® New Installation for Enterprise OS Software Version 11.3 http://www.3com.com/ Part No.
3Com Corporation 5400 Bayfront Plaza Santa Clara, California 95052-8145 Copyright © 1999, 3Com Corporation. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without written permission from 3Com Corporation.
CONTENTS ABOUT THIS GUIDE Introduction 5 How to Use This Guide Conventions 6 Year 2000 Compliance 1 5 6 OVERVIEW NETBuilder II Systems 7 EZBuilt Preassembled NETBuilder II System Component System 7 NETBuilder II Chassis DPE Module 7 Software 7 Installation Checklist 8 2 INSTALLING SOFTWARE AND A NETBUILDER II SYSTEM 7 BOOTING Installing Software and Performing Initial Boot 9 Booting from the Flash Memory Card 9 Prerequisites 9 Booting an EZBuilt NETBuilder II System 9 Booting a Component NETBuilder
Full-Form Syntax 22 Abbreviated Syntax 22 Symbols 23 Full and Abbreviated Syntax Examples 24 Variations in Command Syntax 25 Entering Service Names in Command Lines 25 Determining the Display of Ports and Virtual Ports 25 Using Aliases 26 Command History Substitution 26 Privilege Level 27 Command-Line Parameter Attributes 27 Syntax for Assigning Values 28 Numeric Values 28 Names 28 Strings 28 Port and Path Naming Restrictions 29 ISDN-Related Syntax Variation 29 Address Formats 30 Media Addresses 30 Network
ABOUT THIS GUIDE Introduction This guide describes how to get started with your new NETBuilder II® bridge/router. It describes how to install Enterprise OS software and perform the initial system boot. It also explains how to access and use the command-line interface to establish basic settings. If you are upgrading software from an earlier version, see Upgrading Enterprise OS Software.
ABOUT THIS GUIDE Conventions Table 1 and Table 2 list conventions that are used throughout this guide. Table 1 Notice Icons Icon Notice Type Alerts you to... Information note Important features or instructions Caution Risk of personal safety, system damage, or loss of data Warning Risk of severe personal injury Table 2 Text Conventions Convention Description Syntax Evaluate the syntax provided and supply the appropriate values.
1 OVERVIEW This chapter is an overview of how to get started with your new NETBuilder II® system. This chapter provides you with an installation checklist that describes the basic steps for starting a NETBuilder II system with a Dual Processor Engine (DPE) module. NETBuilder II Systems The NETBuilder II system consists of a 4-Slot, 8-Slot, or 8-Slot Extended chassis with a main processor (DPE) module, and Enterprise OS software.
CHAPTER 1: OVERVIEW Installation Checklist This section contains a checklist for installing software and booting a NETBuilder II system with a DPE module. Install System Software and Boot — See Chapter 2. ❑ Install software from a flash memory card. Change the Primary Boot Source — See Chapter 3. ❑ Change the primary boot source default as needed. Configure Basic Settings — See Chapter 4. ❑ Log on to the system.
INSTALLING SOFTWARE AND BOOTING A NETBUILDER II SYSTEM 2 This chapter contains the following procedures: Installing Software and Performing Initial Boot ■ Installing and booting Enterprise OS software ■ Making a backup copy of the software flash memory card Enterprise OS software can be installed in the following ways: ■ From a flash memory card with preinstalled software. 3Com recommends this method. EZBuilt NETBuilder II systems have a factory-installed software flash memory card.
CHAPTER 2: INSTALLING SOFTWARE AND BOOTING A NETBUILDER II SYSTEM Booting a Component NETBuilder II System To boot a component NETBuilder II system, follow these steps: 1 Insert a flash memory card with preinstalled software in drive A on the DPE module. 2 Turn on the NETBuilder II bridge/router. The NETBuilder II system boots from the default boot source a:/primary/boot.29K (the flash memory drive). 3 When the boot operation is complete, press the Return key on the console.
Using the Backup Flash Card 11 2 Format the blank flash memory card in drive B by entering: FORMAT b: Type Y for yes when the formatting confirmation message is displayed.
CHAPTER 2: INSTALLING SOFTWARE AND BOOTING A NETBUILDER II SYSTEM 3 Reboot the NETBuilder II bridge/router by pressing the two outer buttons on the LCD control panel. Attention Reset Press Reset buttons to reboot The system boots from the Enterprise OS software flash memory card in drive A. 4 Make a copy of the flash memory card in drive A by following the steps in the previous procedure. You will need to either obtain an additional flash memory card or reformat the corrupted flash memory card.
CHANGING THE BOOT SOURCE 3 This chapter describes how to change the primary boot source on a bridge/router or tunnel switch. The Enterprise OS software boot files for the main processor module are factory shipped with a:/primary/boot.29k as the default primary boot source for NETBuilder bridge/routers. If you have installed the Enterprise OS software flash memory card into drive A, and you want to keep the default boot source, go to Chapter 4.
CHAPTER 3: CHANGING THE BOOT SOURCE For more information about the Boot Monitor utility, see the Firmware appendix in Reference for Enterprise OS Software. 2 To enter the Boot Monitor utility, enter r: 3 Enter a boot path using: BT :// If you do not enter the value, drive A is used. To boot from drive A, enter: BT a:/primary/boot29.k The system attempts to boot from the specified image file.
Configuring the Primary Boot Source 15 4 At the Enterprise OS prompt, enter: SysconF 2 The Primary Boot Source menu is displayed: Primary Boot Source: 1. Boot Filename: a:/primary/boot.29k 2. Config File Source a:/primary 3. IP Addresses Client:none Subnet Mask:none 4. FTP Login Parameters Enter parameter number or press Q to quit: 5 Enter 1 to select a boot filename. Information similar to the following is displayed: Current Boot Filename: a:/primary/boot.
CHAPTER 3: CHANGING THE BOOT SOURCE
4 CONFIGURING BASIC SETTINGS This chapter describes preliminary tasks for configuring basic bridge/router settings. Before you begin configuring ports and paths (described in Chapter 1 of Using Enterprise OS Software), complete the following tasks: ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ ■ Log on to the system. Familiarize yourself with the user interface. Learn how to get help. Set up IP routing. Store configuration parameter values. Obtain Network Manager privileges. Change the Network Manager password.
CHAPTER 4: CONFIGURING BASIC SETTINGS 3 Log on as root: root 4 Press the Return key. Pressing the Return key when prompted for the password enters a null string, which is the default local password. Later in this chapter, you will be instructed on how to change the password. The bridge/router system prompt is displayed: Enterprise OS # You are now ready to begin entering software commands. Setting Up IP Routing You must set up the port that accesses the server for IP routing.
Learning About the User Interfaces Accessing the User Interface 19 To access the user interface or to modify the configuration of the bridge/router or tunnel switch, use one of the following methods: ■ Access the bridge/router commands locally through the console port. ■ Establish an HTTP session with the bridge/router using the Web Link application. ■ Establish a Telnet session with the bridge/router using security passwords.
CHAPTER 4: CONFIGURING BASIC SETTINGS 5 Log in as root. Type: root or admin 6 Click the OK button to enter a null string as the password, which is the default local password. The default Web Link page opens in the browser window. Web Link Interface Description The Web Link application window has three frames. All of the frames can be resized by dragging the frame borders using the left mouse button.
Learning About the User Interfaces 21 The Main menu (Level 1) is displayed. Depending on your software package, the number of services in your Main menu may vary. 2 Select the service you want to use. For example, selecting 1 from the Main menu (Level 1) display generates a menu for the SYS Service. 3 Select the parameter you want to configure. For example, if you select the NMPrompt parameter from the SYS Service menu (Level 2) menu, information for that parameter is displayed.
CHAPTER 4: CONFIGURING BASIC SETTINGS The value part of the command specifies how you want the parameter to be set. Values include numerics, strings, or addresses, depending on the parameter. For additional information, see “Syntax for Assigning Values” on page 28. 2 After entering the complete command, press the Return key. The bridge/router software includes online help for commands, services, parameters, and syntax, described in “Getting Help” on page 28.
Learning About the User Interfaces 23 Figure 2 Abbreviated Syntax Commands, parameters, and service names can be entered in abbreviated form. Uppercase denotes the shortest unambiguous abbreviation of a command, service name, or parameter. Command name SETD !1 Parameter name -FDDI IP = DNI Value Additional syntax examples are provided in “Full and Abbreviated Syntax Examples” on page 24. Symbols You may see a variety of symbols shown as part of the command syntax.
CHAPTER 4: CONFIGURING BASIC SETTINGS Table 3 Command Syntax Symbols (continued) Symbol Description hyphen - A letter preceded by a hyphen represents a command option. Also, when you enter a service name as part of the command, you must precede the service name with a hyphen. For example, in the command: SETDefault -BRidge CONTrol = Bridge You must include the hyphen with the service name BRidge when you enter the command. braces { } Enclose a list of values, one of which must be entered.
Learning About the User Interfaces 25 Variations in Command Syntax Each command has its own syntax. When a command is used for configuring parameters, its syntax or values may change according to the parameter and service. For example, the SETDefault command sets the NetMapTime parameter in the SYS Service and the MaxAge parameter in the STP Service.
CHAPTER 4: CONFIGURING BASIC SETTINGS Software. For more information about the CurrentPorts parameter, see Reference for Enterprise OS Software. The syntax convention for ports, virtual ports, and group ports is: ! For a port, is a variable ID number, for example, !1. For a virtual port or group port, is the letter V followed by a variable ID number, for example, !V1. When you create a virtual port or group port, it functions in the same way as a port.
Learning About the User Interfaces ! 27 Repeats the most recent command that starts with the variable .
CHAPTER 4: CONFIGURING BASIC SETTINGS Syntax for Assigning Values Most parameters must be assigned a value of a particular type. Table 4 shows the possible types. Table 4 Parameter Value Types Type Meaning Example Numbers Represent the numerical value of a parameter. 15, 1024 Names Usually represent either system-defined parameter or parameter values (written as param-name or value) or user-defined macros or files (written as macroname or filename).
Learning About the User Interfaces 29 example, to include an apostrophe in string text, enter a backslash followed by an apostrophe (\'). To include a backslash (\) in string text, enter two backslashes (\\). The first backslash prevents the bridge/router from treating the second as a special character. When specifying AppleTalk zone strings, you can use the extended AppleTalk ASCII character set. For more information, see Using Enterprise OS Software.
CHAPTER 4: CONFIGURING BASIC SETTINGS The syntax variation for non-ISDN interfaces applies to local area network (LAN) and data terminal equipment (DTE) interfaces. Enterprise OS software menus and help strings do not display the syntax variation for ISDN interfaces. The variation in syntax is caused partially by the different path-numbering convention used for ISDN. For information, see Using Enterprise OS Software.
Learning About the User Interfaces 31 Frame Relay Requires an address called a Data Link Connection Identifier (DLCI). DLCIs are assigned by the appropriate authority at subscription time. A DLCI follows an at sign (@) and can range from 1 through 1022 decimal. The DLCI identifies a virtual circuit on the Frame Relay network, and is used by the local bridge/router to send a packet to a router on the other end of the circuit.
CHAPTER 4: CONFIGURING BASIC SETTINGS ISDN An ISDN address is a phone number provided by your telecommunications carrier. It can include a dial prefix, country code, area code, and phone number. It can consist of a maximum of 30 characters. If you create a subaddress, you must separate the phone number and the subaddress with a semicolon (;). The subaddress can be composed of a maximum of 20 characters.
Learning About the User Interfaces 33 Table 6 Internet Address Format Class Range of First Address Field Address Format A 0–127 nnn.hhh.hhh.hhh* B 128–191 nnn.nnn.hhh.hhh* C 192–223 nnn.nnn.nnn.hhh* D 224–239 yyy.yyy.yyy† * n represents a digit of the network number; h represents a digit of the host number. † Class D addresses are used for multicast applications as assigned by the Internet Assigned Numbers Authority (IANA).
CHAPTER 4: CONFIGURING BASIC SETTINGS XNS Getting Help Consists of a network address followed by a MAC address. The network address distinguishes between different XNS Ethernet networks. It contains eight hexadecimal digits, and is preceded by an ampersand (&), which is used for identification. Leading zeros can be omitted. The following addresses are the same: &3333%080002001326 &00003333%080002001326 The user interface provides help menus as memory aids.
Obtaining Network Manager Privilege Level 35 modifying it and see the new value, the new value has taken effect immediately. If a command changes only the default value, the new value takes effect only after reboot. In this guide, if the description does not specify when the new value of a parameter takes effect after being enabled or disabled, it is effective immediately after it is set.
CHAPTER 4: CONFIGURING BASIC SETTINGS To change the password, follow these steps: 1 At the Enterprise OS prompt (Enterprise OS #), enter: SysPassWord When a menu is displayed, Select 1, Set Network Manager Privilege Password. 2 Enter the new Network Manager password. Retype it when prompted to do so. You are returned to the SysPassWord menu. 3 Enter 2. 4 Enter the new User password and retype it when prompted to do so.
Assigning Internet Addresses 37 The system location can contain no more than 255 characters. The default value is “ “ (null string). 3 Specify a string that identifies the contact person managing the bridge/router or tunnel switch, using: SETDefault -SYS SysCONtact = “” For example, to specify John Smith as the system contact and a number to reach him, enter: SETDefault -SYS SysCONtact = “John Smith (408) 555-1111” The system contact string can contain no more than 255 characters.
CHAPTER 4: CONFIGURING BASIC SETTINGS The following example illustrates how to assign an Internet address to a bridge. Example Figure 3 shows a configuration in which you need to assign an Internet address to a bridge. Hosts A and B are two hosts belonging to the same IP network, network 10. The IP host on Network A has an Internet address 10.0.0.1, and the one on Network B has an Internet address 10.0.0.2. The bridge forwards packets between these segments.
Assigning Internet Addresses 39 Figure 4 Assigning an IP Address to a bridge/router Port Network B Network A Assign an IP address to Port 2 so that the host can access the bridge/router via Telnet Assign an IP address to Port 1 so that the bridge/router can boot from the TFTP server OSI host 192.1.3.2 Host 192.1.5.4 Bridge/Router 192.1.5.1 Port 1 Port 2 192.1.3.1 OSI host TFTP For additional information on Internet addresses and subnet masks, see Using Enterprise OS Software.
CHAPTER 4: CONFIGURING BASIC SETTINGS If you do not plan to be connected to the Internet, you can assign network addresses on your own. However, if you plan on accessing the Internet in the future, you may want to apply for an Internet network address so you will not have to change network addresses when you make the connection. After obtaining your Internet address, see “Assigning Internet Addresses to a Bridge” on page 37 or to “Assigning Internet Addresses to a Router” on page 38.
NETBuilder Security 41 For example: ADD -SNMP COMmunity “public” TRiv RO AL1 4 Create a new manager with read/write access to the bridge/router or tunnel switch. For security reasons, limit the number of network management stations. For example: ADD -SNMP MANager “private” 129.213.224.1 255.255.
CHAPTER 4: CONFIGURING BASIC SETTINGS
A TECHNICAL SUPPORT 3Com provides easy access to technical support information through a variety of services. This appendix describes these services. Information contained in this appendix is correct at time of publication. For the most recent information, 3Com recommends that you access the 3Com Corporation World Wide Web site.
APPENDIX A: TECHNICAL SUPPORT You do not need a user name and password with Web browser software such as Netscape Navigator and Internet Explorer. 3Com Bulletin Board Service The 3Com BBS contains patches, software, and drivers for 3Com products. This service is available through analog modem or digital modem (ISDN) 24 hours a day, 7 days a week. Access by Analog Modem To reach the service by modem, set your modem to 8 data bits, no parity, and 1 stop bit.
Support from 3Com Support from 3Com 45 If you are unable to obtain assistance from the 3Com online technical resources or from your network supplier, 3Com offers technical telephone support services. To find out more about your support options, please the 3Com technical telephone support phone number at the location nearest you.
APPENDIX A: TECHNICAL SUPPORT Returning Products for Repair Before you send a product directly to 3Com for repair, you must first obtain an authorization number. Products sent to 3Com without authorization numbers will be returned to the sender unopened, at the sender’s expense.
INDEX Numerics 3Com bulletin board service (3Com BBS) 44 3Com URL 43 3ComFacts 44 A abbreviated command syntax 22, 24 address formats media AppleTalk 32 Frame Relay 31 ISDN 32 MAC 30 SMDS 31 X.
paths naming restrictions 29 using instance identifiers 29 ports naming restrictions 29 syntax conventions 26 using instance identifiers 29 privilege level changing 35 changing SNMP access to files 40 obtaining Network Manager 35 to access commands and parameters 27 Q question mark(?) help command 34 R ReBoot command 15 RemoteManager parameter 41 repeating displayed commands 26 restrictions, naming 29 returning products for repair 46 root login 17 S security 41 service names, entering 25 services, se
3Com Corporation LIMITED WARRANTY HARDWARE 3Com warrants its hardware products to be free from defects in workmanship and materials, under normal use and service, for the following lengths of time from the date of purchase from 3Com or its authorized reseller: Network Interface Cards Lifetime Other hardware products *unless otherwise specified above 1 year* Spare parts and spares kits 90 days If a product does not operate as warranted above during the applicable warranty period, 3Com shall, at its op
USE, PERFORMANCE, FAILURE, OR INTERRUPTION OF ITS PRODUCTS, EVEN IF 3COM OR ITS AUTHORIZED RESELLER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, AND LIMITS ITS LIABILITY TO REPAIR, REPLACEMENT, OR REFUND OF THE PURCHASE PRICE PAID, AT 3COM’S OPTION. THIS DISCLAIMER OF LIABILITY FOR DAMAGES WILL NOT BE AFFECTED IF ANY REMEDY PROVIDED HEREIN SHALL FAIL OF ITS ESSENTIAL PURPOSE.