background image

5-24

E

XTREME

W

ARE

 E

NTERPRISE

 M

ANAGER

 I

NSTALLATION

 

AND

 U

SER

 G

UIDE

U

SING

 

THE

 I

NVENTORY

 M

ANAGER

 

D

ELETING

 

A

 D

EVICE

 G

ROUP

To delete a device group from the Enterprise Manager database, follow these steps:

1

Click the Delete button at the top of the Inventory Manager main page. 

Select the appropriate tab to display the Delete Device Groups window (see 
Figure 5-16).

Figure 5-16: Device Groups tab of the Delete Devices, Device Groups, and Port 
Groups window. 

2

Select one or more device groups in the Device Groups list, and click Delete.

3

Click OK to confirm that you want to delete the device group information from the 
database. 

D

ELETING

 

A

 P

ORT

 G

ROUP

To delete a port group from the Enterprise Manager database, follow these steps:

1

Click the Delete button at the top of the Inventory Manager main page. 

Select the appropriate tab to display the Delete Port Groups window (see 
Figure 5-17).

Summary of Contents for ExtremeWare Enterprise Manager

Page 1: ... Inc 3585 Monroe Street Santa Clara California 95051 888 257 3000 http www extremenetworks com ExtremeWare Enterprise Manager Installation and User Guide Version 2 0 Published November 1999 Part number 100008 00 Rev A ...

Page 2: ...Summit4 Summit4 FX Summit7i Summit24 Summit48 Summit Virtual Chassis SummitLink SummitGbX SummitRPS the BlackDiamond logo and the Extreme Networks logo are trademarks of Extreme Networks Inc which may be registered or pending registration in certain jurisdictions The Extreme Turbodrive logo is a service mark of Extreme Networks which may be registered or pending registration in certain jurisdictio...

Page 3: ... Management 1 3 Support for Summit Virtual Chassis Stacks 1 3 Policy based Quality of Service 1 4 Simple Inventory Management 1 4 Real Time Statistics 1 5 The MAC IP Address Finder 1 5 Security Management 1 5 ExtremeWare Enterprise Manager Components 1 6 Extreme Networks Switch Management 1 7 Hardware and Software Requirements 1 8 Extreme Networks Device Requirements 1 8 Third Party Device Require...

Page 4: ...AGER Running the Enterprise Manager Under Windows 3 1 Starting or Restarting the Enterprise Manager Server 3 2 Shutting Down the Enterprise Manager Server Components 3 2 Restarting the Enterprise Manager Server Components as Services 3 3 Running the Enterprise Manager Under Solaris 3 4 Starting or Restarting the Enterprise Manager Server 3 4 Shutting Down the Enterprise Manager Server Components 3...

Page 5: ...Groups 5 13 Adding a Device 5 13 Creating a Device Group 5 15 Creating a Port Group 5 17 Modifying Devices Device Groups and Port Groups 5 18 Modifying a Device 5 18 Modifying a Device Group 5 19 Modifying a Port Group 5 21 Deleting Devices Device Groups and Port Groups from the Database 5 22 Deleting a Device 5 22 Deleting a Device Group 5 24 Deleting a Port Group 5 24 Updating Device Information...

Page 6: ... Objects 8 7 Policy Implementation Types 8 8 Policy Scoping 8 8 Policy Auto Configuration 8 8 Third Party Device Support 8 9 Cisco Device Support 8 9 Cisco Port Mappings 8 10 Limitations on Cisco Device Support 8 10 Xedia Device Support 8 11 Limitations on Xedia Device Support 8 11 Using The Policy System 8 13 Creating a New Network Policy 8 15 Using the Create Policy Wizard 8 15 Creating a Policy...

Page 7: ...es 8 55 System Status 8 56 Current State 8 56 Importing Data from NT Domains or Solaris NIS 8 57 Displaying the Event Log 8 58 9 MANAGING VIRTUAL CHASSIS STACKS Overview of Virtual Chassis Stacks 9 1 Identifying Virtual Chassis Stack Topologies 9 2 Displaying the Virtual Chassis Stack Topology 9 3 Displaying A Virtual Chassis Stack 9 5 Displaying A VC Stack Component 9 6 Displaying Orphan VCs 9 7 ...

Page 8: ...HP OpenView under Windows NT A 2 Installing the HP OpenView Integration Components A 2 Uninstalling the Integration Components A 4 Integrating with HP OpenView under Solaris A 4 Installing the HP OpenView Integration Components A 4 Uninstalling the Integration Components A 9 Launching the Client from HP OpenView A 9 Launching the Client from the HP OpenView Tools Menu A 9 Launching ExtremeWare Vis...

Page 9: ...nnection Parameters C 4 Installing a Backup Database C 5 D EXTREMEWARE ENTERPRISE MANAGER PROPERTIES FILES The extreme properties File D 1 The ciscoipports properties File D 2 E TROUBLESHOOTING ExtremeWare Enterprise Manager Server Issues E 1 Installation E 1 SNMP E 2 VLANs E 3 ExtremeWare Enterprise Manager Client E 4 Client Initialization E 4 VLAN Manager E 5 Inventory Manager E 5 Policy System ...

Page 10: ...x ...

Page 11: ... 4 1 User Administration window 4 4 4 2 Edit User window 4 5 4 3 New User and Edit User windows 4 6 4 4 Change Password window 4 8 4 5 Radius Administration page 4 10 5 1 The Inventory Manager applet main page 5 4 5 2 Inventory Manager device group summary status 5 6 5 3 Inventory Manager device status information 5 7 5 4 Inventory Manager information for a Cisco device 5 8 5 5 Inventory Manager D...

Page 12: ...xtremeView applet Configuration summary 6 6 6 6 The ExtremeView applet Configuration details 6 7 6 7 The ExtremeView applet Statistics summary 6 8 6 8 The ExtremeView applet Statistics details 6 9 6 9 The ExtremeView applet Telnet interface 6 10 6 10 The ExtremeView applet record and play buffer 6 11 6 11 An open Telnet session for a switch in the ExtremeView applet 6 13 6 12 An open Telnet sessio...

Page 13: ...icy view for a Client Server policy Definition tab 8 28 8 14 Network QoS Policy view for a Source Port policy Definition tab 8 30 8 15 Network QoS Policy view for a Custom policy Definition tab 8 32 8 16 Network QoS Policy view for a VLAN policy Status tab 8 34 8 17 Network QoS Policy view for a VLAN policy Scope tab 8 35 8 18 Network QoS Policy view for a VLAN policy Overlaps tab 8 37 8 19 Networ...

Page 14: ...t showing device port statistics 10 5 10 3 Warning displayed when Enterprise Manager cannot retrieve data 10 6 10 4 Utilization data over time for an individual port on a device 10 8 10 5 Individual errors in a single port chart 10 9 10 6 Setting 3D graph preferences 10 11 10 7 Setting graph color preferences 10 12 10 8 Setting data color preferences 10 13 10 9 Setting other graph preferences 10 1...

Page 15: ...tremeView Switch Status Indicators 6 4 6 2 ExtremeView Macro Variables 6 12 8 1 Default QoS Treatments 8 43 C 1 dbvalid Command Switches C 2 C 2 Database Connection Parameters for dbvalid Utility C 3 C 3 dbbackup Command Switches C 4 C 4 Database Connection Parameters for dbbackup Utility C 4 ...

Page 16: ...xvi ...

Page 17: ... install and use the ExtremeWare Enterprise Manager software It is intended for use by network managers who are responsible for monitoring and managing Local Area Networks and assumes a basic working knowledge of Local Area Networks LANs Ethernet concepts Ethernet switching and bridging concepts Routing concepts The Simple Network Management Protocol SNMP Note If the information in the Release Not...

Page 18: ...remeWare Enterprise Manager License Agreement Table 1 Text Conventions Convention Description Screen displays This typeface represents information as it appears on the screen The words enter and type When you see the word enter in this guide you must type something and then press the Return or Enter key Do not press the Return or Enter key when an instruction simply says type Key names Key names a...

Page 19: ...ge http www extremenetworks com A link to the ExtremeWare Enterprise Manager User Guide in PDF format may be found at http www extremenetworks com support documentation htm For a general description of ExtremeWare Enterprise Manager and a link to a downloadable evaluation version of ExtremeWare Enterprise Manager version 2 0 go to http www extremenetworks com products datasheets nms htm Customers ...

Page 20: ...XX EXTREMEWARE ENTERPRISE MANAGER INSTALLATION AND USER GUIDE PREFACE ...

Page 21: ...nd delivers a suite of ExtremeWare management tools to meet those needs The ExtremeWare Enterprise Manager is a powerful yet easy to use application suite that facilitates the management of a network of Summit and BlackDiamond switches as well as selected third party switches ExtremeWare Enterprise Manager makes it easier to perform configuration and status monitoring create virtual LANs VLANs and...

Page 22: ...remeWare Enterprise Manager Server supports both Sun SPARC Solaris and Intel Windows NT Support for multiple users with security Users must log in to the application and can be granted different levels of access to the application features Integration with HP OpenView The ExtremeWare Enterprise Manager client can be launched from within the HP OpenView Network Node Manager application Web based cl...

Page 23: ...rise Manager VLAN Manager is an enterprise wide application that manages many aspects of VLANs on Extreme Network s Summit and BlackDiamond switches Any Enterprise Manager user can view status information about the VLANs currently known to Enterprise Manager Users with the appropriate access can create and delete VLANs add and remove ports from existing VLANs and create and modify the protocol fil...

Page 24: ...ts overlaps and conflicts in policies with precedence rules for resolving conflicting QoS rules To facilitate policy setting based on user names or individual desktop systems the Policy System takes advantage of the Dynamic Link Context System DLCS to map a user s name or system to the associated IP and MAC addresses The policy system also supports limited policy configuration for third party devi...

Page 25: ...ected variable s over time and can show utilization history total errors history or a breakdown of individual errors THE MAC IP ADDRESS FINDER The IP MAC Address Finder applet lets you search for network addresses MAC or IP addresses and identify the Extreme Networks switch and port on which the address resides SECURITY MANAGEMENT In order to access the ExtremeWare Enterprise Manager features a us...

Page 26: ...permissions in each switch and instead centralizes the configuration in one location in the ExtremeWare Enterprise Manager EXTREMEWARE ENTERPRISE MANAGER COMPONENTS The ExtremeWare Enterprise Manager software is made up of three major functional components The ExtremeWare Enterprise Manager Server which is based on the Sun Java Web Server The server is responsible for downloading applets running s...

Page 27: ...olling the ExtremeWare Enterprise Manager uses a mechanism called SmartTraps to identify changes in device status and configuration When an Extreme switch is added to the ExtremeWare Enterprise Manager database the Enterprise Manager creates a set of SmartTraps rules that define what events status and configuration changes the Enterprise Manager needs to know about These rules are downloaded into ...

Page 28: ...E AND SOFTWARE REQUIREMENTS The following sections specify the hardware and software you need to run the ExtremeWare Enterprise Manager software EXTREME NETWORKS DEVICE REQUIREMENTS The ExtremeWare Enterprise Manager can manage Extreme Networks Summit and BlackDiamond switches running the ExtremeWare software release 2 0 or later within the switch However features such as the Policy Based Manageme...

Page 29: ...isk if the disk is using the FAT file system i e 200MB on a 1 GB disk 400 MB on a 2GB disk and so on You can tell the type of file system by looking at the disk properties 200 Mhz Pentium compatible processor CDROM drive for installation A network connection For installation under Solaris the requirements are Solaris Operating Environment 2 6 or Solaris 7 with patches as specified below 128 MB RAM...

Page 30: ...6 or Solaris 7 A Java enabled browser see Client Requirements CLIENT REQUIREMENTS The client can run using the following browsers Microsoft Internet Explorer version 4 72 or later under Windows 95 or Windows NT with the 5 0 JVM Microsoft Internet Explorer 5 0 is recommended Netscape Navigator version 4 0 7 and later under SPARC Solaris 2 5 1 2 6 or 7 or HPUX 10 20 The client system must have a mon...

Page 31: ... Solaris Operating Environment The ExtremeWare Enterprise Manager client runs in a Java enabled browser It can be either be accessed remotely with each module downloaded from the Enterprise Manager server as required or the client applet can be installed locally on the client system Local installation will speed up the process of loading each of the modules compared to downloading them from the se...

Page 32: ...prise Manager components under Windows NT you must have Windows NT administrator privileges If you have a previous release of ExtremeWare Enterprise Manager installed 1 0 or 1 1 the installation script will also handle migrating your database information to the new Enterprise Manager 2 0 installation Note To update an evaluation copy of the Enterprise Manager to a licensed copy without reinitializ...

Page 33: ...e installing on a disk that uses the FAT file system rather than the NTFS file system a warning message pops up when you click Next This is because the ExtremeWare Enterprise Manager software can take up as much as 20 of your partition regardless of the size of the partition 10 In the Installation Type dialog box select the set of files to install Click Typical Install to install all the files pro...

Page 34: ...l versions except the one you want to upgrade before you start the new installation The installation software then copies the ExtremeWare Enterprise Manager program files from the CD to your system 16 When the files are copied the Install as a Service dialog box asks if you want to install the ExtremeWare Enterprise Manager database and web server components as a Windows NT service Click Yes to in...

Page 35: ...Appendix A and follow the instructions To skip the HP OpenView integration process click No 19 If you want to view the Readme file click the check box then click Finish to complete the installation process 20 Finally you are asked whether you want to reboot your system If you choose not to do so at this time you must reboot the server before you can run the ExtremeWare Enterprise Manager server so...

Page 36: ...operties window and stop both the EEM Web Server and EEM Database Engine You must have NT Administrator privileges to access this function If they are running as regular applications open the ExtremeWare Enterprise Manager 2 0 Server MS DOS window from the Task bar and type Ctrl C at the DOS command prompt to shut down the Enterprise Manager Web Server To shut down the Sybase Adaptive Server Anywh...

Page 37: ...u install the Enterprise Manager Server it initializes the database If you attempt to re install the server once you have installed it the installation process reinitializes the database and your existing data and configurations will be lost To update an evaluation copy of the Enterprise Manager to a licensed copy without reinitializing the database follow the update procedure described in the sec...

Page 38: ...t this license to continue the installation Press space to page through the license Press enter to view the license 4 When you press enter the text of the license is displayed You can use the space bar to page through it When you reach the end you are asked Do you agree to the above conditions Y N 5 Enter Y if you agree and want to proceed Enter N to terminate the installation process This questio...

Page 39: ...sked for a set of configuration information To configure ExtremeWare Enterprise Manager EEM we will need to ask you for some information In most case the default answers will work correctly 8 First you are asked whether you want to upgrade from a previous version of ExtremeWare Enterprise Manager Upgrade Parameters If there is a previous installation of EEM installed you may import the database an...

Page 40: ...the Enterprise Manager Web Server will use to communicate with the database or enter a different port number You can use any port number a number between 1024 and 9999 is recommended except a port number already in use by another process 11 You are now asked for three ports that the Enterprise Manager Web Server will use Web Server Parameters EEM runs as a web server and by default accepts HTTP re...

Page 41: ...rt the port you entered or 9091 Are these correct Y to accept N to re enter N 13 If you accept the parameters by entering Y the installation script will finish with the following messages Installing License License installed Done Updating WebServer properties server javawebserver webpageservice servlets pr operties Updating WebServer properties server javawebserver webpageservice endpoint pr opert...

Page 42: ...you can run the client in a supported web browser with the following URL http host port host and port are the name of the system you ve just installed on and the HTTP port you entered or 80 if you accepted the default UPDATING AN EVALUATION VERSION TO A LICENSED VERSION To update an evaluation copy of the ExtremeWare Enterprise Manager to a fully licensed copy use the utility provided Note DO NOT ...

Page 43: ... Manager server software from a Solaris host stop the server using the stopserv command then remove the all the files in the installation directory To remove the Enterprise Manager server software follow these steps 1 Run the stopserv command found in the root installation directory The installation directory is the directory path where you installed the Enterprise Manager components For example i...

Page 44: ...oaded from Netscape Communications Go to the Netscape developer web site at http developer netscape com software for more information From there you can find links to download the Communicator and the JDK 1 1 for the Communicator On Windows NT systems the Enterprise Manager client software can be downloaded and installed on the client system but does not require local installation If you do not in...

Page 45: ...ult web server port 80 you do not need to include the port number The Enterprise Manager Start up page appears as shown in Figure 2 1 Figure 2 1 ExtremeWare Enterprise Manager Start up page 2 From the Enterprise Manager Start up page click Launch Installed ExtremeWare Enterprise Manager The first time you choose this link a page will pop up informing you that a signed applet is going to be downloa...

Page 46: ...he links on the page or click the More Info button 4 When the download is complete the ExtremeWare Enterprise Manager Login page appears UNINSTALLING THE CLIENT APPLET You can remove the downloaded client as follows 1 From Internet Explorer select Internet Options from the View menu 2 On the General tab under the Temporary Internet Files section click Settings 3 Click View Objects to display the D...

Page 47: ...tor access privileges Neither account has a password Follow the instructions in Chapter 4 to change the admin password and to create additional Enterprise Manager user accounts RUNNING THE ENTERPRISE MANAGER UNDER WINDOWS The following instructions assume that the Windows NT operating system is already running and that the ExtremeWare Enterprise Manager server software is already installed If you ...

Page 48: ...se Manager in the Programs menu to display the ExtremeWare Enterprise Manager menu 4 Click ExtremeWare Enterprise Server This runs runserve exe a program that starts the two components in the required order Two windows are displayed as the Enterprise Manager Server starts up Sybase Adaptive Server Anywhere This window is iconified and placed on the right side of the Windows task bar A MS DOS windo...

Page 49: ...SERVICES To restart the ExtremeWare Enterprise Manager components as services follow these steps 1 From the Start menu highlight Settings pull right and click on the Control Panel This displays the Control Panel folder 2 From the Control Panel folder double click Services This displays the Services Properties window You must have NT Administrator privileges to access this function 3 From the list ...

Page 50: ...Enterprise Manager components If you installed in the default directory the path is opt eem20 2 Invoke runserve to start the three Enterprise Manager components in the required order runserve SHUTTING DOWN THE ENTERPRISE MANAGER SERVER COMPONENTS To shut down the Enterprise Manager Server 1 Set the current directory cd install_dir install_dir is the directory path where you installed the Enterpris...

Page 51: ...X To run the ExtremeWare Enterprise Manager client interface 1 Launch your Web browser 2 Enter the following URL http host port In the URL replace host with the name of the system where the ExtremeWare Enterprise Manager server is running Replace port with the TCP port number that you assigned to the ExtremeWare Enterprise Manager Web Server during installation Note If you used the default web ser...

Page 52: ...Launch ExtremeWare Enterprise Manager to launch the Enterprise Manager using the JVM in the browser Click Launch Installed ExtremeWare Enterprise Manager Client to run the client applet locally If the most current version of the client applet has not been downloaded you will be prompted to download it see Installing the Enterprise Manager Client in Chapter 2 For Solaris or HPUX running Netscape Na...

Page 53: ... will be prompted to download it and will be led through the brief installation process The ExtremeWare Enterprise Manager Login page appears as shown in Figure 3 2 Figure 3 2 ExtremeWare Enterprise Manager Login page Note There are two default user accounts the Administrator account admin and the user account user with Monitor access privileges Initially those accounts have no password Chapter 4 ...

Page 54: ...ccounts If you are a new user without your own account on the Enterprise Manager server log in as user You will be able to view information in the various modules but will not be able to change any configurations 2 Type your password in the Password field Both default names user and admin initially have no password so you can leave the field blank 3 Click Login If you are using an evaluation copy ...

Page 55: ... to access various Enterprise Manager modules About returns you to the display shown in Figure 3 3 Inventory runs the Inventory Manager VLAN runs the VLAN Manager VC runs the Virtual Chassis Stack Manager Admin runs the Administration module where a user with Administrator access can administer ExtremeWare Enterprise Manager user accounts Other users can change their own password using this applet...

Page 56: ...tatistics applet Find IP MAC runs the MAC IP Address Finder applet Logoff ends your session and returns you to the Login display The main applet frame is used to display the active Enterprise Manager applet For example in Figure 3 4 the VLAN Manager is displayed in the main applet frame Figure 3 4 VLAN Manager applet running in a browser window Component Tree Component status detail Applet functio...

Page 57: ... the Component Tree shows all the Extreme and third party devices known to the ExtremeWare Enterprise Manager In the VLAN Manager the Component Tree displays VLANs as shown in Figure 3 4 In the Virtual Chassis Stack Manager the Component Tree displays all the known Virtual Chassis stacks In the Policy System client the Component Tree shows the categories of elements you can work with in the Policy...

Page 58: ...lt device group The component status detail panel displays summary status information about each device in this device group A red circle with the white S next to a device indicates that the device is not reachable through SNMP This indicator may appear in any of the applets where a list of switches is displayed The buttons and frame contents change depending on which applet you are viewing and al...

Page 59: ...olumn separator 3 Drag the separator until the column is are the desired width You can sort the rows of a columnar display according to the contents of any individual column To sort the rows click on the column heading you want to use as the sort criteria Click once to sort in ascending order click a second time to reverse the sort order APPLET FUNCTION BUTTONS For all ExtremeWare Enterprise Manag...

Page 60: ...ds such as the Protocol Filter field in Figure 3 6 Click in the field to drop down a menu of choices then click on your selection to enter the value into the field List box fields such as the Available Switches field in Figure 3 6 Click to highlight a value in the field Click again to unselect a value If there are more entries in the list than can be displayed in the box a scrollbar is provided at...

Page 61: ... authentication OVERVIEW OF USER ADMINISTRATION In order to log in to the ExtremeWare Enterprise Manager and use its management features you must have a user name and password You can also use the Enterprise Manager and its Remote Authentication Dial In User Service RADIUS server to configure access permissions for Extreme switches ENTERPRISE MANAGER ACCESS The Enterprise Manager provides three le...

Page 62: ...y of the Enterprise Manager EXTREMEWARE ACCESS Through the Enterprise Manager two levels of access to Extreme switches can be enabled User users who can view device status information and statistics but cannot modify any parameters Administrator users who can modify device parameters as well as view status information and statistics These permissions enable access to Extreme Networks switches thro...

Page 63: ... host port In the URL replace host with the name of the system where the ExtremeWare Enterprise Manager server is running Replace port with the TCP port number that you assigned to the ExtremeWare Enterprise Manager Web Server during installation Note If you used the default web server port 80 you do not need to include the port number The Enterprise Manager Start up page appears 3 Launch the Ente...

Page 64: ...E MANAGER Figure 4 1 User Administration window CHANGING THE ADMIN PASSWORD To change the Admin password 1 Click the tab at the top of the page to display the User Administration page if necessary 2 Select the user admin in the User list 3 Click Modify The Edit User window appears as shown in Figure 4 2 ...

Page 65: ... Verify Password field 6 Click OK The new admin password is stored in the Enterprise Manager database You cannot change the ExtremeWare Enterprise Manager access level for this user You can however change the ExtremeWare account access The default for the ExtremeWare Enterprise Manager user Admin is Administrator See the information under Adding or Modifying User Accounts for details on the Extrem...

Page 66: ...bout ExtremeWare Enterprise Manager window click Admin in the Navigation Toolbar The User Administration window appears 3 Click the tab at the top of the page to display the User Administration page if necessary 4 To add a user click Add To change a user s access or password select the user name and click Modify The New User window or Edit User window appears Figure 4 3 Figure 4 3 New User and Edi...

Page 67: ...trator access allows the user to modify device parameters as well as view status information and statistics User access allows the user to view device status information and statistics but cannot modify any parameters No Access provides no access privileges but keeps the user account information in the Enterprise Manager database 10 Click OK The new user information is stored in the Enterprise Man...

Page 68: ...removing the user account from the Enterprise Manager database use the Modify User function and change the Account Access to Disabled CHANGING YOUR OWN USER PASSWORD If you have Manager or Monitor access you can change your own password at any time after you have logged in to the ExtremeWare Enterprise Manager To do so follow these steps 1 Click Admin in the Navigation Toolbar The Change Password ...

Page 69: ... Verify Password field 4 Click Apply Your new password is stored in the Enterprise Manager database Note The change does not take effect until the next time you log in RADIUS ADMINISTRATION If you have Adminstrator access you may enable or disable the RADIUS server and change its port or the RADIUS secret To modify the RADIUS server settings follow these steps 1 From the User Administration page c...

Page 70: ...If you change the secret in the RADIUS server you must also change it in any of the RADIUS clients Extreme switches that use the RADIUS server for user authentication 3 To change the port type a new port number in the Port field Note If you change the RADIUS server port you must also change the port in any of the RADIUS clients Extreme switches that use the RADIUS server for user authentication 4 ...

Page 71: ...tch directly through Telnet or a browser the RADIUS server will provide the authentication service Disabling the RADIUS server means that it will not be available for authenticating users In this case each Extreme switch must maintain its own list of users and access permissions and users will need to remember a possibly different login and password for every switch ...

Page 72: ...4 12 EXTREMEWARE ENTERPRISE MANAGER INSTALLATION AND USER GUIDE ADMINISTERING THE EXTREMEWARE ENTERPRISE MANAGER ...

Page 73: ...the database OVERVIEW OF THE ENTERPRISE MANAGER DEVICE INVENTORY The Inventory Manager applet keeps a database of all the network devices managed by the ExtremeWare Enterprise Manager ExtremeWare Enterprise Manager Version 2 0 can discover and manage Extreme switches and several models of Cisco and Xedia devices The ExtremeWare Enterprise Manager 2 0 software provides an automatic discovery functi...

Page 74: ...g finance or by any other criteria that makes sense within the managed network environment An individual device may belong to one and only one device group All devices become members of a device group when they are added to the Enterprise Manager database either through Add Devices or as a part of the Discovery process A device may then be moved to another device group as appropriate PORT GROUPS P...

Page 75: ...ps to send to the Enterprise Manager When the Enterprise Manager receives a trap from a switch it then polls the switch for detailed status information The Enterprise Manager polls every network device periodically approximately every five minutes by default to update basic switch status a subset of the status and configuration information kept in the database A user with Administrator or Manager ...

Page 76: ...rise Manager Until this is done no devices are displayed in the Inventory Manager The Device Groups currently defined in the Enterprise Manager are displayed in the Component Tree in the left panel The panel on the right shows the All Device Groups page a list of the currently defined device groups with their descriptions The first time you run the ExtremeWare Enterprise Manager there will be only...

Page 77: ...roups and port groups to the database Delete removes a device device group or port group from the database Modify lets you change the members of a device group or port group or update a device s contact parameters in the database Sync updates the Enterprise Manager database with current device configuration and status information Help displays an on line help page for the Inventory Manager VIEWING...

Page 78: ...anager Device Status Indicators Status Light Device Status Green Device is up and OK Yellow Device is responding but reports an error condition such as a fan or power supply failure or excessive temperature Red Device is not responding to Enterprise Manager status queries This may mean that the device is down that it is unreachable on the network or that the SNMP community strings have changed and...

Page 79: ...d command Select a switch in the Component Tree on the left to display detailed configuration and status information as shown in Figure 5 3 This display shows additional information that the Enterprise Manager has gathered from the switch agent Figure 5 3 Inventory Manager device status information The information displayed in Figure 5 3 is for an Extreme switch The ExtremeWare software running in...

Page 80: ...vice DISCOVERING NETWORK DEVICES ExtremeWare Enterprise Manager 2 0 provides an automatic Discovery function that lets you discover network devices by IP address To discover network devices do the following 1 Click the Discovery button at the top of the Inventory Manager main window The Discover Devices window as shown in Figure 5 5 is displayed ...

Page 81: ... the device address range you want to discover You may specify the range in one of two ways As an IP Address with Wildcards such as 10 203 10 or 10 203 Valid wildcard characters are and dash acts as a wildcard for the entire octet 0 255 is a wildcard for a single digit 0 9 lets you specify a range for any octet You can use this in more than one octet Note You cannot combine the dash with another w...

Page 82: ... decision is based on the IP address as well as the subnet mask 4 Specify or verify the Subnet Mask size as appropriate The value in the Subnet Mask field is the number of bits to be masked starting from the high order left hand octet The default subnet mask of 24 will mask the three high order octets 5 Specify or verify the SNMP Read Community string so that the Enterprise Manager will be able to...

Page 83: ...refine the discovery criteria Note If a discovery request is too large your browser may not have sufficient memory resources available to handle it It is recommended that you break a large discovery task into multiple separate tasks A Discovery Results window is displayed as soon as the discovery process begins as shown in Figure 5 6 The panel at the bottom of the window shows the progress of the ...

Page 84: ...he add will fail for those devices 11 A window Figure 5 7 pops up where you must set additional device options such as a write community string the device group to which the devices should be added and a default device login and password If there are Cisco devices among the set being added you must also enter a Cisco enable password Enter or make changes to any of these fields These options will a...

Page 85: ...he Add has finished the Discovery Results window is re displayed You can select more devices and specify a different set of Inventory Device Options and add those devices to the Inventory Manager ADDING DEVICES DEVICE GROUPS AND PORT GROUPS Users with Administrator or Manager access can add devices to the ExtremeWare Enterprise Manager database and create Device Groups and Port Groups If you have ...

Page 86: ... in place of the Switch IP address 3 Select the device group to which this device should belong It can belong to only one device group Default is the default group for managed devices 4 To clear the contents of the fields and reset them to their default values click Reset 5 To add the new device into the database click Add When you click Add the Inventory Manager adds the devices to the database I...

Page 87: ...g 2 first floor second floor by department engineering marketing finance or by any other criteria that makes sense within the managed network environment Every device belongs to one and only one device group All devices become members of a device group when they are added to the Enterprise Manager database either through Add Devices or as a part of the Discovery process A device may then be moved ...

Page 88: ...and click Add To add all devices in the Available Devices list click Add All 4 To remove a device from the device group select the device in the Included Devices list and click Remove The device will be moved from the selected device group to the Default device group To return all devices in the Included Devices list to the Default device group click Remove All 5 Repeat steps 3 and 4 until you hav...

Page 89: ...e is no default port group and ports do not need to be members of a group However they can belong to only one port group at a time Port groups are useful as policy objects allowing a single policy definition to apply to multiple ports even across devices To create a port group follow these steps 1 Click the Add button at the top of the Inventory Manager main window Select the appropriate tab to di...

Page 90: ...Use Remove All to clear the Selected Ports list 6 Repeat steps 3 through 5 until you have included all the ports that should be members of this port group 7 To add the new port group to the database click the Add button at the bottom of the window MODIFYING DEVICES DEVICE GROUPS AND PORT GROUPS You can use the Modify function to modify the access parameters for an individual device or to add and d...

Page 91: ...ssword are the login and password needed in order to Telnet to the device or to use ExtremeWare Vista 4 Click Reset to change the fields back to their original values 5 Click Modify to add the changed information to the ExtremeWare Enterprise Manager database 6 Click Cancel to cancel the Modify process MODIFYING A DEVICE GROUP To add or remove devices in a device group do the following 1 Click the...

Page 92: ...he Device Group Name and Description fields 4 To add a device to the selected device group select the device in the Available Devices list and click Add To add all devices in the Available Devices list click Add All 5 To remove a device from the device group select the device in the Included Devices list and click Remove The device will be moved from the selected device group to the Default device...

Page 93: ...e group or change its description do the following Figure 5 14 Port Groups tab of the Modify Devices Device Groups and Port Groups window 1 Select the port group you want to modify from the Port Groups pull down list 2 To change the name or description type the new text into the Port Group Name field and the Description field 3 To remove a set of ports from the Selected Ports list select the ports...

Page 94: ...his port group 7 To replace the modified port group in the database click the Modify button at the bottom of the window DELETING DEVICES DEVICE GROUPS AND PORT GROUPS FROM THE DATABASE Users with Administrator or Manager access can delete devices device groups and port groups from the ExtremeWare Enterprise Manager database If you have Monitor access only you can not access this function DELETING ...

Page 95: ...K to confirm that you want to delete the device information from the database Deleting a device removes the information about the device from the Enterprise Manager database This means that the device can no longer be monitored and managed from the ExtremeWare Enterprise Manager application If the device is an Extreme switch deleting it removes any SmartTraps rules both from the database and the s...

Page 96: ...dow see Figure 5 16 Figure 5 16 Device Groups tab of the Delete Devices Device Groups and Port Groups window 2 Select one or more device groups in the Device Groups list and click Delete 3 Click OK to confirm that you want to delete the device group information from the database DELETING A PORT GROUP To delete a port group from the Enterprise Manager database follow these steps 1 Click the Delete ...

Page 97: ...nt to update the configuration and status information for one or more devices in the ExtremeWare Enterprise Manager database The Sync operation is a manual update you can use if you feel that the device configuration is not correctly represented in the Enterprise Manager applets It updates all information for a selected set of devices except for the contact information If you have Administrator or...

Page 98: ...ynchronize Devices dialog 2 Select one or more devices in the Device list 3 Click Sync to initiate the synchronization process The Inventory Manager uses SNMP to retrieve configuration and status information from each selected switch and updates the database with that information 4 Click Reset at any time prior to initiating the Sync to deselect all you device selections and start over 5 The Sync ...

Page 99: ... Summit and Black Diamond switches Any Enterprise Manager user can view status information about these network devices known to the Enterprise Manager Users with Administrator or Manager access can view and modify configuration information for those switches using either the ExtremeWare Vista graphical user interface or using Telnet and the ExtremeWare Command Line Interface CLI You can also use t...

Page 100: ...s for all network devices as well as status and configuration information for individual devices through a front panel view as well as a table of information Configuration displays configuration information based on the configuration categories in ExtremeWare Vista You can view summary configuration information as well as configuration information for individual switches organized by ExtremeWare V...

Page 101: ...h logs into the switch and performs the scripted commands You can also use this applet to run an interactive Telnet session to an individual switch VIEWING SWITCH STATUS INFORMATION Select Status in the Component Tree to display a summary status of the Extreme switches known to the Enterprise Manager see Figure 6 2 Figure 6 2 The ExtremeView applet Status summary The status lights show the status ...

Page 102: ...nformation that the Enterprise Manager has gathered from the switch agent Figure 6 3 The ExtremeView applet switch status Table 6 1 ExtremeView Switch Status Indicators Status Light Switch Status Green Switch is up and OK Yellow Switch is responding but reports an error condition such as a fan or power supply failure or excessive temperature Red Switch is not responding to Enterprise Manager statu...

Page 103: ... 6 4 in two ways By selecting the port with the cursor in the switch diagram By displaying the list of ports in the Component Tree and selecting the port Figure 6 4 The ExtremeView applet port status You can remove the text fields by clicking anywhere on the page outside the switch image VIEWING SWITCH CONFIGURATION INFORMATION Select Configuration in the Component Tree to display a configuration ...

Page 104: ...ormation that are available through this applet These correspond to pages from the ExtremeWare Vista application running on the switch Select one of these categories to display a list of switches and select a switch to view the configuration settings for that switch in the category you ve chosen As shown in Figure 6 6 this displays the current switch configuration and provides an interface through...

Page 105: ...LLATION AND USER GUIDE 6 7 VIEWING SWITCH CONFIGURATION INFORMATION Figure 6 6 The ExtremeView applet Configuration details When you have made the necessary configuration changes click Submit to send these to the switch for implementation ...

Page 106: ...are the categories of statistical information that are available through this applet These correspond to pages of information from the ExtremeWare Vista application running on the switch Select one of these categories to display a list of switches and select a switch to view the configuration settings for that switch in the category you ve chosen This displays the selected set of statistics for th...

Page 107: ...e Telnet applet allows the scripting and playback of groups of CLI commands macros to a selection of Extreme switches You can also use this applet to run an interactive telnet session on an individual switch including third party switches Select Telnet in the Component Tree to display a list of the telnet sessions for the Extreme switches in the Enterprise Manager database see Figure 6 9 ...

Page 108: ...he status of any macros that have run or are being run on the switch Switches with open Telnet connections are also shown in bold in the list of switches under the Telnet component in the Component Tree Note If a switch displayed in the Component Tree has an S in a red circle along with the name that means that the switch is not responding to SNMP requests However the switch may still respond to H...

Page 109: ...ayed to the set of switches you select in the Telnet Connections list Figure 6 10 The ExtremeView applet record and play buffer To create a macro for playback to a set of Extreme switches follow these steps 1 Select the set of switches in the Telnet Connections list where you want your command macro to run The switches do not need to have a telnet session already open the macro play function will ...

Page 110: ...olumn in the Telnet Connections table indicates the status of the macro as execution progresses on the selected switches The four states are Pending the macro is intended to run on this switch but has not yet started Playing the macro is currently running Cancelled the macro was cancelled before it completed Complete the macro has completed running Note Macro play will be automatically stopped if ...

Page 111: ...ess of the macro as the various ExtremeWare commands are executed RUNNING AN INTERACTIVE TELNET SESSION ON AN INDIVIDUAL SWITCH You can open a Telnet session on an individual switch and execute commands interactively by selecting the switch from the Telnet switch list in the Component Tree This opens a Telnet session to the selected switch and then waits for command input just as with any other Te...

Page 112: ...h You can also type in commands individually You cannot use the macro variables NAME DATE TIME ADDRESS in a command you enter interactively COPY PASTE FROM AN INTERACTIVE TELNET SESSION A copy and paste function is available from an interactive Telnet session Copy and paste lets you copy from one interactive Telnet session into another interactive session or into the Macro Record Play Buffer It is...

Page 113: ... Record from the pop up menu Everything you type after this until you select Stop Record from the pop up menu will be copied into the macro Record Play Buffer To stop recording a macro click the right mouse button and select Stop Record from the pop up menu To play back the macro to multiple switches select Telnet in the Component tree and play back the macro in the main Telnet page as discussed i...

Page 114: ...e running a Telnet session on any other client The Telnet session window is a two tone window the bottom of the window is white the top is grey The last 25 lines of Telnet commands and responses always appear in the white portion of the window As output grows the older lines scroll up into the grey portion of the screen This makes it easy to tell whether you are viewing the most recent Telnet outp...

Page 115: ...difying VLANs Adding and deleting protocol filters OVERVIEW OF VIRTUAL LANS A Virtual LAN is a group of location and topology independent devices that communicate as if they were on the same physical local area network LAN Extreme switches have a VLAN feature that enables you to construct broadcast domains without being restricted by physical connections The VLAN Manager creates and manages VLAN f...

Page 116: ...eme switches can be created according to the following criteria Physical port 802 1Q tag Protocol sensitivity using Ethernet LLC SAP or LLC SNAP Ethernet protocol filters A combination of these criteria In the Enterprise Manager a VLAN is defined uniquely by its Name 802 1Q tag if defined Protocol filters applied to the VLAN As a result multiple switches are shown as members of the same VLAN whene...

Page 117: ...t are members of a selected VLAN Note You must add switches to the ExtremeWare Enterprise Manager database through Discovery or by using the Add function in the Inventory Manager Until you add a switch to the database you cannot create any VLANs on that switch Information about VLAN configurations is obtained when a switch is added to the database The VLAN Manager can display information either by...

Page 118: ...7 1 Select By Switch to display every switch in the component tree and showing under the switch each VLAN that owns ports on the switch as shown in Figure 7 2 Figure 7 2 VLAN topology shown by switch You can display details about the component ports of a VLAN by selecting the VLAN or switch in the tree on the left The panel on the right displays detailed information about the selected component as...

Page 119: ...WARE ENTERPRISE MANAGER INSTALLATION AND USER GUIDE 7 5 DISPLAYING VLANS Figure 7 3 VLAN member ports on a selected switch Figure 7 3 presents details about which ports in a VLAN belong to the selected switch ...

Page 120: ...are found in the selected VLAN ADDING A VLAN Users with Administrator or Manager access can create VLANs on the Extreme switches managed by the ExtremeWare Enterprise Manager If you have Monitor access only you can not use this function To add a new VLAN do the following 1 Click the Add button in the VLAN Manager panel The Add VLAN dialog box Properties Ports page is displayed as shown in Figure 7...

Page 121: ...ify a protocol select ANY This means the filtering rules will match all unfiltered protocols 4 If the VLAN is to be tagged enter a 802 1Q tag value in the Tag field The tag value can be a number between 2 and 4095 By entering a tag number you enable tagging for this VLAN Enter the text untagged or 0 zero to indicate that the VLAN is to be untagged 5 To add a port to the VLAN first select the switc...

Page 122: ...lect the switch without selecting any ports and click Tagged or Untagged to add the switch to the VLAN 8 To remove a port from the VLAN select the port from the Ports in VLAN list and then click Remove 9 When you have finished adding ports to the VLAN click Apply to have the changes take effect The VLAN is created on the switches whose ports are members of the new VLAN Once you have added a VLAN y...

Page 123: ... DELETING A VLAN Users with Administrator or Manager access can delete VLANs from the Extreme switches managed by the ExtremeWare Enterprise Manager If you have Monitor access you will not be able to use this function To delete a VLAN follow these steps 1 Click the Delete button in the VLAN Manager panel The Delete VLAN dialog is displayed as shown in Figure 7 7 Figure 7 7 The Delete VLAN page 2 S...

Page 124: ...e Modify VLAN dialog Properties Ports page is displayed as shown in Figure 7 8 Figure 7 8 The Modify VLAN dialog Properties and Ports page 2 Select a VLAN from the drop down list in the VLAN Name field The current values for the VLAN are displayed Note The Ports in VLAN list does not display SummitLink ports because you cannot modify them 3 To change the Protocol Filter selection select a differen...

Page 125: ...not be able to add a port as a tagged port If a port is added as an untagged port it is automatically removed from any other VLAN which uses the same protocol as the new VLAN and where the port is an untagged member You can add a switch to a VLAN as a unit just select the switch without selecting any ports and click Tagged or Untagged to add the switch to the VLAN 9 When you have finished adding a...

Page 126: ...orwarding for this VLAN on the switch 13 Click Apply to have the changes take effect ADDING AND DELETING PROTOCOL FILTERS Users with Administrator or Manager access can view add and delete protocol filter definitions If you have Monitor access you can view filter definitions but not add or delete them To view delete or add protocol filter definitions do the following 1 Click Protocol Filters in th...

Page 127: ... ExtremeWare Enterprise Manager Any filters that are in use by a VLAN are indicated with an asterisk in the In Use column 2 To delete a protocol filter select a filter in the list and click Delete This deletes the protocol filter from all Extreme switches managed by the ExtremeWare Enterprise Manager as well as from the Enterprise Manager database Note If a filter is in use by a VLAN you will not ...

Page 128: ... naming 3 Select a protocol type from the pull down list in the type column 4 Type a corresponding four digit hexadecimal filter value in the value field 5 Repeat steps 3 and 4 to enter up to six type value pairs 6 When you have finished entering the definition click Add to add the new protocol filter to the Enterprise Manager database Note The protocol filter is now available to be used on any sw...

Page 129: ...ERVIEW OF THE POLICY SYSTEM Policy based management is used to protect and guarantee delivery of mission critical traffic A network policy is a set of high level rules for controlling the priority of and amount of bandwidth available to various types of network traffic Through ExtremeWare Enterprise Manager policies can be defined in terms of individual users and desktop systems not just by IP or ...

Page 130: ... a port on an Extreme switch You only need to specify the application which translates to a well known Layer 4 port and server when you create the policy and the Plolicy System maps this to the appropriate port As shown in Figure 8 1 below the policy you specify is implemented as Source Port QoS on the traffic outbound from source port and as IP QoS for the traffic inbound to via source port to th...

Page 131: ...e 8 2 Client Server Policy For a client server policy as with an application policy you can specify only one application e g HTTP FTP Baan as the endpoint but multiple servers not shown in the diagram In addition you can select multiple client endpoints and the Policy System will generate IP QoS rules that it will apply to traffic bi directionally along the entire route between server and client N...

Page 132: ...t to which those names map For more details see the section Source Port Policy Definition Tab on page 8 30 VLAN Policy maps a QoS treatment to traffic from one or more VLANs You specify the VLANs from which the traffic will originate and the Policy System maps this to the switches and ports involved As shown in Figure 8 4 below the Policy System implements VLan QoS for all the traffic flows from t...

Page 133: ...icy only endpoints for one side of the policy need to be entered The other side of the policy is always ANY and the traffic direction is always bi directional BASIC POLICY DEFINITION A QoS policy in the ExtremeWare Enterprise Manager Policy System is defined as shown in Figure 8 5 A policy is composed of A name and description that you supply when you create the policy Definitions of the origin an...

Page 134: ... steps 1 Converts the endpoint components application components and traffic direction components into traffic patterns 2 Converts the policy treatment into QoS profiles 3 Combines the traffic patterns and QoS profiles into QoS rules 4 Uses the policy scope to determine to which device s the QoS rules should be applied see Policy Scoping 5 Resolves any QoS rule conflicts using precedence relations...

Page 135: ...ugh the Import capability or individually using the GUI User Groups are sets of individual Users that are grouped to allow them to be acted upon as a unit The individual Users are mapped to End Stations either via DLCS or manually using the GUI The End Stations are then mapped to IP addresses and physical ports as described above Port Groups These are defined in the Inventory Manager and enable a ...

Page 136: ...ed by the type and components of the policy you define Note Source Port QoS depends on 802 1Q tagging to carry the QoS parameters across switch boundaries and VLAN QoS depends on tagging to carry QoS parameters across VLAN boundaries To allow these QoS types to be effective end to end you should make sure your switch to switch links use tagged ports POLICY SCOPING A policy may apply to the entire ...

Page 137: ...oS policy rules CISCO DEVICE SUPPORT ExtremeWare Enterprise Manager supports Cisco devices running Cisco IOS version 11 2 Later software versions may work but have not been tested ExtremeWare Enterprise Manager 2 0 has been tested with the following models running Cisco IOS 11 2 Cisco 2500 Cisco 3600 Cisco 4000 Cisco 7505 Other models may also work but have not been tested See the ExtremeWare Ente...

Page 138: ...are Enterprise Manager Properties Files for a listing of this file as it shipped with ExtremeWare Enterprise Manager release 2 0 LIMITATIONS ON CISCO DEVICE SUPPORT There are certain policies that cannot be fully implemented on Cisco devices to make them function exactly like Extreme devices Maximum bandwidth parameter in a QoS profile The maximum bandwidth parameter is not used when ExtremeWare E...

Page 139: ...ventory You must make sure that the root CBQ class exists on the output of the interface where policies are to be configured and that the row status is active Enterprise Manager only creates CBQ classes that implement policies below the active root CBQ classes on the outputs of each interface The root class must be named root output tree By default all the root classes with the name root output tr...

Page 140: ...le for a 10Mbps ethernet interface transporting small 64 byte packets the actual throughput may be only 7 2 Mbps In this case you should set the bandwidth allocation parameter to a value that is approximately 3 below this actual bandwidth 6 8 Mbps in order for the CBQ class configuration to be effective For larger packets the actual bandwidth will more closely approach the nominal bandwidth of the...

Page 141: ...e definition and function of each of these elements Figure 8 6 The Policy System main view Network Policy lets you display and define high level policies that translate into the specific QoS rules operating within your enterprise network You can define the overall policies and the treatments that can be used in a policy Users lets you define individual users or groups of users as named policy obje...

Page 142: ...the top of the Policy System page These are from left to right Up moves you one level higher in the component tree New displays a menu from which you can choose to create a new Policy or policy object User User Group End Station End Station Group or Port Set Delete lets you delete an item you ve selected after asking for confirmation Create Policy invokes a Policy Wizard that leads you through a s...

Page 143: ... wizard as described below You can use the Back button to back up to a previous page and change your entries You can go back to a previous page at any time until you click the Finish button which is not available until you reach the last page of the wizard 2 On the first page enter a name for the policy required and a description of the policy optional then click Next to proceed to the next page 3...

Page 144: ...other policy types 4 Click Next to go to the Client s Server s page and specify the servers and clients that will determine the traffic flows to which this policy will apply a To select a server click the policy object selector button see Figure 8 7 at the right of the Servers field You can specify the servers by using any of the available high level objects Users User groups End Stations End Stat...

Page 145: ...you want to include from the pop up menu Select individual clients and add or remove them from the Selected items list You can display lists of other types of clients by selecting from the pull down list in the Show Type field 5 Click Next to go to the Application page and select the application to which this policy will apply a Click the Application selector button at the right of the Application...

Page 146: ... the order in which the policies and the traffic to which they apply will be handled on the managed network devices on which the policy is configured Precedence Type indicates whether the precedence is Explicit specifically defined by a user or Implicit its precedence is a function of the time at which the policy was created Precedence type and the rules that determine the precedence between polic...

Page 147: ...t the policy and click the appropriate directional arrow button to move the policy to the other list To add or remove policies from either of the precedence lists click the corresponding Edit button You can add other policies both overlapping and non overlapping policies to create precedence relationships with the selected policy If there are policies in the precedence lists that aren t relevant y...

Page 148: ...olicies To create a policy using the New menu follow these steps 1 Click the New button at the top of the Policy System page then select Policy from the drop down menu A pop up box appears to let you select the type of policy you want to create see Figure 8 8 Figure 8 8 Pop up selection box for Policy type 2 Select the type of policy you want to create then click OK A Network QoS Policy view appea...

Page 149: ...etwork policy by using the various tabs to specify the elements of a policy as described in the next section VIEWING AND MODIFYING NETWORK POLICIES To view the current network policies defined within the Policy System click the plus sign next to Network Policy in the Component Tree to display the policy subcomponents then click Policy This displays the Network QoS Policy view see Figure 8 10 Polic...

Page 150: ...pplication Server Client server Source Port VLAN or Custom Enabled indicates whether the policy is enabled A green check indicates that the policy is enabled A red X indicates that the policy is not enabled Data indicates whether the policy system has sufficient information to compute valid QoS rules for this policy A green check indicates that the data is complete A red X indicates that additiona...

Page 151: ...The Network QoS policy section always displays the name and description of the selected policy and a check box to indicate whether the policy is enabled Beneath this is a series of tabs that show different aspects of the policy definition and status THE DEFINITION TAB Figure 8 10 shows the Definition tab for the selected policy a VLAN policy The fields displayed under this tab vary depending on th...

Page 152: ...ve will restore the policy definition to those currently in effect for the selected policy Click the Save button to save the changes as the new policy definition VLAN QoS uses 802 1Q tagging to carry the QoS parameters across VLAN boundaries In order to allow VLAN policies to be effective end to end you should make sure your switch to switch links use tagged ports APPLICATION SERVER POLICY DEFINIT...

Page 153: ...e two ways to change the list of servers to which the policy applies Click the policy object selector button at the right of the Servers field then select End Stations and either Local End Stations or End Station Groups from the pop up menu A dialog box appears Select individual end stations or end station groups and add or remove them from the Selected items list You can display either the Local ...

Page 154: ... the application A policy can apply to only one application you must create a separate policy for each application you want to control The Application choice ANY tells the Policy System to apply the defined treatment to ALL traffic from the specified servers In this case the IP address only without a Layer 4 port designation is used as the endpoint You can also type in the name of any known Layer ...

Page 155: ... an IP address only The Policy System determines the switches that are affected by this policy The policy you specify is implemented as IP QoS in both directions between the client and server Although not shown in the diagram you can specify multiple servers as well as multiple clients Note Specifying a large number of servers and clients can result in a very large number of traffic flows The diag...

Page 156: ...icy applies Click the policy object selector button at the right of the Servers field You can specify the servers by using any of the available high level objects Users User groups End Stations End Station Groups or Devices The Policy system will take policy objects you designate along with an application L4 port if you designate one and translate these into a set of IP addresses that will specify...

Page 157: ...ients and add or remove them from the Selected items list in the dialog box that appears You can display lists of other types of clients by selecting from the pull down list in the Show Type field As with the Servers field you can also type in new policy object names or delete names in the Clients field itself The names you type must be valid names of policy objects already known to the Extremewar...

Page 158: ...ment to traffic from a specific port on an Extreme switch You specify the ports from which the traffic will originate As shown in Figure 8 3 a source port policy is uni directional and implements Source Port QoS on the traffic from the specified source port For a Source Port policy see Figure 8 14 the Definition tab shows a list of the physical switch ports to which this policy applies and the Tre...

Page 159: ...the Source Port list itself The name must be in the form switchname port port range The port number must be preceded by the switch name and the list of ports must be enclosed in square brackets Multiple switches are separated by semi colons following the convention used by Microsoft Outlook For example Summit24 1 Summit48 3 5 29 41 To change the treatment used for this policy select a treatment fr...

Page 160: ...policy the Definition tab as shown in Figure 8 15 shows the endpoints applications and direction that defines the traffic pattern to which this policy applies and the treatment that is used by this policy Figure 8 15 Network QoS Policy view for a Custom policy Definition tab To add or change the endpoints to which the policy applies Click the policy object selector button at the right of the eithe...

Page 161: ... the destination and only in a uni directional policies A multi cast subnet can be used as either the source or the destination of the traffic in a uni directional policy To change the traffic direction click the box with the arrow between the two Endpoint fields The arrow is three way toggle between forward reverse and bi directional To change the application associated with an endpoint or set of...

Page 162: ...re 8 16 Network QoS Policy view for a VLAN policy Status tab The Status tab displays the following fields The Policy type Whether the policy is enabled Whether the policy data is complete whether the Policy system has sufficient information about the end stations or user policy objects to compute valid QoS rules for this policy Whether this policy has been successfully configured onto the devices ...

Page 163: ...sage Error Too many rules this means you need to reduce the number of endpoints that your policy specifies THE SCOPE TAB Figure 8 17 shows the Scope tab for the selected policy The Scope tab shows the range of network devices to which the policy can be applied Figure 8 17 Network QoS Policy view for a VLAN policy Scope tab The Scope tab displays the following information Whether the policy applies...

Page 164: ... select the policy in the Excluded Device Groups list and click the right arrow button The policy moves to the Included Device Groups list To remove device groups from the policy scope select the policy in the Included Device Groups list and click the left arrow button The policy moves to the Excluded Device Groups list Note The scope of the default VLAN policy cannot be changed Clicking Reset at ...

Page 165: ... the selected policy The Policy Overlaps list shows the following information Overlapping Policy the name of the overlapping policy Relative Precedence the precedence of this policy relative to the other policies in the list The relative precedence shows the order in which the policies will be configured on the managed network devices to which it applies Precedence Type indicates whether the prece...

Page 166: ... within the basic precedence relationships determined by the QoS implementation type of the policy Precedence based on QoS type overrides all other precedence factors IP QoS gets the highest priority Source Port QoS is second and VLAN QoS is given the lowest priority Traffic with higher priority is forwarded by the switch before traffic of lower priority Thus Custom and Client Server policies have...

Page 167: ...hich these policies apply will be forwarded before traffic of lower priority Lower Priority Policies are those which have lower priority than the currently selected policy the selected policy takes precedence To change the precedence of a listed policy relative to the selected policy select the policy and click the appropriate directional arrow button to move the policy to the other list To add or...

Page 168: ...ve other network QoS policies from a precedence relationship with the selected policy Click OK to return to the Precedence tab Figure 8 20 Edit Select Policies pop up window Clicking Reset at any time prior to clicking Save will restore the precedence settings to those currently in effect relative to the selected policy Click the Save button to save the changes for the affected policies ...

Page 169: ...ults tab The QoS rules are the rules that the current definition of the policy expects to generate Note that these may not correspond exactly to the computed QoS rules because the computed rules take into account the intersection of multiple policies You cannot change the QoS rules displayed under this tab The Save and Reset buttons are disabled If the QoS rules are not correct you should return t...

Page 170: ...ction lists all the treatments currently defined in the policy system Name is the name of the treatment provided when the treatment was created Description is the optional description of the treatment provided when it was created The bottom section shows detailed information about the currently selected treatment The name and description of the selected treatment The scope of the treatment device ...

Page 171: ...isable corresponding to Blackhole IP traffic or disabling source ports The default definitions for QoS treatments are shown in Table 8 1 Table 8 1 Default QoS Treatments QoS Treatment Name Description Priority Min BandwidthMax Bandwidth Deny Disable Blackhole disable source ports None 0 0 Low Corresponds to QP4 Low 0 100 Normal Corresponds to QP3 Normal 0 100 Medium Corresponds to QP2 Medium 0 100...

Page 172: ... minimum bandwidth for the treatment type a value into the Minimum Bandwidth field The value must be between 0 and 90 and less than or equal to the value you plan to use for maximum bandwidth Note The sum of all minimum bandwidth cannot be greater than 90 To change the maximum bandwidth for the treatment type a value into the Maximum Bandwidth field The value must be between 0 and 100 and greater ...

Page 173: ...where this user is logged in It will enter them for you in the Network Stations field If DLCS is not running or if the Enterprise Manager cannot find the user you can enter network stations manually in the Network Station field 4 Click the selector box to the right of the Network Stations field to display a list of the end stations known to the Enterprise Manager Select end station names from this...

Page 174: ...ature This will be done automatically every time the QoS policies are re configured If auto configuration is turned on changes to DLCS mappings in the switch due to a user logging in or logging out will trigger a re configuration The default for Allow Automatic DLCS Updates is on box is checked Note DLCS must be enabled on the switch before the policy system can make use of the feature DLCS cannot...

Page 175: ...ther method will display the Local Group Users page as shown in Figure 8 24 Figure 8 24 The Local Group Users view 2 To add a new User Group type the group name in the Name field and an optional description in the Description field 3 Click the selector box to the right of the Members field to display a list of the users known to the Enterprise Manager Select user names from this list and use the A...

Page 176: ... An End Station name is dynamically translated into an IP address switch and port when QoS rules are computed from a policy definition for configuration onto network devices The easiest way to create End Station objects is to import them from an NT Domain Controller or Solaris NIS maps see Importing Data from NT Domains or Solaris NIS on page 8 57 However there may be situations where you must eit...

Page 177: ...r will use DLCS to try to find the IP Address switch device and port associated with the host name you entered It will enter them for you into the appropriate fields If DLCS is not running or cannot find the host then type the host IP Address into the IP Address field 4 Click the Device selector box to the right of the Device field to list the Access Devices known to the Enterprise Manager Select ...

Page 178: ... be enabled on the switch before the policy system can make use of the feature DLCS cannot be enabled through the Enterprise Manager ADDING OR MODIFYING END STATION GROUPS End Station Groups are named groups of hosts that you can use as policy objects in policy definitions They are dynamically translated into IP addresses switches and ports when QoS rules are computed from the policy definitions f...

Page 179: ... Manager Select end station names from this list and use the Add button to add them to the selected list Use Remove to remove names from this list When you are finished click OK 4 You can also add members by typing a host name into the Add field at the bottom of the screen Type the name and click Add to add it to the members list 5 To remove members from the End Station Group select one or more ho...

Page 180: ... list of all the managed devices known to the Enterprise Manager Selecting a device in the Devices list displays the name description and IP address of the device see Figure 8 27 You cannot change the device information displayed on this page use the Modify Devices function in the Inventory Manager to modify device configuration information Figure 8 27 The Managed Devices View ...

Page 181: ...s button will not be available unless a Cisco device is selected This displays the Cisco Device Policy Setup window as shown in Figure 8 28 Figure 8 28 Setting Cisco Device Policy The values displayed initially are either those read from the switch or else are default values determined by ExtremeWare Enterprise Manager 2 To change the Access List Start Custom Queue List or Priority Queue List type...

Page 182: ... which ExtremeWare Enterprise Manager will apply policies select the interface in the Interface list and select a queueing strategy from the drop down list in the Queueing Strategy field Select Custom Queue List to bind the custom queue you have selected to the interface so ExtremeWare Enterprise Manager can do bandwidth control on this interface Select Priority Queue List to bind the priority que...

Page 183: ...ration of the QoS policies on your network Configuration changes on a device managed by ExtremeWare Enterprise Manager or a user login or end station reboot when DLCS is enabled also trigger a recomputation and reconfiguration of QoS policies If auto configuration is turned off you must explicitly perform the configuration process Click Configuration in the Component Tree to display the Configurat...

Page 184: ...en successfully computed A green check indicates that the rules have been computed successfully A red X indicates that the QoS rules have not been computed since policy definition changes were made Click Compute QoS to compute a new set of QoS rules Configuration Complete indicates whether the Qos rules have been successfully configured onto the appropriate network devices A green check indicates ...

Page 185: ...figuration process has finished The Policy System will maintain this state until a change in a policy definition requires a recomputation and reconfiguration At that point assuming auto configuration is off the state will change to Ready to Compute QoS Rules IMPORTING DATA FROM NT DOMAINS OR SOLARIS NIS You can import information on users user groups and local end stations from either a Windows NT...

Page 186: ...rocess before it is finished click Stop Import will update existing data if it has changed as well as add new users and end stations DISPLAYING THE EVENT LOG The Event Log displays the configuration events that have been performed on any of the managed devices since the ExtremeWare Enterprise Manager client was last started up to a limit of 25 Kbytes of messages Select Event Log from the Component...

Page 187: ...TALLATION AND USER GUIDE 8 59 DISPLAYING THE EVENT LOG Figure 8 31 The Event Log The Clear All button clears the Event Log display only the event data remains in the log file Click Show All to restore the display of the full Envent Log ...

Page 188: ...8 60 EXTREMEWARE ENTERPRISE MANAGER INSTALLATION AND USER GUIDE USING THE POLICY SYSTEM ...

Page 189: ... one cohesive system A Virtual Chassis VC stack is a configuration of one to four Summit Virtual Chassis and up to eight connected Summit switches Note See the Summit Virtual Chassis Design and Installation Guide for a discussion and examples of Summit Virtual Chassis stack configurations The Virtual Chassis Stack Manager applet of the ExtremeWare Enterprise Manager lets you identify virtual stack...

Page 190: ...the stack topology identification Users with Monitor access can view the VC stack configuration topology and the details about individual components IDENTIFYING VIRTUAL CHASSIS STACK TOPOLOGIES To create or identify Virtual Chassis stacks several prerequisites must be met All switches that are to be members of the VC stacks must be included in the ExtremeWare Enterprise database If not the VC stac...

Page 191: ...tch or a VC can belong to only one VC stack Thus if a Summit switch has connections to multiple VCs in separate stacks the Enterprise Manager may not be able to place the switch correctly You can edit the VC stack configurations to reflect the actual managed stack configurations in your network You can also create stack representations manually independent of the stack identification process Once ...

Page 192: ...e detail shows the stack configurations known to the Enterprise Manager database VC Stacks lists each Virtual Chassis stack that has been detected by the Enterprise Manager or that has been created manually by the user It also shows all switches and VCs detected as components of the stacks Orphan VCs are any Virtual Chassis that do not appear to be components of any VC stack as detected by Enterpr...

Page 193: ...sis Stack Configure Lets you configure the Gigabit Ethernet ports on a switch to be SummitLink ports and to participate in load sharing Identify Identifies all the Virtual Chassis stacks that the ExtremeWare Enterprise Manager can recognize You must have Administrator or Manager access to use these functions DISPLAYING A VIRTUAL CHASSIS STACK You can display a graphical representation of a VC stac...

Page 194: ... individual connection Double click on a switch to invoke ExtremeWare Vista for the switch This launches a Web browser window and displays the ExtremeWare Vista Login page For information on how to use ExtremeWare Vista refer to Using ExtremeWare Vista in the Summit Switch Installation and User Guide DISPLAYING A VC STACK COMPONENT You can display details about an individual component of a VC stac...

Page 195: ...is that do not appear to be members of a VC stack as detected by ExtremeWare Enterprise Manager To display a list of the VCs select Orphan VCs in the Component Tree as shown in Figure 9 4 A Virtual Chassis may appear to be an orphan if It was removed from a VC Stack using the Enterprise Manager It once was part of a stack and was known to the Enterprise Manager database but its physical connection...

Page 196: ...hassis in the Orphan VC list Selecting an individual Virtual Chassis in the Orphan VC list displays a detail diagram similar to that shown in Figure 9 3 DISPLAYING ORPHAN SUMMIT SWITCHES The ExtremeWare Enterprise Manager considers a switch to be an orphan if it could not be identified as belonging to a Virtual Chassis stack To display details about the orphan Summit switches select Orphan Summits...

Page 197: ...as been added to the switch inventory since the last stack identification was done It does not have any VC connections The display shows the switch name the IP address of the switch and the port numbers of any active and inactive SummitLink ports If a port is configured as one of a set of load sharing ports it is displayed in blue If there are no SummitLink ports the entries in the Active SL Ports...

Page 198: ...eft of the Virtual Chassis Stack Manager window The Create VC Stack dialog box appears as shown in Figure 9 6 Figure 9 6 Creating a VC stack To create a Virtual Chassis Stack follow these steps 1 Type a name for the new stack in the New VC Stack field 2 Select one or more Virtual Chassis in the Orphan VCs list Click the right arrow button located between the Orphan VCs and the VCs in Stack lists T...

Page 199: ...gure the switches in the stack to indicate which ports are in SummitLink mode and whether they are configured for Load Sharing See Configuring Virtual Chassis Stack Ports for directions on how to do this DELETING A VIRTUAL CHASSIS STACK You must have Administrator or Manager access to delete a Virtual Chassis stack Note Deleting a Virtual Chassis stack removes the stack representation in the Extre...

Page 200: ...is stack become Orphans and now appear in their respective Orphan lists EDITING A VIRTUAL CHASSIS STACK You must have Administrator or Manager access to edit a Virtual Chassis stack Note Editing a Virtual Chassis stack updates the stack representation in the ExtremeWare Enterprise Manager database It does not affect the actual configuration of the Virtual Chassis or the member switches To edit the...

Page 201: ... database 4 To remove a Summit Virtual Chassis from the VC stack select the Virtual Chassis and click the left arrow button The selected switch is moved to the Orphan VCs list 5 To remove a Summit switch from the VC stack select the switch and click the left arrow button The selected switch is moved to the Orphan Summits list Note There must be at least one Virtual Chassis and one Summit switch in...

Page 202: ...ports follow these steps 1 Select a VC stack or Orphan Summits in the Component Tree 2 Click Config at the top of the Virtual Chassis Stack Manager page The Configure Ports in VC Stack dialog Box appears as shown in Figure 9 9 Figure 9 9 Configure ports in a VC Stack 3 Select a VC stack or Orphan Switches from the pull down list in the field at the top of the dialog box Every Gigabit Ethernet port...

Page 203: ... Sharing configuration pull down the menu associated with the Load Sharing field for the port and then select the appropriate value None 2 port or 4 port The pull down menu only presents choices that are valid for the switch type For example if the Switch is a Summit1 or a Summit4 you have all three choices None 2 or 4 port configuration For a Summit2 switch you only have the choice of None or 2 p...

Page 204: ...entify Virtual Chassis Stacks click Yes ExtremeWare Enterprise Manager runs the SNMP identification process and redisplays the Component Tree to show the Virtual Stack configuration topology as identified during the discovery process Note Rediscovering the Virtual Chassis stack causes any manual changes you have made to your Virtual Chassis stack configurations to be lost ...

Page 205: ... presentation of utilization and error statistics for Extreme switches in real time The data is taken from Management Information Base MIB objects in the etherHistory table of the Remote Monitoring RMON MIB Note You must have RMON enabled on the switch in order to collect real time statistics for the switch This feature is supported only for Extreme Networks switches You can view data for multiple...

Page 206: ... 2 Individual Errors for a single port An individual errors display shows the six variables shown in Table 10 2 Table 10 1 Definition of RMON utilization variable used in port utilization displays etherHistoryUtilization The best estimate of the mean physical layer network utilization on this interface during this sampling interval in graphed in percents Table 10 2 Definition of RMON etherHistory ...

Page 207: ...of packets received during this sampling interval that were less than 64 octets in length excluding framing bits but including FCS octets had either a bad Frame Check Sequence FCS with an integral number of octets FCS Error or a bad FCS with a non integral number of octets Alignment Error etherHistoryJabbers The number of packets received during this sampling interval that were longer than 1518 oc...

Page 208: ...ircle S indicates that the port group is empty For an individual port you can display individual errors in addition to utilization and total errors Select a network device to display data for some or all ports on the device Select a port group to display data for all ports in the port group You will first see a message saying Please wait loading data If the ExtremeWare Enterprise Manager is succes...

Page 209: ... and the time stamp on the data sample You can use the mouse to change the depth and rotation of a 3 dimensional chart Hold down the Shift key press the left mouse button and drag the cursor left or right to rotate the graph Hold down the Ctrl key press the left mouse button and drag the cursor up or down to set the depth of the 3 dimensional view For any of the bar graphs move the cursor and then...

Page 210: ...tion or the highest total number of errors are displayed RMON is disable for some ports on the switch If the switch as a whole can be reached and is reporting data then individual ports that do not report data will be ignored No error message is presented in this case If the Enterprise Manager is not successful in loading data from the device it displays a message similar to that shown in Figure 1...

Page 211: ... samples exist yet DISPLAYING STATISTICS FOR A SINGLE PORT In addition to displaying data for a set of ports you can display historical data for an individual port You can select a port in one of two ways Double click on the data point for an individual port in the device or port group statistics display bar data point or pie slice in the respective chart or row in a tabular display Click on a dev...

Page 212: ... limitations of the device configuration The defaults are A 30 second sampling interval 50 data points displayed However in Figure 10 4 only 25 data points are displayed because that is the maximum number of values the BlackDiamond switch stores as historical data For an individual port you can display individual errors in addition to utilization and total errors Select the tab at the bottom of th...

Page 213: ...termine whether the display for a device or port group will include all ports or only the top N ports where N is initially fifteen Click the icon to toggle between the red X which indicates the top N limitation is not in effect and a green check which indicates that the top N ports are being displayed The top N ports are displayed in order from highest largest percent utilization or largest total ...

Page 214: ... chart This chart type by default displays in 3D The 3D setting is also a user configurable option Select this to display the data as a stacked bar chart This chart type is only available when you are displaying individual errors for a single port Select this to display the data as an area chart This chart type by default displays in 3D The 3D setting is also a user configurable option Select this...

Page 215: ...he Set Graph Preferences icon in the toolbar The Graph Preferences window is displayed as shown in Figure 10 6 Use the tabs across the top of the window to select the type of setting you want to change Each tab displays a page with a group of related settings When you have changed any setting you want on a given page Click Apply to put the changes into effect but stay in the Graph Preferences wind...

Page 216: ...es The default is 12 range is 45 Graph Colors Figure 10 7 lets you set the colors for the graph background and text data and axis labels Figure 10 7 Setting graph color preferences To change a color click on a button with the color bar icon This displays a color selection window where you can select the color you want You can select a color using color swatches or by specifying HSB or RGB values S...

Page 217: ...d for Utilization and Total Error graphs Data colors 1 through 6 are used for the different errors in a individual errors chart Data colors in order starting from 1 are used in a pie chart for as many slices as you ve specified If you specify more than 12 slices the colors will repeat with slice 13 using the same color as slice 1 Graph Data Figure 10 9 lets you set several miscellaneous graph para...

Page 218: ...the maximum value you can set is 100 However the actual maximum number of data points you can get is determined by the SNMP agent running in the device from which you are getting data Historical Data Sampling Interval is the sampling interval to use when displaying historical data Select a choice from the pull down list The choices in the list are determined by the configuration of the device from...

Page 219: ...work addresses MAC or IP addresses and identify the switch and port on which the address resides The Search Tool lets you configure and start a search task view the status of the task and view the task results The task specification and results are kept in the task list until you delete them or until you log out of ExtremeWare Enterprise Manager client When you click the Find MAC button in the Nav...

Page 220: ... 11 1 IP MAC Address Finder main page TASKS LIST SUMMARY WINDOW As search tasks are initiated they are placed in the Find Address Tasks List in the Component Tree Selecting the Find Address Tasks folder in the Component Tree displays a summary of the status of the tasks in the Task List see Figure 11 2 ...

Page 221: ...ng a task a unique name is important to distinguish it from other tasks in the Tasks List Type is the type of search this will perform In ExtremeWare Enterprise Manager release 2 0 this is always Find Addresses the only task type available in this release Status shows the status of the request Possible values are Pending and Done Date Submitted shows the date and time the task was submitted Date C...

Page 222: ...as long as you are running the ExtremeWare Enterprise Manager client even if you leave the IP MAC Address Finder applet and go to another Enterprise Manager applet However when you exit the Enterprise Manager client all the task specifications and search results are deleted CREATING A SEARCH TASK To create a search task click the Search Task button in the tool bar at the top of the IP MAC Address ...

Page 223: ...to include in the search Groups lets you search all the devices in a specified Device Group You can create a target domain that includes a combination of these specifications When you select a Search Space Type you are presented with a list of the Devices or Device Groups from which you can select individual members to include in the Target Domains 4 Select the Device or Device Group you want to s...

Page 224: ...ION AND USER GUIDE USING THE IP MAC ADDRESS FINDER Figure 11 4 Search in progress While the task is in progress the window shows the status as Pending When the search is complete the Detailed Task View shows the results for the search Figure 11 5 ...

Page 225: ...nt to distinguish it from other tasks in the Tasks List Status shows the status of the request Possible values are Pending and Done Date Submitted shows the date and time the task was submitted Date Completed shows the data and time the task was finished The Search Criteria areas shows The list of IP or MAC addresses that were the object of the search The Search Domains where the search took place...

Page 226: ... list shows Both the MAC address and the corresponding IP address The switch and port to which the address is connected The User name currently logged in at that address Once the search is complete the Search Results will stay in the Tasks List until you explicitly delete them using the Delete Function from the Tasks List Summary View or until you exit the ExtremeWare Enterprise Manager client ...

Page 227: ... Tools menu or from an icon on the Network Node Manager toolbar To enable this feature you need to run the ExtremeWare HP OpenView integration process on the server where your HP OpenView platform is running This also requires that you have a Java enabled Web browser installed on the system where HP OpenView resides The ExtremeWare HP OpenView integration process also provides integration with Ext...

Page 228: ...n the integration process follow these steps 1 Close any open applications 2 Insert the CDROM into the CDROM drive If the ExtremeWare Enterprise Manager Welcome screen appears automatically just exit the install 3 Choose Run from the Start Menu The Run dialog box appears 4 Type d nt hpov setup in the text box and click OK If the CDROM is not drive d substitute the correct drive letter The HP OpenV...

Page 229: ...IBs into HP OpenView This runs the HP OpenView commands to load the MIBs If you choose to do this at a later time you can run the HP OpenView loadmib bat command found in the HP OpenView bin directory 9 In the next dialog Box click Yes to update the HP OpenView topology database to include the Extreme Networks configuration information This adds the Summit sysOIDs system Object IDentifiers to the ...

Page 230: ...unch ExtremeWare Enterprise Manager and ExtremeWare Vista from HP OpenView under Solaris you must add commands to the appropriate HP OpenView menus with links to the Extreme Networks software In addition the Extreme Networks MIBs need to be included in the set of MIBs available to HP OpenView The integration process provided with ExtremeWare Enterprise Manager adds the needed components INSTALLING...

Page 231: ...by page or in one display 5 You are then asked to accept the license terms The Software and the accompanying documentation are Copyrights of Extreme Networks Do you agree to the above conditions Y N y Enter Y or Enter to agree or N to terminate the installation 6 The script next informs you of the steps it will take to install the integration software and asks you to confirm you want to proceed Th...

Page 232: ...the EEM Server eem server host The default is the host upon which you are running the installation script Please enter the http port used by EEM 80 Would you like to update the installed MIBs Y N Y Installation of Extreme Network s Management Information Base MIB definitions is necessary for HP OpenView to recognize and manage Extreme Networks devices 9 The script then asks you to confirm the inst...

Page 233: ...t OV share registration C summitweb Enabling EEM Selections in etc opt OV share registration C summitweb Updating Mibs opt OV bin xnmloadmib replace load data snmp_mibs rfc1493 mib opt OV bin xnmloadmib replace load data snmp_mibs rfc1757 mib opt OV bin xnmloadmib replace load data snmp_mibs rfc1513 mib opt OV bin xnmloadmib replace load data snmp_mibs rfc2021 mib opt OV bin xnmloadmib replace loa...

