Nortel BayStack 460 Switch Скачать руководство пользователя страница 5

Policy management on the Nortel Ethernet Switch 460, Ethernet Switch 470, and BPS

5

e

Enable the check box for each port on the device that you want to include 
under the new role combination, and then click the Submit button.

f

Repeat steps a through e to define additional role combinations.

9

Exit the device’s Web interface.

Testing an Ethernet Switch or BPS device’s policy 
configuration

In order to check the policy filters installed on your COPS-PR devices, you must 
meet the following requirements:

You must have SNMP reporting enabled on your network devices.

You must enter the SNMP string for each device on the device’s 
corresponding object in the EPM management console.

You must have the EMANATE SNMP master agent (available as a default 
EPM installation option) installed with your Policy Server.

1

In the Policy Setup view, drag a policy from the Available Policy Components 
tree to the role that is being reported by the device. Enable the policy from the 
Options menu.

For example, you can choose the Mark WWW Traffic Best Effort During 
Lunch policy to match all Web traffic between 11:30 am and 1:30 pm. You 
can remove the schedule from the policy to make it active all of the time.

2

Click the Deploy Changes button on the toolbar to notify the Policy Server of 
your changes.

3

In the Device Setup view, right-click on the device and choose Show Device 
Report from the menu.

4

In the Device Report dialog box, click the Lookup button next to the Interface 
field and choose the interface for which you want to view installed policy 
filters.

If the policy was correctly installed on the device, a list of traffic filters 
generated by the policy appears in the Filter Set list. If any traffic matching 
the filters has passed through the device, the number of affected packets 
appears under the Packets column for each filter.

Содержание BayStack 460 Switch

Страница 1: ...ating to the configuration of the Nortel Ethernet Switch 460 formerly BayStack 460 Ethernet Switch 470 formerly BayStack 470 and Business Policy Switch BPS to receive policy configuration from Nortel Enterprise Policy Manager EPM It also includes information on the devices compatibility with various policy management objects This guide covers the following subjects ...

Страница 2: ...course of 2004 The transition simplifies product naming in order to make it easier for customers to understand the Nortel product and services portfolio Table 1 lists the names of rebranded Nortel products mentioned in this publication Full details of the Nortel product rebranding process can be obtained from http www nortel com products announcements rebranding index html faqs Supported software ...

Страница 3: ...iated by associating a policy with the device s reported role s You must open the Web interface for the device and specify the address and port number of the EPM Policy Server You can specify more than one Policy Server You must also enable QoS configuration on the device and define its role combinations You must know the IP address and COPS PR Client Port values for your Policy Server You can obt...

Страница 4: ...ce Group Creation area do the following a Type a name for a role combination in the Role Combination field Do not use spaces in role combination names The role combination is a common identifier that is used to enforce a specific set of policies on specific network entities for example the print server the Web server employee workstations etc EPM includes a set of preconfigured roles with policy o...

Страница 5: ... Policy Setup view drag a policy from the Available Policy Components tree to the role that is being reported by the device Enable the policy from the Options menu For example you can choose the Mark WWW Traffic Best Effort During Lunch policy to match all Web traffic between 11 30 am and 1 30 pm You can remove the schedule from the policy to make it active all of the time 2 Click the Deploy Chang...

Страница 6: ...device Maximum 14 802 traffic conditions per device Devices with limited memory may not be able to achieve the limitations stated above The BPS 2 x series has a special limit of 24 traffic conditions that specify the same source IP address To avoid device limitations Avoid assigning multiple traffic conditions with overlapping traffic criteria to a single policy This will result in excessive numbe...

Страница 7: ...ayRS devices Note The information displayed here reflects the most up to date information available at the time of the EPM 4 1 release Policy filter support capabilities may change for individual device types as their software is upgraded Check your device documentation for current policy support capabilities Filtering capability Ether Type VLAN ID Inbound User Priority Protocol Inbound DSCP Port ...

Страница 8: ... and networking devices Remote access to the directory requires HTTP port 80 default The Policy Server uses LDAP port 389 default to communicate with the directory server It uses COPS PR port 3288 default and SNMP ports 161 and 162 to communicate with networking devices and the Interface Manager The Interface Manager uses LDAP port 389 default to communicate with the directory server It uses COPS ...

Страница 9: ...y management right click its object in the EPM management console and then choose Disable For Policy Management from the menu To enable a device for policy management right click its object in the EPM management console and then choose Enable For Policy Management from the menu Fixed device reset issue Q01038174 BoSS version 3 1 3 had a problem that caused the device to reset repeatedly when runni...

Страница 10: ...port is suspect Therefore the DSCP field of any traffic that enters the BPS from an untrusted port is always re marked Any policies instructing the BPS to not set the value of the DSCP field on an untrusted port will generate errors Only policies with Meter Mark and Drop actions are permitted on untrusted ports Unrestricted ports do not assume anything about the origin of the incoming traffic You ...

Страница 11: ...re version Untrusted Trusted Unrestricted BPS 2 0 3 0 3 1 Layer 3 Mark Mark Update DSCP with value 0 63 Ignore Ignore Ignore DSCP All All All actions allowed Layer 2 Tagged Ignore Ignore Ignore UnTagged Ignore Ignore Ignore Table 3 User Priority Update action behavior underlined text denotes EPM default setting where multiple options exist Device software version Untrusted Trusted Unrestricted BPS...

Страница 12: ...e options exist DSCP Ignore DSCP Mark Drop Update User Priority Update 0 7 Egress Map Ignore Update 0 7 Update user priority with value 0 7 Egress Map Use COS value from DSCP to COS mapping based on DSCP from incoming packet Ignore Ignore user priority Defaults Defaults Use COS value from DSCP to COS mapping based on DSCP value in action Ignore Table 5 Drop Precedence Update action behavior underl...

Страница 13: ...Egress Map Use COS value from DSCP to COS mapping based on DSCP from incoming packet Ignore Ignore drop precedence Table 6 Allowable Drop Precedence actions underlined text denotes EPM default setting where multiple options exist DSCP Ignore DSCP Mark Drop Update Drop Precedence Update 1 8 Egress Map Ignore Update 1 8 Update drop precedence with value of 1 8 Egress Map Use COS value from DSCP to C...

Страница 14: ... before the 802 1p User Priority value can be known Ignore or Drop actions cannot include shaping functionality Only Mark actions can include shaping functionality Table 7 Shaper limitations on BPS ports Device software version Untrusted Trusted Unrestricted BPS 2 0 3 0 3 1 Layer 3 Supported with Mark action only Mark Update DSCP with value 0 63 Not supported Supported with Mark action only Layer ...

Отзывы: