Contents
OmniSwitch AOS Release 8 Network Configuration Guide December 2017 iv
Interfaces Violation Recovery .......................................................................................1-15
Violation Shutdown and Recovery Methods .........................................................1-15
Interaction With Other Features .............................................................................1-16
Configuring Interface Violation Recovery .............................................................1-17
Verifying the Interfaces Violation Recovery Configuration ..................................1-18
Clearing Ethernet Port Violations .................................................................................1-19
Link Monitoring ............................................................................................................1-20
Monitoring Interface Errors ...................................................................................1-20
Monitoring Interface Flapping ...............................................................................1-20
Monitoring Window ...............................................................................................1-21
Configuring the Wait-to-Restore Timer .................................................................1-21
Configuring the Wait-to-Shutdown Timer .............................................................1-22
Displaying Link Monitoring Information ..............................................................1-23
Link Fault Propagation ..................................................................................................1-24
Interaction With Interfaces Violation Recovery ....................................................1-24
Configuring Link Fault Propagation ......................................................................1-25
LFP Application Example ......................................................................................1-26
IEEE 1588 Precision Time Protocol (PTP) ...................................................................1-27
Enabling/Disabling PTP Time Stamping ...............................................................1-27
MAC Security Overview ...............................................................................................1-28
How It Works? .......................................................................................................1-28
Enabling/Disabling MACSec on an Interface ........................................................1-30
Chapter 2 Configuring UDLD ......................................................................................................2-1
In This Chapter ................................................................................................................2-1
UDLD Defaults ..............................................................................................................2-2
Quick Steps for Configuring UDLD ...............................................................................2-3
UDLD Overview .............................................................................................................2-4
UDLD Operational Mode .........................................................................................2-4
Mechanisms to Detect Unidirectional Links ............................................................2-5
Configuring UDLD .........................................................................................................2-6
Enabling and Disabling UDLD ................................................................................2-6
Configuring the Operational Mode ..........................................................................2-7
Configuring the Probe-Timer ...................................................................................2-7
Configuring the Echo-Wait-Timer ...........................................................................2-7
Clearing UDLD Statistics .........................................................................................2-8
Verifying the UDLD Configuration ................................................................................2-8
Chapter 3 Managing Source Learning ...................................................................................3-1
In This Chapter ................................................................................................................3-1
Source Learning Defaults ...............................................................................................3-2
MAC Address Table Overview .......................................................................................3-3
Using Static MAC Addresses ..........................................................................................3-3
Configuring Static MAC Addresses .........................................................................3-4