Nortel BayStack 460 Switch Скачать руководство пользователя страница 6

6

Policy management on the Nortel Ethernet Switch 460, Ethernet Switch 470, and BPS

318396-4.1

Known device limitations for EPM 4.1

Users should consider the following guidelines when creating policy 
configuration for the BPS or Ethernet Switch devices.

If you are running a stack of cascaded Ethernet Switch devices, you can 
configure user-based policies on the stack ONLY if the stack consists entirely 
of COPS-PR compatible devices (Business Policy Switch, Ethernet Switch 
460, and Ethernet Switch 470). If you are running a mixed stack that includes 
Ethernet Switch 450 devices, you will not be able to configure user-based 
policies on the stack.

Maximum 24 roles per device.

Maximum 200 IP traffic conditions per device.

Maximum 14 802 traffic conditions per device.

Devices with limited memory may not be able to achieve the limitations 
stated above.

The BPS 2.x series has a special limit of 24 traffic conditions that specify the 
same source IP address.

To avoid device limitations

Avoid assigning multiple traffic conditions with overlapping traffic criteria to 
a single policy. This will result in excessive numbers of policy filters being 
sent to the device. For example, do not assign two traffic conditions, each 
specifying the same port number, to the same policy.

When creating a traffic condition, you should limit the number of different 
types of traffic flow criteria you specify. A traffic condition that specifies too 
many traffic criteria will, in turn, cause the policies to which it is applied to 
send an excessive number of policy filters to network devices. The network 
devices may return error messages as a result.

Содержание BayStack 460 Switch

Страница 1: ...ating to the configuration of the Nortel Ethernet Switch 460 formerly BayStack 460 Ethernet Switch 470 formerly BayStack 470 and Business Policy Switch BPS to receive policy configuration from Nortel Enterprise Policy Manager EPM It also includes information on the devices compatibility with various policy management objects This guide covers the following subjects ...

Страница 2: ...course of 2004 The transition simplifies product naming in order to make it easier for customers to understand the Nortel product and services portfolio Table 1 lists the names of rebranded Nortel products mentioned in this publication Full details of the Nortel product rebranding process can be obtained from http www nortel com products announcements rebranding index html faqs Supported software ...

Страница 3: ...iated by associating a policy with the device s reported role s You must open the Web interface for the device and specify the address and port number of the EPM Policy Server You can specify more than one Policy Server You must also enable QoS configuration on the device and define its role combinations You must know the IP address and COPS PR Client Port values for your Policy Server You can obt...

Страница 4: ...ce Group Creation area do the following a Type a name for a role combination in the Role Combination field Do not use spaces in role combination names The role combination is a common identifier that is used to enforce a specific set of policies on specific network entities for example the print server the Web server employee workstations etc EPM includes a set of preconfigured roles with policy o...

Страница 5: ... Policy Setup view drag a policy from the Available Policy Components tree to the role that is being reported by the device Enable the policy from the Options menu For example you can choose the Mark WWW Traffic Best Effort During Lunch policy to match all Web traffic between 11 30 am and 1 30 pm You can remove the schedule from the policy to make it active all of the time 2 Click the Deploy Chang...

Страница 6: ...device Maximum 14 802 traffic conditions per device Devices with limited memory may not be able to achieve the limitations stated above The BPS 2 x series has a special limit of 24 traffic conditions that specify the same source IP address To avoid device limitations Avoid assigning multiple traffic conditions with overlapping traffic criteria to a single policy This will result in excessive numbe...

Страница 7: ...ayRS devices Note The information displayed here reflects the most up to date information available at the time of the EPM 4 1 release Policy filter support capabilities may change for individual device types as their software is upgraded Check your device documentation for current policy support capabilities Filtering capability Ether Type VLAN ID Inbound User Priority Protocol Inbound DSCP Port ...

Страница 8: ... and networking devices Remote access to the directory requires HTTP port 80 default The Policy Server uses LDAP port 389 default to communicate with the directory server It uses COPS PR port 3288 default and SNMP ports 161 and 162 to communicate with networking devices and the Interface Manager The Interface Manager uses LDAP port 389 default to communicate with the directory server It uses COPS ...

Страница 9: ...y management right click its object in the EPM management console and then choose Disable For Policy Management from the menu To enable a device for policy management right click its object in the EPM management console and then choose Enable For Policy Management from the menu Fixed device reset issue Q01038174 BoSS version 3 1 3 had a problem that caused the device to reset repeatedly when runni...

Страница 10: ...port is suspect Therefore the DSCP field of any traffic that enters the BPS from an untrusted port is always re marked Any policies instructing the BPS to not set the value of the DSCP field on an untrusted port will generate errors Only policies with Meter Mark and Drop actions are permitted on untrusted ports Unrestricted ports do not assume anything about the origin of the incoming traffic You ...

Страница 11: ...re version Untrusted Trusted Unrestricted BPS 2 0 3 0 3 1 Layer 3 Mark Mark Update DSCP with value 0 63 Ignore Ignore Ignore DSCP All All All actions allowed Layer 2 Tagged Ignore Ignore Ignore UnTagged Ignore Ignore Ignore Table 3 User Priority Update action behavior underlined text denotes EPM default setting where multiple options exist Device software version Untrusted Trusted Unrestricted BPS...

Страница 12: ...e options exist DSCP Ignore DSCP Mark Drop Update User Priority Update 0 7 Egress Map Ignore Update 0 7 Update user priority with value 0 7 Egress Map Use COS value from DSCP to COS mapping based on DSCP from incoming packet Ignore Ignore user priority Defaults Defaults Use COS value from DSCP to COS mapping based on DSCP value in action Ignore Table 5 Drop Precedence Update action behavior underl...

Страница 13: ...Egress Map Use COS value from DSCP to COS mapping based on DSCP from incoming packet Ignore Ignore drop precedence Table 6 Allowable Drop Precedence actions underlined text denotes EPM default setting where multiple options exist DSCP Ignore DSCP Mark Drop Update Drop Precedence Update 1 8 Egress Map Ignore Update 1 8 Update drop precedence with value of 1 8 Egress Map Use COS value from DSCP to C...

Страница 14: ... before the 802 1p User Priority value can be known Ignore or Drop actions cannot include shaping functionality Only Mark actions can include shaping functionality Table 7 Shaper limitations on BPS ports Device software version Untrusted Trusted Unrestricted BPS 2 0 3 0 3 1 Layer 3 Supported with Mark action only Mark Update DSCP with value 0 63 Not supported Supported with Mark action only Layer ...

Отзывы: