Omniswitch AOS Release 6 Switch Management Guide

Total Page:16

File Type:pdf, Size:1020Kb

Omniswitch AOS Release 6 Switch Management Guide Part No. 060638-10, Rev B November 2019 OmniSwitch AOS Release 6 Switch Management Guide 6.7.2.R07 www.al-enterprise.com This user guide documents release 6.7.2.R07 of the OmniSwitch 6350, 6450. The functionality described in this guide is subject to change without notice. The Alcatel-Lucent name and logo are trademarks of Nokia used under license by ALE. To view other trademarks used by affiliated companies of ALE Holding, visit: www.al-enterprise.com/en/legal/trade- marks-copyright. All other trademarks are the property of their respective owners. The information presented is subject to change without notice. Neither ALE Holding nor any of its affiliates assumes any responsibility for inaccuracies contained herein. 26801 West Agoura Road Calabasas, CA 91301 Service & Support Contact Information North America: 800-995-2696 Latin America: 877-919-9526 EMEA: +800 00200100 (Toll Free) or +1(650)385-2193 Asia Pacific: +65 6240 8484 Web: businessportal2.alcatel-lucent.com Email: [email protected] OmniSwitch AOS Release 6 Switch Management Guide November 2019 ii Contents About This Guide .......................................................................................................... xi Supported Platforms .......................................................................................................... xi Who Should Read this Manual? .......................................................................................xii When Should I Read this Manual? ...................................................................................xii What is in this Manual? ....................................................................................................xii What is Not in this Manual? ............................................................................................xiii How is the Information Organized? ................................................................................xiii Documentation Roadmap ................................................................................................ xiv Related Documentation .................................................................................................... xv Product Documentation ................................................................................................... xvi Technical Support ........................................................................................................... xvi Chapter 1 Managing System Files .............................................................................................1-1 In This Chapter ................................................................................................................1-1 File Management Specifications .....................................................................................1-2 Switch Administration Overview ....................................................................................1-3 File Transfer .............................................................................................................1-3 Switch Directories ....................................................................................................1-4 File and Directory Management ......................................................................................1-5 Using Wildcards .......................................................................................................1-7 Multiple Characters ...........................................................................................1-7 Single Characters ...............................................................................................1-7 Directory Commands ...............................................................................................1-8 Determining Your Location in the File Structure ..............................................1-8 Changing Directories .........................................................................................1-9 Displaying Directory Contents ........................................................................1-10 Making a New Directory .................................................................................1-11 Displaying Directory Contents Including Subdirectories ................................1-12 Copying an Existing Directory ........................................................................1-12 Removing a Directory and its Contents ...........................................................1-14 File Commands ......................................................................................................1-15 Creating or Modifying Files ............................................................................1-15 Copy an Existing File ......................................................................................1-15 Secure Copy an Existing File .................................................................................1-16 Move an Existing File or Directory .................................................................1-16 Change File Attribute and Permissions ...........................................................1-17 Delete an Existing File ....................................................................................1-17 Managing Files on Switches ............................................................................1-18 OmniSwitch AOS Release 6 Switch Management Guide November 2019 iii Contents Utility Commands ..................................................................................................1-19 Displaying Free Memory Space ......................................................................1-19 Performing a File System Check .....................................................................1-19 Deleting the Entire File System .......................................................................1-20 Process Self-test Function Commands ...................................................................1-21 Loading Software onto the Switch ................................................................................1-22 Using the Switch as an FTP Server ........................................................................1-22 Using the Switch as an FTP Client .........................................................................1-23 Using Secure Shell FTP .........................................................................................1-25 Closing a Secure Shell FTP Session ......................................................................1-26 Using TFTP to Transfer Files .................................................................................1-27 Using Zmodem .......................................................................................................1-27 Using the Switch as an SCP Server ........................................................................1-29 Registering Software Image Files .................................................................................1-31 Directories on the Switch .......................................................................................1-31 Available Image Files .............................................................................................1-32 Application Examples for File Management ................................................................1-33 Transferring a File to the Switch Using FTP .........................................................1-33 Creating a File Directory on the Switch .................................................................1-34 FTP Client Application Example ....................................................................1-35 Creating a File Directory Using Secure Shell FTP ................................................1-37 Transfer a File Using Secure Shell FTP .................................................................1-38 Closing a Secure Shell FTP Session ......................................................................1-38 Verifying Directory Contents ........................................................................................1-39 Installing Software Licenses .........................................................................................1-40 Licensed Features ...................................................................................................1-41 Setting the System Clock ..............................................................................................1-42 Setting Date and Time ............................................................................................1-42 Date ..................................................................................................................1-42 Time Zone .......................................................................................................1-42 Time .................................................................................................................1-43 Daylight Savings Time Configuration ...................................................................1-44 Enabling DST ..................................................................................................1-45 Configuring Hash Control Mode ..................................................................................1-47 Non-Unicast Load Balancing on Link Aggregation .....................................................1-48 Chapter 2 Logging Into the Switch ............................................................................................2-1
Recommended publications
  • English Arabic Technical Computing Dictionary
    English Arabic Technical Computing Dictionary Arabeyes Arabisation Team http://wiki.arabeyes.org/Technical Dictionary Versin: 0.1.29-04-2007 April 29, 2007 This is a compilation of the Technical Computing Dictionary that is under development at Arabeyes, the Arabic UNIX project. The technical dictionary aims to to translate and standardise technical terms that are used in software. It is an effort to unify the terms used across all Open Source projects and to present the user with consistant and understandable interfaces. This work is licensed under the FreeBSD Documentation License, the text of which is available at the back of this document. Contributors are welcome, please consult the URL above or contact [email protected]. Q Ì ÉJ ªË@ éÒ¢@ Ñ«YË QK AK.Q« ¨ðQåÓ .« èQK ñ¢ ÕæK ø YË@ úæ®JË@ úGñAm '@ ñÓA®ÊË éj èYë . l×. @QK. éÔg. QK ú¯ éÊÒªJÖÏ@ éJ J®JË@ HAjÊ¢Ö Ï@ YJ kñKð éÔg. QK úÍ@ ñÓA®Ë@ ¬YîE .ºKñJ ËAK. éîD J.Ë@ ÐYjJÒÊË éÒj. Óð éÓñê®Ó H. ñAg éêk. @ð Õç'Y®JË ð á ÔgQÖÏ@ á K. H. PAJË@ øXA®JË ,H. ñAmÌ'@ . ¾JÖ Ï .ñÓA®Ë@ éK AîE ú ¯ èQ¯ñJÖÏ@ ð ZAKñÊË ø X @ ú G. ø Q¯ ékP ù ë ñÓA®Ë@ ékP . éJ K.QªËAK. ÕÎ @ [email protected] . úΫ ÈAB@ ð@ èC«@ à@ñJªË@ úÍ@ H. AëYË@ ZAg. QË@ ,á ÒëAÖÏ@ ɾK. I. kQK A Abortive release êm .× (ú¾J.) ¨A¢®K@ Abort Aêk . @ Abscissa ú æJ Absolute address Ê¢Ó à@ñ J« Absolute pathname Ê¢Ó PAÓ Õæ @ Absolute path Ê¢Ó PAÓ Absolute Ê¢Ó Abstract class XQm.× ­J Abstract data type XQm.× HA KAJ K.
    [Show full text]
  • Rethinking Security
    RETHINKING SECURITY Fighting Known, Unknown and Advanced Threats kaspersky.com/business “Merchants, he said, are either not running REAL DANGERS antivirus on the servers managing point- of-sale devices or they’re not being updated AND THE REPORTED regularly. The end result in Home Depot’s DEMISE OF ANTIVIRUS case could be the largest retail data breach in U.S. history, dwarfing even Target.” 1 Regardless of its size or industry, your business is in real danger of becoming a victim of ~ Pat Belcher of Invincea cybercrime. This fact is indisputable. Open a newspaper, log onto the Internet, watch TV news or listen to President Obama’s recent State of the Union address and you’ll hear about another widespread breach. You are not paranoid when you think that your financial data, corporate intelligence and reputation are at risk. They are and it’s getting worse. Somewhat more controversial, though, are opinions about the best methods to defend against these perils. The same news sources that deliver frightening stories about costly data breaches question whether or not anti-malware or antivirus (AV) is dead, as reported in these articles from PC World, The Wall Street Journal and Fortune magazine. Reports about the death by irrelevancy of anti-malware technology miss the point. Smart cybersecurity today must include advanced anti-malware at its core. It takes multiple layers of cutting edge technology to form the most effective line of cyberdefense. This eBook explores the features that make AV a critical component of an effective cybersecurity strategy to fight all hazards targeting businesses today — including known, unknown and advanced cyberthreats.
    [Show full text]
  • Cyren's 2016 Cyberthreat Report
    2016 CYBERTHREAT Report AUTOMATED THREAT INTELLIGENCE: The Key to Preventing, Mitigating, and Identifying Cyber Breaches Introduction .................................................................................................4 The Cloud Sandbox Array: A New Tool Against Cybercrime .....................6 The Benefits of Big Data .......................................................................... 12 2016 Predictions....................................................................................... 14 Malware Newsmakers of 2015 ................................................................ 16 The Criminal Power of the Unknown ...................................................... 22 2015 Statistics: Android, Phishing, Malware, Spam ............................... 26 Table of Contents Table CYREN 2016 CYBERTHREAT REPORT 3 INTRODUCTION Lior Kohavi Chief Technical Officer, CYREN, Inc. There is a false perception that sophisticated attacks are too difficult to prevent and the only alternative is detection. But detection is NOT the new prevention. Cybersecurity professionals must make it their mission to STOP attacks, not just become proficient at detecting them. It's no secret that cybercriminals are willing to spend a lot of time and money to obtain the information they desire. And, the risk that these criminals will be caught and convicted is relatively low. Despite well-publicized botnet takedowns, like that of Darknode this past July, researchers estimate that less than 1% of cybercrimes receive a corresponding conviction.
    [Show full text]
  • BCIS 1305 Business Computer Applications
    BCIS 1305 Business Computer Applications BCIS 1305 Business Computer Applications San Jacinto College This course was developed from generally available open educational resources (OER) in use at multiple institutions, drawing mostly from a primary work curated by the Extended Learning Institute (ELI) at Northern Virginia Community College (NOVA), but also including additional open works from various sources as noted in attributions on each page of materials. Cover Image: “Keyboard” by John Ward from https://flic.kr/p/tFuRZ licensed under a Creative Commons Attribution License. BCIS 1305 Business Computer Applications by Extended Learning Institute (ELI) at NOVA is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted. CONTENTS Module 1: Introduction to Computers ..........................................................................................1 • Reading: File systems ....................................................................................................................................... 1 • Reading: Basic Computer Skills ........................................................................................................................ 1 • Reading: Computer Concepts ........................................................................................................................... 1 • Tutorials: Computer Basics................................................................................................................................ 1 Module 2: Computer
    [Show full text]
  • Malware Primer Malware Primer
    Malware Primer Malware Primer Table of Contents Introduction Introduction ...........................................................................................................................................................................2 In The Art of War, Sun Tzu wrote, “If you know the enemy and know yourself, you need not fear the result of a hundred battles.” This certainly applies Chapter 1: A Brief History of Malware—Its Evolution and Impact ..............................3 to cyberwarfare. This primer will help you get to know cybercriminals by providing you with a solid foundation in one of their principle weapons: Chapter 2: Malware Types and Classifications ....................................................................................8 malware. Chapter 3: How Malware Works—Malicious Strategies and Tactics ........................11 Our objective here is to provide a baseline of knowledge about the different types of malware, what malware is capable of, and how it’s distributed. Chapter 4: Polymorphic Malware—Real Life Transformers .............................................14 Because effectively protecting your network, users, data, and company from Chapter 5: Keyloggers and Other Password Snatching Malware ...............................16 malware-based attacks requires an understanding of the various ways that the enemy is coming at you. Chapter 6: Account and Identity Theft Malware ...........................................................................19 Keep in mind, however, that we’re only able here
    [Show full text]
  • NETSURION DEFENSE AGAINST BACKOFF: How Netsurion Effectively Protected Against Threats
    NETSURION DEFENSE AGAINST BACKOFF: How Netsurion Effectively Protected Against Threats Powering Secure and Agile Networks In the wake of the numerous recent data breaches, many consumers are demanding answers as to the how and why surrounding companies who have inadvertently allowed data to be compromised, given security measures accessible today. After a breach is confirmed, the process typically involves PCI Forensic Investigators spending time researching and investigating compromised networks, logging files, and any other pieces of the system traceable to not only determine how the hackers gained access, but once in control of a machine, how data was removed or retrieved. Investigative reports post-breach have uncovered vast amounts of useful information employed to reactively secure networks going forward. The industry, as a whole, has learned that in many of the instances, the culprit responsible for the data theft is linked to businesses utilizing remote access, or more specifically, insecure remote access. It should come as no surprise then that the method of choice for many blackhats (a.k.a. computer hackers) looking to enter a system has been identifying insecure remote access. This method includes several different remote platforms, of which you can read more about in the DHS article on Backoff: New Point of Sale Malware. Hackers search for vulnerabilities and once located, it is only a matter of moments before they are able to connect to machines remotely, often times gaining administrative privileges in the process. Once they have these privileges, it is quite easy for them to download the Backoff malware on the machine in order to begin sending credit card data to their destination of choice.
    [Show full text]
  • Q3 Internet Threat Trends Report
    INTERNET THREATS TREND REPORT OCTOBER 2014 THE STATE OF CORPORATE SECURITY Lior Kohavi Chief Technical Officer, CYREN, Inc. The Companies—Home Depot, JP Morgan Chase, Target The Information—56 million credit cards, 76 million ‘households,’ 7 million small businesses, and 110 million accounts The Impact—According to recent reports, Home Depot estimates that investigation, credit monitoring, call center, and other costs could top $62 million. Target’s stock fell by almost 14% in the months following news of the breach, with profits down 46% by the end of Q4 2013, and breach-related expenses totaling $146 million. The impact of the JP Morgan Chase data breach has yet to be determined, but early reports suggest the costs could top that of Target. These are just a few of the big names that have hit the headlines recently. But, it’s not just large organizations being hacked. Regional small- to medium-sized businesses (SMBs) are potentially even greater targets, as hackers view SMB security as less sophisticated and easy to breach. According to a 2013 Verizon report, which analyzed 47,000 security incidents, 40% of all confirmed breaches involved companies with fewer than 1,000 employees; more notably, the largest single segment of corporate breach victims among companies with less than 1,000 employees were companies with fewer than 100 employees. When you consider that an estimated 60% of all companies experiencing a cybersecurity breach go out of business within six months of the attack, it is a wonder that all corporations aren’t making cybersecurity a higher priority. Yet, the level of corporate complacency with regard to cybersecurity remains high.
    [Show full text]
  • How to Protect Against Ransomware Attacks 24 May, 2017
    HOW TO PROTECT AGAINST RANSOMWARE ATTACKS 24 MAY, 2017 Visit us at www.ehr20.com [email protected] 866-276 8309 © 2017 EHR 2.0. All rights reserved. To purchase reprints of this document, please email [email protected]. Disclaimer This session has been provided for educational and informational purposes only and is not intended and should not be construed to constitute legal advice. Please consult your attorneys in connection with any fact-specific situation under federal law and the applicable state or local laws that may impose additional obligations on you and your company. © 2017 EHR 2.0. All rights reserved. To purchase reprints of this document, please email [email protected]. Who we are … EHR 2.0 Mission: To assist healthcare organizations develop and implement practices to secure IT systems and comply with HIPAA/HITECH regulations. Education(Training, Webinar & E-Learning) Consulting Services Toolkit(Tools, Best Practices & Checklist) © 2017 EHR 2.0. All rights reserved. To purchase reprints of this document, please email [email protected]. About Craig Petronella • Top cybersecurity expert and IT authority in Raleigh, NC. • Author of multiple books, including How HIPAA Can Crush Your Medical Practice and Peace of Mind Computer Support. • 30+ years advising clients & protecting computer information. • Makes sure your business network works when you need it the most, and is a celebrity in his field and hometown. • Frequently quoted on ABC, CBS, NBC, News14, PRNews Wire, and Newsobserver.com for his expertise in protecting local businesses and medical practice owners from hackers halfway around the world in places such as Ukraine, Russia, and China.
    [Show full text]
  • SBC-Gateway-MSBR Series Release Notes Ver
    Release Notes AudioCodes Gateways, Session Border Controllers (SBC) & Multi-Service Business Routers (MSBR) Session Border Controllers Multi-Service Business Routers Analog & Digital Media Gateways Version 7.2 Release Notes Contents Table of Contents 1 Introduction ....................................................................................................... 17 1.1 Software Revision Record ...................................................................................... 17 1.2 Products Supported in Release 7.2 ........................................................................ 19 2 Gateways and SBCs ......................................................................................... 21 2.1 Version GA .............................................................................................................21 2.1.1 New Features .......................................................................................................... 21 2.1.1.1 New Product - Media Transcoder Device ................................................ 21 2.1.1.2 New GUI for Web-based Management Tool ........................................... 21 2.1.1.3 New CLI Structure ................................................................................... 22 2.1.1.4 Interworking between SIP and SIP-I Endpoints ...................................... 22 2.1.1.5 Maximum Call Duration per Gateway and SBC Calls ............................. 23 2.1.1.6 Protection against Known Malicious Attacks ........................................... 23
    [Show full text]
  • Optimizing Re-Evaluation of Malware Distribution Networks
    Optimizing Re-Evaluation of Malware Distribution Networks by Kyle Zeeuwen A THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF APPLIED SCIENCE in The Faculty of Graduate Studies (Electrical and Computer Engineering) THE UNIVERSITY OF BRITISH COLUMBIA (Vancouver) October, 2011 c Kyle Zeeuwen 2011 Abstract The retrieval and analysis of malicious content is an essential task for security researchers. Security labs use automated HTTP clients known as client honeypots to visit hundreds of thousands of suspicious URLs daily. The dynamic nature of malware distribution networks necessitate periodic re-evaluation of a subset of the confirmed malicious sites, which introduces two problems: 1) the number of URLs requiring re-evaluation exhaust available resources, and 2) repeated evaluation exposes the system to adversarial blacklisting, which affects the accuracy of the content collected. To address these problems, I propose optimizations to the re-evaluation logic that reduce the number of re-evaluations while maintaining a constant sample discovery rate during URLs re-evaluation. I study these problems in two adversarial scenarios: 1) monitoring malware repositories where no provenance is available, and 2) monitoring Fake Anti-Virus (AV) distribution networks. I perform a study of the adversary by repeatedly content from the distribution networks. This re- veals trends in the update patterns and lifetimes of the distribution sites and malicious executa- bles. Using these observations I propose optimizations to reduce the amount of re-evaluations necessary to maintain a high malicious sample discovery rate. In the first scenario the proposed techniques, when evaluated versus a fixed interval scheduler, are shown to reduce the number of re-evaluations by 80-93% (assuming a re-evaluation interval of 1 hour to 1 day) with a corresponding impact on sample discovery rate of only 2-7% percent.
    [Show full text]
  • Bladecenter, Linux, and Open Source Blueprint for E-Business on Demand
    Front cover IBM Eserver BladeCenter, Linux, and Open Source Blueprint for e-business on demand Discover open source projects to reduce cost and improve reliability Install and configure Linux and critical open source network services Learn best practices to implement reliable services George Dolbier Peter Bogdanovic Dominique Cimafranca Yessong Johng Rufus Credle Jr. ibm.com/redbooks International Technical Support Organization IBM ^ BladeCenter, Linux, and Open Source: Blueprint for e-business on demand July 2003 SG24-7034-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (July 2003) This edition applies to Red Hat Advanced Server 2.1. © Copyright International Business Machines Corporation 2003. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . ix The team that wrote this redbook. ix Become a published author . xi Comments welcome. xi Chapter 1. About the book: Blueprint for building an e-business application for BladeCenter. 1 1.1 Building an e-business infrastructure . 2 1.1.1 Materials . 2 1.1.2 Objectives . 3 1.2 IBM eServer™ BladeCenter . 3 1.3 FAStT SAN storage. 3 1.4 BladeCenter business value . 4 1.5 Linux business value. 4 1.6 Open source business value. 4 1.7 Other references . 5 Chapter 2. Architecture: Solution overview . 7 2.1 Open source e-business infrastructure a modular approach . 8 2.2 All construction projects start with a pattern . 8 2.2.1 Industry standard e-business pattern: A three-tier infrastructure .
    [Show full text]
  • 2.4 Cyber Crime
    Post-Graduate Diploma in Cyber Security Cyber Security Techniques (PGDCS-02) Title Cyber Security Techniques Advisors Mr. R. Thyagarajan, Head, Admn. & Finance and Acting Director, CEMCA Dr. Manas Ranjan Panigrahi, Program Officer (Education), CEMCA Prof. Durgesh Pant, Director- SCS&IT, UOU Editor Dr. Jeetendra Pande, Assistant Professor- School of CS & IT, Uttarakhand Open University, Haldwani Authors Block I> Unit I, Unit II, Unit III & Unit IV Mr. Mukesh Kumar Verma, Cyber Security Professional, Chandigarh Block II> Unit I, Unit II, Unit III & Unit IV Mr. Ashutosh Bahuguna, Scientist- Indian Computer Emergency Response Team (CERT- In), Department of Electronics & IT, Ministry of Communication & IT, Government of India & Block III> Unit I, Unit II, Unit III & Unit IV Mr. Sani Abhilash, Scientist- Indian Computer Emergency Response Team (CERT-In), Department of Electronics & IT, Ministry of Communication & IT, Government of India ISBN: 978-93-84813-89-5 Acknowledgement The University acknowledges with thanks the expertise and financial support provided by Commonwealth Educational Media Centre for Asia (CEMCA), New Delhi, for the preparation of this study material. Cover page image courtesy: https://upload.wikimedia.org/wikipedia/commons/0/00/Orange_blue_digital_signature_en.svg and http://molosyndicate.com/3/computerworld Uttarakhand Open University, 2016 © Uttarakhand Open University, 2016. Cyber Security Techniques is made available under a Creative Commons Attribution Share-Alike 4.0 Licence (international): http://creativecommons.org/licenses/by-sa/4.0/ It is attributed to the sources marked in the References, Article Sources and Contributors section. Published By: Uttarakhand Open University Expert Panel S. No. Name 1 Dr. Jeetendra Pande, School of Computer Science & IT, Uttarakhand Open University, Haldwani 2 Prof.
    [Show full text]