Mgtextre
Mgtextre
9036692-01 Rev AA
August 2020
Copyright © 2020 Extreme Networks, Inc. All rights reserved.
Legal Notice
Extreme Networks, Inc. reserves the right to make changes in specifications and other information
contained in this document and its website without prior notice. The reader should in all cases
consult representatives of Extreme Networks to determine whether any such changes have been
made.
The hardware, firmware, software or any specifications described or referred to in this document
are subject to change without notice.
Trademarks
Extreme Networks and the Extreme Networks logo are trademarks or registered trademarks of
Extreme Networks, Inc. in the United States and/or other countries.
All other names (including any product names) mentioned in this document are the property of
their respective owners and may be trademarks or registered trademarks of their respective
companies/owners.
For additional information on Extreme Networks trademarks, please see:
www.extremenetworks.com/company/legal/trademarks
Configuration Fundamentals............................................................................................ 14
Configuration Files..................................................................................................................................................... 14
Default Configuration Files............................................................................................................................14
Startup Configuration Files........................................................................................................................... 15
Running Configuration Files..........................................................................................................................15
Auto-Persistence of Configuration Data.................................................................................................15
Displaying configurations...............................................................................................................................16
Backing up a running configuration..........................................................................................................17
Backing up configurations............................................................................................................................. 17
Configuration restoration............................................................................................................................... 18
Managing flash files...........................................................................................................................................18
Rebooting the device......................................................................................................................................20
Session connection...................................................................................................................................................20
Telnet.......................................................................................................................................................................20
SSH........................................................................................................................................................................... 22
Configuring the terminal session parameters..................................................................................... 27
Configuring a login banner...........................................................................................................................28
Ethernet management interfaces...................................................................................................................... 29
Displaying the management interface....................................................................................................29
Configuring an IPv6 address on the SLX platform................................................................................... 29
Port management.......................................................................................................................................................31
SLX 100G ports................................................................................................................................................... 31
Configuring breakout mode.........................................................................................................................32
10G/1G auto negotiation and auto detection mode........................................................................ 33
Port flap dampening........................................................................................................................................34
Port transition hold timer.............................................................................................................................. 35
Link fault signaling............................................................................................................................................36
Interface Ethernet ports......................................................................................................................................... 37
Displaying device interfaces........................................................................................................................ 37
Interface reload delay to prevent traffic black-holing in vLAG........................................................... 38
Extreme SLX-OS
Management Configuration Guide, 20.2.1a iii
Table of Contents
Scenario 1.............................................................................................................................................................. 38
Scenario 2............................................................................................................................................................. 39
Configuration examples................................................................................................................................ 40
Chassis and host names.......................................................................................................................................... 41
Customizing chassis and host names...................................................................................................... 41
System clock................................................................................................................................................................ 42
Setting the clock............................................................................................................................................... 42
Management VRFs....................................................................................................................................................43
VRF reachability................................................................................................................................................ 43
Zero Touch Provisioning.........................................................................................................................................46
Routing for ZTP................................................................................................................................................. 47
Using ZTP............................................................................................................................................................. 47
ZTP configuration.............................................................................................................................................48
Example of ZTP in a two-node topology .............................................................................................53
Enhanced Zero Touch Provisioning (ZTP+)..................................................................................................56
Pre-requisites and Dependencies..............................................................................................................57
ZTP+ Phases of Operation............................................................................................................................57
Firmware validation..........................................................................................................................................58
Configuration...................................................................................................................................................... 59
MAC address aging...................................................................................................................................................59
TCAM application-resource monitoring......................................................................................................... 59
TCAM library-resource monitoring...........................................................................................................60
Hardware profiles........................................................................................................................................................61
TCAM profiles.......................................................................................................................................................61
TCAM sharing......................................................................................................................................................63
Counter profiles................................................................................................................................................. 64
FIB compression................................................................................................................................................65
Border profiles for Internet peering.........................................................................................................66
Hardware profile show commands ......................................................................................................... 69
Enter Maintenance Mode Before Performing Device Maintenance.................................................. 69
Rebooting into Maintenance Mode ................................................................................................................. 70
Extreme SLX-OS
iv Management Configuration Guide, 20.2.1a
Table of Contents
VM Access Management........................................................................................................................................79
Extreme SLX-OS VM Access Management......................................................................................... 80
Insight Interface and TPVM...................................................................................................................................85
Insight interface port-channel.................................................................................................................... 85
TPVM on the SLX 9150 series..................................................................................................................... 86
Configuring the Insight Interface for the SLX 9150/9250.............................................................87
Insight interface................................................................................................................................................. 88
Inbound ACL-based mirroring..................................................................................................................... 91
Insight interface traffic management and QoS..................................................................................93
Configuring QoS egress scheduling........................................................................................................ 95
Troubleshooting port-mirroring................................................................................................................. 97
TPVM............................................................................................................................................................................. 100
Supported third-party applications, packages, and hardware.................................................100
TPVM Installation and Management...................................................................................................... 102
Docker containers.............................................................................................................................................113
Linux containers................................................................................................................................................ 114
Utilities installation and management.................................................................................................... 115
Assigning a static IP address on the TPVM Linux OS.....................................................................117
SNMP.................................................................................................................................. 126
SNMP overview..........................................................................................................................................................126
Basic SNMP operation................................................................................................................................... 127
SNMP community strings............................................................................................................................ 128
SNMP groups..................................................................................................................................................... 128
SNMP users.........................................................................................................................................................128
SNMP views........................................................................................................................................................ 129
SNMP server hosts.......................................................................................................................................... 129
Multiple SNMP server context to VRF mapping...............................................................................129
SNMP source interface..................................................................................................................................129
Configuring SNMPv2.............................................................................................................................................. 130
Configuring SNMPv3................................................................................................................................................131
Configuring an SNMP server context to a VRF......................................................................................... 132
Offline SNMP ifIndex generation tool............................................................................................................. 133
Generating ifIndexes for various interfaces........................................................................................ 134
Configuration examples for generating ifIndexes offline............................................................. 134
LLDP................................................................................................................................... 136
Extreme SLX-OS
Management Configuration Guide, 20.2.1a v
Table of Contents
LLDP overview...........................................................................................................................................................136
Layer 2 topology mapping..........................................................................................................................137
LLDP configuration guidelines and restrictions............................................................................... 138
Configuring and managing LLDP.....................................................................................................................138
Understanding the default LLDP............................................................................................................. 139
Disabling LLDP globally............................................................................................................................... 139
Configuring LLDP global parameters................................................................................................... 140
Configuring LLDP profiles............................................................................................................................ 141
Configuring an LLDP profile to an interface...................................................................................... 142
Displaying LLDP information..................................................................................................................... 142
Clearing LLDP-related information.........................................................................................................144
Configuration Rollback....................................................................................................162
Configuration rollback overview....................................................................................................................... 162
Supported topologies................................................................................................................................... 162
Configuration rollback details............................................................................................................................ 164
Configuration rollback considerations and limitations.......................................................................... 165
General..................................................................................................................................................................165
Issues with specific configurations......................................................................................................... 166
RAS considerations........................................................................................................................................ 166
Intrusive scenarios...........................................................................................................................................167
Performance considerations...................................................................................................................... 167
Configuring rollback................................................................................................................................................167
Enabling or disabling rollback................................................................................................................... 167
Creating a default configuration checkpoint..................................................................................... 167
Extreme SLX-OS
vi Management Configuration Guide, 20.2.1a
Table of Contents
Extreme SLX-OS
Management Configuration Guide, 20.2.1a vii
Preface
This section describes the text conventions used in this document, where you can find additional
information, and how you can provide feedback to us.
Text Conventions
Unless otherwise noted, information in this document applies to all supported environments for the
products in question. Exceptions, like command keywords associated with a specific software version,
are identified in the text.
When a feature, function, or operation pertains to a specific hardware product, the product name is
used. When features, functions, and operations are the same across an entire product family, such as
ExtremeSwitching switches or SLX routers, the product is referred to as the switch or the router.
Extreme SLX-OS
8 Management Configuration Guide, 20.2.1a
Preface Text Conventions
Table 2: Text
Convention Description
screen displays This typeface indicates command syntax, or represents information as
it appears on the screen.
The words enter and type When you see the word enter in this guide, you must type something,
and then press the Return or Enter key. Do not press the Return or
Enter key when an instruction simply says type.
Key names Key names are written in boldface, for example Ctrl or Esc. If you must
press two or more keys simultaneously, the key names are linked with a
plus sign (+). Example: Press Ctrl+Alt+Del
Words in italicized type Italics emphasize a point or denote new terms at the place where they
are defined in the text. Italics are also used when referring to
publication titles.
New information. In a PDF, this is searchable text.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 9
Documentation and Training Preface
Extreme Networks offers product training courses, both online and in person, as well as specialized
certifications. For details, visit www.extremenetworks.com/education/.
Getting Help
If you require assistance, contact Extreme Networks using one of the following methods:
Extreme Portal
Search the GTAC (Global Technical Assistance Center) knowledge base; manage support cases and
service contracts; download software; and obtain product licensing, training, and certifications.
The Hub
A forum for Extreme Networks customers to connect with one another, answer questions, and share
ideas and feedback. This community is monitored by Extreme Networks employees, but is not
intended to replace specific guidance from GTAC.
Call GTAC
For immediate support: (800) 998 2408 (toll-free in U.S. and Canada) or 1 (408) 579 2826. For the
support phone number in your country, visit: www.extremenetworks.com/support/contact
Before contacting Extreme Networks for technical support, have the following information ready:
• Your Extreme Networks service contract number, or serial numbers for all involved Extreme
Networks products
• A description of the failure
• A description of any actions already taken to resolve the problem
• A description of your network environment (such as layout, cable type, other relevant environmental
information)
• Network load at the time of trouble (if known)
• The device history (for example, if you have returned the device before, or if this is a recurring
problem)
• Any related RMA (Return Material Authorization) numbers
1. Go to www.extremenetworks.com/support/service-notification-form.
2. Complete the form (all fields are required).
Extreme SLX-OS
10 Management Configuration Guide, 20.2.1a
Preface Providing Feedback
3. Select the products for which you would like to receive notifications.
Note
You can modify your product selections or unsubscribe at any time.
4. Select Submit.
Providing Feedback
The Information Development team at Extreme Networks has made every effort to ensure the accuracy
and completeness of this document. We are always striving to improve our documentation and help
you work better, so we want to hear from you. We welcome all feedback, but we especially want to
know about:
• Content errors, or confusing or conflicting information.
• Improvements that would help you find relevant information in the document.
• Broken links or usability issues.
Provide the publication title, part number, and as much detail as possible, including the topic heading
and page number if applicable, as well as your suggestions for improvement.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 11
About This Document
Supported Hardware on page 12
Regarding Ethernet interfaces and chassis devices on page 12
What’s New in this Document on page 13
Supported Hardware
For instances in which a topic or part of a topic applies to some devices but not to others, the topic
specifically identifies the devices.
Note
Although many software and hardware configurations are tested and supported for this
release, documenting all possible configurations and scenarios is beyond the scope of this
document.
For information about other releases, see the documentation for those releases.
However, the Ethernet interface configuration and output slot/port examples in this document may
appear as either 0/x or n/x, where "n" and "x" are integers greater than 0.
For all currently supported devices, specify 0 for the slot number.
Extreme SLX-OS
12 Management Configuration Guide, 20.2.1a
About This Document What’s New in this Document
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 13
Configuration Fundamentals
Configuration Files on page 14
Session connection on page 20
Ethernet management interfaces on page 29
Configuring an IPv6 address on the SLX platform on page 29
Port management on page 31
Interface Ethernet ports on page 37
Interface reload delay to prevent traffic black-holing in vLAG on page 38
Chassis and host names on page 41
System clock on page 42
Management VRFs on page 43
Zero Touch Provisioning on page 46
Enhanced Zero Touch Provisioning (ZTP+) on page 56
MAC address aging on page 59
TCAM application-resource monitoring on page 59
Hardware profiles on page 61
Enter Maintenance Mode Before Performing Device Maintenance on page 69
Rebooting into Maintenance Mode on page 70
Configuration Files
Extreme devices support three types of configuration files; default, startup, and running configuration.
When you boot up a device for the first time, the default configuration is the running configuration. As
you configure the device, the changes are written to the running configuration. To save the changes as
the startup configuration, you must copy the currently effective configuration (the running
configuration) as the startup configuration. Changes to the running configuration persist when the
device reboots.
Extreme SLX-OS
14 Management Configuration Guide, 20.2.1a
Configuration Fundamentals Startup Configuration Files
Configurations are saved to a persistent configuration datastore. During device bring-up, configurations
are replayed from this datastore. If the datastore becomes unusable for any reason, configurations are
replayed from a startup-file.
By default, the startup-file has the factory-default configuration. This startup-file is updated with
datastore entries whenever user executes copy running-config startup-config.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 15
Displaying configurations Configuration Fundamentals
Command Information
The following examples illustrate how to display the default, startup, and running configurations.
• Displaying the Default Configuration:
To display the default configuration, enter show file with the default configuration filename, in
privileged EXEC mode.
(device)# show file defaultconfig.standalone
To display the contents of the startup configuration, enter show startup-config, in privileged
EXEC mode.
(device)# show startup-config
To display the contents of the running configuration, enter show running-config in privileged
EXEC mode.
(device)# show running-config
Displaying configurations
The following examples illustrate how to display the default, startup, and running configurations,
respectively.
Extreme SLX-OS
16 Management Configuration Guide, 20.2.1a
Configuration Fundamentals Backing up a running configuration
Note
Before upgrading or downgrading the firmware, use one of the following tasks to backup the
running configuration.
Enter the copy command in privileged EXEC mode. Specify the file name as the file URL followed by
the startup-config keyword.
device# copy flash://myconfig startup-config
This operation will modify your startup configuration. Do you want to continue? [Y/N]: y
Backing up configurations
Always keep a backup copy of your configuration files, so you can restore the configuration in the event
the configuration is lost or you make unintentional changes.
In the following example, the startup configuration is copied to a file on a remote server by means of
FTP.
device# copy startup-config ftp://admin:******@10.34.98.133//archive/startup-config_device24-08_20101010
2. Enter the copy startup-config command with the destination (USB) and file name.
device# copy startup-config usb://startup-config_slx-08_20160510
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 17
Configuration restoration Configuration Fundamentals
Configuration restoration
Restoring a configuration involves overwriting a given configuration file on the device by downloading
an archived backup copy from an external host or from an attached USB device.
To restore the default configuration, perform the following procedure in privileged EXEC mode.
2. Confirm that you want to make the change by entering Y when prompted.
This operation will modify your startup configuration. Do you want to continue? [Y/N]:
y
Extreme SLX-OS
18 Management Configuration Guide, 20.2.1a
Configuration Fundamentals Managing flash files
Note
You cannot delete a system configuration file in flash memory.
Note
You cannot rename a system configuration file in flash memory.
Note
To display the contents of the running configuration, use the show running-config
command. To display the contents of the startup configuration, use the show startup-
config command.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 19
Rebooting the device Configuration Fundamentals
Caution
All reboot operations are disruptive, and the commands prompt for confirmation before
executing. When you reboot a device, all traffic to and from it stops. All ports on that device
remain inactive until the device comes back online.
Note
Any unsaved configurations are lost. During the boot process system initialization,
configuration data (default or user-defined) are applied to the device through configuration
replay.
• The reload system command performs a cold reboot that powers off and restarts the entire
chassis. All session connections must be restarted. If the power-on self-test (POST) is enabled (via
FIPS or CC enable), POST is executed when the system comes back up.
device# reload system
Session connection
You can connect to your device through a console session on the serial port, or through a Telnet or
Secure Shell (SSH) connection to the management port or the inband port belonging to either the
mgmt-vrf, default-vrf, or a user-defined vrf. You can use any account login present in the local device
database or on a configured authentication, authorization, and accounting (AAA) server for
authentication. For initial setup procedures, use the pre-configured administrative account that is part
of the default device configuration.
The device must be physically connected to the network. If the device network interface is not
configured or the device has been disconnected from the network, use a console session on the serial
port.
Refer to the appropriate hardware guide for information on connecting through the serial port and
establishing an Ethernet connection for a console session.
Telnet
Telnet allows access to management functions on a remote networking device. Unlike SSH, Telnet does
not provide a secure, encrypted connection to the device.
Telnet support is available in privileged EXEC mode on all Extreme platforms. The device supports a
combined maximum (SSH, Telnet, and serial) of 32 non-root CLI sessions. Both IPv4 and IPv6 addresses
are supported. Root users have another five dedicated sessions.
The Telnet service is enabled by default on the device. When the Telnet server is disabled, existing
inbound Telnet connections are terminated and access to the device by additional inbound connections
Extreme SLX-OS
20 Management Configuration Guide, 20.2.1a
Configuration Fundamentals Telnet
is not allowed until the Telnet server is re-enabled. If you have admin privileges, you can disable and re-
enable inbound Telnet connections from global configuration mode.
Note
Outgoing Telnet connections from the device to any remote device are not affected by
disabling or enabling the Telnet server in the device.
Note
When using Telnet, the root ID is blocked and you cannot login as root. Use root enable
command to enable root ID.
The example establishes a Telnet session to the device with the IP address of 10.17.37.157.
If the device is active and the Telnet service is enabled on it, a display similar to the following
appears.
Trying 10.17.37.157...
Connected to 10.17.37.157.
Escape character is '^]'.
2. Once you have established the Telnet connection, you can log in normally.
device login: admin
Password:
SECURITY WARNING: The default password for at least
one default account (root, admin and user) have not been changed.
Note
The default admin login name is admin. The default user name is user. The default
password for both admin and user accounts is password.
Extreme recommends that you change the default account password when you log in for the first
time. For more information on changing the default password, refer to the Extreme SLX-OS Security
Configuration Guide.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 21
SSH Configuration Fundamentals
The example establishes a Telnet session to a device with the IP address of 10.20.51.68.
You can override the default port by using the port-number port option. However, the device
must be listening on this port for the connection to succeed.
If the device is active and the Telnet service is enabled on it, a display similar to the following
appears.
device# telnet 10.20.51.68 vrf mgmt-vrf
Trying 10.20.51.68...
Connected to 10.20.51.68.
Escape character is '^]'.
...
device login:
2. Once you have established the Telnet connection, you can log in normally.
All Telnet sessions including any currently active sessions are immediately terminated, and cannot
be re-established until the service is re-enabled.
3. Enable Telnet service on the device.
device(config)# no telnet server use-vrf red shutdown
Note
The shutdown option for a given VRF is displayed only when the Telnet server was
configured and then shutdown on that VRF. Otherwise, the VRF name and shutdown
option are not displayed for the no form of the command.
SSH
Secure Shell (SSH) allows secure access to management functions on a remote networking device.
Unlike Telnet, which offers no security, SSH provides a secure, encrypted connection to the device.
SSH support is available in privileged EXEC mode on all Extreme platforms. The device supports a
combined maximum (SSH, Telnet, and serial) of 32 non-root CLI sessions. Both IPv4 and IPv6 addresses
are supported. Root users have another five dedicated sessions.
Extreme SLX-OS
22 Management Configuration Guide, 20.2.1a
Configuration Fundamentals SSH
The SSH service is enabled by default on the device. When the SSH server is disabled, existing inbound
SSH connections are terminated and access to the device by additional inbound connections are not
allowed until the SSH server is re-enabled. If you have admin privileges, you can disable and re-enable
inbound SSH connections from global configuration mode.
Note
Outgoing SSH connections from the device to any remote device are not affected by disabling
or enabling the SSH server in the device.
Note
When using SSH, the root ID is blocked and you cannot login as root. Use root enable
command to enable the root ID.
The following Hash-based Message Authentication Code (HMAC) message authentication algorithms
are supported:
• hmac-md5: MD5 encryption algorithm with 128-bit key.
• hmac-md5-96
• hmac-sha1: SHA1 encryption algorithm with 160-bit key.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 23
SSH Configuration Fundamentals
• hmac-sha1-96
• hmac-sha2-256: SHA2 encryption algorithm with 256-bit key.
• hmac-sha2-256-etm@openssh.com
• hmac-sha2-512: SHA2 encryption algorithm with 512-bit key.
• hmac-sha2-512-etm@openssh.com
• hmac-ripemd160
• hmac-ripemd160@openssh.com
• umac-64@openssh.com
• umac-128@openssh.com
• hmac-sha1-etm@openssh.com
• hmac-sha1-96-etm@openssh.com
• hmac-md5-etm@openssh.com
• hmac-ripemd160-etm@openssh.com
• umac-64-etm@openssh.com
• umac-128-etm@openssh.com
• hmac-ripemd160-etm@openssh.com
SSH user authentication is performed with passwords stored on the device or on an external
authentication, authorization, and accounting (AAA) server.
Extreme SLX-OS
24 Management Configuration Guide, 20.2.1a
Configuration Fundamentals SSH
The example establishes an SSH session to the device with the IP address of 10.17.37.157.
2. Enter yes if prompted.
The authenticity of host '10.17.37.157 (10.17.37.157)' can't be established.
RSA key fingerprint is 9f:83:62:cd:55:6c:b9:e8:1d:79:ab:b4:04:f4:f6:2a.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '10.17.37.157' (RSA) to the list of known hosts.
admin@10.17.37.157's password:
Note
The default admin login name is admin. The default user login name is user. The default
password for both admin and user accounts is password.
It is recommended that you change the default account password when you log in for the first time.
For more information on changing the default password, refer to the Extreme SLX-OS Security
Configuration Guide.
1. Establish an SSH connection with the login name and IP address for the remote server.
device# ssh 10.20.51.68 -l admin vrf mgmt-vrf
You can use the -m and -c options to override the default encryption and hash algorithms
2. Enter yes if prompted.
The authenticity of host '10.20.51.68 (10.20.51.68)' can't be established.
RSA key fingerprint is ea:32:38:f7:76:b7:7d:23:dd:a7:25:99:e7:50:87:d0.
Are you sure you want to continue connecting (yes/no)? yes
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 25
SSH Configuration Fundamentals
1. In privileged EXEC mode, import an SSH client public key to the device.
device# certutil import sshkey user admin host 10.70.4.106 directory /users/home40/
bmeenaks/.ssh file id_rsa.pub login fvt
This example imports the SSH client public key for the admin user from the remote 10.70.4.106 host
using the directory and file information for the key and using the fvt login credentials for logging
into the external server for the scp.
You can also copy the public key directly using certutil sshkey user admin pubkey. For
example;
device# certutil sshkey user admin pubkey “ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDnim
+Ofjx/id3z2jDxXu9DcMuQqVq/NKi2Lms
+q7dA5Dqww8jlrOGawG8tMySOvnB1ZEvJt1kqNneRi4l6Ot4/7hfd99rIOPGBP/NJs6xTLUrQhDgxB78ddTg
+6euBtkYLTAaTC7kbXGXcO8VVB9+4xrH+0bkvjU9RRvGJguUfdiFKEfIGVOyt0atdHi1dmgQ9BE0cO65nc/
i9MjMJedBe174/QT4TxeGeEgaQ57c2AL5It2V4CzrZBDtnixdnHUO5w2vmBR61LZIDVT1fuX/
xYxDAm9H8SDpDX8pZlfFpQBy/wrkIYPZ/p4OLrUApB/XAJGujrlNlZLEu9U9MPVM/ root@ldap.hc-
fusion.in”
When the public key is imported (using certutil import sshkey) or copied (using
certutil sshkey) for a user, password based authentication will become a fallback option for
that particular user; This user will be allowed login using public key. If a user tries to login from any
other machine for which public key is not present on the device then the user will be prompted for a
password. Once the public key is removed for the user, only password based authentication will be
enabled for that particular user.
Note
Whenever the public key is imported or removed, the SSH server is automatically rebooted
and all active SSH connections are terminated.
3. Delete an SSH public key from the device to prevent it from being used. This resets the device to a
password based login.
device# no certutil sshkey user admin
This example deletes the SSH client key for the admin user.
Note
Whenever the public key is imported or removed, the SSH server is automatically rebooted
and all active SSH connections are terminated.
Extreme SLX-OS
26 Management Configuration Guide, 20.2.1a
Configuration Fundamentals Configuring the terminal session parameters
Note
When shutting down the service, either the SSH or the Telnet server on the Management VRF
must remain operational. For example; if the Telnet server on the default-vrf and mgmt-vrf are
shut down, the ssh server can be disabled on the default-vrf, but NOT on the mgmt-vrf.
All SSH sessions on the specified vrf are immediately terminated, and cannot be re-established until
the service is re-enabled.
3. Enable SSH service on the device.
device(config)# no ssh server use-vrf default-vrf shutdown
Note
The shutdown option for a given VRF is displayed only when the SSH server was
configured and then shutdown on that VRF. Otherwise, the VRF name and shutdown
option are not displayed for the no form of the command.
Note
Additionally, the SSH Server can be restarted on all VRF instances using ssh-server
restart.
This example sets the lines to be displayed on the terminal session at 30 lines.
Note
Setting the terminal length to 0 removes page breaks for the show commands' output.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 27
Configuring a login banner Configuration Fundamentals
This example sets the timeout of 3600 seconds (60 minutes) for the terminal session.
Note
Specifying a value of 0 allows the terminal session to stay open until the device is
rebooted or the connection is terminated by other means.
This example sets the maximum login attempts of four to establish a session.
5. Set the maximum number of minutes the user account remains locked when user fails to login within
the maximum login attempts.
device(config)# password-attributes admin-lockout max-lockout-duration 5
This example specifies that the user account be unlocked after 5 minutes.
device(config)# banner login "Please do not disturb the setup on this device"
This example configures a text message on a single line by enclosing the text in double quotation
marks (" ").
The banner can be up to 2048 characters long. To create a multi-line banner, enter the banner
login command followed by the Esc-m keys. Enter Ctrl-D to terminate the input.
You can use the no banner login command to remove the banner.
Extreme SLX-OS
28 Management Configuration Guide, 20.2.1a
Configuration Fundamentals Ethernet management interfaces
Important
Setting static IPv4 addresses and using DHCP are mutually exclusive. If DHCP is enabled,
remove the DHCP client before you configure a static IPv4 address. However, this does not
apply to IPv6 addresses.
Note
If you are provided an IPv6 prefix with a /65 to /128 net mask, assign the addresses according
to your network administrator's direction, and do NOT follow this procedure.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 29
Configuring an IPv6 address on the SLX platform Configuration Fundamentals
-- UNIT 0 --
Unit Name : 9450
Switch Status :
Hardware Rev :
Up Time : up 21:00
Current Time : 23:08:49 GMT
SLX-OS Version : 18x.1.00
Jumbo Capable : yes
Burned In MAC : 60:9c:9f:46:e2:06
Management IP : 10.25.101.4
Management Port Status : UP
The MAC addresses are used to create the IPv6 SLAAC address for the following mapping:
• Stack MAC - IPv6 address for chassis virtual-ipv6.
2. Convert each MAC address to a modified EUI-64 format, and then into the final IPv6 address for the
interfaces by performing the following steps:
a. Remove any punctuation from the MAC.
609c9f46e206
c. Using a calculator application in HEX Mode on a PC, do a Bitwise OR operation of the modified
MAC with 0200000000000000.
629c9ffffe46e206
d. Convert the result to IPv6 format by inserting colons after every 4 characters from the right hand
side.
629c:9fff:fe46:e206
e. Prepare the IPv6 network information for use. This example uses a sample network of
2001:DB8::/32 provided by the Admin.
• Normalize the address to a fully expanded format.
2001:0DB8:0000:0000:0000:0000:0000:0000/32
f. Combine the IPv6 network prefix from step 2e and the result of step 2d to make the IPv6
address.
2001:DB8::629c:9fff:fe46:e206/32
Extreme SLX-OS
30 Management Configuration Guide, 20.2.1a
Configuration Fundamentals Port management
Port management
The Extreme device allows the port management of the following features for interface Ethernet ports.
• SLX 9540 port management includes the following:
◦ Supports 54 ports in total. Ports 1 - 48 support 10G, 1G and 100 Mbps speed (default is10G).
◦ Ports 49-54 support 40G, 100G; and also support 4x10G and 4x25G breakout configurations.
Default is 100G.
◦ Forward Error Correction (FEC) is supported only in 100G mode.
• SLX 9640 port management includes the following:
◦ Supports 36 ports in total. Ports 1 - 24 support 10G and 1G speed (default is10G).
◦ Ports 25-36 support 40G, 100G; and also support 4x10G, 4x25G, and 2x50G breakout
configurations. Default is 100G.
◦ Forward Error Correction (FEC) is supported only in 100G mode.
• SLX-9250 port management includes the following:
◦ Supports 32 ports of 40G and 100G.
◦ Ports may be broken out into 4x10G or 4x25G.
• SLX-9150-48Y port management includes the following:
◦ Supports 56 ports in total
◦ 48 ports support 1G, 10G, and 25G.
◦ 8 ports support 40G, and 100G. These ports are able to break out to 4x10G.
◦ 4x25Gb is supported on 2 ports only (0/49 and 0/56).
• 9150-48XT port management includes the following:
◦ Supports 54 ports in total.
◦ 48 ports support 1G and 10G.
◦ 6 ports support 40G and 100G.
◦ Ports 49 and 54 support break out configurations of 4x10G or 4x25G.
• Interface Ethernet port management features discussed this section include the following:
◦ Port transition hold timer
◦ Port flap dampening
◦ Link fault signaling
You can configure 40G mode using the speed 40000 command from the interface configuration
mode. Each 100G port also supports 4x25G and 4x10G breakout configurations.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 31
Configuring breakout mode Configuration Fundamentals
Before performing the following procedure, you can verify the current port configuration using the
show interface status command:
--------------------------------------------------------------------------------
Port Status Mode Speed Type Description
--------------------------------------------------------------------------------
Eth 0/1 adminDown -- -- --
Eth 0/2 adminDown -- -- --
Eth 0/3 adminDown -- -- --
Eth 0/4 adminDown -- -- --
Eth 0/5 adminDown -- -- --
Note
When configuring breakout mode - either breaking into multiple interfaces or consolidating
into one interface - it is a best practice to remove all configuration on the interface, and set
the interface to the disabled state.
Or;
device (config)# interface ethernet 0/1:1-4
shutdown
exit
Note
Dynamic breakout is supported; the user does not need to reboot the switch to execute
the breakout.
Extreme SLX-OS
32 Management Configuration Guide, 20.2.1a
Configuration Fundamentals 10G/1G auto negotiation and auto detection mode
• Auto negotiation is supported on ports 1 to 24 on the front plate. However, ports 25 to 72 support 1G
mode without auto negotiation.
• Auto detection occurs when the interface speed is configured based on the detected optic type.
• Only full duplex is supported in the CL37 auto-negotiation.
You can manually configure the port speed. In manual mode, the inserted optic must match the
configured speed. Otherwise, the link will not come up. You can configure 1G mode with or without auto
negotiation. The following speed matrix shows different combinations of modes on the SLX 9540.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 33
Port flap dampening Configuration Fundamentals
If the port link state toggles, from down to up or from up to down, for a specified number of times
within a specified period, the interface is physically disabled for the specified wait period. Once the wait
period expires, the port’s link state is re-enabled. However, if the wait period is set to zero (0) seconds,
or you want to re-enable the port before the wait period expires, the port must be manually re-enabled.
2. Access the interface configuration mode for the port that you want to configure.
device(config)# interface Ethernet 1/4
Extreme SLX-OS
34 Management Configuration Guide, 20.2.1a
Configuration Fundamentals Port transition hold timer
While link down events are reported immediately in the Syslog, their effect on higher level protocols
such as OSPF is delayed according to how the hold timer is configured. When configured, the timer
affects the physical link events. However, the resulting logical link events are also delayed.
Note
All LAG member ports must have the same delayed-link-event configuration.
Note
The delayed-link-event configuration is applicable only on a physical interface. It is not valid
on a VLAN, VE, LAG, or loopback interfaces.
Note
The port transition hold timer does not take effect when the interface is administratively shut
down.
2. Access the interface configuration mode for the port that you want to configure.
device(config)# interface Ethernet 4/2
The polling iteration is 50 ms. In this example, 50 ms is multiplied by 2 and the sending of port down
event is delayed by 100 ms. If the port is detected to be in the up state within the 100 ms, the
delayed down event is cancelled.
You can specify a multiplier value from 1 to 200 for delay times from 50 ms to 10 seconds and a port
event of up, down, or both.
4. Verify the configuration.
device(conf-if-eth-4/2)# do show running-config internet ethernet 4/2
interface Ethernet 4/2
...
delay-link-event 2 down
no shutdown
!
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 35
Link fault signaling Configuration Fundamentals
Note
LFS is not supported in 1G mode.
When the device detects a local fault, it returns a remote fault to the link partner. When the device
detects a remote fault, it returns an idle state.
A port's physical link detection is independent of LFS detection. When either of these link fault signals is
detected, the following behaviors occur:
• The link is declared as DOWN and the port should display Protocol Down on the SLX-OS CLI.
• The physical link is not bought down in both of the previous cases. The peer side based on its
implementation might display that the link is UP when the Extreme device displays that the link is
DOWN due to a fault detection.
• The transmit (TX) packets, if any, are dropped at the MAC layer. The receive (RX) packets, if any, are
dropped in the software.
• The detected signal is reported as a RASTRACE message on the line card. The same information is
reported on the MM as a RASLOG. The same behavior occurs when the signal is cleared.
You can enable or disable LFS globally and on the interface level for both RX and TX directions:
• If the LFS is enabled for RX, the normal local and remote fault detection and processing described
previously occur. If it is disabled for RX, local and remote fault detection are ignored.
• If the LFS is enabled for TX and a local fault occurs, a remote fault (pause frame) is generated to the
remote side. If it is disabled for TX, the remote fault is not generated.
In this example, the global LFS is disabled for the link fault RX and enabled for link fault TX.
3. Access the interface configuration mode for the port that you want to configure.
device(config)# interface Ethernet 0/1
The interface must be in the shutdown state before you disable or enable TX LFS.
Extreme SLX-OS
36 Management Configuration Guide, 20.2.1a
Configuration Fundamentals Interface Ethernet ports
In this example, the LFS for the interface is enabled for the link fault RX and disabled for the link fault
TX. This configuration on the interface overrides the global configuration.
6. Enable the interface.
device(conf-if-eth-0/1)# no shutdown
Enter the show running-config interface command to display the interfaces and their status.
The following example displays the Ethernet interfaces on the device and are identified by the port
number.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 37
Interface reload delay to prevent traffic black-holing in
vLAG Configuration Fundamentals
Scenario 1
Node1 in VCS Cluster1 is reloading. The vLAG between Node1 and Node2 is not formed yet, but the BGP
session between leaf and spine nodes is established. Servers could start load balancing the traffic to
Node1, but that traffic is black holed as the vLAG is not formed yet.
Extreme SLX-OS
38 Management Configuration Guide, 20.2.1a
Configuration Fundamentals Scenario 2
Figure 1: Scenario 1
Scenario 2
Node1 in VCS Cluster1 is reloading. Routing protocols between leaf and spine nodes could be converging
before all tunnels are formed in Node1. Spine nodes could start load balancing the overlay traffic to
Node1, but all this traffic could be dropped as the tunnels are not yet formed in Node1.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 39
Configuration examples Configuration Fundamentals
Figure 2: Scenario 2
After a switch reload, interfaces on which reload-delay is enabled remain administratively down for at
least the delay-time configured by the user. After this time, the interface becomes administratively up.
For graceful vLAG host-traffic restoration, the reload delay must be configured on client interfaces such
as physical interfaces and vLAG/port-channel interfaces. For graceful spine-traffic restoration, reload
delay isconfigured on a loopback interface whose IP address is used as the source IP address of a tunnel
end point. The routing protocols become aware of the tunnel interfaces only after the specified reload-
delay time, after the tunnel has been established. This avoids traffic black-holing.
Configuration examples
This example enables reload delay and specifies an optional delay time of 1200 seconds on a port-
channel.
device# configure terminal
device(config)# interface port-channel 10
device(config-Port-channel)# reload-delay enable 1200
This example enables reload delay and specifies a delay time on an Ethernet interface.
device# configure terminal
device(config)# int eth 0/12
device(conf-if-eth-0/12)# reload-delay enable 1600
Newly configured reload delay value will be applicable after system reload.
device(conf-if-eth-0/12)#
Extreme SLX-OS
40 Management Configuration Guide, 20.2.1a
Configuration Fundamentals Chassis and host names
This example enables reload delay and specifies a delay time on a loopback interface.
device# configure terminal
device(config)# interface loopback 10
device(config-lo-10)# reload-delay enable 1200
This example specifies a global reload-delay time of 1800 seconds. (The interface configuration always
takes precedence over the global configuration.)
device# configure terminal
device(config)# reload-delay 1800
This example uses the show interface port-channel command to display the configuration on
a port-channel.
device# show interface port-channel 10
Port-channel 10 is admin down, line protocol is down (admin down)
Hardware is AGGREGATE, address is d884.66e9.fb60
Current address is d884.66e9.fb60
Interface index (ifindex) is 671088650 (0x2800000a)
Minimum number of links to bring Port-channel up is 1
MTU 1548 bytes
LineSpeed Actual : Nil
Allowed Member Speed : 10000 Mbit
Priority Tag disable
Forward LACP PDU: Disable
Route Only: Disabled
Tag-type: 0x8100
Reload delay time: 1200, Remaining time: 975
Last clearing of show interface counters: 00:03:45
Queueing strategy: fifo
Receive Statistics:
A chassis name can be from 1 through 30 characters long, must begin with a letter, and can contain
letters, numbers, and underscore characters.
The default chassis name is SLX9540-# where # is the number of slots in the chassis.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 41
System clock Configuration Fundamentals
This example changes the host name to SLX-mrkt and it is displayed in the prompt.
A host name can be from 1 through 30 characters long. It must begin with a letter, and can contain
letters, numbers, and underscore characters. The default host name is SLX.
4. Exit global configuration mode.
SLX-mrkt(config)# exit
System clock
The operation of the device does not depend on the date and time and the Extreme device with an
incorrect date and time value functions properly. However, since logging, error detection, and
troubleshooting use the date and time, you should set the clock correctly.
Note
You can set the system clock if there are no NTP servers configured. Otherwise, an active NTP
server, if configured, automatically updates and overrides the system clock.
1. In privileged EXEC mode, set the current date and time in the UTC timezone.
Note
This must be set to the UTC time, otherwise configuration of the timezone will cause the
system to adopt the incorrect local time.
This example sets the time and date to 16:38:00 on December 10, 2019.
Note
Setting the clock is not required whtn NTP is configured and the clock is synchronized to
an external NTP server.
Extreme SLX-OS
42 Management Configuration Guide, 20.2.1a
Configuration Fundamentals Management VRFs
This example changes the time zone to the region of America and the city of Los Angeles.
Management VRFs
Virtual Routing and Forwarding (VRF) is a technology that controls information flow within a network,
isolating the traffic by partitioning the network into different logical VRF domains.
All management services on the Extreme device are VRF aware. The management services can select a
particular VRF to reach a remote server based on a VRF. The VRFs are management (mgmt-vrf),
default (default-vrf), and user defined VRF (user-vrf).
By default, the device creates a VRF for management named mgmt-vrf and, all manageability services
are accessible through this VRF. Multiple instances of IP services can be instantiated in multiple VRFs.
For example, SSH can be in more than one VRF. IP services can have up to five VRF instances.
VRF reachability
The Extreme device supports the VRF reachability service. Reachability determines which VRF contains
the routing information needed to reach the application servers. For example, when you configure an
SSH server, you can configure the VRF information for the VRF context to resolve the SSH server route.
VRF reachability indicates the details of the VRF for servicing requests from the clients. It also indicates
the clients specifying the VRF for reaching a source to ensure that the management packets are
serviced or routed in a server VRF domain.
These two types of reachability services are also referred to as device-initiated and server-based
services.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 43
VRF reachability Configuration Fundamentals
Extreme SLX-OS
44 Management Configuration Guide, 20.2.1a
Configuration Fundamentals VRF reachability
All these implementations use forward referencing of the VRF name in the use-vrf option, unless
noted. At runtime when making the socket connection, the VRF ID by name must be resolved. If it does
not resolve, it will result in a connection error.
Each server-based service can have a maximum of 32 VRF instances; one mgmt-vrf, one default-vrf,
and 30 user-defined VRFs. The following table lists the server services and associated commands that
VRF reachability supports.
Note
The SNMP server listens on all VRFs and sends the response back on the same VRF where the
request arrived.
HTTP and HTTPS are mutually exclusive on the Extreme device and both will not be enabled
in different VRFs.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 45
Zero Touch Provisioning Configuration Fundamentals
service ceases to function correctly on the local VRF (mgmt-vrf) and you must restart it; for
example, to restart the SSH service on the local VRF, run the ssh server restart command.
Note
The Zero Touch Provisioning feature is supported on the following platforms:
• SLX9540
• SLX9640
• SLX-9250
• SLX-9150-48Y
• SLX-9150-48XT
Zero Touch Provisioning (ZTP) is an automated process that uses the DHCP process to download
firmware and set up the device configuration.
The ZTP process eliminates the need to log in manually to the console to bring up the device with the
correct firmware and required configuration. When the device is in the factory default configuration,
ZTP can start automatically upon device bootup.
This process reduces the time taken for firmware download and device configuration. All switches
download the same firmware and configuration script from the ZTP configuration file.
Extreme SLX-OS
46 Management Configuration Guide, 20.2.1a
Configuration Fundamentals Routing for ZTP
The DHCP and FTP/HTTP server may not be reachable by all the nodes in the IP Fabric. A route must be
configured on the first-level node with a connection to DHCP and FTP/HTTP servers. ZTP must first be
run on the first-level node by means of the Python script to enable iphelp to forward the traffic to the
servers. The ZTP process can then run on the next-level nodes. Eventually the farthest nodes can
connect to the servers for ZTP.
Using ZTP
Follow these steps to enable ZTP in standalone mode.
In the current state the ZTP process returns to substep (b) in the following situations:
• If there is a failure in any of the above-mentioned substeps from (b) through (g)
• If the device reboots from the CLI
• If the device crashes
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 47
ZTP configuration Configuration Fundamentals
On device bootup, the continuation of the ZTP process is indicated on the console. Wait for firmware
commit to complete. If the firmware commit fails, the ZTP process aborts. If the script is enabled, the
script is launched automatically.
4. Enable the RASlog.
For more information and log outputs for canceling DHCP ZTP, refer to the SLX-OS Command
Reference Guide.
ZTP configuration
To manage devices, the DHCP server and the FTP server must be set up to provide the environment.
DHCP server
DHCP Server version 4.2.4 was tested on Ubuntu 14.04 (Trusty). The dhcpd.conf file must have option
66 (TFTP Server Name) and option 67 (Filename) set for ZTP. Option 66 is used for the FTP server IP
address or host name. Option 67 is used for the ZTP configuration file path.
When the device starts the DHCP process, it sends the DHCP client ID to the DHCP server to get the IP
address and options 66/67. The device then downloads the ZTP configuration file from the FTP server.
To set up a different ZTP configuration file for different devices, the DHCP Client ID can be used in the
dhcpd.conf file. Whenever dhcpd.conf is changed, the dhcpd server must be restarted.
FTP server
vsFTP server version 3.0.2 was installed and tested on Ubuntu 14.04 (Trusty). The FTP server stores the
ZTP configuration file, firmware, switch configuration file, or Python script. The location of these
configuration files under the FTP server base directory is flexible.
HTTP server
Apache server version 2.4.18 was installed and tested on Ubuntu 14.04 (Trusty). The HTTP server stores
the ZTP configuration file, firmware, switch configuration file, or Python script. The location of these
configuration files under the HTTP server base directory is flexible.
Extreme SLX-OS
48 Management Configuration Guide, 20.2.1a
Configuration Fundamentals ZTP configuration
The script can automate any command line, including SLX-OS and Linux commands, such as the
configuration download command, copy ftp:// . . . running-config.
def main(argv):
log.write("apply config\n")
# change login banner
CLI(“conf ; banner login DAD ; end”)
# config download
CLI(“copy scp://root:extr123@192.169.0.2/castorT.startup.cfg running-config”)
if __name__ == "__main__":
main(sys.argv[1:])
pam_service_name=vsftpd
userlist_enable=NO
tcp_wrappers=YES
# dad settings
anonymous_enable=YES
no_anon_password=YES
anon_root=/var/ftp
delay_failed_login=30
max_clients=100
anon_max_rate=8388608
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 49
ZTP configuration Configuration Fundamentals
default-lease-time 600;
max-lease-time 7200;
authoritative;
log-facility local7;
key "extr-key" {
algorithm hmac-md5;
secret
"dtBgNTAoqZmwV5c4SueybjOvhe6OIqgac1uQrzGBv5O4X4nIEBEEGWRf0lCnbFhuIJXGExNBjDdNSqgBMeNI8w=="
;
};
# sw0
host sw0 {
option dhcp-client-identifier = "EXTREMENETWORKS##SLX9240##EXG3342L00V";
hardware ethernet 52:54:00:0E:95:8B;
fixed-address 192.168.0.90;
# fixed ip address
common_begin
Extreme SLX-OS
50 Management Configuration Guide, 20.2.1a
Configuration Fundamentals ZTP configuration
vcsmode=SA
scriptcfgflag=2 #0-config file only, 1-script only, 2 both
script=/script/ztp.py
fwdir=/fw/slxos17s.1.03_bld04
common_end
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 51
ZTP configuration Configuration Fundamentals
ZTP commands
ZTP has two commands, dhcp ztp log and dhcp ztp cancel. These are illustrated below.
Extreme SLX-OS
52 Management Configuration Guide, 20.2.1a
Configuration Fundamentals Example of ZTP in a two-node topology
Note
Before making any configuration changes from the CLI, the user must reboot the switch to
return to the default configuration. A reboot abandons all switch configuration set by ZTP.
device# dhcp ztp cancel
Warning: This command will terminate the existing ZTP session
Do you want to continue? [y/n] y
In the following figure, Switch 1 Eth 0/8 has direct connection to the DHCP or FTP/HTTP server. Switch 1
acts as a router for Switch 2 to reach the DHCP or FTP/HTTP server. A default route on Switch 1 is
configured on the server for traffic sent from the DHCP server to reach Switch 2 (see the default route
below). External access to the DHCP server is on Eth 0. There are two configurations for Switch 1:
• One is set up on Eth 0/8 by the DHCP server for ZTP to establish a connection to the DHCP server to
download the ZTP configuration file.
• The other is set up by the Python script to configure Switch 1 as a router with Eth 0/8 to the server
and Eth 0/3 to Switch 2.
DHCP relay is configured on Eth 0/3 in Switch 1 for DHCP requests from Switch 2. Switch 1 Eth 0/8 and
Eth 0/3 must be in different subnets.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 53
Example of ZTP in a two-node topology Configuration Fundamentals
The DHCP server configuration has two subnet address pools, based on the DHCP client ID: "level_1" for
Switch 1 and "level_2" for Switch 2, as in the following example.
class "level_1" {
match if option dhcp-client-identifier = "EXTREMENETWORKS##SLX9140##EXH3319M01J";
<EXH3319M01J is the device serial number>
}
class "level_2" {
match if option dhcp-client-identifier = "EXTREMENETWORKS##SLX9140##EXH3314M00L";
<EXH3314M00L is the device serial number>
}
subnet 192.169.0.0 netmask 255.255.255.0 {
pool {
allow members of "level_1";
range 192.169.0.100 192.169.0.200;
}
option bootfile-name "/config/ztp.cfg";
option tftp-server-name "192.169.0.2";
option routers 192.169.0.2;
option subnet-mask 255.255.255.0;
option broadcast-address 192.169.0.255;
}
subnet 192.169.1.0 netmask 255.255.255.0 {
pool {
allow members of "level_2";
Extreme SLX-OS
54 Management Configuration Guide, 20.2.1a
Configuration Fundamentals Example of ZTP in a two-node topology
common_begin
vcsmode=SA
fwdir=/bld/Nightly_nos_fusion_davinci_dev_160822_0600/dist
scriptcfgflag=2 #0-config file only, 1-script only, 2 both
script=/script/ztp.py
common_end
Configuration flow
The following sequence summarizes the configuration flow:
1. Execute the write erase command from the CLI on both Switch 1 and Switch 2 simultaneously.
2. Switch 1 behaves as a single-node ZTP switch.
3. Switch 2 is delayed in detecting the DHCP server by means option 66 or 67 until ZTP on Switch 1
succeeds, so that the static route is configured successfully. If Switch 1 fails, Switch 2 waits
indefinitely.
4. If ZTP is enabled, it shows the ZTP progress log as follows:
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 55
Enhanced Zero Touch Provisioning (ZTP+) Configuration Fundamentals
Note
ZTP is enabled by default for switch in factory default or after running "write erase". User
must cancel ZTP and reload system. After switch restarts, switch is ready for all commands.
ZTP session is designed to retry forever to detect the DHCP server and establish network connection for
firmware download. If it is in the middle of firmware download, firmware download is completed
successfully and the switch is in normal mode.
Limitation
1. If firmware download has not started yet, user should reboot the switch manually for normal mode.
2. If firmware download has already started, user should wait for firmware download to complete,
before running any other commands, power cycle the switch, start a new firmware download, or to
start a new ZTP session.
3. If firmware download completes and fails to reboot the switch, user should restart the switch
manually for normal mode.
Enhanced Zero Touch Provisioning (ZTP+) allows an SLX device to verify the existing image, upgrade if
necessary, or obtain the initial configuration from the Extreme Management Center (XMC). ZTP+ uses a
Extreme SLX-OS
56 Management Configuration Guide, 20.2.1a
Configuration Fundamentals Pre-requisites and Dependencies
Cloud Connector plugin installed on the SLX device to communcate with XMC to set the following intial
configuration.
• Image upgrade
• Static Management IP
• Gateway IP
• DNS Server IP and Domain Name
• HostName
• SNMP configuration (V1/V2/V3)
• NTP Server IP and Timezone Configuration
Please refer to the ZTP+ Device Configuration section in the XMC documentation for information to
upload SLX firmware and configure ZTP+.
Connection
Once the SLX device is connected to the network, it uses DHCP to obtain an IP address. After receiving
an IP address and DNS information via DHCP, the device tries to connect to XMC using the following
means:
1. extremecontrol.<customerDomainName>
2. devices.extremenetworks.com
3. check DHCP options for original ZTP support
Discovery
When an SLX device comes up in ZTP mode, the native ZTP state machine uses the following procedure
to deterimine which method to use for configuration; ZTP or ZTP+.
1. The CloudConnector plugin is launched in ZTP mode.
2. The DHCP options and network configuration are received from the DHCP Server.
3. If option 66 and 67 are received, proceed with native ZTP.
4. If the CloudConnector module discovers XMC in the network, proceed with ZTP+.
5. If option 66 and 67 are received but XMC is not discovered, then proceed with native ZTP state
machine.
You can exit ZTP and ZTP+ mode at any point using the dhcp ztp cancel command.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 57
Firmware validation Configuration Fundamentals
Firmware validation
The firmware validation process of ZTP+ verifies the device is running the appropriate version of
software.
The CloudConnector and Extreme Management Center (XMC) exchange device software versions. If
XMC detects a firmware update is required, it responds with the details to download the new version.
The update or download of software is initiated by the device.
To identify the correct operating firmware in XMC, use Inventory Manager to assign the base operating
system version as the Reference Image. The XMC ZTP+ server searches the reference image directory
for all applications that need to be upgraded. These versions are used for the Application and OS
Extreme SLX-OS
58 Management Configuration Guide, 20.2.1a
Configuration Fundamentals Configuration
verification steps in ZTP+. If there are errors during this upgrade process, the device notifies XMC by
posting an event to the server log., and retries the download operation.
Configuration
In the Configuration phase of ZTP+, the device notifies XMC that it is ready to receive its configuration.
Note
The device will not enter this stage until it has completed upgrading the software versions
that were identified in the Firmware Validation process.
If the device is booting with factory defaults .i.e. unconfigure switch all, then no configuration
block is sent. If the device has not yet been configured in XMC, the server issues a response to the
device instructing it to periodically retry the configuration request until the user has applied a
configuration to that device in XMC.
If the device has been previously configured (reboot), the device informs the server of its software
version and current configuration when querying the server for configuration updates.
Please refer to the ZTP+ Device Configuration section in the XMC documentation for information to
upload SLX firmware and configure ZTP+.
The aging time of dynamic MAC address entries can be configured using the mac-address-table
aging-time command. The MAC aging time can be configured to a value from 60 through 86400
seconds. By default, the aging time of dynamic MAC address entries is 300 seconds. The configured
MAC aging time is applied to all MAC addresses in the system. You can disable the MAC address aging
by specifying the aging time as 0 (zero).
Note
MAC address aging configuration per VLAN is not supported.
TCAM is used for storing different application filtering rules. These can be either L2, L3, or L4 control
protocols. TCAM resources are used at different stages of the packet processor pipeline for providing
the functionality. Some examples are:
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 59
TCAM library-resource monitoring Configuration Fundamentals
Note
For devices based in the XGS chipset family, TCAM banks are referred to as slices. For a list of
such devices, see "Supported Hardware".
It is possible to hit multiple TCAM banks for a single packet and the priority among the entries is
selected based on either priority mode or interleaved mode. In priority mode bank1, entry1 takes
precedence over bank2, entry2. In interleaved mode, minimal line entry is selected and first if both lines
are equal. Associative data is 24b/48b when a TCAM bank is configured as 4K/2Kx80b/160b. When two
TCAM banks are configured as 2K/128x320b model AD is 96b.
Note
For devices based on the XGS chipset family, there are 12 TCAM slices, each containing 768
entries.
To support this capability of TCAM, each resource has to go through the TCAM library code path of
resource allocation to achieve monitoring.
Based on the allocation via TCAM library, resource usage statistics are collected and RAS logs are
generated and associated with the specific TCAM application resources with flags as critical, warning
Extreme SLX-OS
60 Management Configuration Guide, 20.2.1a
Configuration Fundamentals Hardware profiles
and info. Shared/fixed comment is present in the logs to reflect shared/fixed TCAM hardware resource
by applications.
Hardware profiles
A variety of hardware profiles optimize ASIC resources for counters, port-channels, routes, and Ternary
Content-Addressable Memory (TCAM)-allocation.
Note
When you change a hardware profile, the supported scale numbers remain the same with
respect to the configuration even if hardware may not be able to fulfill them. This ensures that
the same protocol and interface information remain valid with all hardware profile settings.
TCAM profiles
TCAM profiles enable you to optimize TCAM resources according to your system requirements.
Note
TCAM profiles other than default are supported only on devices based on the DNX chipset
family. For a list of such devices, see "Supported Hardware".
TCAM is used by various forwarding applications. A TCAM profile supports a specified group of
forwarding applications.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 61
TCAM profiles Configuration Fundamentals
NS = not supported.
RL = rate limiting.
BD = bridge domain.
Extreme SLX-OS
62 Management Configuration Guide, 20.2.1a
Configuration Fundamentals TCAM sharing
NS = not supported.
RL = rate limiting.
BD = bridge domain.
TCAM sharing
Under supported TCAM profiles, you can enable sharing of TCAM resources for each security ACL or
PBR ACL applied to multiple ports.
Note
TCAM sharing is supported only on devices based on the DNX chipset family. For a list of such
devices, see "Supported Hardware".
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 63
Counter profiles Configuration Fundamentals
No TCAM profile provides simultaneous support for all five flavors of TCAM sharing. The following table
displays which and how many TCAM-sharing flavors are supported for each TCAM profile:
TCAM profile Maximum Layer 2 ACL IPv4 ACL IPv4 PBR IPv6 ACL IPv6 PBR
sharing- TCAM- TCAM- TCAM- TCAM- TCAM-
flavors sharing sharing sharing sharing sharing
default 0 No No No No No
app-telemetry 0 No No No No No
border-routing 0 No No No No No
layer2-ratelimit 0 No No No No No
3. Enter the profile tcam command to specify the TCAM-sharing profile or profiles that you
require.
device(config-hardware)# profile tcam cam-share l3-v4-ingress-acl l3-v6-ingress-acl
Counter profiles
Counter profiles optimize counters. Common Infrastructure leveraged by applications, to take care of
statistics subsystem programming.
Counter Profiles determine the amount of CEs each counting source receives.
Extreme SLX-OS
64 Management Configuration Guide, 20.2.1a
Configuration Fundamentals FIB compression
FIB compression
Border Gateway Protocol (BGP) learns routes from a neighbor and flattens the BGP next-hop route into
an IGP next-hop route before downloading those routes to the Routing Information Base (RIB). The RIB
then downloads those routes into the Forwarding Information Base (FIB) to program the routes in
hardware.
FIB compression is enabled for IPv4 and IPv6, supporting up to (approximately) 5.7 M IPv4 routes and
900 K IPv6 routes. Refer to release notes and scale documentation for further information.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 65
Border profiles for Internet peering Configuration Fundamentals
Compression limitations
Compressions can save hardware resources. However, FIB compression can result in the following:
1. Because compression requires a parent route with the same next-hop, Level 1 routes cannot be
compressed, as they may not have a parent route (default route).
2. Level 1 routes in the Internet BGP FIB can be compressed in the range of 40% to 50%.
2. Enable FIB compression by using the profile route route-enhance command as in the
following example for both IPv4 and IPv6 compression.
device(config-hardware)# profile route route-enhance v4_fib_comp v6_fib_comp on
3. Confirm the configuration by using the show hw route-info command for an interface.
device# show hw route-info interface 1/2
HW-Route-Info
====================================================
Slot 1
Tower 0
LEM
Total Entries :750000
95% Threshold :712500
85% Threshold :637500
Total In Use :39 (.000000%)
IPV4 routes :39
IPV6 routes :0
Status :Green
LPM
Total Entries :350000
95% Threshold :332500
85% Threshold :297500
Total In Use :331 (.000000%)
IPV4 routes :156
IPV6 routes :175
Status :Green
Note
This feature is applicable only for SLX 9640 devices.
Extreme SLX-OS
66 Management Configuration Guide, 20.2.1a
Configuration Fundamentals Border profiles for Internet peering
Previous releases supported Internet routing tables with limited IPv4 routes after FIB compression and
hardware optimization features were enabled. This scale is applicable to Internet routing only on the
default VRF.
The FIB compression feature compresses route entries to ensure optimal resource utilization. When
there is a more-specific and a less-specific route pointing to a same next-hop, FIB compression
addresses the more-specific route and programs only the less-specific route in the hardware.
The hardware optimization feature allows the user to program /24 prefix routes in longest exact match
(LEM) table. When this feature is enabled, all /23 routes (split into two /24 routes) and /24 prefix routes
are programmed into the LEM table. This feature uses more LEM memory than is required for longest
prefix match (LPM), and so can be used on devices that have more LEM than LPM capacity.
The following external TCAM (ETCAM) profiles are supported, by means of the profile etcam in
hardware configuration mode:
• Profile ETCAM default: This profile programs IPv4 unicast routes into an external lookup device
(ELK), and the internal LPM table is used to program IPv6 unicast routes. This is the default profile in
the system.
• Profile ETCAM IPv6-route: This profile programs IPv6 unicast routes into the ELK, and the internal
LPM table is used to program IPv4 unicast routes.
• Profile ETCAM IPv4-IPv6-route: This profile programs both IPv4 and IPv6 unicast routes in the ELK.
The following table provides values that can be used for network design purposes.
Important
These values are to be viewed as approximate, for design purposes only. They are based on a
compression ratio of 30%. The compression ratio is subject to the routes and next-hop
combinations that are available in the system, and it may vary from one network design to
another. Refer to release notes and scale documentation for further information.
Table 12: Approximate scale support, per profile, for design purposes
ETCAM profile FIB compression disabled FIB compression enabled
IPv4 unicast routes IPv6 unicast routes IPv4 unicast routes IPv6 unicast routes
profile etcam 4,000,000 256,000 5,700,000 365,000
default
profile etcam 1,000,000 1,000,000 1,400,000 1,400,000
ipv6-route
profile etcam 4,000,000 700,000 5,700,000 900,000
ipv4-ipv6-
route
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 67
Border profiles for Internet peering Configuration Fundamentals
This example specifies that IPv4 and IPv6 routes are programmed in the external lookup device
(ELK).
3. Enable FIB compression by using the profile route route-enhance command, as in the
following example for IPv4 and IPv6 routes.
device(config-hardware)# profile route route-enhance v4_fib_comp v6_fib_comp on
4. Confirm the configuration by using the show hw route-info command, as in the following
example for a linecard.
device# show hw route-info linecard 0
HW-Route-Info
====================================================
Slot 0
Tower 0
LEM
Total Entries :750000
95% Threshold :712500
85% Threshold :637500
Total In Use :58 (.000000%)
IPV4 routes :58
IPV6 routes :0
Status :Green
LPM
Total Entries :1000000
95% Threshold :950000
85% Threshold :850000
Total In Use :696 (.000000%)
IPV4 routes :0
IPV6 routes :174
Status :Green
eTCAM
Total Entries :4000000
95% Threshold :3800000
85% Threshold :3400000
Total In Use :156 (.000000%)
IPV4 routes :156
IPV6 routes :0
Status :Green
Extreme SLX-OS
68 Management Configuration Guide, 20.2.1a
Configuration Fundamentals Hardware profile show commands
Planned maintenance operations may require the device to be shut down or restarted, resulting in
traffic disruption even if alternative paths are available. Maintenance mode provides graceful traffic
diversion to alternative traffic paths, helping to minimize traffic loss during such planned operations.
When an alternative path is available, the BGP and MCT protocols redirect traffic away from the node
that is going into maintenance mode. When maintenance mode is enabled, all protocols that are
running on the maintenance mode node are notified and redirection of traffic (convergence) begins in
stages.
Note
Maintenance mode is not supported for the following features: BGP address-family, Flowspec,
Layer 3 VPN, VPLS, and VLL (virtual leased line).
5. Specify the number of seconds allowed per stage of the convergence of traffic to the maintenance
mode node.
device(config-system-maintenance)# convergence-time 125
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 69
Rebooting into Maintenance Mode Configuration Fundamentals
device(config-system-maintenance)# enable
device(config-system-maintenance)# convergence-time 125
Maintenance mode provides graceful traffic diversion to alternative traffic paths, helping to minimize
traffic loss during such planned operations. When an alternative path is available, the BGP and MCT
protocols redirect traffic away from the node that is going into maintenance mode. When maintenance
mode is enabled, all protocols that are running on the maintenance mode node are notified and
redirection of traffic (convergence) begins in stages.
Use the enable-on-reboot command to enable the device to come up in maintenance mode after a
reboot. This process allows any network errors detected with Extreme Fabric Automation (EFA) to be
addressed. After the errors have been resolved, the device can be added back to the network.
Note
The enable-on-reboot command is supported on the SLX 9250.
Use the enable parameter with a specified convergence time, to put the device into maintenance
mode without a reboot.
device# configure terminal
device(config)# system
device(config-system)# maintenance
device(config-system-maintenance)# enable
device(config-system-maintenance)# convergence-time 120
Extreme SLX-OS
70 Management Configuration Guide, 20.2.1a
SLX-OS and Linux Shell Interoperability
Overview on page 71
Executing Linux shell commands from SLX-OS on page 72
Executing scripts from SLX-OS on page 73
Accessing the Linux shell from SLX-OS on page 74
Executing SLX-OS commands from the Linux shell on page 74
Escalating Linux permissions to root on page 75
Saving and appending show command output to a file on page 76
Logs of Linux shell activities on page 76
Overview
The SLX-OS supports interoperability between the SLX-OS CLI and the SLXVM Linux shell.
As an SLX-OS user with admin permissions, you can perform the following tasks:
• Running permitted Linux commands and scripts from the SLX-OS CLI
• Accessing the SLXVM Linux shell, and:
◦ Running permitted Linux commands and scripts. However, if you have access to the root
password, you can then escalate your permissions, by using the su root Linux command.
◦ Running SLX-OS configuration and show commands.
◦ Running scripts that contain multiple SLX-OS commands.
Limitations
• By default, only the Bash shell is supported. With Linux root permissions, you can install a different
shell, such as the C shell or KornShell. However, shell-activity logging is supported only for the Bash
shell.
• If you open multiple Bash sessions, the Linux shell timeout is applicable only on the current Bash
session.
• If you run Linux commands as part of the script or through a file, the device logs the script or file
execution. It does not log the commands.
• If you use the cli_run command to execute SLX-OS CLI show commands from the shell,
pagination is not supported, and commands that require user input are also not supported.
• At the SLX-OS CLI, a window resizing issue occurs when you execute Linux commands such as top
using the oscmd command. Extreme recommends that you execute these commands from the
Linux shell.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 71
Executing Linux shell commands from SLX-OS SLX-OS and Linux Shell Interoperability
• Although as an SLX-OS admin, you have permissions to run the following commands from the Linux
shell, you do not have permissions to run them—from the SLX-OS CLI—appended to the oscmd
command.
◦ bash
◦ script
◦ vi
◦ vim
• Do not modify SLX-OS user accounts from the Linux shell. For information on modifying user
accounts, refer to the Extreme SLX-OS Security Configuration Guide.
In the following example, the Linux ps -ef command lists the process status.
device# oscmd ps -ef
UID PID PPID C STIME TTY TIME CMD
root 1 0 0 Jul24 ? 00:00:04 /sbin/init
root 2 0 0 Jul24 ? 00:00:00 [kthreadd]
root 3 2 0 Jul24 ? 00:00:00 [migration/0]
root 4 2 0 Jul24 ? 00:00:03 [ksoftirqd/0]
root 5 2 0 Jul24 ? 00:00:00 [migration/1]
root 6 2 0 Jul24 ? 00:00:03 [ksoftirqd/1]
root 7 2 0 Jul24 ? 00:00:00 [migration/2]
root 8 2 0 Jul24 ? 00:00:02 [ksoftirqd/2]
root 9 2 0 Jul24 ? 00:00:00 [migration/3]
root 10 2 0 Jul24 ? 00:00:02 [ksoftirqd/3]
root 11 2 0 Jul24 ? 00:00:00 [migration/4]
root 12 2 0 Jul24 ? 00:00:02 [ksoftirqd/4]
root 13 2 0 Jul24 ? 00:00:00 [migration/5]
root 14 2 0 Jul24 ? 00:00:03 [ksoftirqd/5]
root 27 2 0 Jul24 ? 00:00:00 [cpuset]
root 28 2 0 Jul24 ? 00:00:01 [khelper]
root 31 2 0 Jul24 ? 00:00:00 [netns]
root 34 2 0 Jul24 ? 00:00:00 [async/mgr]
root 270 2 0 Jul24 ? 00:00:00 [sync_supers]
root 272 2 0 Jul24 ? 00:00:00 [bdi-default]
...
Extreme SLX-OS
72 Management Configuration Guide, 20.2.1a
SLX-OS and Linux Shell Interoperability Executing scripts from SLX-OS
After copying the script to the device, verify that the script file is displayed with the list of files in the
flash memory of the device.
device# dir
total 24
drwxr-xr-x 2 root sys 4096 Oct 26 15:22 .
drwxr-xr-x 3 root root 4096 Oct 1 1970 ..
-rw-r--r-- 1 root root 1051 Oct 24 16:09 copy_script.sh
-rw-r--r-- 1 root root 207 Oct 24 16:09 create_vlans.py
-rw-r--r-- 1 root sys 557 Oct 26 10:37 defaultconfig.novcs
-rw-r--r-- 1 root sys 778 Oct 26 10:37 defaultconfig.vcs
If the copied script does not have executable permissions, you need to assign executable permissions
from the SLXVM Linux shell. Note that you need root access for this action, as described in "Escalating
Linux permissions to root."
[root@SLX]# cd /var/config/vcs/scripts/
[root@SLX]# chmod 755 copy_script.sh
[root@SLX]# ls -lart copy_script.sh
-rwxr-xr-x 1 root root 1051 Oct 24 16:09 copy_script.sh
After you write the script, make sure that it exists in the /fabos/users/admin/script directory
and is executable under Linux.
[admUser@SLX]#pwd
/fabos/users/admin/scripts
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 73
Running scripts from the SLX-OS CLI SLX-OS and Linux Shell Interoperability
Note
Inside the SLXVM Linux shell, you can execute commands that do not require root
permissions. To escalate your permissions, refer to "Escalating Linux permissions to root".
2. Enter Linux commands and run scripts as needed. You can also run SLX-OS commands from the
Linux shell.
3. To exit the shell and return to the SLX-OS CLI, enter exit.
[admUser@SLX]# exit
Upon exiting, the following message appears and you return to the SLX-OS CLI prompt.
exit
Exited from Linux shell
device#
In the previous example, the output of show ip interface brief is redirected to the /tmp/
interface file.
2. Display the contents of the file to verify the redirection.
[admUser@SLX]# cat /tmp/interface
Port-channel 1 unassigned administratively down down
Port-channel 2 unassigned administratively down down
3. To execute a file containing multiple SLX-OS commands, enter the Linux cli_run -f command.
[admUser@SLX]# cli_run -f /tmp/slxcli_cmd_file > /tmp/newfile
Extreme SLX-OS
74 Management Configuration Guide, 20.2.1a
SLX-OS and Linux Shell Interoperability Escalating Linux permissions to root
local-as 23
capability as4-enable
Note
Make sure that each command is on a new line.
4. Display the contents of the target file to verify that it contains the redirected output.
[admUser@SLX]# cat /tmp/newfile
Welcome to the Extreme SLX-OS Software
admin connected from 127.0.0.1 using console on SLX
SLX# show ssh server status | nomore
VRF-Name: mgmt-vrf Status: Enabled
VRF-Name: default-vrf Status: Enabled
device# conf t
Entering configuration mode terminal
Current configuration users:
admin console (cli from 10.70.4.183) on since 2017-01-31 05:49:59 terminal mode
device(config)# router bgp
device(config-bgp-router)# local-as 23
device(config-bgp-router)# capability as4-enable
device(config-bgp-router)#
Caution
A user with SLXVM Linux-shell root permissions can—unintentionally or maliciously—execute
commands that can render the SLX inoperable.
1. From the SLX-OS CLI prompt, enter start-shell to access the SLXVM Linux shell.
device# start-shell
Entering Linux shell for the user: admUser
[admUser@SLX]#
You can now execute commands that do not require root permissions.
2. To escalate your permissions, enter the Linux su root command.
[admUser@SLX]# su root
Password:
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 75
Saving and appending show command output to a file SLX-OS and Linux Shell Interoperability
5. To exit root level and return to the default SLXVM Linux shell, enter exit.
[root@SLX]# exit
exit
[admUser@SLX]#
6. To exit the default SLXVM Linux shell and return to the SLX-OS CLI, enter exit.
[admUser@SLX]# exit
exit
Exited from Linux shell
device#
In this example, the show ssh server status output is saved to the status file.
2. Display the contents of the file with the Linux cat command.
device# oscmd cat status
VRF-Name: mgmt-vrf Status: Enabled
VRF-Name: default-vrf Status: Enabled
In this example, the show ip interface brief output is appended to the status file.
4. Display the contents of the file with the Linux cat command.
device# oscmd cat status
VRF-Name: mgmt-vrf Status: Enabled
VRF-Name: default-vrf Status: Enabled
Ethernet 2/58 unassigned default-vrf administratively down down
Ethernet 2/59 unassigned default-vrf administratively down down
Ethernet 2/60 unassigned default-vrf administratively down down
Ethernet 2/125(I) unassigned default-vrf administratively down down
Ethernet 2/126(I) unassigned default-vrf administratively down down
Extreme SLX-OS
76 Management Configuration Guide, 20.2.1a
SLX-OS and Linux Shell Interoperability Linux shell command execution logs
From privileged EXEC mode, use the show logging raslog command to display the RASLOG
entries.
• When a user enters the Linux shell, the show logging raslog command displays an SH-1001
message.
device# show logging raslog
2016/06/25-06:42:54, [SH-1001], 1547, M1 | Active, INFO, SLX, SLXVM Linux shell login
information: User [admUser]. Login Time : Sat Jun 25 06:42:54 2016
• When a user exits the Linux shell, the show logging raslog command displays an SH-1002
message.
device# show logging raslog
Note
An SH-1003 message indicates failure to log in to the Linux shell.
When a user executes a command at the Linux shell, the shell_activity.log file includes SH-1005
messages:
[admUser@SLX]# tail -f /var/log/shell_activity.log
Note
The /var/log/shell_activity.log file is rotated every thirty minutes if it goes over 2
MB in size. The old version of the file is compressed; a maximum of four rotated files can exist
at the same time.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 77
Configuring remote logging of Linux shell activities SLX-OS and Linux Shell Interoperability
From SLX-OS CLI, you can perform the following tasks to control the logging of commands executed at
the Linux shell to a remote Syslog server. These tasks do not affect the local logging.
Note
Changes of the log-shell stop and log-shell start commands are applicable only
on new Linux shell sessions.
Extreme SLX-OS
78 Management Configuration Guide, 20.2.1a
Guest OS for TPVM
VM Access Management on page 79
Insight Interface and TPVM on page 85
TPVM on page 100
TPVM, or Third-Party Virtual Machine, is a general server that resides on ExtremeSLX-OS devices. The
guest OS that it provides is different from SLX-OS.
VM Access Management
This section addresses how the SLX-OS accesses the Third-Party Virtual Machine (TPVM).
Extreme SLX-OS devices support the provisioning of a Guest OS, referred to as TPVM or the Third-Party
Virtual Machine. Currently only one instance of the TPVM and one image for the TPVM is provided. The
Extreme SLX-OS will run the TVPM in the following modes; VM Mode on the SLX 9540, and Baremetal
on the SLX 9640, SLX 9150, and SLX 9250. The figure below describes the two modes and how mulitple
OS’s are stacked, followed by a table for platform support details.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 79
Extreme SLX-OS VM Access Management Guest OS for TPVM
On the SLX 9540, the front-panel port 0/48 is shared with the insight interface (port 0/125) through a
command line controlled hardware switch. This interface can only be operational as either a data
Extreme SLX-OS
80 Management Configuration Guide, 20.2.1a
Guest OS for TPVM Extreme SLX-OS VM Access Management
forwarding port, or as an insight interface at any given time. By default, interface 0/48 is operational as
a data forwarding port. When insight mode is configured, interface 0/48 is deleted dynamically along
with any associated configurations, and interface 0/125 is created.
On the SLX 9640, the front-panel port 0/24 is shared with the insight interface (port 0/126) through a
command line controlled hardware switch. This interface can only be operational as either a data
forwarding port, or as an insight interface at any given time. By default, interface 0/24 is operational as
a data forwarding port. When insight mode is configured, interface 0/24 is deleted dynamically along
with any associated configurations, and interface 0/126 is created.
The SLX 9150 and SLX 9250 assign the following ports for VM access;
• SLX 9150T : 0/73
• SLX 9150: 0/81
• SLX 9250: 0/129
VM access
You can access the VMs and host operating systems through the SLX-OS CLI, SLXVM OS shell or the
serial console.
When you log into the SLX-OS CLI, you can use the default admin or user credentials. Non-default users
are authenticated through AAA.
The following example shows Telnet access to the SLX-OS CLI with admin credentials.
client# telnet 10.24.12.71
Trying 10.24.12.71...
Connected to 10.24.12.71.
Escape character is '^]'.
SLX login: admin
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 81
Extreme SLX-OS VM Access Management Guest OS for TPVM
Password:
SECURITY WARNING: The default password for at least
one default account (root, admin and user) have not been changed.
For SLX platforms operating in Baremetal Mode (SLX 9640, SLX 9150), use the tvpm console
command to access the TVPM serial console port, and the key sequence Ctrl+\ to return to the SLX
console.
device# Ctrl+Y+1
Ubuntu 14.04 LTS HOST ttyS0
device# Ctrl+Y+2
[admin@SLX]#
Extreme SLX-OS
82 Management Configuration Guide, 20.2.1a
Guest OS for TPVM Extreme SLX-OS VM Access Management
start succeeds
[admin@SLX]#
TPVM login:
Note
Inside the SLXVM Linux shell, you can execute commands that do not require root
permissions. To escalate your permissions, refer to "Escalating Linux permissions to root".
2. Enter Linux commands and run scripts as needed. You can also run SLX-OS commands from the
Linux shell.
3. To exit the shell and return to the SLX-OS CLI, enter exit.
[admUser@SLX]# exit
Upon exiting, the following message appears and you return to the SLX-OS CLI prompt.
exit
Exited from Linux shell
device#
In the following example, an SSH session is used to access the SLXVM1 host-OS shell.
device# ssh SLXVM1_kvm vrf mgmt-vrf -l root
The authenticity of host 'SLXVM1_kvm (127.2.0.1)' can't be established.
ECDSA key fingerprint is d5:ba:cc:d4:57:03:e4:b2:6f:ca:d2:dd:4c:40:5d:60.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added 'SLXVM1_kvm' (ECDSA) to the list of known hosts.
root@SLXVM1_kvm's password:
Welcome to Ubuntu 14.04 LTS (GNU/Linux 3.14.17 x86_64)
* Documentation: https://help.ubuntu.com/
System information as of Thu Aug 4 10:41:47 PDT 2016
System load: 0.81 Users logged in: 0
Usage of /: 14.7% of 9.72GB IP address for eth1: 127.2.0.1
Memory usage: 54% IP address for br0: 10.24.12.77
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 83
Extreme SLX-OS VM Access Management Guest OS for TPVM
In the previous examples, use exit to terminate the session and return back to the parent shell.
Once in the TPVM console, you can execute ctrl+\, or ctrl+Y+1/2/3 on the SLX-9450, to switch
back to the session from where the TPVM console was started.
On the SLXVM, the show tpvm ipaddr command configures the address.
If DHCP is not available, you can use the serial console to log in as root, and use standard Ubuntu (14.04
LTS) commands to configure the IP address for eth0 interface.
Extreme SLX-OS
84 Management Configuration Guide, 20.2.1a
Guest OS for TPVM Insight Interface and TPVM
TPVM is a server that resides on Extreme SLX-OS devices, connected through the Insight Interface. It
may be used in one of the following modes:
• Data plane traffic mirroring - Analytic mode
• TVPM Reachability - Bi-directional Reachability mode
Support for TPVM is through a front-panel port (SLX 9540 and SLX 9640), shared with the Insight
Interface using a hardware switch by means of a CLI command. The SLX 9150 and SLX 9250 have a
dedicated Insight port. Physically, it may be a direct or indirect ethernet point-to-point connection
between the device fast forwarding Data Plane ASIC Chip port to the TPVM. In order to use TVPM, each
endpoint must be set up individually on the appropriate OS (the SLX-OS and the TVPM OS). The
following table details access to the Insight Interface on Extreme SLX platforms.
The Insight Interface endpoint is configured from the command line as a Port Channel with Insight
enabled. There can only be one such Port Channel on the device; you cannot add any new members to
this Port channel. However, a port channel with existing members cannot have Insight enabled.
On the TPVM, the Insight Interface endpoint shows as Linux Network Interface eth1, and is configured
statically. For DHCP-based configuration, refer to the section below
The following section addresses the management details of using the Insight Interface port on
supported Extreme SLX devices. For the details of TPVM applications supported on all Extreme SLX
devices, refer to "TPVM" later in this chapter.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 85
TPVM on the SLX 9150 series Guest OS for TPVM
Similarly, insight mode cannot be removed on connector 0/48 until the connector is unbound from
the insight port-channel.
• Upon insight mode configuration, interface 0/48 is dynamically deleted and 0/125 is created.
• All the configurations under interface 0/48 are deleted upon insight mode configuration.
• An existing port-channel with existing member ports cannot be made an insight interface port-
channel.
The SLX 9150 series platforms support only one disk of 128 GB. 64 GB of the disk are used to store SLX-
OS, and the remaining 64 G are used to store the TPVM image and any additional TPVM virtual disks.
The TPVM disk image (or TPVM main disk) and any additional TPVM virtual disks share the same single
64-GB partition reserved for TPVM. It is important to be aware of this when creating virtual disks inside
the TPVM.
The total size of the TPVM main disk and the all the virtual disks is limited to 64 GB, the size of the
actual physical partition. Because these platforms are bare-metal systems, the SLX-OS reload behavior
affects TPVM. When SLX-OS is rebooted, TPVM is rebooted as well. However, on the contrary, when
TPVM is rebooted, SLX-OS is not affected. Because the SLX 9150 series platforms do not support a host
OS, the console toggle key sequences “CTRL + y + 1|2|3” is not supported. Instead, a new command,
tpvm console, allows connection to the TPVM console from an SLX Telnet or console session, as in
the following example.
[SLX]# tpvm console
Connected to domain TPVM
Escape character is ^\
Extreme SLX-OS
86 Management Configuration Guide, 20.2.1a
Guest OS for TPVM Configuring the Insight Interface for the SLX 9150/9250
Once in the TPVM console, you can execute ctrl+\ to switch back to the session from where the
TPVM console was started.
2. In global configuration mode, specify a port-channel. You can create a new port-channel or use an
existing unconfigured port-channel. The Insight Interface can only be configured on one port-
channel
device(config)# interface port-channel 50
6. Use the show interface port-channel and the show port-channel commands to
confirm the configuration, as in the following example.
device# show interface port-channel 50
Port-channel 50 is up, line protocol is up
Insight mode is enabled
Hardware is AGGREGATE, address is f46e.959f.1af5
Current address is f46e.959f.1af5
Interface index (ifindex) is 671088690 (0x28000032)
Minimum number of links to bring Port-channel up is 1
MTU 9216 bytes
LineSpeed Actual : 10000 Mbit
Allowed Member Speed : 10000 Mbit
Priority Tag disable
Forward LACP PDU: Disable
Route Only: Disabled
Tag-type: 0x8100
Last clearing of show interface counters: 4d18h22m
Queueing strategy: fifo
FEC Mode - Disabled
Receive Statistics:
0 packets, 0 bytes
Unicasts: 0, Multicasts: 0, Broadcasts: 0
64-byte pkts: 0, Over 64-byte pkts: 0, Over 127-byte pkts: 0
Over 255-byte pkts: 0, Over 511-byte pkts: 0, Over 1023-byte pkts: 0
Over 1518-byte pkts(Jumbo): 0
Runts: 0, Jabbers: 0, CRC: 0, Overruns: 0
Errors: 0, Discards: 0
Transmit Statistics:
12 packets, 5589 bytes
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 87
Insight interface Guest OS for TPVM
Insight interface
Insight interface supported features
Insight interface port-channel supports the following third-party features and hardware.
Insight interface supports the standard features seen in other front end interfaces including:
• Port and ACL-based mirroring destination
• QoS and rate shaping
The port-channel interface is created as default LAGs in the system. It is visible to you, configured with
default settings, and is a static LAG. All other options on the LAG are disabled. Insight Interface ports
and port-channels work independently with each providing up to 20 GB bandwidth for applications.
On the SLX 9540, port 0/48 is multiplexed for normal use and as access to the Insight Interface. On the
SLX 9640, port 0/24 is used.
When Insight is invoked, the hardware switch reconfigures port 0/48 (or 0/24 on the SLX 9640) to
ethernet interface 0/125 and is used exclusively for Insight configuration/management. The user never
has to specifically configure Eth 0/125. When a show command is run, no configuration is displayed for
port 0/48 (or 0/24 on the SLX 9640).
Insight Interface port-channel creation, addition, or deletion is similar to the standard port-channel
creation, addition, or deletion except it is programmatically invoked during system initialization.
2. Enter the hardware command to enter hardware configuration mode. (This is required for the SLX
9540/9640 only.)
device(config)# hardware
Extreme SLX-OS
88 Management Configuration Guide, 20.2.1a
Guest OS for TPVM Insight interface
4. Enter the insight mode command to enable the insight interface on a port-channel, and exit to
global configuration mode.
device(connector-0/48)# insight mode
For the SLX 9640 use Eth 0/24. The command will toggle the physical port, and will display as port
0/125 in any show commands.
5. Exit to global configuration mode.
device(connector-0/48)# exit
6. In global configuration mode, specify a port-channel. You can create a new port-channel or use an
existing unconfigured port-channel. The Insight Interface can only be configured on one port-
channel
device(config)# interface port-channel 22
10. Use the show interface port-channel and the show port-channel commands to
confirm the configuration, as in the following example.
device# show interface port-channel 22
Port-channel 22 is up, line protocol is up
Hardware is AGGREGATE, address is 609c.9f5a.4558
Current address is 609c.9f5a.4558
Interface index (ifindex) is 671088673
Minimum number of links to bring Port-channel up is 1
MTU 1548 bytes
LineSpeed Actual : 10000 Mbit
Allowed Member Speed : 10000 Mbit
Priority Tag disable
Forward LACP PDU: Disable
Route Only: Disabled
Last clearing of show interface counters: 1d23h53m
Queueing strategy: fifo
Receive Statistics:
0 packets, 0 bytes
Unicasts: 0, Multicasts: 0, Broadcasts: 0
64-byte pkts: 0, Over 64-byte pkts: 0, Over 127-byte pkts: 0
Over 255-byte pkts: 0, Over 511-byte pkts: 0, Over 1023-byte pkts: 0
Over 1518-byte pkts(Jumbo): 0
Runts: 0, Jabbers: 0, CRC: 0, Overruns: 0
Errors: 0, Discards: 0
Transmit Statistics:
5 packets, 380 bytes
Unicasts: 0, Multicasts: 5, Broadcasts: 0
Underruns: 0
Errors: 0, Discards: 0
Rate info:
Input 0.000000 Mbits/sec, 0 packets/sec, 0.00% of line-rate
Output 0.000000 Mbits/sec, 0 packets/sec, 0.00% of line-rate
Route-Only Packets Dropped: 0
Time since last interface status change: 00:00:21
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 89
Insight interface Guest OS for TPVM
1. Start TVPM.
device# tvpm start
3. In global configuration mode, specify a port-channel. You can create a new port-channel or use an
existing unconfigured port-channel. The Insight Interface can only be configured on one port-
channel
device(config)# interface port-channel 20
1. Start TVPM.
device# tvpm start
2. From a LINUX prompt, configure the IPV4 address and route entry.
bash# ifconfig eth1 10.0.0.100 netmask 255.255.255.0
bash# route add -net 1.1.1.0 netmask 255.255.255.0 gw 10.0.0.1
3. In global configuration mode, specify a port-channel. You can create a new port-channel or use an
existing unconfigured port-channel. The Insight Interface can only be configured on one port-
channel
device(config)# interface port-channel 20
Extreme SLX-OS
90 Management Configuration Guide, 20.2.1a
Guest OS for TPVM Inbound ACL-based mirroring
2. From a LINUX prompt, configure the IPV4 address and route entry.
bash# ifconfig eth1 10.0.0.100 netmask 255.255.255.0
bash# route add -net 1.1.1.0 netmask 255.255.255.0 gw 10.0.0.1
3. In global configuration mode, specify a port-channel. You can create a new port-channel or use an
existing unconfigured port-channel. The Insight Interface can only be configured on one port-
channel
device(config)# interface port-channel 20
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 91
Inbound ACL-based mirroring Guest OS for TPVM
2. Associate the ACL mirror source and destination port. The mirror source port should be physical and
the mirror destination port is either a physical port or a LAG port.
3. Bind the ACL to an interface.
4. Save the configuration.
Related Topics
Configuring inbound ACL-based mirroring to the insight interface on page 92
device(conf-macl-ext)# exit
device(conf-ipv4acl-ext)# exit
Extreme SLX-OS
92 Management Configuration Guide, 20.2.1a
Guest OS for TPVM Insight interface traffic management and QoS
device(conf-if-eth-0/1)# end
Note
Only the Layer 2 ACL creation is shown in this example.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 93
Insight interface traffic management and QoS Guest OS for TPVM
platforms is 10Gbps, and although the TVPM runs on two vCPUs, the cumulative traffic may result in the
fast plane ASIC dropping some egress traffic at the Insight Interface.
From a traffic management perspective, QoS for an Insight Interface is similar to QoS for a regular port.
If required, SLX conventional egress traffic rate-limiting or typical QoS features may be applied to the
Port Channel with an enabled Insight Interface. The difference is the QoS configuration is applied to an
Insight Interface LAG (port-channel).
For more information, see Configuring QoS egress scheduling on page 95.
• You must use a credit request/grant mechanism to perform egress scheduling QoS.
• The maximum credit size is 1024 Bytes.
• For each egress port there are 8 Virtual Output Queues (VOQs) allocated on each ingress transmit
module (TM) core to support 8 priorities.
• Egress scheduling supports strict priority (SP), weighted fair queue (WFQ), and mixed mode
scheduling.
• You can specify weighted for each VOQ only in WFQ mode.
• Fair queue (FQ) scheduling between VOQs from different TMs and with the same priority is
permitted.
Extreme SLX-OS
94 Management Configuration Guide, 20.2.1a
Guest OS for TPVM Configuring QoS egress scheduling
See the topic Configuring QoS egress scheduling on page 95 for configuration information.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 95
Configuring QoS egress scheduling Guest OS for TPVM
3. Specify the option for strict priority mode to determine strict priority queues.
There are seven traffic classes. Specify the weight for the priority If the priority is in WFQ mode.
4. Return to privileged exec mode.
device(port-channel-1)# end
VOQ-Counters:
====================================================
Priority 0
----------------------------------------------
EnQue Pkt Count 0
EnQue Bytes Count 0
Total Discard Pkt Count 0
Total Discard Bytes Count 0
Current Queue Depth 0
Maximum Queue Depth since Last read 0
Priority 1
----------------------------------------------
EnQue Pkt Count 0
EnQue Bytes Count 0
Total Discard Pkt Count 0
Total Discard Bytes Count 0
Current Queue Depth 0
Maximum Queue Depth since Last read 0
Priority 2
----------------------------------------------
EnQue Pkt Count 0
EnQue Bytes Count 0
Total Discard Pkt Count 0
Total Discard Bytes Count 0
Current Queue Depth 0
Maximum Queue Depth since Last read 0
Priority 3
----------------------------------------------
EnQue Pkt Count 0
EnQue Bytes Count 0
Total Discard Pkt Count 0
Total Discard Bytes Count 0
Current Queue Depth 0
Maximum Queue Depth since Last read 0
Priority 4
----------------------------------------------
Extreme SLX-OS
96 Management Configuration Guide, 20.2.1a
Guest OS for TPVM Troubleshooting port-mirroring
Priority 5
----------------------------------------------
EnQue Pkt Count 0
EnQue Bytes Count 0
Total Discard Pkt Count 0
Total Discard Bytes Count 0
Current Queue Depth 0
Maximum Queue Depth since Last read 0
Priority 6
----------------------------------------------
EnQue Pkt Count 0
EnQue Bytes Count 0
Total Discard Pkt Count 0
Total Discard Bytes Count 0
Current Queue Depth 0
Maximum Queue Depth since Last read 0
Priority 7
----------------------------------------------
EnQue Pkt Count 0
EnQue Bytes Count 0
Total Discard Pkt Count 0
Total Discard Bytes Count 0
Current Queue Depth 0
Maximum Queue Depth since Last read 0
Troubleshooting port-mirroring
Follow these high level steps to troubleshoot port-mirroring.
1. MAC counters on source and destination interfaces can be verified by running the command : show
interface ethernet slot/port.
2. To see if packets are sent to a destination queue, VOQ counters can be verified by running the
command: show tm voq-stat.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 97
Troubleshooting port-mirroring Guest OS for TPVM
Troubleshooting port-mirroring
Use these example in debugging port mirroring.
SLX-OS VM commands
Use these commands on the SLX platform to help troubleshoot the VM.
Extreme SLX-OS
98 Management Configuration Guide, 20.2.1a
Guest OS for TPVM Troubleshooting port-mirroring
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 99
TPVM Guest OS for TPVM
0 packets, 0 bytes
Unicasts: 0, Multicasts: 0, Broadcasts: 0
64-byte pkts: 0, Over 64-byte pkts: 0, Over 127-byte pkts: 0
Over 255-byte pkts: 0, Over 511-byte pkts: 0, Over 1023-byte pkts: 0
Over 1518-byte pkts(Jumbo): 0
Runts: 0, Jabbers: 0, CRC: 0, Overruns: 0
Errors: 0, Discards: 0
Transmit Statistics:
0 packets, 0 bytes
Unicasts: 0, Multicasts: 0, Broadcasts: 0
Underruns: 0
Errors: 0, Discards: 0
Rate info:
Input 0.000000 Mbits/sec, 0 packets/sec, 0.00% of line-rate
Output 0.000000 Mbits/sec, 0 packets/sec, 0.00% of line-rate
Time since last interface status change: 03:46:22
TPVM
TPVM enables users to run applications such as Docker Container, syslog server, SNMP server, and
RESTful applications, among others. TPVM runs as a separate, independent virtual machine (VM),
sharing the host CPU, RAM, hard disk drive, and management resources with SLX-OS.
Extreme devices are shipped with the TPVM firmware, but it is not installed by default.
Third-party applications
• Packet capture applications
• RESTful support to access SLX-OS
• perfSONAR
• ARPsponge
Third-party packages
• Packages installed by default on the TPVM
• RESTful application: Chrome browser – GUI RESTful access
• RESTful application: cURL – Command line RESTful access
• Tcpdump: Command line packet-capture utility
• Tshark: Command line packet-capture utility
• Wireshark: GUI packet-capture utility
• Datadog or Splunk – External analytics software service
Note
Extreme SLX-OS provides support for built-in applications (third-party packages shipped
with the SLX-OS) that are listed in the Extreme SLX-OS Management Configuration Guide.
• Extreme is committed to providing limited support for the interoperability of these applications with
Extreme application interfaces.
Extreme SLX-OS
100 Management Configuration Guide, 20.2.1a
Supported third-party applications, packages, and
Guest OS for TPVM hardware
• Extreme does not provide support for the application configuration, functionality, or deficiencies.
• Extreme does not provide any support for applications not listed in the Extreme SLX-OS
Management Configuration Guide.
Hardware
The TPVM has 4 GB of RAM and 240GB of solid-state disk (SSD) memory, which limits the amount of
data captured through packet capture applications. To overcome this limitation, Extreme provides
support for the Network File System (NFS) mount of an external drive.
perfSONAR
perfSONAR (Performance focused Service Oriented Network monitoring ARchitecture) is an open-
source, active network measurement toolkit that provides federated coverage of paths and helps
establish end-to-end user expectations.
To provide measurement baselines, some 2000 perfSONAR instances are deployed worldwide,
representing around 300 domains, and many of which are available for the open testing of key
measures of network performance. Ths global infrastructure helps to identify and isolate problems as
they occur, making the role of supporting network users easier for engineering teams, and increasing
productivity in the use of network resources.
perfSONAR provides a uniform interface that allows for the scheduling of measurements, storage of
data in uniform formats, and scalable methods to retrieve data and generate visualizations. This
extensible system can be modified to support new metrics, with a variety of ways to present data.
perfSONAR features
Although SLX-OS allows perfSONAR to run on TPVM, it is recommended that this application be run on
a dedicated server to mitigate risks posed by the VM environment, for the following reasons:
1. Time keeping: Some virtualization environments implement clock management as a function of the
hypervisor and VM communication channel, rather than using a stabilization daemon such as NTP.
This could result in timing skipping forward or backward, making it generally unpredictable for
measurement.
2. Data path: Additional hypervisor layers can cause undesired latency.
3. Resource management: Because VMs share physical hardware and might get swapped, this might
introduce additional errors in network performance measurements.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 101
TPVM Installation and Management Guest OS for TPVM
Reason (2) is mitigated in TPVM deployments by directly assigning the insight interface to the VM.
Reason (3) can be potentially mitigated by pinning one or more CPU cores to the VM.
Reason (1) can also be mitigated, such as by running NTP between guest and host, but this still not
provide sufficient accuracy.
The perSONAR development team has identified several use cases that can work in VM environments,
provided the known issues are mitigated. However, the high-speed throughput and OWAMP tests do
not perform well.
ARP sponge
ARP sponge is an application that snoops on ARP packets on the Virtual Private LAN Service (VPLS)
domain.
ARP sponge listens for ARP traffic. When the number of ARP requests for a certain IP address exceeds
a threshold, ARP sponge sends out an ARP reply for that address that uses its own MAC address. This
achieved by using the insight LAG to the bridge domain as an AC endpoint. All ARP traffic received by
the VPLS instance is flooded to the insight LAG as well.
Installation Overview
The TPVM package is available separately from the SLX-OS software, and may be downloaded from the
SLX-OS Release Server. This decoupling enables faster turnaround on enhancements and bug fixes,
while reducing the file size of the SLX-OS distribution.
Verify that the TPVM firmware package is available in the SLX-OS filesystem's /tftpboot/SWBD2900
directory; download if necessary. The TPVM firmware installation may then be run.
The TPVM firmware package is not updated as a part of a subsequent SLX-OS release firmware
download. The TPVM firmware package installation procedure is independent of the SLX-OS release
upgrade procedure. Manually copy the TPVM firmware package compatible with the SLX-OS release,
uninstall the existing TPVM firmware, and install the new TPVM firmware package.
If you have already installed a TPVM version and plan to upgrade to the next SLX-OS release version, it
is recommeded that you first uninstall the current TPVM firmware. Once a subsequent SLX-OS release
firmware download is completed, install the TPVM firmware package that is compatible with that SLX-
OS release. This option avoids TPVM firmware incompatibility with subsequent SLX-OS release
firmware. In case of an upgrade to the next SLX-OS release, the current TPVM firmware remains
unchanged.
Important
The installation is disruptive, and any data saved on the TPVM partition is erased. You must
save any data manually before executing the tpvm install command.
Extreme SLX-OS
102 Management Configuration Guide, 20.2.1a
Guest OS for TPVM TPVM Installation and Management
You may also use the tpvm-deploy command to install and configure TPVM and the Insight Interface.
See Using tpvm deploy on page 111 for additional information about this container command.
After the installation, you can start and stop the image by means of the tpvm start and tpvm stop
commands, respectively. To start the TPVM image automatically in subsequent reboots, use the tvpm
auto-boot enable command. (TVPM may not come up if there are any issues with booting SLX-
OS.)
Once the TPVM image is running, you can download user-specific applications by copying them to the
TPVM partition and starting them manually.
To uninstall the TPVM image and release its resources, use the tpvm uninstall command.
Important
When TPVM is re-installed, any user applications are deleted.
Resource usage
From the Linux host's perspective, TPVM appears as a process. All commands to check TPVM resources
and control TPVM are executed from the host and have administrative (root) restrictions.
Console access
A console daemon runs on the host and opens a console connection to TPVM on the 9540. You can
switch the console connection between host, SLX-OS, and TPVM using the following key sequences,
respectively.
• Host: Ctrl + y + 1
• SLX-OS: Ctrl + y + 2
• TPVM: Ctrl + y + 3
For information on accessing the console on the 9150 and other baremetal platforms, see TPVM on the
SLX 9150 series on page 86.
Note
By default, the console is connected to SLX-OS.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 103
TPVM Installation and Management Guest OS for TPVM
TPVM can be accessed through the eth0 (management ) interface. The eth0 interface connects to the
outside network through the host physical interface, which makes it appear as a normal host to the rest
of the network. SSH or Telnet access to TPVM is provided through the IP address of the eth0 interface
configured on TPVM.
IP address management
The assignment of a TPVM IP address to a management interface uses DHCP by default. However, the
user can also assign a static address and a default gateway to the TPVM eth0 interface by using the
ifconfig command. See Assigning a static IP address on the TPVM Linux OS on page 117.
In addition to cURL, Advanced Rest Client, a Chrome-based RESTful client application, is prepackaged
inside TPVM and is accessed through a browser interface.
In addition, TPVM comes with Tcpdump, Tshark, and Wireshark prepackaged to support packet capture.
Users or administrators can use the apt-get command with options to upgrade, update, purge, or
remove (to downgrade to an older version). In addition, applications can be downloaded to provide a
development environment that allows users or administrators to build their own applications,
development tools (gdb, glibc (e.g. ANSI-C and POSIX), and gcc for C/C++ . Similarly, python
development tools can also be downloaded.
Containers
The following container binaries have been tested with TPVM:
• Docker container: docker-1.13.0
• Linux container: LXC 1.0
The above binaries do not come prepacked with TPVM. Use the wget or apt-get commands to install,
upgrade, or downgrade Docker and Linux container binaries or packages in TPVM.
Extreme SLX-OS
104 Management Configuration Guide, 20.2.1a
Guest OS for TPVM TPVM Installation and Management
Command Description
auto-boot Enables or disables start of TPVM at next boot.
disk Supports TPVM disk operations.
install Installs TPVM.
password Updates the root password.
start Starts TPVM.
stop Stops TPVM.
uninstall Uninstalls TPVM.
Installing TPVM
The TPVM package is available separately from the SLX-OS software, and may be downloaded from the
SLX-OS Release Server. This decoupling enables faster turnaround on enhancements and bug fixes,
while reducing the file size of the SLX-OS distribution. (Prior to SLX-OS 18r.2.00, the TPVM package was
released in conjunction with the SLX-OS packages.)
Important
The installation is disruptive, and any data saved on the TPVM partition is erased. You must
save any data manually before executing the tpvm install command.
The following table lists the TPVM package names and locations for relevant SLX-OS releases.
Table 18: TPVM package names and locations for relevant SLX-OS releases
SLX-OS release TPVM package name TPVM package location
slxos16r.x.xx vm-swbd2900-1.0.0-1.i386.deb <slxos release dir>/
SWBD2900/vm-
swbd2900-1.0.0-1.i386.d
eb
slxos17r.1.xx vm-swbd2900-1.0.0-1.i386.deb <slxos release dir>/
SWBD2900/vm-
swbd2900-1.0.0-1.i386.d
eb
slxos17r.2.xx vm- <slxos release dir>/
swbd2900-1.0.0-1.amd64.deb SWBD2900/vm-
swbd2900-1.0.0-1.amd64.
deb
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 105
TPVM Installation and Management Guest OS for TPVM
Table 18: TPVM package names and locations for relevant SLX-OS releases
(continued)
SLX-OS release TPVM package name TPVM package location
slxos18r.1.xx vm- <slxos release dir>/
swbd2900-1.0.0-1.amd64.deb SWBD2900/vm-
swbd2900-1.0.0-1.amd64.
deb
slxos18r.2.xx tpvm-2.0.0-0.amd64.deb <TPVM release url>/
tpvm2.0.0/
tpvm-2.0.0-0.amd64.deb
(see NOTE)
slxos 20.1.xx tpvm-3.0.0-0.amd64.deb <TPVM release url>/
tpvm3.0.0/
tpvm-3.0.0-0.amd64.deb
Note
Removed from SLX-OS release folder and posted on release server for access through
separate URL.
The tpvm command, in privileged EXEC mode, allows you to manage TPVM with a variety of
subcommands that do the following:
• Install, start, stop, and uninstall TPVM
• Specify the default behavior when SLX-OS boots
• Add or remove disks and show the disk information
• Print out IP addresses set on TPVM
• Change the root password on TPVM
• Use the help keyword for details on all options
Install TPVM:
tpvm install
Uninstall TPVM:
tpvm uninstall [ force ]
To force the clearing of installation or uninstallation errors, use the force keyword:
device# tpvm uninstall
TPVM uninstallation failed
Extreme SLX-OS
106 Management Configuration Guide, 20.2.1a
Guest OS for TPVM TPVM Installation and Management
To start TPVM:
tpvm start
To stop TPVM:
tpvm stop
To automatically start TPVM at the next reboot of SLX-OS use auto-boot enable:
tpvm auto-boot enable
Note
In this case, the tpvm start command is required to enable TPVM.
To display the current status of TPVM, or any errors, use the following:
show tpvm status [ clear-tag <tag name> ]
To clear errors use the clear-tag<tag name> keywords, where the error in this example is
"vm_disks":
device# tpvm start
start succeeds
TPVM is installed but not running, and AutoStart is disabled on this host.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 107
TPVM Installation and Management Guest OS for TPVM
TPVM is installed but not running, and AutoStart is disabled on this host.
Note
The runtime error can be also removed automatically when the same subcommand succeeds.
Note
The maximum number of disks is currently 3. If the number of allocated disks exceeds this list,
the add_disk keyword fails. Also, the total disk capacity is limited to 50 Gbytes on the SLX
9540. If you exceed this limit when you create a disk, the add_disk keyword fails.
Use the disk remove command to remove an additional disk from TPVM:
tpvm disk remove name <vd[b-x] | auto>
Extreme SLX-OS
108 Management Configuration Guide, 20.2.1a
Guest OS for TPVM TPVM Installation and Management
Note
Disks must be unmounted before removal from the system. Otherwise, the next added disk
will be labeled incorrectly. If the system falls, TPVM must be rebooted to recover.
total:
Capacity: 100.00 GiB
Allocation: 10.00 GiB
Available: 90.00 GiB
total:
Capacity: 100.00 GiB
Allocation: 10.00 GiB
Available: 90.00 GiB
Note
The show_ip_addr parameter requires the qemu-guest-agent package on TPVM. If this
package is removed, the operation fails.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 109
TPVM Installation and Management Guest OS for TPVM
The tpvm config command, in privileged EXEC mode, allows you to customize the following TPVM
optional features:
• tpvm config ldap: LDAP configurations for TPVM
• tpvm config dns: DNS configurations for TPVM
• tpvm config ntp: NTP configurations for TPVM
This section describes the commands used to configure LDAP over TPVM.
• add: Add LDAP configurations
◦ basedn: Base Domain Name
◦ host: LDAP server IPV4/IPV6 address or FQDN
◦ rootdn: Root Domain Name
◦ rootdnpw: Password for Root Domain Name
• ca-cert: LDAP TLS certificate operations
◦ import: Import certificates for LDAP over TLS.
▪ directory: Remote Directory
▪ filename: Certificate filename
▪ host: Hostname/IP address
▪ password: Password for the user
▪ protocol: Protocol (SCP)
▪ user: Login name in the host
◦ remove: Remove certificates for LDAP over TLS
• remove: Remove LDAP configurations
◦ basedn: Base Domain Name
◦ host: LDAP server IPV4/IPV6 address or FQDN
◦ rootdn: Root Domain Name
◦ rootdnpw: Password for Root Domain Name
This section describes the commands used to configure DNS over TPVM.
• add: Add DNS configuration
◦ dns-server: Name Server List <IPv4 address> domain-name
• remove: Remove all DNS configurations
This section describes the commands used to configure NTP over TPVM.
• add: Add NTP configurations
◦ server: NTP server IPV4 address or FQDN
Extreme SLX-OS
110 Management Configuration Guide, 20.2.1a
Guest OS for TPVM TPVM Installation and Management
Show Commands
This section describes the show commands used with tpvm config.
• show tpvm config ldap: Show TPVM LDAP server configuration
• show tpvm config dns: Show TPVM DNS server configuration
• show tpvm config ntp: Show TPVM NTP server configuration
Command Overview
The tpvm deploy command performs the following installation and configuration operations:
• Installation of TPVM
• TPVM Networking set up
• Enable Passwordless ssh to TPVM from root@slx
• Enable passwordless “sudo” inside TPVM
• Set the TPVM password for the default “admin” user
• Set TPVM autoboot
• Start or boot the TPVM
There are two important pre-requisites to use the tpvm deploy command:
• TPVM Debian package image – available in the /tftpboot/SWBD2900 folder. If TPVM has already
been installed, then you may skip this step.
• An Advanced Features License. Use the following command to activate the license: license eula
accept ADVANCED_FEATURES.
TPVM Installation
Verify the presence of the TPVM firmware package in the SLXVM /tftpboot/SWBD2900 directory. If
the latest version is not there, download before running the TPVM deploy command.
The tpvm deploy command begins with the standard TPVM installation.
By default the TPVM managment interface eth0 is configured to acquire an IP Address via DHCP,
whereas the eth1 address is manually configured by adding a static entry in /etc/network/interfaces.
One of these interfaces may be configured using tpvm deploy. The tpvm deploy command uses
the interface and ip address parameters to configure the TPVM interface.The interface not configured
using tpvm deploy is put into manual mode with no IP address assigned, regardless of the current or
previous state.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 111
TPVM Installation and Management Guest OS for TPVM
Passwordless SSH
The passwordless parameter within tpvm deploy allows you to configure ssh access from the root
user account on the SLX-OS to TPVM without a password. For example:
root@SLX# ssh -o "StrictHostKeyChecking no" admin@10.23.30.153
When using the passwordless parameter, please note the following:
• Passwordless ssh capability will be retained across firmware downgrade and upgrade.
• Passwordless ssh capability is lost in the case of a netinstall where tpvm deploy is used,
regardless of whether TPVM is reinstalled or retained from previous install.
• The SLX-OS must be running and a compatible version of TPVM currently installed.
Passwordless SUDO
The TPVM default user is admin with sudo privileges. The tpvm deploy command configures TPVM
so sudo for this user does not ask for a password. Setting this parameter once will persist for the
lifetime of the TPVM.
If not set, the default behavior requires a password for sudo activities, as dicated by the Ubuntu 16.04
LTS Server Operating System.
TPVM Password
TPVM ships with admin/password as the default login credential. To automate the TPVM setup and
achieve one touch provisioning of TPVM, this optional parameter will set the password for the TPVM
admin user account. Setting this parameter once will persist for the lifetime of the TPVM.
TPVM Auto-boot
This option will restart the TPVM image automatically in subsequent reboots, such as an SLX-OS start
on a Baremetal platform, or a HOST start on a VM-based platform.
TPVM Start
After configuring the TPVM as described above, tpvm deploy will start the TPVM. On a baremetal
platform, a reboot of SLX will reboot TPVM. On a VM based platform, an SLX-OS reboot does not affect
TPVM, however if the HOST reboots for any reason, TPVM also reboots.
Note
A firmware upgrade or downgrade will reboot the SLX-OS, but will not reboot TPVM.
Extreme SLX-OS
112 Management Configuration Guide, 20.2.1a
Guest OS for TPVM Docker containers
Docker containers
This section addresses the installation and management of Docker containers.
Installation
Complete the following steps to install the latest version of Docker under TPVM.
1. Install and export the missing Gnu Privacy Guard (GPG) key.
Docker Linux binaries can also be obtained from the following URL by means of the wget command:
• Docker script: https://get.docker.com/
After downloading the binaries, you extract the archive by using the tar -xvzf docker-
latest.tgz command, which puts the binaries in a directory named /docker in the current location.
Depending upon the Docker engine version, you may have to set "execute" permission on the Docker
daemon, by using the chmod +x docker command.
Docker requires the binaries to be installed in your host's $PATH. For example, you can move these
binaries to /usr/bin.
Starting Docker
Start Docker by using theservice docker start & command.
The docker daemon always runs as the root user, and binds to a UNIX socket instead of to a TCP port.
By default, that UNIX socket is owned by the user "root", and therefore is accessible by means of the
sudo or root commands.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 113
Linux containers Guest OS for TPVM
If you (or your Docker installer) create a UNIX group called "docker" and add users to it, then the docker
daemon makes the ownership of the UNIX socket read/writable by the docker group when the daemon
starts. The docker daemon must always run as the root user, but if you run the docker client as a user in
the docker group, then you do not need to add sudo to all the client commands.
Upgrading Docker
To upgrade your manual installation of Docker, first kill the docker daemon by using the killall
docker command.
Linux containers
This section addresses the installation of Linux and creating and managing containers.
Installation
LXC 1.0 was tested with TPVM. The lxc package can be installed as root by means of the apt-get
install lxc command.
Your system will then have all the LXC commands, all LXC templates, and also the python3 binding
should you want to script LXC.
Creating containers
You can create privileged or unprivileged containers. (Only privileged containers were tested for this
release.)
Extreme SLX-OS
114 Management Configuration Guide, 20.2.1a
Guest OS for TPVM Utilities installation and management
Privileged containers are containers created by root and running as root. They can be created as
follows: sudo lxc-create -t download -n my-container
This creates a new privileged container "my-container" on TPVM, using an image based on the
download template. The download template contains a list of distributions, versions, and architectures
to choose from. Good example templates would be "ubuntu" and "trusty".
You can then confirm its status by using either of the following commands:
• lxc-info -n my-container
• lxc-ls -f
You get a shell inside the container by using the lxc-attach -n my-container command.
Once done, you can stop the container by using the lxc-stop command, and remove it by using the
lxc-destroy command:
• lxc-stop -n my-container
• lxc-destroy -n my-container
To confirm connectivity, attach to one of the containers and check network access by pinging a server
accessible from the host:
• lxc-attach -n lxc1
• ping external-server
cURL
cURL is a command-line RESTful access utility. The following table lists useful installation and
management commands.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 115
Utilities installation and management Guest OS for TPVM
Google-chrome
Google-chrome is a graphical user interface RESTful access utility. The following table lists useful
installation and management commands
Ethtool
The Ethtool utility is used to get device information. The following table lists useful command options.
Extreme SLX-OS
116 Management Configuration Guide, 20.2.1a
Guest OS for TPVM Assigning a static IP address on the TPVM Linux OS
Tcpdump
Tcpdump is a command line utility that is used for packet capture by means of libpcap. The following
table lists useful command options.
Tshark
Tshark is a command line utility from the Wireshark community that is used for packet capture by
means of libpcap. The following table lists useful command options.
Wireshark
Wireshark is a GUI-based packet capture utility that is used for packet capture by means of libpcap. The
following table lists useful command options.
device# ifconfig
...
eth0 Link encap:Ethernet HWaddr 00:0a:21:ff:45:2a
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 117
Assigning a static IP address on the TPVM Linux OS Guest OS for TPVM
device# route -n
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
0.0.0.0 10.10.10.2 0.0.0.0 UG 100 0 0 eth0
172.16.77.0 0.0.0.0 255.255.255.0 U 0 0 0 eth0
Use flags u and g for the route gateway. The other IP address is the network IP address.
3. Open the interfaces file.
Nano is the GNU version of the Pico text editor. Use the editor of your choice.
4. Find the DHCP settings in the /interfaces file. They will appear as text similar to the following
example.
...
auto eth0
iface eth0 inet dhcp
...
...
auto eth0
iface eth0 inet static
address 10.0.0.100
netmask 255.255.255.0
gateway 10.0.0.0
...
9. If you want this as a permanent change, remove the DHCP client so it can no longer assign dynamic
IP addresses.
Extreme SLX-OS
118 Management Configuration Guide, 20.2.1a
Network Time Protocol (NTP)
Network Time Protocol overview on page 119
Configuring NTP on page 123
Authenticating an NTP server on page 124
Displaying the active NTP server on page 125
To keep the time in your network current, it is recommended that each device have its time
synchronized with at least one external NTP server.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 119
Network Time Protocol Server Overview Network Time Protocol (NTP)
The Network Time Protocol server is used to obtain the correct time from an external time source and
adjust the local time in each connected device. When NTP server functionality is enabled, the NTP
server starts listening on the NTP port for client requests and responds with the reference time. Up to
eight server addresses can be configured in IPv4 or IPv6 format. When multiple NTP server addresses
are configured, the NTP algorithm finds the most reliable server and uses this as the active NTP server. If
there are no reachable time servers, then the local device time becomes the default time until a new
active time server is configured. If an NTP server loses synchronization, it will operate in master mode to
serve time using the local clock. Use the ntp master command to enable the serving of local time.
The NTP server is stateless and does not maintain NTP client information. Network time synchronization
is guaranteed only when a common external time server is used by all devices.
Important
Although time-stepping corrects a large offset after a reload, as a best practice do not
manually change the time after NTP synchronization.
The NTP client maintains the server and peer state information as an association. The server and peer
association is mobilized at startup, or after it has been configured. A statically configured server/peer
association is not demobilized unless the configuration is removed/changed. A symmetric passive
association is mobilized upon the arrival of an NTP packet from a peer which is not statically configured.
This type of association is demobilized on error or timeout.
1. The device is booted and the system initializes. The configured servers and peers are polled at the
configured poll interval. Additional dynamically discovered servers/peers are also polled.
2. Multiple samples of server/peer times in the NTP packet are added to and maintained in the
association database.
3. The selection, cluster, and combine algorithms choose the most accurate and reliable server/peer as
system peer.
Note
Refer to RFC 5905.
4. The reference time from the system peer is used for system time synchronization.
5. The NTP client increases the poll interval from the minimum poll interval to the maximum poll
interval value after the clock stabilizes.
After the system peer is chosen, the system time is synchronized using one of the following ways:
• If the system time differs from the system peer by less than 128 milliseconds, then the system clock
is adjusted slowly towards the system peer time reference time.
Extreme SLX-OS
120 Management Configuration Guide, 20.2.1a
Network Time Protocol (NTP) Network Time Protocol Associations
• If the system time differs from the system peer by greater than 128 milliseconds, then the system
clock is stepped to the system peer reference time. The old, time-related information stored in the
server/peer association database is cleared.
NTP Server
The Server mode requires no prior client configuration; it responds to Client mode NTP packets. The
ntp server enable command is used to set the device to operate in Server mode. Use no ntp
disable serve to ensure NTP is configured in server mode.
NTP Client
When the system is operating in Client mode, all configured NTP servers and peers are polled. The
device selects a host from all the polled NTP Servers from which to synchronize. To configure the NTP
servers and peers individually, use the server and peer commands.
NTP Peer
NTP Peer mode is intended for configurations where a group of devices operate as mutual backup for
one another. If one device loses a reference source, the time values flow from the remaining peers.
• Symmetric Active - When the peer is configured using the peer command.
• Symmetric Passive - If the device is not configured using the peer command, the arrival of an
NTP packet from a symmetric active peer generates a symmetric passive response. However, to
prevent false time values being introduced, authentication in symmetric mode is strongly suggested.
NTP supports symmetric key scheme for authentication. The scheme uses either MD5 or SHA1
authentication algorithms. The key-id and the calculated digest form the Message Authentication Code
(MAC). When authentication is enabled on the server, it is expected that the client's request message
has a valid MAC. If authentication of the client message fails, NTP replies with a crypto-NAK packet.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 121
Network Time Protocol Authentication Network Time Protocol (NTP)
Key type is either SHA1 or MD5. SHA1 specifies message authentication support provided using SHA1
algorithm; MD5 uses the Message Digest 5 Agorithm.
Note
To add a key as trusted key, it must first configured as an authentication-key.
A maximum of 10 trusted keys can be configured, and must be configured under the ntp
authentication-key command.
Extreme SLX-OS
122 Management Configuration Guide, 20.2.1a
Network Time Protocol (NTP) Configuring NTP
Configuring NTP
After setting the date and time on a device, the local time on a device can be synchronized with an
Network Time Protocol (NTP) server.
The date and time are set in privileged EXEC mode and only have to be configured once per device
because the value is written to nonvolatile memory. After the basic time information is set up, an NTP
server is configured to allow the local time to be synchronized across the network.
1. Set the current date and time in the UTC timezone for the device.
Note
This MUST be done in the UTC timezone. Otherwise issues will arise as NTP attempts to
sync to the upstream servers and peers, and the clock timezone command will incorrectly
adjust the time.
5. Display the local date, time, and time zone for the device.
device# show clock
2017-02-09 12:15:00 America/Los_Angeles
7. Synchronize the local time with an external source accessible from a user-specified VRF named
myvrf.
device(config)# ntp server 192.168.10.1 use-vrf myvrf
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 123
Authenticating an NTP server Network Time Protocol (NTP)
Note
After upgrading to SLX-OS 20.1.x, a downgrade to a previous version of the SLX-OS which
does not provide support for an NTP source interface will remove the NTP server
configuration. This will require you to reconfigure the NTP server command after the
downgrade.
In the following example, the date, time and time zone are set on a device and verified. The local device
is configured to synchronize the local time with an external NTP server at a specific IP address,
accessible from a user-specified VRF named myvrf.
device# clock set 2017-02-09 12:15:00
device# configure terminal
device(config)# clock timezone America/Los_Angeles
device(config)# exit
device# show clock
2017-02-09 12:15:00 America/Los_Angeles
device# configure terminal
device(config)# ntp server 192.168.10.1 use-vrf myvrf
device(config)# exit
device(config)# exit
device# show ntp status
Clock is synchronized, stratum 3, reference clock is 192.168.128.5
precision is 2**24
reference time is CC38EC6A.8FCCA1C4 (10:10:02.561 JST Fri Jan 20 2017 )
clock offset is -1.051 msec, root delay is 174.060 msec
root dispersion is 172.37 msec, peer dispersion is 0.10 msec
system poll interval is 32, last update was 19 sec ago
NTP server mode is enabled, NTP client mode is enabled
NTP master mode is disabled, NTP master stratum is 8
Up to five NTP authentication keys can be configured and each key ID must be unique.
3. Synchronize the local time with an external source, an NTP server, accessible by the management
VRF. Associate the key to the NTP server.
device(config)# ntp server 192.168.10.1 key 33
Extreme SLX-OS
124 Management Configuration Guide, 20.2.1a
Network Time Protocol (NTP) Displaying the active NTP server
In the following example, an authentication key with an ID of 33 is created and the local time on the
device is synchronized with an external NTP server at the IP address of 192.168.10.1.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 125
SNMP
SNMP overview on page 126
Configuring SNMPv2 on page 130
Configuring SNMPv3 on page 131
Configuring an SNMP server context to a VRF on page 132
Offline SNMP ifIndex generation tool on page 133
SNMP overview
Simple Network Management Protocol (SNMP) is a set of application layer protocols for managing
complex networks. Devices within a network use SNMP to send messages, called protocol data units
(PDUs), to different parts of a network.
Multiple instances of the same MIB module can support a single SNMP agent by mapping a specific
key called a context name to a virtual routing and forwarding (VRF) instance created within the
Extreme device.
• Management Information Base (MIB)—Hierarchical database where SNMP agents in the managed
devices store the data about these devices. The MIB is is structured on the standard specified in the
RFC 2578 [Structure of Management Information Version 2 (SMIv2)].
An SNMP manager can issue read or write operations to retrieve and use the MIB objects to manage
and monitor devices on the network. However, the MIB structure determines the scope of
management access allowed by a device.
The SNMP server on the Extreme device supports SNMP version 1 (SNMPv1), SNMP version 2 (SNMPv2),
and SNMP version 3 (SNMPv3).
• SNMPv1 and SNMPv2 use community strings associated to SNMP groups. The group maps the user
to MIB objects called SNMP views. The views restrict the access of the MIB OIDs .
• SNMPv3 provides additional security through authenticated users associated with groups to restrict
the access of MIBs for SNMP requests through SNMP views.
Extreme SLX-OS
126 Management Configuration Guide, 20.2.1a
SNMP Basic SNMP operation
Also, the device supports the configuration of trap hosts as a trap recipient to receive filtered traps
based on their severity level, and optionally receive SNMP communication through a VRF.
When clear command is issued to clear interface statistics, counters are cleared only from CLI version of
the statistics and the SNMP version of the statistics are kept intact (SNMP stats preservation). SNMP
accumulates the counters and displays aggregate values via IF-MIB queries. These MIB statistics can
preserved by using the snmp-server preserve-statistics command by enabling or disabling
these MIB statistics when the clear interface statistics command is issued.
snmp-server preserve-statistics command is enabled, SNMP MIB statistics are preserved .i.e
clear command only clears counters from command line interface and not from SNMP IF-MIB. When
snmp-server preserve-statistics is disabled, clear command deletes the counters from
both the command line interface and SNMP versions.
Note
By default, preserving of MIB statistics is enabled. User has to execute the CLI command to
disable preserving of MIB statistics.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 127
SNMP community strings SNMP
The management station can also receive traps, unsolicited messages from the device agent if an
unusual event occurs as shown in the next figure.
The community string can be associated with an SNMP group to restrict the access of MIBs for SNMPv1
and SNMPv2c requests. You can configure a total of 256 read-only and read-write community strings on
the device.
The software automatically encrypts SNMP community strings. Users with read-only access or who do
not have access to management functions in the CLI cannot display the strings. For users with read-
write access, the strings are encrypted in the CLI.
By default, you cannot perform any SNMP Set operations until you configure a read-write community
string.
SNMP groups
SNMP groups map the SNMP user for SNMPv3 and the community for the SNMPv1 and SNMPv2 to
SNMP views.
You can configure each group with any or all of the following views:
• Read view with read-only access
• Write view with read-write access
• Notify view to filter notifications to be encrypted and sent to target hosts
SNMP users that are mapped to a group with SNMP views use its views for access control.
SNMP users
SNMP version 3 (RFC 2570 through 2575) introduces a User-Based Security model (RFC 2574) for
authentication and privacy services. This model provides a user that is associated with security
information for authentication of its generated SNMP messages.
SNMP version 3 also supports View-Based Access Control Mechanism (RFC 2575) to control access at
the PDU level. It defines mechanisms for determining whether to allow access to a managed object in a
Extreme SLX-OS
128 Management Configuration Guide, 20.2.1a
SNMP SNMP views
local MIB by a remote principal. You can create and associate SNMPv3 users with configured SNMP
groups to use the group views for access control.
SNMP views
SNMP views are named groups of MIB objects that you can associate with groups to limit access by
community strings and users for viewing and modifying the SNMP statistics and system configuration.
With SNMP views, you can create or remove the access to a MIB object for inclusion or exclusion from
viewing from user access.
SNMP views reference MIB objects using object names. It represents the hierarchical location of the
object in the MIB tree. You associate the views with each group to restrict or allow access to the OIDs.
You can create a maximum of 10 views on the device.
For an SNMPv3 trap, you associate a SNMPv3 host with the SNMP users. When you specify the host,
you also specify a community string for SNMPv1 and SNMPv2. The Extreme device sends all the SNMP
traps to the specified hosts and includes the specified community string. Then, administrators can filter
for traps from a Extreme device based on IP address or community string.
You map each VRF with a specific context name. The context name identifies the VRF and fetches the
MIB details of the mapped VRF from the underlying modules. For example, the OSPF-MIB returns the
queried OSPF-MIB object values pertaining to the default VRF (default-vrf).
For SNMPv1 and SNMPv2, the mapping of the context is with the community. This mapping is in
addition to mapping of the context with the VRF. The SNMP agent supports 256 contexts to support
context-to-VRF mapping.
For SNMPv3, you only need to map the context with the VRF. The SNMPv3 request PDU itself provisions
for the context. Only one context is allowed for each VRF instance.
The specified interface acts as the source interface for SNMP trap and inform the packets. SNMP trap
host can be configured for SNMP version 1, version 2, and version 3 per instance. If the source interface
is not specified, the source IP address is the IP address of the interface through which packet exits
device. If the source interface is modified (changing IP address), then it is reflected in the trap packets.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 129
Configuring SNMPv2 SNMP
Configured source interface IP address is not cached because the corresponding IP address can be
modified. While sending out the SNMP trap packets to find the source IP address to use, the system
checks and picks up the source interface configured. If an interface with no IP address is configured as
the source interface, SNMP trap packets have the egress interface IP as the source IP.
The Source interface configurations are stored in the running-config and can be viewed using command
name show running-config.
device# show running-config
source-interface loopback 1
Configuring SNMPv2
SNMPv1 and SNMPv2 use community strings to restrict SNMP access. When you associate it with an
SNMP group, you can restrict the access of MIBs for SNMPv1 and SNMPv2c requests.
To configure SNMPv2, perform the following steps.
This example adds the SNMP view2 view entry with included permission to allow access for the MIB
1.3.6.1 object ID ('internet').
3. Add an SNMP group.
device(config)# snmp-server group admin v2c write view2 notify view2
This example adds the admin group for SNMPv2 and maps the read-write access and notify views to
view2.
4. Add an SNMP community string and associate it with a group.
device(config)# snmp-server community comm1 group admin
This example adds the comm1 community string and associates it with the admin group to access
the MIBs for SNMPv2c requests.
5. Configure the SNMP trap host associated with community string.
device(config)# snmp-server host 10.32.147.6 comm1 version 2c severity-level Warning
This example configures 10.32.147.6 as a trap recipient with SNMPv2c on the default target port 162
and associates the comm1 community string.
6. Enable the traps.
device(config)# snmp-server enable trap
Extreme SLX-OS
130 Management Configuration Guide, 20.2.1a
SNMP Configuring SNMPv3
Configuring SNMPv3
SNMPv3 uses SNMP users to restrict SNMP access. When you map an SNMP user to an SNMP group,
you can restrict the access of MIBs for SNMP requests through an SNMP view.
To configure SNMPv3, perform the following steps.
1. In privileged EXEC mode, enter global configuration mode.
This example changes the default contact information from Field Support to "Network Management
group - Contact # 123-123-1234".
The double quotes allows you to enter the string with spaces.
3. Configure the location information for the SNMP server.
device(config)# snmp-server location "South Room, Rack-11"
This example changes the default location from End User Premise to "South Room, Rack-11".
The double quotes allows you to enter the string with spaces.
4. Add an SNMP view to restrict or allow access to the MIB OIDs.
device(config)# snmp-server view view2 1.3.6.1 included
This example adds the SNMP view2 view entry with included permission to allow access for the MIB
1.3.6.1 object ID ('internet').
5. Add an SNMP group.
device(config)# snmp-server group group1 v3 priv write view2 notify view2
This example adds the group1 group for SNMPv3 and maps the read-write access and notify views
to view2.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 131
Configuring an SNMP server context to a VRF SNMP
This example adds the user2 user and associates it with the group1 group to access of MIBs for
SNMPv3 requests. For SNMPv3 users, the passwords for auth-password and priv-password
keywords are encrypted while storing to the persistent memory or displaying it back to the user. You
can configure either with a plain-text password or an encrypted password. In both cases, the show
running-config command displays the passwords as encrypted.
7. Configure the SNMPv3 trap host associated with an SNMP user.
device(config)# snmp-server v3host 10.26.3.166 user2 severity-level Info udp-port
4425
This example configures 10.26.3.166 as an SNMPv3 trap recipient host on the target port 4425 and
associates the user2 user.
The global SNMPv3 host can be associated with global SNMPv3 users only. You cannot create an
SNMPv3 host in a global configuration by associating it with local SNMPv3 users.
8. Enable the traps.
device(config)# snmp-server enable trap
Extreme SLX-OS
132 Management Configuration Guide, 20.2.1a
SNMP Offline SNMP ifIndex generation tool
name is used to identify the VRF and fetch the MIB details of the mapped VRF from the underlying
modules.
To configure an SNMP server context to a VRF for SNMPv1 or SNMPv2, perform the following steps.
Note
For SNMPv3, use the snmp-server context command only. The SNMPv3 request PDU
itself has the provision for the context name as input.
Important
SNMP SET requests work only on the default VRF.
The following example shows the previous steps for the configuration.
device# configure terminal
device(config)# snmp-server community public groupname admin
device(config)# snmp-server context mycontext vrf myvrf
device(config)# snmp-server mib community-map public context mycontext
The ifIndex is encoded per interface type and the assigned value is used if any information needs to be
polled for a particular interface. The offline SNMP ifIndex generation tool which is developed based on
Python, provides a means to find out the ifIndexes associated with various interfaces. This tool can run
on any platform (SLX Router, Linux, or Windows) wherever the Python package is installed. The script is
available on SLX Router at /fabos/cliexec/ifindex_gen.py. If you want to run it on a Linux or
Windows platform, you may have to modify the first line in the script to point to the location of the
Python binary on the platform.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 133
Generating ifIndexes for various interfaces SNMP
Note: The parameters -t, -m, -s, -p, and -sp are the sub-options specific to physical interface.
3. Generate ifIndex for a specific interface. In this example, ifIndex is generated for a physical interface.
[admin@SLX]# /fabos/cliexec/ifindex_gen.py -i physical -t 72x10G -s 2 -p 65 -d all
Decimal : 413171855
Hex : 18a0808f
Binary : 00011000101000001000000010001111
Extreme SLX-OS
134 Management Configuration Guide, 20.2.1a
SNMP Configuration examples for generating ifIndexes offline
Hex : 18c0c001
Binary : 00011000110000001100000000000001
VE interface
[admin@SLX]# /fabos/cliexec/ifindex_gen.py -i ve -vi 10 -d all
Decimal : 1207959562
Hex : 4800000a
Binary : 01001000000000000000000000001010
Tunnel interfaces
[admin@SLX]# /fabos/cliexec/ifindex_gen.py -i tunnel -tt mpls -ti 2 -d all
Decimal : 2092957698
Hex : 7cc00002
Binary : 01111100110000000000000000000010
Loopback interface
[admin@SLX]# /fabos/cliexec/ifindex_gen.py -i lb -lbi 20 -d all
Decimal : 1476395028
Hex : 58000014
Binary : 01011000000000000000000000010100
Management interface
[admin@SLX]# /fabos/cliexec/ifindex_gen.py -i mgmt -mi 2 -d all
Decimal : 805306370
Hex : 30000002
Binary : 00110000000000000000000000000010
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 135
LLDP
LLDP overview on page 136
Configuring and managing LLDP on page 138
LLDP overview
The IEEE 802.1AB Link Layer Discovery Protocol (LLDP) enhances the ability of network management
tools to discover and maintain accurate network topologies and simplify LAN troubleshooting in multi-
vendor environments. To efficiently and effectively operate the various devices in a LAN you must
ensure the correct and valid configuration of the protocols and applications that are enabled on these
devices. With Layer 2 networks expanding dramatically, it is difficult for a network administrator to
statically monitor and configure each device in the network.
Using LLDP, network devices such as routers and switches advertise information about themselves to
other network devices and store the information they discover. Details such as device configuration,
device capabilities, and device identification are advertised. LLDP defines the following:
• A common set of advertisement messages.
• A protocol for transmitting the advertisements.
• A method for storing the information contained in received advertisements.
Note
LLDP runs over the data-link layer which allows two devices running different network layer
protocols to learn about each other.
LLDP information is transmitted periodically and stored for a finite period. Every time a device receives
an LLDP advertisement frame, it stores the information and initializes a timer. If the timer reaches the
time to live (TTL) value, the LLDP device deletes the stored information ensuring that only valid and
current LLDP information is stored in network devices and is available to network management systems.
Extreme SLX-OS
136 Management Configuration Guide, 20.2.1a
LLDP Layer 2 topology mapping
As LLDP devices transmit and receive advertisements, the devices store information they discover
about their neighbors. Advertisement data such as a neighbor's management address, device type, and
port identification is useful in determining what neighboring devices are in the network.
Note
The Extreme LLDP implementation supports up to two neighbors.
The higher level management tools, such as the Network Advisor, can query the LLDP information to
draw Layer 2 physical topologies. The management tools can continue to query a neighboring device
through the device’s management address provided in the LLDP information exchange. As this process
is repeated, the complete Layer 2 topology is mapped.
In LLDP the link discovery is achieved through the exchange of link-level information between two link
partners. The link-level information is refreshed periodically to reflect any dynamic changes in link-level
parameters. The basic format for exchanging information in LLDP is in the form of a type, length, value
(TLV) field.
LLDP keeps a database for both local and remote configurations. The LLDP standard currently supports
three categories of TLVs. The Extreme LLDP implementation adds a proprietary Extreme extension TLV
set. The four TLV sets are described as follows:
• Basic management TLV set — This set provides information to map the Layer 2 topology and
includes the following TLVs:
◦ Chassis ID TLV — Provides the ID for the switch or router where the port resides. This is a
mandatory TLV.
◦ Port ID TLV—Provides a unique identifiable information of the port. The Port ID could be one of
the following: MAC address, Network address, Interface name of the port. On the SLX-OS, the
interface name of the port is provided. This is a mandatory TLV.
◦ Port description TLV — Provides a description of the port in an alphanumeric format. If the LAN
device supports RFC-2863, the port description TLV value equals the "ifDescr" object. This is an
optional TLV.
◦ System name TLV — Provides the system-assigned name in an alphanumeric format. If the LAN
device supports RFC-3418, the system name TLV value equals the "sysName" object. This is an
optional TLV.
◦ System description TLV — Provides a description of the network entity in an alphanumeric
format. This includes system name, hardware version, operating system, and supported
networking software. If the LAN device supports RFC-3418, the value equals the "sysDescr"
object. This is an optional TLV.
◦ System capabilities TLV — Indicates the primary functions of the device and whether these
functions are enabled in the device. The capabilities are indicated by two octets. The first octet
indicates Other, Repeater, Bridge, WLAN AP, Router, Telephone, DOCSIS cable device, and
Station, respectively. The second octet is reserved. This is an optional TLV.
◦ Management address TLV — Indicates the addresses of the local switch. Remote switches can
use this address to obtain information related to the local switch. This is an optional TLV.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 137
LLDP configuration guidelines and restrictions LLDP
• IEEE 802.1 organizational TLV set — This set provides information to detect mismatched settings
between local and remote devices. A trap or event can be reported once a mismatch is detected.
This is an optional TLV. This set includes the following TLVs:
◦ Port VLANID TLV — Indicates the port VLAN ID (PVID) that is associated with an untagged or
priority tagged data frame received on the VLAN port.
◦ PPVLAN ID TLV — Indicates the port- and protocol-based VLAN ID (PPVID) that is associated
with an untagged or priority tagged data frame received on the VLAN port. The TLV supports a
"flags" field that indicates whether the port is capable of supporting port- and protocol-based
VLANs (PPVLANs) and whether one or more PPVLANs are enabled. The number of PPVLAN ID
TLVs in a Link Layer Discovery Protocol Data Unit (LLDPDU) corresponds to the number of the
PPVLANs enabled on the port.
◦ VLAN name TLV — Indicates the assigned name of any VLAN on the device. If the LAN device
supports RFC-2674, the value equals the "dot1QVLANStaticName" object. The number of VLAN
name TLVs in an LLDPDU corresponds to the number of VLANs enabled on the port.
◦ Protocol identity TLV — Indicates the set of protocols that are accessible at the device's port. The
protocol identity field in the TLV contains a number of octets after the Layer 2 address that can
enable the receiving device to recognize the protocol. For example, a device that wishes to
advertise the spanning tree protocol includes at least eight octets: 802.3 length (two octets), LLC
addresses (two octets), 802.3 control (one octet), protocol ID (two octets), and the protocol
version (one octet).
• IEEE 802.3 organizational TLV set — This is an optional TLV set. This set includes the following TLVs:
◦ MAC/PHY configuration/status TLV — Indicates duplex and bit rate capabilities and the current
duplex and bit rate settings of the local interface. It also indicates whether the current settings
were configured through auto-negotiation or through manual configuration.
◦ Power through media dependent interface (MDI) TLV — Indicates the power capabilities of the
LAN device.
◦ Link aggregation TLV — Indicates whether the link (associated with the port on which the
LLDPDU is transmitted) can be aggregated. It also indicates whether the link is currently
aggregated and provides the aggregated port identifier if the link is aggregated.
◦ Maximum Ethernet frame size TLV — Indicates the maximum frame size capability of the device’s
MAC and PHY implementation.
Extreme SLX-OS
138 Management Configuration Guide, 20.2.1a
LLDP Understanding the default LLDP
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 139
Configuring LLDP global parameters LLDP
Extreme recommends that you use the operating system version for the description or use the
description from the chassis/entity management information base (MIB).
Do not use special characters, such as #$!@, as part of the system name and description. The following
example specifies the IT_1.6.2_LLDP_01 system description.
device(conf-lldp)# system-description IT_1.6.2_LLDP_01
Extreme SLX-OS
140 Management Configuration Guide, 20.2.1a
LLDP Configuring LLDP profiles
You can advertise the rest of the optional LLDP TLVs. The following example advertises the
management address, capabilities, name and description of the device, and user-configured port.
device(conf-lldp)# advertise optional-tlv management-address port-description system-
capabilities system-name system-description
Note
Extreme does not recommend advertising dot1.tlv and dot3.tlv LLDPs if your network
contains Converged Network Adapters (CNAs) from non-Extreme vendors. Functionality
problems can occur.
Note
Extreme does not recommend advertising dot1.tlv and dot3.tlv LLDPs if your network
contains CNAs from non-Extreme vendors. Functionality problems can occur.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 141
Configuring an LLDP profile to an interface LLDP
Extreme SLX-OS
142 Management Configuration Guide, 20.2.1a
LLDP Displaying LLDP information
To display LLDP status for an Ethernet interface, use the show lldp interface ethernet
command.
device# show lldp interface ethernet 0/18
LLDP information for Eth 0/18
State: Enabled
Mode: Receive/Transmit
Advertise Transmitted: 30 seconds
Hold time for advertise: 120 seconds
Tx Delay Timer: 1 seconds
Transmit TLVs: Chassis ID Port ID
TTL Port Description
System Name
The following example displays the LLDP neighbor information for all interfaces.
device# show lldp neighbors
Local Port Dead Interval Remaining Life Remote Port ID Remote Port Descr Chassis
ID Tx Rx System Name
Eth 0/18 120 102 Ethernet 0/25 Eth 2/25
768e.f807.6000 653 652 R6
Eth 0/21 120 108 Ethernet 0/21 Eth 1/21
768e.f807.6000 653 652 R6
Eth 0/40 120 110 Ethernet 0/50 Eth 1/50
768e.f807.6000 653 650 R6
Eth 0/43 120 102 Ethernet 0/51 Eth 2/51
768e.f807.6000 653 652 R6
Eth 0/50 120 102 Ethernet 0/23 Eth 2/23
768e.f807.6000 653 611 R6
The following example displays the LLDP neighbor information for Ethernet interface 0/18.
device# show lldp neighbors interface ethernet 0/18
Local Port Dead Interval Remaining Life Remote Port ID Remote Port Descr Chassis
ID Tx Rx System Name
Eth 0/18 120 115 Ethernet 0/25 Eth 0/25
768e.f807.6000 655 654 R6
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 143
Clearing LLDP-related information LLDP
The following example displays the detailed LLDP neighbor information for Ethernet interface 1/18.
device# show lldp neighbors interface ethernet 0/18 detail
Neighbors for Interface Eth 0/18
MANDATORY TLVs
===============
Local Interface: Eth 0/18 (Local Interface MAC: 768e.f805.5816)
Remote Interface: Ethernet 0/25 (Remote Interface MAC: 768e.f807.610d)
Dead Interval: 120 secs
Remaining Life : 118 secs
Chassis ID: 768e.f807.6000
LLDP PDU Transmitted: 656 Received: 655
OPTIONAL TLVs
==============
Port Interface Description: Eth 0/25
System Name: R6
The following example displays the statistics for Ethernet interface 0/18.
device# show lldp statistics interface ethernet 0/18
LLDP Interface statistics for Eth 0/18
Frames transmitted: 659
Frames Aged out: 0
Frames Discarded: 0
Frames with Error: 0
Frames Recieved: 657
TLVs discarded: 0
TLVs unrecognized: 0
If you do not include the interface ethernet option, the command displays the statistics for all
interfaces.
This example clears the LLDP neighbor information for all interfaces.
2. Clear the LLDP statistics on an interface.
device# clear lldp statistics interface ethernet 1/8
This example clears the LLDP transmit and receive counters on the Ethernet interface 1/8.
3. Clear the LLDP statistics for all interfaces.
device# clear lldp statistics
Extreme SLX-OS
144 Management Configuration Guide, 20.2.1a
Account and Password Recovery
Recover the admin password from the root account on page 145
Root account and password recovery on page 145
In this example, the admin password is reset to the default value of password.
You can now use the admin account to manage the admin and user passwords by using normal
password-management procedures.
The ability to enable the root account and recover the root credentials (password) depends on the
uboot environment variable. When the variable is set, it executes the root recovery logic based on the
parameter set. The variable is not preserved across reboot. Every time a reboot occurs, the root account
is disabled by default and this variable has to be set again to enable it unless the root account was not
enabled from global configuration mode.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 145
(DNX devices) Recover the root login account Account and Password Recovery
The root account access availability determines the method for password recovery:
• When the root account is disabled and the SLX-OS CLI is not available, you must recover the root
login account. The password is also recovered. Based on your device, perform the relevant task:
◦ (DNX devices) Recover the root login account on page 146
◦ (XGS devices) Recover the root login account on page 146
• When the root account is enabled but the root password is not available, perform the relevant task:
◦ (DNX devices) Recover the root password on page 147
◦ (XGS devices) Recover the root password on page 148
Note
The default password for the root account on the VM is fibranne.
Note
For a list of the currently supported DNX devices, see the "Supported Hardware" topic.
Note
For a list of the currently supported XGS devices, see the "Supported Hardware" topic.
Extreme SLX-OS
146 Management Configuration Guide, 20.2.1a
Account and Password Recovery (DNX devices) Recover the root password
The root account is now enabled. You can log in with the default password.
6. If the SLX-OS CLI is available, you can recover the root account by using the SLX-OS CLI root
enable command.
Note
To perform the recovery process, you need access to the console prompt.
1) Start system.
2) Recover password.
3) Enter command shell.
Option?
3. Define the root password value for the root recovery environment variable.
=> bootenv VM_Root_Recover RootPasswd
=>
This step sets the VM_Root_Recover variable with the RootPasswd value.
4. Save the variable to flash memory.
=> saveenv
Saving Environment to SPI Flash...
SF: Detected W25Q128BV @ 0:0 with page size 256 Bytes, erase size 64 KiB, 32 KiB, 4
KiB, total 16 MiB
Erasing SPI flash...Writing to SPI flash...
Erasing SPI flash...Writing to SPI flash...done
=>
The root account is now enabled. You can log in with the default fibranne password.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 147
(XGS devices) Recover the root password Account and Password Recovery
Note
For a list of the currently supported XGS devices, see the "Supported Hardware" topic.
The root account is now enabled. You can log in with the default fibranne password.
6. If the SLX-OS CLI is available, you can recover the root account by using the SLX-OS CLI root
enable command.
Extreme SLX-OS
148 Management Configuration Guide, 20.2.1a
Python Event-Management and Scripting
Python under Extreme operating systems on page 149
Python scripts on page 151
Python event-management on page 159
Troubleshooting event-management on page 161
Event-management show commands on page 161
Note
SLX-OS is among the Extreme operating systems that support Python.
Python overview
Python is a high-level scripting language that also supports object-oriented programming. If you have
previous programming experience, you can quickly learn how to write useful, simple Python scripts.
Note
For Python resources, refer to http://python.org.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 149
Working interactively in the Python shell Python Event-Management and Scripting
Note
The Python shell is accessible only to admin-role users.
Python syntax is case-sensitive.
2. To exit the Python shell and return to the Extreme operating system prompt, enter either:
• exit()
• Ctrl-D
3. To run a Extreme operating system command from within the Python shell, enter the CLI( )
command.
>>> cmd_show_running_ve = CLI('show running-config interface ve')
!Command: show running-config interface ve
!Time: Mon Aug 22 16:53:13 2019
The statement entered above does two things:
• Runs the show running-config interface ve command and displays the result.
• Assigns that command to a Python variable named cmd_show_running_ve
4. To run a series of Extreme operating system commands from within the Python shell, separate the
commands with \n.
>>> cmd_config_ve = CLI('configure \n interface ve 101-103')
!Command: configure
interface ve 101-103
!Time: Mon Aug 22 16:53:13 2019
Note
There is a difference between running a sequence of Extreme operating system CLI
commands in the Python shell rather than in the standard Extreme operating system
interface. Whereas in the standard interface the result of a command is persistent, in the
Python shell each CLI( ) statement is independent of any preceding ones.
In the following example, the lines beginning with # are added for explanation.
device# python
Python 3.5.2 (default, Apr 11 2019, 13:05:18)
[GCC 4.8.2] on linux
Type "help", "copyright", "credits" or "license" for more information.
>>> cmd_show_running_ve = CLI('show running-config interface ve')
!Command: show running-config interface ve
!Time: Mon Aug 22 16:53:13 2019
% No entries found.
Extreme SLX-OS
150 Management Configuration Guide, 20.2.1a
Python Event-Management and Scripting Python scripts
>>> cmd_show_running_ve.rerun()
# The rerun() function appended to cmd_show_running_ve gives the following output:
!Command: show running-config interface ve
!Time: Mon Aug 22 16:53:13 2019
interface Ve 101
shutdown
!
interface Ve 102
shutdown
!
interface Ve 103
shutdown
!
!
Python scripts
Python scripts enable you to manipulate and launch Extreme operating system commands, taking
advantage of the power and flexibility of Python. Such scripts also support event handling.
The topics in this section guide you through the process of writing and testing Python scripts, copying
them to supported devices, and running them with the python command from the command line.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 151
Testing Python-script statements Python Event-Management and Scripting
Note
For sample scripts, refer to Python scripts and run-logs on page 154.
1. In privileged EXEC mode, enter the python command to access the Python shell.
device# python
Python 3.5.2 (default, Apr 11 2019, 13:05:18)
[GCC 4.8.2] on linux
Type "help", "copyright", "credits" or "license" for more information.
Note that the device# prompt changed to a >>> Python prompt:
2. Enter the script statements one at a time, verifying that they run as expected.
>>> cmd_config_ve = CLI('configure \n interface ve 101-103')
!Command: configure
interface ve 101-103
!Time: Mon Aug 22 16:53:13 2019
Important
The only supported USB device for this task is the Extreme USB stick shipped with the device.
Extreme SLX-OS
152 Management Configuration Guide, 20.2.1a
Python Event-Management and Scripting Copying Python files to the device
3. In privileged EXEC mode, enter the copy command to copy the Python file from the USB stick to
the device flash memory.
device# copy usb://pythscript1.py flash://pythscript1.py
4. To display a list of files in the device flash memory, enter the dir command.
device# dir
total 32
drwxr-xr-x 2 251 1011 4096 Aug 26 08:44 .
drwxr-xr-x 3 251 1011 4096 Jul 20 07:50 ..
-rw-r--r-- 1 root root 1051 Mar 24 16:09 create_po.py
-rw-r--r-- 1 root sys 695 Aug 23 21:18 defaultconfig.cluster
-rw-r--r-- 1 root root 410 Aug 26 04:06 defaultconfig.standalone
-rw-r--r-- 1 root root 10042 Aug 4 00:01 ospfnsr1.cfg
-rw-r--r-- 1 root root 410 Aug 26 01:28 startup-config
5. To display the contents of a Python file copied into the device flash memory, enter the show file
command.
device# show file pythscript1.py
1. Make sure that the Python script file is uploaded to an accessible network location.
2. In privileged EXEC mode, enter the copy command to copy the Python file from the network
location to the device flash memory.
device# copy ftp://MyUserID:MyPassword@10.10.10.10//pythscript1.py flash://
pythscript1.py
For other file-transfer options, refer to the Extreme SLX-OS Command Reference copy topic.
3. To display a list of files in the device flash memory, enter the dir command.
device# dir
total 32
drwxr-xr-x 2 251 1011 4096 Aug 26 08:44 .
drwxr-xr-x 3 251 1011 4096 Jul 20 07:50 ..
-rw-r--r-- 1 root root 1051 Mar 24 16:09 create_po.py
-rw-r--r-- 1 root sys 695 Aug 23 21:18 defaultconfig.cluster
-rw-r--r-- 1 root root 410 Aug 26 04:06 defaultconfig.standalone
-rw-r--r-- 1 root root 10042 Aug 4 00:01 ospfnsr1.cfg
-rw-r--r-- 1 root root 410 Aug 26 01:28 startup-config
4. To display the contents of a Python file copied into the device flash memory, enter the show file
command.
device# show file pythscript1.py
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 153
Running Python scripts from the command line Python Event-Management and Scripting
Caution
Make sure that you test Python scripts according to standard quality assurance practices
before deploying them.
In privileged EXEC mode, enter the python command, specifying the Python script file that you want
to run.
device# python create_po.py
After the script runs, the SLX-OS prompt displays.
Note
The create_po.py script is discussed in "Script for assigning interfaces to port channels
(create_po.py)."
Note
To access sample scripts and related resources, refer to https://github.com/
extremenetworks/ExtremeScripting.
Note
Lines beginning with # are annotations.
slot = [0]
interfaces = [28, 29, 30, 31]
port_channel = 10
vlan_range = "101-105"
# Runs show running-config int vlan before the configuration, and assigns this SLX
# command to a Python variable named cmd_show_running_vlans.
cmd_show_running_vlans = CLI("show running-config vlan")
# Configures VLANs. {} is a placeholder for the format (arg1, arg2, ... argN) variables:
cmd_configure_vlans = CLI("config \n vlan {}".format(vlan_range))
Extreme SLX-OS
154 Management Configuration Guide, 20.2.1a
Python Event-Management and Scripting Python scripts and run-logs
cmd_show_running_vlans.rerun()
Run-log (create_po.py)
A log upon running create_po.py was as follows:
SLX# python create_po.py !
Command: show running-config vlan
!Time: Fri Dec 16 18:35:41 2016
vlan 1
!
vlan dot1q tag native
!Command: config
vlan 101-105
!Time: Fri Dec 16 18:35:41 2016
vlan 1
!
vlan 101
!
vlan 102
!
vlan 103
!
vlan 104
!
vlan 105
!
vlan dot1q tag native
% No entries found.
!Command: config
int po 10
switchport
switchport mode trunk
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 155
Python scripts and run-logs Python Event-Management and Scripting
interface Port-channel 10
switchport
switchport mode trunk
switchport trunk allowed vlan add 101-105
Running this script displays the "Firmware name" line of the show version command.
#Required in all scripts for SLX:
from CLI import CLI
# Using .get_output(), assign the result of show ver to a Python object named output:
output = cmd_show_ver.get_output()
print("FIRMWARE:\n")
for key in slot_firmware:
print("\t", key, "\t=> ", slot_firmware[key])
Run-log (get_output.py)
Extreme SLX-OS
156 Management Configuration Guide, 20.2.1a
Python Event-Management and Scripting Python scripts and run-logs
Event-handler script
This is a typical script launched when a specific RASLOG message is generated.
The all_ports_down.py script below was deployed—as a temporary workaround—to ensure that if
a port-channel is shut down the members are also shut down.
Note
To access this script and related resources, refer to https://github.com/extremenetworks/
ExtremeScripting.
#!/usr/local/python/3.5.2/bin/python3
import getopt
import json
import sys
import io
import re
import pdb
from CLI import CLI
int_down_raslog = 'NSM-1020'
int_up_raslog = 'NSM-1019'
shutdown_string = ''
match = None
raslog_triggers = {}
output = ''
# Iterating over each interface found in the output, and executing the
# appropriate configuration commands:
for entry in output:
print(entry)
str1 = "".join(entry)
str1 = str1.lstrip()
print(str1.startswith("Link"))
if str1.startswith("Link"):
phy = str1.split("Link: ")[1].split("(0x")[0]
members.append(phy)
command = "config term\nint " + phy + "\n" + str(shutdown_str)
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 157
Python scripts and run-logs Python Event-Management and Scripting
# The following section uses the passed information from the event-handler
# and calls po_members with the correct information:
print('raslog_triggers:\n', str(raslog_triggers))
f.write("raslog_triggers:\n" + str(raslog_triggers) + '\n')
if int_down_raslog in raslog_triggers:
shutdown_string = 'shutdown'
match = re.search(r'interface Port-channel (\d+)',
raslog_triggers[int_down_raslog], re.IGNORECASE)
elif int_up_raslog in raslog_triggers:
shutdown_string = 'no shutdown'
match = re.search(r'interface Port-channel (\d+)',
raslog_triggers[int_up_raslog], re.IGNORECASE)
if match:
po = match.group(1)
print('Performing operation "' + shutdown_string
+ '" on members for Port-channel ' + po + '\n')
f.write('Performing operation "' + shutdown_string
+ '" on members for Port-channel ' + po + '\n')
members = po_members(po, shutdown_string)
print('\tMembers on Port-channel ' + po + ': ' + str(members) + '\n')
f.write('\tMembers on Port-channel ' + po + ': ' + str(members) + '\n')
f.close()
The following command tests the all_ports_down.py script for an NSM-1020 RASLOG:
device# python all_ports_down.py --raslog-triggers {"NSM-1020":"interface Port-channel 10
is administratively down."}
The following command tests the all_ports_down.py script for an NSM-1019 RASLOG:
device# python all_ports_down.py --raslog-triggers {"NSM-1019":"interface Port-channel 10
is administratively up."}
To verify that the script with "NSM-1019" works correctly, enter the following commands:
device# show port-channel detail
LACP Aggregator: Po 10
Aggregator type: Standard
Actor System ID - 0x8000,78-a6-e1-45-95-14
Admin Key: 0010 - Oper Key 0010
Receive link count: 4 - Transmit link count: 4
Individual: 0 - Ready: 1
Partner System ID - 0x0001,00-24-38-8b-f1-00
Partner Oper Key 0102
Flag * indicates: Primary link in port-channel
Number of Ports: 4
Minimum links: 1
Member ports:
Link: Eth 0/3 (0xC006000) sync: 1
Link: Eth 0/4 (0xC008000) sync: 1 *
Link: Eth 0/5 (0xC00A000) sync: 1
Link: Eth 0/6 (0xC00C000) sync: 1
Extreme SLX-OS
158 Management Configuration Guide, 20.2.1a
Python Event-Management and Scripting Python event-management
Python event-management
Python event management enables you to specify a Python script that runs automatically upon
specified conditions.
3. For each trigger that you need for a profile, enter the trigger command.
device(config-event-handler-eventHandler1)# trigger 1 raslog LOG-1001
The trigger event is RASlog message #LOG-1001.
4. Enter the action python-script command to specify a Python script that runs when the
event-handler is triggered.
device(config-event-handler-eventHandler1)# action python-script example.py
Caution
Make sure that you test Python scripts according to standard quality assurance practices
before deploying them.
The following example defines a trigger that uses POSIX extended REGEX to search for a match within
a specified RASlog message ID.
device# configure terminal
device(config-event-handler-eventHandler1)# event-handler eventHandler2
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 159
Activating an event-handler Python Event-Management and Scripting
RASlog message NSM-1003 includes "interface interface-name is link down", indicating that
an interface is offline because the link is down. The REGEX searches within such a message for an
interface from 1/1 through 1/9.
Activating an event-handler
Use this procedure to activate one or more event-handlers on the device. If a trigger specified in the
event-handler profile occurs, a designated Python script runs.
1. Enter configure terminal to access global configuration mode.
device# configure terminal
2. Enter the event-handler activate command, specifying the event handler that you are
activating.
device(config)# event-handler activate eventHandler1
2. To specify a delay from when a trigger is received until execution of the event-handler action, enter
the delay command.
device(config-activate-eventHandler1)# delay 60
The above example specifies a delay of 60 seconds.
3. To specify multiple iterations of the action when a trigger is received:
a. Enter the iterations command.
b. To specify an interval between iterations, enter the interval command.
device(config-event-handler-eventHandler1)# iterations 3
device(config-activate-eventHandler1)# interval 30
The above example sets the number of iterations to 3 and specifies an interval of 30 seconds
between each iteration.
Extreme SLX-OS
160 Management Configuration Guide, 20.2.1a
Python Event-Management and Scripting Troubleshooting event-management
4. To specify a maximum number of minutes to wait for an action script to complete execution, enter
the action-timeout command.
device(config-activate-eventHandler1)# action-timeout 30
The example sets the timeout to 30 minutes.
5. To limit action-recurrence upon multiple trigger-events, enter one of the following commands:
• trigger-mode only-once—for the duration of a device configuration, the event-handler
action is launched only once.
device(config-activate-eventHandler1)# trigger-mode only-once
6. If multiple triggers are defined, to specify that the action run only if all of the triggers occur, enter
the trigger-function AND time-window command.
device(config-activate-eventHandler1)# trigger-function AND time-window 120
The above example specifies that the action run only if all triggers occur within 120 seconds.
Troubleshooting event-management
Use these topics to troubleshoot issues that arise during implementation of Python event-management.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 161
Configuration Rollback
Configuration rollback overview on page 162
Configuration rollback details on page 164
Configuration rollback considerations and limitations on page 165
Configuring rollback on page 167
This functionality can be used to revert to a previous configuration state, effectively rolling back any
configuration changes that were made since that configuration checkpoint was created. Administrators
can create multiple checkpoints to save different versions of the running configuration.
Supported topologies
The following IP Clos and non-Clos rack topologies are supported.
Extreme SLX-OS
162 Management Configuration Guide, 20.2.1a
Configuration Rollback Supported topologies
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 163
Configuration rollback details Configuration Rollback
This feature is disabled by default. It is enabled by means of the rollback enable EXEC command.
The execution of the no rollback enable command erases all the checkpoints and rollback related
logs. Admin privileges are required to create checkpoints and perform rollback operations.
When rollback is disabled, other rollback commands result in the following error message:
The user creates configuration checkpoints (maximum of 10 are allowed) by executing the rollback
checkpoint command in privileged EXEC mode. A checkpoint name is optional. If a name is not
supplied, a checkpoint is created with a timestamp in YYYYMMDD_HHMISS format, for example,
20180511_234535.
As long as the checkpoint file is present on the device, the user can revert to a specified checkpoint file
without having to reboot the device. However, certain configuration changes may require reboot, for
example, hardware profile configurations. A rollback to a specific checkpoint restores the active
configuration of the system to that of the checkpoint.
Extreme SLX-OS
164 Management Configuration Guide, 20.2.1a
Configuration Rollback Configuration rollback considerations and limitations
Two types of rollback are supported, by means of options to the rollback apply checkpoint
command:
• best-effort: Implements a rollback and skips any errors (the default).
• stop-at-first-failure: Stops at the first error encountered.
A variety of show commands allow the user to see the details of failed configurations.
Note
MPLS and it's allied configurations (VPLS, VLL, LDP) are not supported under Configuration
Rollback.
General
In a rollback operation, configuration diffs are generated between the running config and the
checkpoint config. These can be seen by means of the show rollback diff checkpoint
command. Configuration parameters that are changed are first removed, and then previous
configuration parameters are reapplied.
The show rollback patch checkpoint command displays the patch file, which lists the
sequence of CLI commands to be executed as part of a rollback.
Configurations from all other CLI/NETCONF/REST/RestConf and SNMP sessions are blocked when the
rollback operation is in progress, with an error message as in the following CLI example.
device(conf-if-eth-0/1)# switchport
Rollback configuration is in progress. Please try again later.
device(conf-if-eth-0/1)#
Rollback and checkpoint operations are not permitted when the file/configuration replay operation is in
process. An example error message is shown below.
Only one rollback session is allowed. Subsequent attempts to roll back when there is an active rollback
session are blocked, as in the following example.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 165
Issues with specific configurations Configuration Rollback
A rollback operation is not permitted when cluster formation is in progress, as in the following example.
All checkpoints and related artifacts (such as logs, history, and so on) are deleted from the system for
the following conditions:
• When write-erase is issued
• When upgrade/downgrade is issued
• When no rollback enable is executed from global configuration mode.
When a firmware download is done with a full install, rollback will be disabled. When the device comes
up with the new image, all the checkpoints will be lost.
RAS considerations
The following table lists conditions and messages for Reliability, Availability, and Serviceability (RAS).
Extreme SLX-OS
166 Management Configuration Guide, 20.2.1a
Configuration Rollback Intrusive scenarios
Intrusive scenarios
The following are among the intrusive scenarios that can occur in moves from a running configuration
to a checkpoint configuration.
• The running configuration has config switchport trunk allowed vlan all and the
checkpoint has the range-based switchport trunk configuration switchport trunk allowed
vlan add <vlan-range>. Such configurations result in traffic disruption while reverting to a
checkpoint configuration.
• When network telemetry is activated in the running configuration and a checkpoint configuration
has modifications for the telemetry server related configuration, the telemetry server must be
deactivated and the changes applied.
• Certain feature configurations such as HTTPS and, telemetry are dependent on some exec mode
commands for related artifacts like crypto-certificates. The rollback feature is unable to determine
any discrepancies in such dependencies.
Performance considerations
A rollback operation involves retrieving an existing running configuration, computing the differences
between that and a checkpoint configuration, and replaying the file of the diff that is generated. Where
network scales are such that there are huge differences between the running configuration and
checkpoint configuration, it can take several minutes to complete the rollback.
Configuring rollback
The following examples illustrate how to create a checkpoint file, view the rollback/diff patch, revert to a
user-defined checkpoint, and view the status of the operation.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 167
Viewing checkpoint details Configuration Rollback
2) vlan_config:
Created by "admin"
Created at Tue Jun 13 14:19:49 2018
Size is 4872 bytes
Description: "Vlan Config"
Extreme SLX-OS
168 Management Configuration Guide, 20.2.1a
Viewing the patch between a checkpoint and the
Configuration Rollback running configuration
Executing rollback
Use the rollback apply checkpoint command to execute a rollback. To rollback the
configuration to a specific, saved checkpoint, the rollback configuration name for that checkpoint must
be used. Please note that any changes made to the configuration after the checkpoint was taken will be
removed when the rollback is performed.
device# rollback apply checkpoint default_config_checkpoint
This operation will modify the running configuration of the system. Do you want to
continue? [Y/N]y
% Warning: Configuration Rollback is in-progress.
Please do not abort an ongoing session as it can leave the system with an inconsistent
configuration.
......
Rollback completed successfully.
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 169
Viewing rollback log errors Configuration Rollback
no suppress-arp
no ipv6 mld snooping startup-query-interval
no ip igmp snooping startup-query-interval
no suppress-nd
no router-interface Ve
!
exit
vlan 3
no description
no suppress-arp
no ipv6 mld snooping startup-query-interval
no ip igmp snooping startup-query-interval
no suppress-nd
no router-interface Ve
!
exit
vlan 2
no description
no suppress-arp
no ipv6 mld snooping startup-query-interval
no ip igmp snooping startup-query-interval
no suppress-nd
no router-interface Ve
!
exit
vlan 1
no ipv6 mld snooping startup-query-interval
Extreme SLX-OS
170 Management Configuration Guide, 20.2.1a
Configuration Rollback Viewing rollback status history
Extreme SLX-OS
Management Configuration Guide, 20.2.1a 171