Page 234: ...any Summit devices on the map to use Summit specific icons rather than generic device icons opt OV bin ovstart ovtopmd opt OV bin ovtopofix u o 1 3 6 1 4 1 1916 2 1 Updating S1 objid 1584 opt OV bin ovtopofix u o 1 3 6 1 4 1 1916 2 2 Updating VLAN1 objid 1552 Updating Summit2 objid 1678 Updating Summit2 objid 1820 Updating Summit2 objid 4936 11 Finally you are asked if you want to restart the HP O...

Page 235: ...llowing 1 Insert the ExtremeWare Enterprise Manager CDROM into the CDROM drive 2 If you are running CDE the contents of the CDROM are displayed in the File Manager Go to the solaris directory To run from an X term window cd cdrom eem2_0 solaris 3 Run the installation script hpovint sh uninstall LAUNCHING THE CLIENT FROM HP OPENVIEW If you have run the integration process for HP OpenView you can la...

Page 236: ...k Extreme Networks to display the ExtremeWare menu 3 Click ExtremeWare Enterprise Manager or ExtremeWare Vista to launch the appropriate application If you have selected a Summit device on the Node Manager Map you will be able to launch ExtremeWare Vista on that device If you do not have a Summit device selected the ExtremeWare Vista choice will not be available You can also launch ExtremeWare Ent...

Page 237: ...ExtremeWare Enterprise Manager icon on the HP OpenView toolbar LAUNCHING EXTREMEWARE VISTA FROM THE HP OPENVIEW MAP You can launch ExtremeWare Vista for an individual Extreme device directly from the Network Node Manager map using the pop up menu associated with the device icon ExtremeWare Enterprise Manager icon ...

Page 238: ...Select a Summit device on the Network Node Manager Map 2 Click with the right mouse button to display the pop up menu 3 Click ExtremeWare Vista in the menu This will launch a browser window and run the ExtremeWare Vista application for the Summit switch you have selected For information on using ExtremeWare Vista see Using ExtremeWare Vista in the Summit Switch Installation and User Guide ...

Page 239: ...he information in the packet DLCS can detect when an end station boots up or shuts down or a user logs in or logs out When an end station boots up DLCS associates its name and IP address to a port on a switch Similarly when a user logs in DLCS associates the user with an end station and thus a switch port Such learned information is discarded when the user logs out or when the end station is shut ...

Page 240: ...hrough DLCS If auto configuration is enabled in the Policy System client then dynamic data learned through DLCS will also update the configured policies DLCS PROPERTIES The following guidelines must be used when using DLCS Only one user can be attached to an end station host at a given time This will be the last user that logged in A user may be logged into many end stations simultaneously An IP a...

Page 241: ...hat data has been learned show dlcs 6 To clear all DLCS data that has been learned clear dlcs 7 Type quit to exit the telnet session DLCS LIMITATIONS There are certain limitations in the ExtremeWare 5 0 implementation of DLCS that should be considered with regards to the data received from WINS snooping DLCS will not work for the WINS server itself This is because the WINS server will not send Net...

Page 242: ...also allow the application of IP QoS for traffic on a Layer 2 switch that is destined outside the served subnet If your switch is running in L2 mode and you want to snoop Layer 4 NetBIOS packets you can do so using ISQ To configure this capability you will need the MAC address of the next hop router or the MAC address of the WINS server if the server is on the same subnet and a list of the IP addr...

Page 243: ...fined on the table This utility can be used in combination with regular backups to give you confidence in the security of the data in your database The Backup utility makes a backup copy of all data in the database except for user names and passwords which are kept in separate files Backing up your database regularly will ensure that you will not need to re enter all the switch VLAN QoS and VC sta...

Page 244: ...nstall_dir basecamp db This example assumes a database user ID of dba with password sql These are the defaults used when the database server is installed through the ExtremeWare Enterprise Manager installation process If you have changed your database user ID and password substitute your actual user ID and password in the command install_dir is the directory where the Enterprise Manager software i...

Page 245: ...abase except for user names and passwords Access the Backup utility from the MSDOS or Solaris command line using the dbbackup command This convention also allows incorporation into batch or command files THE DBBACKUP COMMAND LINE UTILITY To back up the ExtremeWare Enterprise Manager database running under Windows NT use the command install_dir database dbbackup c uid dba pwd sql dbf install_dir ba...

Page 246: ...ectory The backup consists of two files basecamp db and basecamp log All database files are backed up These files should be saved so they can be used to replace the original files in the event of a problem Syntax dbbackup switches directory DATABASE CONNECTION PARAMETERS These are the parameters for the c command line switch If the connection parameters are not specified connection parameters from...

Page 247: ...camp db and is kept in the directory you specified when you ran the dbbackup command c tmp in the example To replace a damaged database with the backup copy follow these steps 1 Shut down the ExtremeWare Enterprise Manager following the instructions in Chapter 3 in the section Shutting Down the Enterprise Manager Server Components for your operating system environment 2 Move or delete the old copy...

Page 248: ...C 6 EXTREMEWARE ENTERPRISE MANAGER INSTALLATION AND USER GUIDE DATABASE UTILITIES ...

Page 249: ...e contains default values for a number of ExtremeWare Enterprise Manager configuration parameters including the SNMP polling interval the SNMP request time out the number of SNMP request retries and several timeout values This file is found in the install_dir extreme directory The defaults and value restrictions are as indicated in the file listed below This file has user configurable parameters f...

Page 250: ... Session TimeoutPeriod 600000 Timeout period in milliseconds to be used when performing DNS lookups for hosts found through DLCS or when importing through Domain Controller Default 1000 Dns LookupTimeoutPeriod 1000 THE ciscoipports properties FILE This file documents the mapping between well known ports and the names that Cisco devices will substitute when they encounter these ports The ExtremeWar...

Page 251: ... 70 hostname 101 ident 113 irc 194 isakmp 500 klogin 543 kshell 544 login 513 lpd 515 mobile ip 434 nameserver 42 netbios dgm 138 netbios ns 137 netbios ss 139 nntp 119 ntp 123 pim auto rp 496 pop2 109 pop3 110 rip 520 smtp 25 snmp 161 snmptrap 162 sunrpc 111 syslog 514 tacacs 49 talk 517 telnet 23 tftp 69 time 37 uucp 540 who 513 whois 43 www 80 xdmcp 177 ...

Page 252: ...D 4 EXTREMEWARE ENTERPRISE MANAGER INSTALLATION AND USER GUIDE EXTREMEWARE ENTERPRISE MANAGER PROPERTIES FILES ...

Page 253: ...version of ExtremeWare Enterprise Manager when I wanted to import from an older version e g 1 0 instead of 1 1 Uninstall all versions of ExtremeWare Enterprise Manager except the one from which you want to import the database Then install the new version See the instructions in Chapter 2 for information on un installing ExtremeWare Enterprise Manager Problem Under Windows NT cannot install Extreme...

Page 254: ...shes the switch specific data validates the SmartTrap rules and ensures that the Enterprise Manager server is added as a trap receiver Extreme switches only If the problem persists verify that the ExtremeWare Enterprise Manager workstation has been added in the list of trap destinations on the given switch 1 Telnet to the switch 2 Login to the switch 3 Type show management to verify that the syste...

Page 255: ...fter which an SNMP request should first time out This is followed by an exponential backoff Default 2 Minimum 1 Maximum 10 seconds Snmp TimeoutPeriod 2 Number of retries before timing out Default 1 Minimum 0 Maximum 5 Snmp NumberOfRetries 1 VLANS Problem Can only access one of the IP addresses on a VLAN configured with IP multi netting ExtremeWare Enterprise Manager does not currently support IP m...

Page 256: ... server Verify that the ExtremeWare Enterprise Manager Server process is running Verify that the server is running on the specified port Check the file installdir webserver properties server javaWebServer webPageService endpoints properties The entry endpoint main port contains the port number the server is using Problem Browser does not bring up the Login page Verify the version of the browser yo...

Page 257: ...col is used by a VLAN on that switch INVENTORY MANAGER Problem Discovery hangs if a large number of addresses is specified A very large discovery can cause the discovery process to hang because there is insufficient memory available to the browser to process the number of addresses This is a limitation of the browser To recover restart the browser Then split your discovery request into multiple re...

Page 258: ... Panel This displays the Control Panel folder 2 Double click on Services to display the Services Properties window 3 Highlight EEM 2 0 Web Server in the list of services and click the Startup button 4 In the Log On As section of the pop up window enter the account name and password for a user that has the appropriate permissions to access the Domain Controller 5 Stop and Restart the Web Server ser...

Page 259: ...se Manager 4 2 Administrator password default 4 3 All Device Groups page 5 4 Application as policy object 8 7 Application Server policy 8 2 Application Server policy definition tab 8 24 architecture Enterprise Manager software 1 6 Auto Configure button Policy 8 14 B buttons 3 13 About 3 9 Add Inventory Manager 5 5 Add VLAN Manager 7 6 Admin 3 9 Auto Configure Policy 8 14 Configure Inventory Manage...

Page 260: ... 4 Definition tab 8 23 Application Server policy 8 24 Client Server Policy 8 27 Custom policy 8 32 Source Port policy 8 30 VLAN policy 8 23 Delete button 9 11 in Inventory Manager 5 5 in VC Stack Manager 9 5 in VLAN Manager 7 9 Delete button Policy 8 14 deleting 9 11 a switch 5 23 a user account 4 7 protocol filters 7 13 VLANs 7 9 Device as policy object 8 7 Device Discovery set up window 5 9 Devi...

Page 261: ... Inventory Manager page 5 3 IP QoS implementation type 8 8 IP MAC Address Finder 1 5 L license key 2 3 logging in 3 8 Login page 3 8 4 3 Logoff button 3 10 M Managed Devices Policy System 8 14 Manager access level 1 5 4 1 menu New Policy System 8 14 8 15 Modify button in Inventory Manager 5 5 in VLAN Manager 7 10 modifying end station groups as policy objects 8 50 end stations as policy objects 8 ...

Page 262: ...es 8 43 QoS Results tab Policy 8 41 R RADIUS server 4 2 administering 4 9 changing port 4 10 changing shared secret 4 10 disabling 4 10 enabling 4 10 Ready Busy indicator Policy System 8 14 Real Time Statistics 1 5 10 1 related publications About This Guide xviii Release Notes xvii Remote Authentication Dial In User Service RADIUS 1 6 resizing columns in status display 3 13 Component Tree 3 13 res...

Page 263: ...ing in Policy System 8 57 users adding 4 6 users modifying 4 6 utilities database backup C 3 database validation C 1 V VC button 3 9 9 3 VC Stack 9 11 VC Stack Manager 1 3 9 1 configuring switch ports 9 2 creating a VC stack 9 10 deleting a VC stack 9 11 displaying a VC stack 9 5 displaying orphan Summits 9 8 displaying orphan VCs 9 7 editing a VC stack 9 12 orphan Summits 9 5 orphan VCs 9 4 VC St...

Page 264: ...vi Index starting the server 3 2 stopping the server 3 2 uninstalling HP OpenView integration A 4 uninstalling the server 2 6 X Xedia device requirements 1 8 Xedia device support in Policy System 8 11 ...

Reviews: