EasyManua.ls Logo

Alcatel-Lucent OmniSwitch 6860 Series

Alcatel-Lucent OmniSwitch 6860 Series
1078 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Contents
OmniSwitch AOS Release 8 Network Configuration Guide December 2017 iv
Interfaces Violation Recovery .......................................................................................1-15
Violation Shutdown and Recovery Methods .........................................................1-15
Interaction With Other Features .............................................................................1-16
Configuring Interface Violation Recovery .............................................................1-17
Verifying the Interfaces Violation Recovery Configuration ..................................1-18
Clearing Ethernet Port Violations .................................................................................1-19
Link Monitoring ............................................................................................................1-20
Monitoring Interface Errors ...................................................................................1-20
Monitoring Interface Flapping ...............................................................................1-20
Monitoring Window ...............................................................................................1-21
Configuring the Wait-to-Restore Timer .................................................................1-21
Configuring the Wait-to-Shutdown Timer .............................................................1-22
Displaying Link Monitoring Information ..............................................................1-23
Link Fault Propagation ..................................................................................................1-24
Interaction With Interfaces Violation Recovery ....................................................1-24
Configuring Link Fault Propagation ......................................................................1-25
LFP Application Example ......................................................................................1-26
IEEE 1588 Precision Time Protocol (PTP) ...................................................................1-27
Enabling/Disabling PTP Time Stamping ...............................................................1-27
MAC Security Overview ...............................................................................................1-28
How It Works? .......................................................................................................1-28
Enabling/Disabling MACSec on an Interface ........................................................1-30
Chapter 2 Configuring UDLD ......................................................................................................2-1
In This Chapter ................................................................................................................2-1
UDLD Defaults ..............................................................................................................2-2
Quick Steps for Configuring UDLD ...............................................................................2-3
UDLD Overview .............................................................................................................2-4
UDLD Operational Mode .........................................................................................2-4
Mechanisms to Detect Unidirectional Links ............................................................2-5
Configuring UDLD .........................................................................................................2-6
Enabling and Disabling UDLD ................................................................................2-6
Configuring the Operational Mode ..........................................................................2-7
Configuring the Probe-Timer ...................................................................................2-7
Configuring the Echo-Wait-Timer ...........................................................................2-7
Clearing UDLD Statistics .........................................................................................2-8
Verifying the UDLD Configuration ................................................................................2-8
Chapter 3 Managing Source Learning ...................................................................................3-1
In This Chapter ................................................................................................................3-1
Source Learning Defaults ...............................................................................................3-2
MAC Address Table Overview .......................................................................................3-3
Using Static MAC Addresses ..........................................................................................3-3
Configuring Static MAC Addresses .........................................................................3-4

Table of Contents

Related product manuals