® http://www.3com.com/ Part No.
3Com Corporation 5400 Bayfront Plaza Santa Clara, California 95052-8145 Copyright © 1999, 3Com Technologies. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without written permission from 3Com Technologies.
CONTENTS ABOUT THIS GUIDE Terminology 11 Conventions 12 Related Documentation 13 Year 2000 Compliance 13 Product Registration 13 1 SWITCH 9100 OVERVIEW About the Switch 9100 15 Summary of Features 15 Port Connections 16 Full-duplex 17 Load Sharing 17 Switch Operation 17 Virtual LANs (VLANs) 17 Spanning Tree Protocol (STP) 18 Quality of Service (QoS) 18 Network Configuration Example 18 Switch 9100 Front View 20 Ports 20 LEDs 21 Switch 9100 Rear View 22 Power Sockets 23 Serial Number 23 MAC Address 23 Conso
2 INSTALLATION AND SETUP Determining the Switch 9100 Location 25 Configuration Rules for Ethernet 26 Installing the Switch 9100 26 Rack Mounting 26 Free-Standing 27 Stacking the Switch and Other Devices 28 Connecting Equipment to the Console Port 28 Powering-up the Switch 30 Checking the Installation 30 Power On Self-Test (POST) 30 Logging on for the First Time 31 3 ACCESSING THE SWITCH Understanding the Command Syntax 34 Syntax Helper 34 Command Completion with Syntax Helper Abbreviated Syntax 35 Comman
Connecting to Another Host Using Telnet 46 Configuring Switch IP Parameters 46 Using a BOOTP Server 46 Manually Configuring the IP Settings 47 Disconnecting a Telnet Session 49 Disabling Telnet Access 49 IP Host Configuration Commands 50 Using the Web Interface 50 Disabling Web Access 51 Using SNMP 51 Accessing Switch Agents 51 Supported MIBs 51 Configuring SNMP Settings 52 Displaying SNMP Settings 53 Resetting and Disabling SNMP 54 Checking Basic Connectivity 54 Configuring Switch 9100 Port Speed and Duple
Spanning Switches with Port-Based VLANs 67 Tagged VLANs 69 Uses of Tagged VLANs 70 Assigning a VLAN Tag 70 Mixing Port-Based and Tagged VLANs 72 Protocol-Based VLANs 72 Predefined Protocol Filters 73 Defining Protocol Filters 74 Deleting a Protocol Filter 75 Precedence of Tagged Packets Over Protocol Filters 75 VLAN Names 75 Default VLAN 75 Configuring VLANs on the Switch 76 VLAN Configuration Examples 77 Displaying VLAN Settings 78 Deleting VLANs 79 5 FORWARDING DATABASE (FDB) Overview of the FDB 81 FDB
Configuring STP on the Switch 94 STP Configuration Example 96 Displaying STP Settings 96 Disabling and Resetting STP 97 7 QUALITY OF SERVICE (QOS) Overview of Quality of Service 99 Building Blocks 99 QoS Profiles 100 Modifying a QoS Profile 101 The Blackhole QoS Profile 102 Traffic Groupings and Creating a QoS Policy 102 MAC-Based Traffic Groupings 103 Permanent MAC addresses 103 Dynamic MAC Addresses 103 Blackhole 104 Broadcast/Unknown Rate Limiting 104 Verifying MAC-Based QoS Settings 104 Packet Groupin
Real-Time Display 117 Remote Logging 117 Logging Commands 118 RMON 119 About RMON 119 About the RMON Groups 120 Statistics 120 History 120 Alarms 120 Events 121 Benefits of RMON 121 Improving Efficiency 121 Allowing Proactive Management Reducing the Traffic Load 121 RMON and the Switch 122 RMON Features of the Switch 122 Configuring RMON 123 Event Actions 123 9 121 USING THE WEB INTERFACE Enabling and Disabling Web Access 125 Setting Up Your Browser 126 Accessing the Web Interface 126 Navigating the Web
Upgrading BootROM 133 Accessing the BootROM menu Boot Option Commands 135 A 133 SAFETY INFORMATION Important Safety Information 138 Lithium Battery 140 L’information de Sécurité Importante 141 Batterie au lithium 143 Wichtige Sicherheitsinformationen 144 Europe 144 Lithiumbatterie 145 B TECHNICAL SPECIFICATIONS C TROUBLESHOOTING Port Configuration VLANs 153 STP 155 D 152 TECHNICAL SUPPORT Online Technical Services 157 World Wide Web Site 157 3Com Knowledgebase Web Services 157 3Com FTP Site 158 3C
GLOSSARY INDEX INDEX OF COMMANDS 3COM CORPORATION LIMITED WARRANTY EMC STATEMENTS
ABOUT THIS GUIDE This guide describes the required information to install and configure the SuperStack ® II Switch 9100 (3C17705). This guide is intended for use by network administrators who are responsible for installing and setting up network equipment.
ABOUT THIS GUIDE Conventions Table 1 and Table 2 list conventions that are used throughout this guide.
Related Documentation Related Documentation 13 The Switch 9100 documentation set includes the following documents. To order additional copies, contact your sales representative. ■ SuperStack II Switch 9100 Quick Reference Guide This guide describes the commands used to configure your SuperStack II Switch 9100. ■ SuperStack II Switch 9100 Quick Installation Guide This guide describes how to install your SuperStack II Switch 9100 system.
ABOUT THIS GUIDE
1 SWITCH 9100 OVERVIEW This chapter describes the following: About the Switch 9100 ■ Switch 9100 features ■ How to use the Switch 9100 in your network configuration ■ Switch 9100 front view ■ Switch 9100 rear view ■ Factory default settings Network managers are currently faced with the challenge of creating networks that can provide high-speed and high performance to serve the needs of today’s network users.
CHAPTER 1: SWITCH 9100 OVERVIEW ■ Controls traffic (including broadcasts) ■ Provides extra security ■ Protocol-sensitive filtering for VLANs ■ Responds to 802.3x flow-control messages ■ Autonegotiation to IEEE 802.3z for Gigabit Ethernet ■ Load sharing on multiple ports ■ Spanning Tree Protocol (STP) (IEEE 802.
Summary of Features 17 100/1000BASE-TX ports are configured as MDIX (crossover). A crossover cable will typically be needed to connect these ports to another switch. Full-duplex Load Sharing The Switch 9100 provides full-duplex support for all ports. Full-duplex allows frames to be transmitted and received simultaneously and, in effect, doubles the bandwidth available on a link. All ports that are configured for (or negotiate to) 1000Mbps operate at full-duplex.
CHAPTER 1: SWITCH 9100 OVERVIEW Spanning Tree Protocol (STP) The Switch 9100 supports the IEEE 802.1d Spanning Tree Protocol (STP), which is a bridge-based mechanism for providing fault tolerance on networks. STP allows you to implement parallel paths for network traffic, and ensure the following: ■ Redundant paths are disabled when the main path is operational. ■ Redundant path is enabled if the main traffic paths fail. For more information on STP, refer to Chapter 6.
Network Configuration Example 19 Switch 3300 Switch 3300 Switch 3300 Switch 3300 Switch 9100 To Backbone Key Fast Ethernet Server Gigabit Ethernet Workstation 91_001 Figure 1 Switch 9100 used in a backbone configuration The Switch 3300 on each floor has a 1000Mbps full-duplex link to the Switch 9100. Two servers on one floor of the building are connected to the Switch 9100 by way of two Gigabit Ethernet links.
CHAPTER 1: SWITCH 9100 OVERVIEW In addition to providing a Gigabit backbone between Fast Ethernet workgroups, Gigabit Ethernet equipped file servers and services may be directly attached to the Switch 9100 providing improved performance to the Fast Ethernet desktop. Switch 9100 Front View Figure 2 shows the Switch 9100 front view.
Switch 9100 Front View 21 WARNHINWEIS: RJ-45 Ports. RJ-45-Anschlüsse. Dies sind abgeschirmte RJ-45-Datenbuchsen. Sie können nicht als Telefonanschlußbuchsen verwendet werden. An diesen Buchsen dürfen nur RJ-45-Datenstecker angeschlossen werden. Diese Datenstecker können entweder mit abgeschirmten oder unabgeschirmten Datenkabeln mit abgeschirmten oder unabgeschirmten Klinkensteckern verbunden werden. The Switch 9100 has six autosensing 100/1000BASE-TX ports using standard RJ-45 connectors.
CHAPTER 1: SWITCH 9100 OVERVIEW Table 4 Switch 9100 LEDs (continued) LED Color Indicates Green Link is present; port is enabled. Yellow Frames are being transmitted/received on this port. Green flashing Link is present; port is disabled. Off Link is not present. Green 1000BASE-T operation. Off 100BASE-TX operation. Green Either or both LEDs green indicates the Switch 9100 is powered up. Yellow A yellow power LED indicates a power, overheat, or fan failure on the corresponding PSU.
Factory Defaults 23 The rear panel has the following features: Power Sockets The Switch 9100 has two, fully redundant, load-sharing power supplies. Both automatically adjust to the supply voltage. The power supplies operate down to 90 V. The fuse is suitable for both 110 V AC and 220–240 V AC operation. Serial Number The serial number uniquely identifies this unit. You will need this serial number for fault-reporting purposes.
CHAPTER 1: SWITCH 9100 OVERVIEW Table 5 Switch 9100 Factory Defaults (continued) Item Default Setting Spanning Tree Protocol Disabled for the switch; enabled for each port in the STPD 802.1p priority Recognition enabled 802.3x flow control Enabled on Gigabit Ethernet ports 802.
2 INSTALLATION AND SETUP This chapter describes the following: ■ How to decide where to install the Switch 9100 ■ Ethernet configuration rules ■ How to install the switch in a rack or free-standing ■ How to connect equipment to the console port ■ How to check the installation using the Power On Self-Test (POST) WARNING: Safety Information.
CHAPTER 2: INSTALLATION AND SETUP CAUTION: When using a rack mounting system, the switch must be mounted on a shelf or runners. The rack mounting brackets alone are not sufficient to support the weight of the switch. The rack mounting brackets are provided to ensure stability across the horizontal plane. If you stack switches, you must ensure that the shelf or runners are strong enough to hold the combined weight. Ensure that the ventilation holes are not obstructed.
Installing the Switch 9100 27 To install the mounting brackets on the switch, follow these steps: 1 Place the switch the right way up on a hard flat surface, with the front facing toward you. 2 Remove the existing screws from the sides of the chassis. 3 Locate a mounting bracket over the mounting holes on one side of the unit. 4 Insert the four screws and fully tighten with a suitable screwdriver, as shown in Figure 4.
CHAPTER 2: INSTALLATION AND SETUP Stacking the Switch and Other Devices Up to four units can be placed on top of one another. If mixing SuperStack II devices, the smaller units must be positioned at the top using rubber pads. This section relates only to physically placing the devices on top of each other. The switch cannot be used to form a logical stack. It cannot be linked to other switches using special expansion cables to form a larger switch.
Connecting Equipment to the Console Port 29 Table 6 Console Connector Pinouts (continued) Function Pin Number Direction GND (ground) 5 - DSR (data set ready) 6 In RTS (request to send) 7 Out CTS (clear to send 8 In Figure 5 shows the pin-outs for a 9-pin to RS-232 25-pin null modem cable.
CHAPTER 2: INSTALLATION AND SETUP Figure 6 shows the pin-outs for a 9-pin to 9-pin PC-AT serial null modem cable. Switch 9100 PC-AT Serial Port Cable connector: 9-pin female Cable connector: 9-pin female Screen Shell 4 DTR 3 TxD 2 RxD 8 CTS Ground 5 6 DSR 7 RTS 1 DCD Shell Screen 1 DCD 2 RxD 3 TxD 4 DTR 5 Ground 6 DSR 7 RTS 8 CTS 91_ser2 Figure 6 PC-AT serial cable pin-outs Powering-up the Switch The Switch 9100 contains two power supplies.
Logging on for the First Time 31 If the switch passes the POST, the MGMT LED stops blinking and remains green. If the switch fails the POST, the MGMT LED shows a solid yellow light. Logging on for the First Time After the switch has completed the POST, it is operational. Once operational, you can log on to the switch and configure an IP address for the default VLAN (named default).
CHAPTER 2: INSTALLATION AND SETUP
3 ACCESSING THE SWITCH This chapter provides the following required information to begin managing the Switch 9100: ■ Understanding the command syntax ■ Line-editing commands ■ Command history substitution ■ Configuring the switch for management ■ Switch management methods ■ Configuring SNMP ■ Checking basic connectivity ■ Enabling and disabling individual ports ■ Configuring the port speed (100/1000BASE-TX ports only) ■ Configuring half- or full-duplex mode ■ Creating load-sharing gro
CHAPTER 3: ACCESSING THE SWITCH Understanding the Command Syntax This section describes the steps to take when entering a command. Refer to the sections that follow for detailed information on using the command-line interface. To use the command-line interface (CLI), follow these steps: 1 When entering a command at the prompt, ensure that you have the appropriate privilege level. Most configuration commands require you to have the administrator privilege level. 2 Enter the command name.
Understanding the Command Syntax Abbreviated Syntax 35 Abbreviated syntax is the shortest, most unambiguous, allowable abbreviation of a command or parameter. Typically, this is the first three letters of the command. When using abbreviated syntax, you must enter enough characters to make the command unambiguous, and distinguishable to the switch. Command Shortcuts All named components of the switch configuration must have a unique name. Components are named using the create command.
CHAPTER 3: ACCESSING THE SWITCH Symbols You may see a variety of symbols shown as part of the command syntax. These symbols explain how to enter the command, and you do not type them as part of the command itself. Table 7 summarizes command syntax symbols. Table 7 Command Syntax Symbols Symbol Description angle brackets < > Enclose a variable or value. You must specify the variable or value.
Line-Editing Keys Line-Editing Keys 37 Table 8 describes the line-editing keys available using the CLI. Table 8 Line-Editing Keys Key(s) Description Backspace Deletes character to the left of cursor and shifts the remainder of line to left. Delete or [Ctrl] + D Deletes character under cursor and shifts the remainder of line to left. [Ctrl] + K Deletes characters from under cursor to the end of the line. Insert Toggles on and off. When toggled on, inserts text and shifts previous text to right.
CHAPTER 3: ACCESSING THE SWITCH Table 9 Common Commands (continued) Command Description create vlan Creates a VLAN. config account {encrypted} {} Configures a user account password. Passwords must have a minimum of four characters and can have a maximum of 12 characters. User names and passwords are case-sensitive. config banner Configures the banner string. You can enter up to 24 rows of 80-column text that is displayed before the login prompt of each session.
Common Commands Table 9 Common Commands (continued) Command Description enable idletimeout Enables a timer that disconnects all sessions (both Telnet and console) after 20 minutes of inactivity. The default setting is disabled. enable telnet {access-profile | none} {port } Enables Telnet access to the switch. By default, Telnet is enabled with no access profile, and uses TCP port 23. The none option removes any previously configured access profile assignment.
CHAPTER 3: ACCESSING THE SWITCH Table 9 Common Commands (continued) Command Description unconfig switch {all} Resets all switch parameters (with the exception of defined user accounts, and date and time information) to the factory defaults. If you specify the keyword all, the user account information is reset as well. show banner Displays the user-configured banner.
Configuring Management Access 41 If an asterisk (*) appears in front of the command-line prompt, it indicates that you have outstanding configuration changes that have not been saved. For example: *3C17705:19# For more information on saving configuration changes, refer to Chapter 10. Default Accounts By default, the switch is configured with two accounts, as shown in Table 10. Table 10 Default Accounts Account Name Access Level admin This user can access and change all manageable parameters.
CHAPTER 3: ACCESSING THE SWITCH To add a password to the default user account, follow these steps: 1 Log in to the switch using the name admin. 2 At the password prompt, press [Return], or enter the password that you have configured for the admin account. 3 Add a default user password by typing the following: config account user 4 Enter the new password at the prompt. 5 Re-enter the new password at the prompt.
Methods of Managing the Switch 9100 43 Deleting an Account To delete an account, you must have administrator privileges. Use the following command to delete an account: delete account The account name admin cannot be deleted. Methods of Managing the Switch 9100 You can manage the switch using the following methods: ■ Access the CLI by connecting a terminal (or workstation with terminal-emulation software) to the console port.
CHAPTER 3: ACCESSING THE SWITCH The most common applications that use access profiles allow you to remotely manage the switch across the network, for example: Creating an Access Profile ■ SNMP read access ■ SNMP read and write access ■ Telnet ■ Web access Access profiles are created to specifically permit or deny users access to an application. Access is restricted by assigning an access profile to the service that is being used for remote access.
Using Access Profiles 45 The subnet mask specified in the access profile command is interpreted as a reverse mask. A reverse mask indicates the bits that are significant in the IP address. In other words, a reverse mask specifies the part of the address that must match the IP address to which the profile is applied. If you configure an IP address that is an exact match that is specifically denied or permitted, use a mask of /32 (for example, 141.251.24.28/32).
CHAPTER 3: ACCESSING THE SWITCH To view the Telnet configuration, type: show management Using Telnet Any workstation with a Telnet facility should be able to communicate with the switch over a TCP/IP network. Up to eight active Telnet sessions can access the switch concurrently. If idle timeouts are enabled, the Telnet connection will time out after 20 minutes of inactivity. If a connection to a Telnet session is lost inadvertently, the switch terminates the session within two hours.
Using Telnet ■ 47 Subnet address mask (optional) The switch MAC address is found on the rear label of the switch. Once this is done, the IP address and subnetwork mask for the switch will be downloaded automatically. You can then start managing the switch without further configuration. You can enable BOOTP on a per-VLAN basis by using the following command: enable bootp vlan [ | all] By default, BOOTP is enabled on the default VLAN.
CHAPTER 3: ACCESSING THE SWITCH To manually configure the IP settings, perform the following steps: 1 Connect a terminal or workstation running terminal-emulation software to the console port. 2 At your terminal, press [Return] one or more times until you see the login prompt. 3 At the login prompt, enter your user name and password. Note that they are both case-sensitive. Ensure that you have entered a user name and password with administrator privileges.
Using Telnet 49 For example: config iproute add default 123.45.67.1 7 Save your configuration changes so that they will be in effect after the next switch reboot, by typing save For more information on saving configuration changes, refer to Chapter 10. 8 When you are finished using the facility, log out of the switch by typing logout or quit Disconnecting a Telnet Session An administrator-level account can disconnect a management session that has been established by way of a Telnet connection.
CHAPTER 3: ACCESSING THE SWITCH IP Host Configuration Commands Table 12 describes the commands that are used to configure IP settings on the switch. Table 12 IP Host Configuration Commands Command Description config iparp add Adds a permanent entry to the Address Resolution Protocol (ARP) table. Specify the IP address and MAC address of the entry. config iparp delete Deletes an entry from the ARP table. Specify the IP address of the entry.
Using SNMP 51 The default home page of the switch can be accessed using the following command: http:// When you access the home page of the switch, you are presented with the Logon screen. For more information on using the Web Interface, refer to Chapter 9. Disabling Web Access By default, Web access is enabled on the switch.
CHAPTER 3: ACCESSING THE SWITCH Configuring SNMP Settings The following SNMP parameters can be configured on the switch: ■ Authorized trap receivers — An authorized trap receiver can be one or more network management stations on your network. The switch sends SNMP traps to all trap receivers. You can have a maximum of six trap receivers configured for each switch. Entries in this list can be created, modified, and deleted using the RMON2 trapDestTable MIB variable, as described in RFC 2021.
Using SNMP Table 13 SNMP Configuration Commands (continued) Command Description config snmp access-profile [readonly | readwrite] { | none} Applies an access profile for SNMP access. You can create different access profiles for readonly and readwrite access to the switch. The none option removes any previously configured access profile assignment. config snmp add trapreceiver community Adds the IP address of a specified trap receiver.
CHAPTER 3: ACCESSING THE SWITCH Resetting and Disabling SNMP ■ Login statistics ■ Access profile assignments To reset and disable SNMP settings, use the commands in Table 14. Table 14 SNMP Reset and Disable Commands Command Description disable snmp access Disables SNMP on the switch. Disabling SNMP access does not affect the SNMP configuration (for example, community strings). disable snmp traps Prevents SNMP traps from being sent from the switch.
Enabling and Disabling Switch 9100 Ports Enabling and Disabling Switch 9100 Ports 55 By default, all ports are enabled. To enable or disable one or more ports, use the following command: [enable | disable] ports For example, to disable ports 1, 3, and 5 through 7 on the Switch 9100, enter the following: disable ports 1,3,5-7 Even though a port is disabled, the link remains enabled for diagnostic purposes.
CHAPTER 3: ACCESSING THE SWITCH Flow Control Switch 9100 Port Commands Flow control is supported on Gigabit Ethernet ports. It is enabled or disabled as part of autonegotiation. If autonegotiation is set to off, flow control is disabled. When autonegotiation is turned on, flow control is enabled. Table 16 describes the Switch 9100 port commands. Table 16 Switch 9100 Port Commands Command Description enable learning ports Enables MAC address learning on one or more ports.
Switch 9100 Port Commands Table 16 Switch 9100 Port Commands (continued) Command Description disable learning ports Disables MAC address learning on one or more ports for security purposes. If MAC address learning is disabled, only broadcast traffic and packets destined to a permanent MAC address matching that port number, are forwarded. The default setting is enabled. disable ports Disables a port. Even when disabled, the link is available for diagnostic purposes.
CHAPTER 3: ACCESSING THE SWITCH Load Sharing on the Switch 9100 Load sharing with Switch 9100 devices allows you to increase bandwidth and resilience between switches by using a group of ports to carry traffic in parallel between switches. The sharing algorithm allows the switch to use multiple ports as a single logical port. For example, VLANs see the load-sharing group as a single logical port. The algorithm also typically guarantees packet sequencing between clients.
Load Sharing on the Switch 9100 ■ ■ 59 All other packets — Uses the source and destination MAC address. Round-robin — When the switch receives a stream of packets, it forwards one packet out of each physical port in the load-sharing group using a round-robin scheme. Using the round-robin algorithm, packet ordering is not guaranteed. If you do not explicitly select an algorithm, the port-based scheme is used.
CHAPTER 3: ACCESSING THE SWITCH It is recommended that you configure the same duplex and speed settings for all ports in a load-sharing group. Do not disable a port that is part of a load-sharing group. Disabling the port prevents it from forwarding traffic, but still allows the link to initialize. As a result, a partner switch does receive a valid indication that the port is not in a forwarding state, and the partner switch will continue to forward packets.
Switch 9100 Port-Mirroring Port-Mirroring Commands 61 Switch 9100 port-mirroring commands are described in Table 17. Table 17 Switch 9100 Port-Mirroring Configuration Commands Command Description enable mirroring to Dedicates a port to be the mirror output port. config mirroring add [mac | vlan | port | vlan port ] Adds a single mirroring filter definition. Up to eight mirroring definitions can be added.
CHAPTER 3: ACCESSING THE SWITCH
VIRTUAL LANS (VLANS) 4 Setting up Virtual Local Area Networks (VLANs) on the switch eases many time-consuming tasks of network administration while increasing efficiency in network operations. This chapter describes the concept of VLANs and explains how to implement VLANs on the switch. Overview of Virtual LANs Benefits The term “VLAN” is used to refer to a collection of devices that communicate as if they were on the same physical LAN.
CHAPTER 4: VIRTUAL LANS (VLANS) ■ VLANs ease the change and movement of devices. With traditional networks, network administrators spend much of their time dealing with moves and changes. If users move to a different subnetwork, the addresses of each endstation must be updated manually. For example, with a VLAN, if an endstation in VLAN Marketing is moved to a port in another part of the network, and retains its original subnet membership; you must only specify that the new port is in VLAN Marketing.
IGMP Overview 65 the switch is configured to perform IGMP snooping and there is no other reliable querier on the network. IGMP configuration commands are described in Table 18. Table 18 IGMP Configuration Commands Command Description enable igmp {vlan } Enables IGMP. If no VLAN is specified, IGMP is enabled on all interfaces. The default setting is enabled. enable igmp snooping {forward-mcrouter-only} Enables IGMP snooping on the switch.
CHAPTER 4: VIRTUAL LANS (VLANS) Table 18 IGMP Configuration Commands (continued) Command Description config igmp snooping timer Configures the IGMP snooping timers. Timers should be set to approximately 2.5 times the router query interval in use on the network. Specify the following: ■ ■ router_timeout — The interval, in seconds, between the last time the router was discovered and the current time. The range is 10 to 2,147,483,647 seconds (68 years).
Types of VLANs 67 For example, in Figure 7, the VLANs are configured as follows: ■ Ports 1 and 3 are part of VLAN Sales ■ Ports 2 and 5 are part of VLAN Marketing ■ Ports 4 and 6 are part of VLAN Finance Marketing 1 2 3 Finance 4 5 6 7 8 Sales 91_00 Figure 7 Example of a port-based VLAN on the Switch 9100 Even though they are physically connected to the same switch, in order for the members of the different VLANs to communicate, the traffic must go through an IP router.
CHAPTER 4: VIRTUAL LANS (VLANS) Figure 8 illustrates a single VLAN that spans two Switch 9100 devices. All ports on both switches belong to VLAN Sales. The two switches are connected using port 1 on Switch 1, and port 6 on Switch 2. Sales Switch 1 Switch 2 91_004 Figure 8 Single port-based VLAN spanning two switches To create multiple VLANs that span two switches in a port-based VLAN, a port on Switch 1 must be cabled to a port on Switch 2 for each VLAN you want to have span across the switches.
Types of VLANs Accounting 69 Engineering Switch 1 Switch 2 91_005 Figure 9 Two port-based VLANs spanning two Switch 9100 devices VLAN Accounting spans Switch 1 and Switch 2 by way of a connection between Switch 1, port 1 and Switch 2, port 3. VLAN Engineering spans Switch 1 and Switch 2 by way of a connection between Switch 1, port 5, and Switch 2, port 6. Using the configuration described above, you can create multiple VLANs that span multiple switches, in a daisy-chained fashion.
CHAPTER 4: VIRTUAL LANS (VLANS) Uses of Tagged VLANs Tagging is most commonly used to allow VLANs to span switches. The switch-to-switch connections are typically called trunks. Using tags, multiple VLANs can span multiple switches using one or more trunks. In a port-based VLAN, each VLAN requires its own pair of trunk ports, as shown in Figure 9. Using tags, multiple VLANs can span two switches with a single trunk.
Types of VLANs 1 2 S M 3 4 S 5 6 7 8 Switch 1 M = Marketing S = Sales 802.1Q Tagged server = Tagged port M S 1 2 M 3 4 5 6 7 8 Switch 2 91_006 Figure 10 Physical diagram of tagged and untagged traffic Figure 11 shows a logical diagram of the same network.
CHAPTER 4: VIRTUAL LANS (VLANS) In Figure 10 and Figure 11: ■ The trunk port on each switch carries traffic for both VLAN Marketing and VLAN Sales. ■ The trunk port on each switch is tagged. ■ The server connected to port 1 on Switch 1 has a NIC that supports 802.1Q tagging. ■ The server connected to port 1 on Switch 1 is a member of both VLAN Marketing and VLAN Sales. ■ All other stations use untagged traffic.
Types of VLANs 192.207.35.1 192.207.36.1 My Company 192.207.35.0 Finance 1 192.207.36.
CHAPTER 4: VIRTUAL LANS (VLANS) Defining Protocol Filters If necessary, you can define a customized protocol filter based on EtherType, Logical Link Control (LLC), and/or Subnetwork Access Protocol (SNAP). Up to six protocols may be part of a protocol filter. To define a protocol filter, do the following: 1 Create a protocol using the following command: create protocol For example: create protocol fred The protocol name can have a maximum of 31 characters.
VLAN Names 75 For more information on SNAP for Ethernet protocol types, see TR 11802-5:1997 (ISO/IEC) [ANSI/IEEE std. 802.1H, 1997 Edition]. Deleting a Protocol Filter If a protocol filter is deleted from a VLAN, the VLAN is assigned a protocol filter of none. You can continue to configure the VLAN. However, no traffic is forwarded to the VLAN until a protocol is assigned to it.
CHAPTER 4: VIRTUAL LANS (VLANS) Configuring VLANs on the Switch This section describes the commands associated with setting up VLANs on the switch. Configuring a VLAN involves the following steps: 1 Create and name the VLAN. 2 Assign an IP address and mask (if applicable) to the VLAN, if needed. Each IP address and mask assigned to a VLAN must represent a unique IP subnet. You cannot configure the same IP subnet on different VLANs. 3 Assign a VLANid, if any ports in this VLAN will use a tag.
Configuring VLANs on the Switch 77 Table 19 VLAN Configuration Commands (continued) Command Description config vlan add port {tagged | untagged} Adds one or more ports to a VLAN. You can specify tagged port(s), untagged port(s). By default, ports are untagged. config vlan delete port {tagged | untagged} Deletes one or more ports from a VLAN. config vlan protocol [ | any] Configures a protocol-based VLAN.
CHAPTER 4: VIRTUAL LANS (VLANS) The following Switch 9100 example creates a VLAN named sales, with the VLANid 120. The VLAN uses both tagged and untagged ports. Ports 1 through 3 are tagged, and ports 4 and 7 are untagged. Note that when not explicitly specified, ports are added as untagged. create config config config vlan sales sales tag 120 sales add port 1-3 tagged sales add port 4,7 The following Switch 9100 example creates a protocol-based VLAN named ipsales.
Deleting VLANs ■ Ports assigned ■ Tagged/untagged status for each port ■ How the ports were added to the VLAN (manually or by GVRP) 79 To display protocol information, use the following command: show protocol {} This show command displays protocol information, including the following: Deleting VLANs ■ Protocol name ■ List of protocol fields ■ VLANs that use the protocol To delete a VLAN, or to return VLAN settings to their defaults, use the commands listed in Table 20.
CHAPTER 4: VIRTUAL LANS (VLANS)
5 FORWARDING DATABASE (FDB) This chapter describes the contents of the forwarding database (FDB), how the FDB works, and how to configure the FDB. Overview of the FDB FDB Contents FDB Entry Types The switch maintains a database of all media access control (MAC) addresses received on all of its ports. It uses the information in this database to decide whether a frame should be forwarded or filtered. The database holds up to a maximum of 128K entries.
CHAPTER 5: FORWARDING DATABASE (FDB) way of the command-line interface are stored as permanent. The switch can support a maximum of 64 permanent entries. Once created, permanent entries stay the same as when they were created. For example. the permanent entry store is not updated when any of the following take place: ■ How FDB Entries Get Added Associating a QoS Profile with an FDB Entry ■ A VLAN is deleted. ■ A VLANid is changed. ■ A port mode is changed (tagged/untagged).
Configuring FDB Entries Configuring FDB Entries To configure entries in the FDB, use the commands listed in Table 21. Table 21 FDB Configuration Commands Command Description create fdbentry vlan [blackhole | | dynamic] {qosprofile } Creates an FDB entry. Specify the following: ■ ■ ■ ■ ■ ■ mac_address — Device MAC address, using colon separated bytes. name — VLAN associated with MAC address. blackhole — Configures the MAC address as a blackhole entry.
CHAPTER 5: FORWARDING DATABASE (FDB) ■ Port number for this device is 4. This example associates the QoS profile qp2 with a dynamic entry that will be learned by the FDB: create fdbentry 00:D0:96:BF:31:50 vlan net34 dynamic qosprofile qp2 This entry has the following characteristics: Displaying FDB Entries ■ MAC address is 00D096BF3150. ■ VLAN name is net34. ■ The entry will be learned dynamically. ■ QoS profile qp2 will be applied when the entry is learned.
Removing FDB Entries Removing FDB Entries 85 You can remove one or more specific entries from the FDB, or you can clear the entire FDB of all entries by using the commands listed in Table 22. Table 22 Removing FDB Entry Commands Command Description delete fdbentry vlan Deletes a permanent FDB entry. clear fdb { | vlan | } Clears dynamic FDB entries that match the filter. When no options are specified, the command clears all FDB entries.
CHAPTER 5: FORWARDING DATABASE (FDB)
6 SPANNING TREE PROTOCOL (STP) Using the Spanning Tree Protocol (STP) functionality of the switch makes your network more fault tolerant. The following sections explain more about STP and the STP features supported by the Switch 9100. STP is a part of the 802.1D bridge specification defined by the IEEE Computer Society. To explain STP in terms used by the 802.1D specification, the Switch 9100 will be referred to as a bridge.
CHAPTER 6: SPANNING TREE PROTOCOL (STP) Figure 13 Network with an illegal topology This configuration is illegal because it creates loops that cause the network to overload. However, STP allows you to use this configuration because STP detects duplicate paths and immediately prevents (or blocks) one of them from forwarding traffic. Figure 14 shows an example of enabling STP on the bridges in the configuration.
Overview of the Spanning Tree Protocol 89 If the link through Bridge C fails, as shown in Figure 15, the STP system reconfigures the network so that traffic from segment 2 flows through Bridge B.
CHAPTER 6: SPANNING TREE PROTOCOL (STP) The Root Bridge generates BPDUs on all ports at a regular interval known as the Hello Time. All other bridges in the network have a Root Port. This is the port that costs the least in getting to the Root Bridge, and it is used for receiving the BPDUs initiated by the Root Bridge.
STP Configurations 91 Care must be taken to ensure that multiple STPD instances within a single switch do not see each other in the same broadcast domain. This could happen if, for example, another external bridge is used to connect VLANs belonging to separate STPDs. If you delete an STPD, the VLANs that were members of that STPD are also deleted. You must remove all VLANs associated with the STP before deleting the STPD.
CHAPTER 6: SPANNING TREE PROTOCOL (STP) Sales, Personnel, Marketing Manufacturing, Engineering, Marketing Switch A Switch Y Switch B Switch Z STPD 1 Switch M STPD 2 Sales, Personnel, Manufacturing, Engineering, Marketing 91_009 Figure 16 Multiple Spanning Tree Domains When the switches in this configuration start up, STP configures each STPD such that there are no active loops in the topology. STP could configure the topology in a number of ways to make it loop-free.
STP Configurations Marketing & Sales 93 Marketing, Sales & Engineering Switch 1 Switch 3 Switch 2 Sales & Engineering 91_010 Figure 17 Tag-based STP configuration The tag-based network in Figure 17 has the following configuration: ■ Switch 1 contains VLAN Marketing and VLAN Sales. ■ Switch 2 contains VLAN Engineering and VLAN Sales. ■ Switch 3 contains VLAN Marketing, VLAN Engineering, and VLAN Sales.
CHAPTER 6: SPANNING TREE PROTOCOL (STP) Configuring STP on the Switch STP configuration involves the following actions: ■ Create one or more STP domains using the following command: create stpd STPD, VLAN, and QoS profile names must all be unique. For example, a name used to identify a VLAN cannot be used when you create an STPD or a QoS profile.
Configuring STP on the Switch Table 23 shows the commands used to configure STP. Table 23 STP Configuration Commands Command Description create stpd Creates an STPD. When created, an STPD has the following default parameters: ■ Bridge priority — 32,768 ■ Hello time — two seconds ■ Forward delay — 15 seconds enable stpd {} Enables the STP protocol for one or all STPDs. The default setting is disabled.
CHAPTER 6: SPANNING TREE PROTOCOL (STP) Table 23 STP Configuration Commands (continued) Command Description config stpd port cost Specifies the path cost of the port in this STPD. config stpd port priority The range is 1 through 65,535. The switch automatically assigns a default path cost based on the speed of the port, as follows: ■ For a 100Mbps port, the default cost is 19. ■ For a 1000Mbps port, the default cost is 4.
Disabling and Resetting STP 97 To display the STP state of a port, use the following command: show stpd port This command displays the following: Disabling and Resetting STP ■ STPD port configuration ■ STPD state (Root Bridge, and so on) ■ STPD port state (forwarding, blocking, and so on) To disable STP or return STP settings to their defaults, use the commands listed in Table 24.
CHAPTER 6: SPANNING TREE PROTOCOL (STP)
7 QUALITY OF SERVICE (QOS) This chapter describes the concept of Quality of Service (QoS) and explains how to configure QoS on the switch. Overview of Quality of Service QoS is a feature of the Switch 9100 that allows you to specify different service levels for traffic traversing the switch. QoS is an effective control mechanism for networks that have heterogeneous traffic patterns. Using QoS, you can specify the service that a traffic type receives.
CHAPTER 7: QUALITY OF SERVICE (QOS) The next sections describe how QoS profiles are used and modified. After this, various traffic groupings are explained and QoS profiles are assigned to the traffic groupings. QoS Profiles Eight default QoS profiles are provided that can be modified, but not deleted.
QoS Profiles 101 A QoS profile does not alter the behavior of the switch until it is assigned to a traffic grouping. The settings of the default profiles are shown in Table 25.
CHAPTER 7: QUALITY OF SERVICE (QOS) The Blackhole QoS Profile In the description of various options for configuring Policy-Based QoS, there is an option to specify blackhole in place of a named QoS profile. As its name implies, a traffic grouping assigned to the “blackhole” goes nowhere, and is not forwarded by the switch. There are noted exceptions.
Traffic Groupings and Creating a QoS Policy 103 Table 26 Traffic Groupings by Precedence (continued) Destination Address MAC-based Groupings Packet Priority Groupings Physical/Logical Groupings Blackhole Broadcast/unknown rate limiting MAC-Based Traffic Groupings QoS profiles can be assigned to destination MAC addresses.
CHAPTER 7: QUALITY OF SERVICE (QOS) The command to clear the FDB is as follows: clear fdb Blackhole Using the blackhole option configures the switch to not forward any packets to the destination MAC address on any ports for the VLAN specified.
Traffic Groupings and Creating a QoS Policy 105 802.1p Packets When traffic that contains 802.1p prioritization bits is seen, the traffic is mapped to the eight default QoS profiles. No user configuration is required for this type of traffic grouping. Table 27 describes 802.1p values and their associated QoS profiles. Table 27 802.1p Values and Associated QoS Profiles 802.1p Value QoS Profile 0 qp1 1 qp2 2 qp3 4 qp4 4 qp5 5 qp6 6 qp7 7 qp8 To modify the default behavior of 802.
CHAPTER 7: QUALITY OF SERVICE (QOS) Source Port A source port traffic grouping implies that any traffic sourced from this physical port uses the indicated QoS profile when the traffic is transmitted out any other port. To configure a source port traffic grouping, use the following command: config ports qosprofile In the following example, all traffic sourced from port 7 uses the QoS profile named qp3 when being transmitted.
Verifying Configuration and Performance Verifying Configuration and Performance Displaying QoS Information 107 The following information is used to verify the QoS configuration and monitor the use of the QoS policies that are in place.
CHAPTER 7: QUALITY OF SERVICE (QOS) QoS monitor sampling is configured as follows: ■ The port is monitored for 20 seconds before the switch moves on to the next port in the list. ■ A port is sampled for five seconds before the packets per second (pps) value is displayed on the screen. Monitoring QoS in the background places transmit counter and any “overflow” information into the switch log.
Configuring QoS ■ Configuring QoS 109 For physical and logical groupings of a source port or VLAN, re-apply the QoS profile to the source port or Vlan. You can also save and reboot the switch. Table 29 describes the commands used to configure QoS. Table 29 QoS Configuration Commands Command Description config qosprofile {minbw } {maxbw } {priority } Configures a QoS profile.
CHAPTER 7: QUALITY OF SERVICE (QOS)
8 STATUS MONITORING AND STATISTICS This chapter describes how to view the current operating status of the switch, how to display information in the log, and how to take advantage of available Remote Monitoring (RMON) capabilities. Viewing statistics on a regular basis allows you to see how well your network is performing. If you keep simple daily records, you will see trends emerging and notice problems arising before they cause major network faults.
CHAPTER 8: STATUS MONITORING AND STATISTICS Table 30 describes show commands that are used to monitor the status of the switch. Table 30 Status Monitoring Commands Command Description show log {} Displays the current snapshot of the log. The priority option filters the log to display message with the selected priority or higher (more critical). Priorities include critical, emergency, alert, error, warning, notice, info, and debug.
Port Statistics Port Statistics 113 The Switch 9100 provides a facility for viewing port statistic information. The summary information lists values for the current counter against each port on each operational module in the system, and it is refreshed approximately every two seconds. Values are displayed to nine digits of accuracy.
CHAPTER 8: STATUS MONITORING AND STATISTICS Port Errors The switch keeps track of errors for each port. To view port transmit errors, use the following command: show ports txerrors The following port transmit error information is collected by the system: ■ Link Status — The current status of the link.
Port Monitoring Display Keys Port Monitoring Display Keys 115 ■ Receive Alignment Errors (RX Align) — The total number of frames received by the port that occurs if a frame has a CRC error and does not contain an integral number of octets. ■ Receive Frames Lost (RX Lost) — The total number of frames received by the port that were lost because of buffer overflow in the switch. Table 31 describes the keys used to control the displays that appear when you issue any of the show port commands.
CHAPTER 8: STATUS MONITORING AND STATISTICS Table 32 Fault Levels Assigned by the Switch Level Description Critical A desired switch function is inoperable. The switch may need to be reset. Warning A noncritical error that may lead to a function failure. Informational Actions and events that are consistent with expected behavior. By default, log entries that are assigned a critical or warning level remain in the log after a switch reboot.
Logging 117 Real-Time Display In addition to viewing a snapshot of the log, you can configure the system to maintain a running real-time display of log messages on the console. To turn on the log display, enter the following command: enable log display To configure the log display, use the following command: config log display {} If priority is not specified, only messages of critical priority are displayed.
CHAPTER 8: STATUS MONITORING AND STATISTICS Logging Commands The commands described in Table 34 allow you to configure logging options, reset logging options, display the log, and clear the log. Table 34 Logging Commands Command Description enable cli-config-logging Enables logging CLI configuration commands to the syslog for auditing purposes. enable log display Enables the log display to the console port. enable syslog Enables logging to a remote syslog host.
RMON 119 Table 34 Logging Commands (continued) Command Description clear counters Clears all switch statistics and port counters. clear log {static} Clears the log. If static is specified, the critical log messages are also cleared. RMON Using the Remote Monitoring (RMON) capabilities of the switch allows network administrators to improve system efficiency and reduce the load on the network. The following sections explain more about the RMON concept and the RMON features supported by the switch.
CHAPTER 8: STATUS MONITORING AND STATISTICS About the RMON Groups The IETF defines nine groups of Ethernet RMON statistics. The switch supports the following four of these groups: ■ Statistics ■ History ■ Alarms ■ Events This section describes these groups, and discusses how they can be used. Statistics The RMON Ethernet Statistics group provides traffic and error statistics showing packets, bytes, broadcasts, multicasts, and errors on a LAN segment or VLAN.
RMON 121 Events The Events group creates entries in an event log and/or sends SNMP traps to the management workstation. An event is triggered by an RMON alarm. The action taken can be configured to ignore it, to log the event, to send an SNMP trap to the receivers listed in the trap receiver table, or to both log and send a trap. The RMON traps are defined in RFC 1757 for rising and falling thresholds. Effective use of the Events group saves you time.
CHAPTER 8: STATUS MONITORING AND STATISTICS An RMON probe, however, autonomously looks at the network on behalf of the management workstation without affecting the characteristics and performance of the network. The probe reports by exception, which means that it only informs the management workstation when the network has entered an abnormal state. RMON and the Switch RMON requires one probe per LAN segment, and stand-alone RMON probes have traditionally been expensive.
RMON 123 When using the RMON features of the switch, you should note the following: Configuring RMON ■ After the default sessions are created, they have no special status. You can delete or change them as required. ■ The greater the number of RMON sessions, the greater the burden on the management resources of the switch. However, the forwarding performance of the switch is not affected.
CHAPTER 8: STATUS MONITORING AND STATISTICS
9 USING THE WEB INTERFACE The Web Interface is device-management software running in the switch that allows you to access the switch over a TCP/IP network, using a standard Web browser. Any properly configured standard Web browser that supports frames and JavaScript (such as Netscape Navigator 3.0 or higher, or Microsoft Internet Explorer 3.0 or higher) can be used to manage the system.
CHAPTER 9: USING THE WEB INTERFACE Setting Up Your Browser In general, the default settings that come configured on your browser work well with the Web Interface. The following are recommended settings that you can use to improve the display features and functionality of the Web Interface: ■ After downloading a newer version of the switch image, clear the browser disk and memory cache to see the updated menu screens.
Navigating the Web Interface 127 If you have entered the name and password of an administrator-level account, you have access to all Web Interface pages. If you have used a user-level account name and password, you only have access to the Statistics and Support information. For more information on assigning user names, levels, and passwords, refer to Chapter 3.
CHAPTER 9: USING THE WEB INTERFACE Content Frame The content frame contains the main body of information in the Web Interface. For example, if you select an option from the Configuration task button, enter configuration parameters in the content frame. If you select the Statistics task button, statistics are displayed in the content frame. Browser Controls Browser controls include drop-down list boxes, check boxes, and multi-select list boxes.
Saving Changes Saving Changes 129 There are two ways to save your changes to non-volatile storage using the Web Interface: ■ Select Save Configuration from the Configuration task button, Switch option. This field contains a drop-down list box that allows you to select either the primary or secondary configuration area. After you select the configuration area, click Submit to save the changes. For more information on the primary and secondary configuration areas, refer to Chapter 10.
CHAPTER 9: USING THE WEB INTERFACE
10 SOFTWARE UPGRADE AND BOOT OPTIONS This chapter describes the procedure for upgrading the switch software image. This chapter also discusses how to save and load a primary and secondary image and configuration file on the switch. Downloading a New Image The image file contains the executable code that runs on the switch. It comes preinstalled from the factory. As new versions of the image are released, you should upgrade the software running on your system.
CHAPTER 10: SOFTWARE UPGRADE AND BOOT OPTIONS The switch can store up to two images; a primary and a secondary. When you download a new image, you must select into which image space (primary or secondary) you want the new image to be placed.
Upgrading and Accessing BootROM 133 To use the configuration, use the following command: use configuration [primary | secondary] The configuration takes effect on the next reboot. If the switch is rebooted while in the middle of a configuration save, the switch boots to factory default settings. The configuration that is not in the process of being saved is unaffected.
CHAPTER 10: SOFTWARE UPGRADE AND BOOT OPTIONS To access the BootROM menu, follow these steps: 1 Attach to the console port of the switch, as described in Chapter 2. 2 With the serial port connected to a properly configured terminal or terminal emulator, power cycle the switch while depressing the spacebar on the keyboard of the terminal. As soon as you see the BootROM-> prompt, release the spacebar. You can see a simple help menu by pressing h .
Boot Option Commands Boot Option Commands Table 38 lists the commands associated with switch boot options. Table 38 Boot Option Commands Command Description show configuration Displays the current configuration to the terminal. You can then capture the output and store it as a file. download bootrom Downloads a BOOT ROM image from a TFTP server. The downloaded image replaces the BOOT ROM in the onboard FLASH memory.
CHAPTER 10: SOFTWARE UPGRADE AND BOOT OPTIONS
A SAFETY INFORMATION You must read the following safety information before carrying out any installation or removal of components, or any maintenance procedures on the Switch 9100. WARNING: Warnings contain directions that you must follow for your personal safety. Follow all directions carefully. You must read the following safety information carefully before you install or remove the unit.
APPENDIX A: SAFETY INFORMATION Important Safety Information ■ Installation and removal of the unit must be carried out by qualified personnel only. ■ If installing the Switch 9100 in a stack with SuperStack II units that are narrower than the 9100, the Switch 9100 unit must be installed below the narrower units. ■ The unit must be earthed (grounded). ■ Connect the unit to an earthed power supply to ensure compliance with safety standards.
Important Safety Information 139 ■ This unit operates under SELV (Safety Extra Low Voltage) conditions according to IEC 950. The conditions are only maintained if the equipment to which it is connected also operates under SELV conditions. ■ France and Peru only: This unit cannot be powered from IT† supplies.
APPENDIX A: SAFETY INFORMATION If service personnel disregard the instructions and attempt to replace the bq4830/DS1644, replace the lithium battery with the same or equivalent type, as recommended by the manufacturer. WARNING: There is danger of personal injury and explosion if battery is improperly discarded. Do not discard the battery in fire or near heat, or in water. Always dispose of used batteries according to the battery manufacturer’s instructions.
L’information de Sécurité Importante L’information de Sécurité Importante 141 ■ L'installation et la dépose de ce groupe doivent être confiés à un personnel qualifié. ■ Si vous entassez l'unité Switch avec les unités SuperStack II Hub, l'unité Switch 9100 doit être installée en dessous des unités Hub plus étroites. ■ Vous devez mettre l’appareil à la terre (à la masse) ce groupe. ■ Brancher l’unité à une source de courant mise à la terre pour assurer la conformité aux normes de sécurité.
APPENDIX A: SAFETY INFORMATION ■ La prise secteur doit se trouver à proximité de l’appareil et son accès doit être facile. Vous ne pouvez mettre l’appareil hors circuit qu'en débranchant son cordon électrique au niveau de cette prise. ■ L’appareil fonctionne à une tension extrêmement basse de sécurité qui est conforme à la norme CEI 950. Ces conditions ne sont maintenues que si l'équipement auquel il est raccordé fonctionne dans les mêmes conditions.
L’information de Sécurité Importante 143 Batterie au lithium Les batteries du dispositif bq4830/DS1644 est hermétiquement scellé et ne peut donc pas être remplacé par l'utilisateur. Si les techniciens de maintenance outrepassent ces instructions et tentent de remplacer la bq4830/DS1644, la batterie lithium doit être remplacée par une batterie identique ou de même type, selon les recommandations du fabricant.
APPENDIX A: SAFETY INFORMATION Wichtige Sicherheitsinformat ionen ■ Die Installation und der Ausbau des Geräts darf nur durch Fachpersonal erfolgen. ■ Wenn die Switch 9100 Einheit in einer Stapel mit anderen SuperStack II Hub Einheiten eingebaut werden soll, muß die Switch 9100 Einheit unter die schmaleren Hub Einheiten eingebaut werden. ■ Das Gerät muß geerdet sein. ■ Das Gerät muß an eine geerdete Steckdose angeschlossen werden, die europäischen Sicherheitsnormen erfüllt.
Wichtige Sicherheitsinformationen 145 WARNHINWEIS: RJ-45 Ports. RJ-45-Anschlüsse. Dies sind abgeschirmte RJ-45-Datenbuchsen. Sie können nicht als Telefonanschlußbuchsen verwendet werden. An diesen Buchsen dürfen nur RJ-45-Datenstecker angeschlossen werden. Diese Datenstecker können entweder mit abgeschirmten oder unabgeschirmten Datenkabeln mit abgeschirmten oder unabgeschirmten Klinkensteckern verbunden werden. WARNUNG: Faseroptikanschlüsse – Optische Sicherheit.
APPENDIX A: SAFETY INFORMATION ■ ■ Lithiumbatterien sind kein von der EPA aufgelisteter Sondermüll und können daher in der Regel mit dem normalen Müll entsorgt werden. Bei der Entsorgung größerer Mengen ist die örtliche Müllverwaltungsstelle zu Rate zu ziehen. ■ Das Batteriemodul enthält keine gefährlichen Verbindungen. ■ In jeder Zelle ist ca. 0,035 g Lithium enthalten. ■ Es werden zwei austauschbare Batterietypen verwendet. ■ ■ CR-Chemie verwendet Mangandioxid als Kathodenmaterial.
B TECHNICAL SPECIFICATIONS Physical Dimensions Height: 89mm (3.5 in.) x Width: 440mm (17.3 in.) x Depth: 472mm (18.6 in.) Weight: 9.53kg (21 lb.) Environmental Requirements Operating Temperature 0 to 40° C (32 to 104° F) Storage Temperature -10 to 70 ° C (14 to 158° F) Operating Humidity 10% to 95% relative humidity, noncondensing Standards EN60068 (IEC68) Safety Agency Certifications IEC 60950, UL 1950, EN60950, CSA 22.2 No.
APPENDIX B: TECHNICAL SPECIFICATIONS The following is a list of software standards supported by the Switch 9100. SNMP Terminal Emulation MIB-II (RFC 1213) Telnet (RFC 854) Bridge MIB (RFC 1493) HTTP 1.1 (RFC 2068) Entity MIB (RFC 2037) Protocols Used for Administration Evolution of Interfaces MIB (RFC 1573) RMON MIB (RFC 1757) RMON II Probe Configuration MIB (2021) 802.3 MAU MIB (RFC 2239) 802.
C TROUBLESHOOTING If you encounter problems when using the switch, this appendix may be helpful. If you have a problem not listed here or in the “Release Notes,” contact your supplier. LEDs Power LED does not light: Check that the power cable is firmly connected to the device and to the supply outlet. On powering-up, the MGMT LED lights yellow: The device has failed its Power On Self Test (POST) and you should contact your supplier for advice.
APPENDIX C: TROUBLESHOOTING Switch does not power up: The Switch 9100 uses a digital power supply with surge protection. In the event of a power surge, the protection circuits shut down the power supply. To reset, unplug the switch for 1 minute, plug it back in, and attempt to power up the switch. If this does not work, try using a different power source (different power strip/outlet) and power cord.
Using the Command-Line Interface 151 attempt to log in and the maximum number of Telnet sessions are being used, you should receive an error message indicating so. Traps are not received by the SNMP Network Manager: Check that the SNMP Network Manager's IP address and community string are correctly configured, and that the IP address of the Trap Receiver is configured properly on the system.
APPENDIX C: TROUBLESHOOTING You forget your password and cannot log in: If you are not an administrator, another user having administrator access level can log in, delete your user name, and create a new user name for you, with a new password. Alternatively, another user having administrator access level can log in and initialize the device. This will return all configuration information (including passwords) to the initial values.
Using the Command-Line Interface 153 A mismatch of duplex mode between the Switch 9100 and the network device will cause poor network performance. Viewing using the show port rx command on the Switch 9100 may display a constant increment of CRC errors. This is characteristic of a duplex mismatch between devices. This is NOT a problem with the switch. Always verify that the switch and the network device match in configuration for speed and duplex.
APPENDIX C: TROUBLESHOOTING which should now allow you to re-enter the previous command without error as follows: localhost:26 # config vlan red add port 1,2 VLAN names: There are restrictions on VLAN names. They cannot contain whitespaces and cannot start with a numeric value unless you use quotation marks around the name. If a name contains whitespaces, starts with a numeric, or contains non-alphabetical characters, you must use quotation marks whenever referring to the VLAN name. 802.
Using the Command-Line Interface STP 155 You have connected an endstation directly to the switch and the endstation fails to boot correctly: The Switch 9100 has STP enabled, and the endstation is booting before the STP initialization process is complete. Specify that STP has been disabled for that VLAN, or turn off STP for the switch ports of the endstation and devices to which it is attempting to connect, and then reboot the endstation.
APPENDIX C: TROUBLESHOOTING
D TECHNICAL SUPPORT 3Com provides easy access to technical support information through a variety of services. This appendix describes these services. Information contained in this appendix is correct at time of publication. For the most recent information, 3Com recommends that you access the 3Com Corporation World Wide Web site.
APPENDIX D: TECHNICAL SUPPORT 3Com FTP Site Download drivers, patches, software, and MIBs across the Internet from the 3Com public FTP site. This service is available 24 hours a day, 7 days a week. To connect to the 3Com FTP site, enter the following information into your FTP client: ■ Hostname: ftp.3com.com ■ Username: anonymous ■ Password: You do not need a user name and password with Web browser software such as Netscape Navigator and Internet Explorer.
Support from Your Network Supplier 159 Access by Digital Modem ISDN users can dial in to the 3Com BBS using a digital modem for fast access up to 64 Kbps. To access the 3Com BBS using ISDN, call the following number: 1 847 262 6000 3Com Facts Automated Fax Service The 3Com Facts automated fax service provides technical articles, diagrams, and troubleshooting instructions on 3Com products 24 hours a day, 7 days a week.
APPENDIX D: TECHNICAL SUPPORT When you contact 3Com for assistance, have the following information ready: ■ Product model name, part number, and serial number ■ A list of system hardware and software, including revision levels ■ Diagnostic error messages ■ Details about recent configuration changes, if applicable Here is a list of worldwide technical telephone support numbers: Country Telephone Number Country Telephone Number Asia, Pacific Rim Australia Hong Kong India Indonesia Japan Mala
Returning Products for Repair Returning Products for Repair 161 Before you send a product directly to 3Com for repair, you must first obtain an authorization number. Products sent to 3Com without authorization numbers will be returned to the sender unopened, at the sender’s expense.
GLOSSARY 10BASE-T The IEEE specification for 10Mbps Ethernet over Category 3, 4 or 5 twisted pair cable. 100BASE-FX The IEEE specification for 100Mbps Fast Ethernet over fiber-optic cable. 100BASE-TX The IEEE specification for 100Mbps Fast Ethernet over Category 5 twisted-pair cable. 1000BASE-T The IEEE specification for 1000Mbps Gigabit Ethernet over four-pair Category 5 twisted-pair cable. 1000BASE-SX The IEEE specification for 1000Mbps Gigabit Ethernet over fiber-optic cable.
GLOSSARY BOOTP The BOOTP protocol allows you to automatically map an IP address to a given MAC address each time a device is started. In addition, the protocol can assign the subnet mask and default gateway to a device. bridge A device that interconnects two LANs of a different type to form a single logical network that comprises of two network segments. Bridges learn which endstations are on which network segment by examining the source addresses of packets.
GLOSSARY Forwarding Database filtering flow control full duplex Gigabit Ethernet half duplex 165 A database that is stored by a switch to determine if a packet should be forwarded, and which port should forward the packet if it is to be forwarded. Also known as Switch Database. The process of screening a packet for certain characteristics, such as source address, destination address, or protocol.
GLOSSARY IP Internet Protocol. IP is a layer 3 network protocol that is the standard for sending data through a network. IP is part of the TCP/IP set of protocols that describe the routing of packets to addressed devices. IPX Internetwork Packet Exchange. IPX is a layer 3 and 4 network protocol designed for networks that use Novell® Netware®. IP address Internet Protocol address. A unique identifier for a device attached to a network using TCP/IP.
GLOSSARY MAC address 167 Media Access Control address; also called hardware or physical address. A layer 2 address associated with a particular network device. Most devices that connect to a LAN have a MAC address assigned to them as they are used to identify other devices in a network. MAC addresses are 6 bytes long. main port The port in a resilient link that carries data traffic in normal operating conditions. MDI Medium Dependent Interface.
GLOSSARY repeater A simple device that regenerates LAN traffic so that the transmission distance of that signal can be extended. Repeaters are used to connect two LANs of the same network type. resilient link A pair of ports that can be configured so that one takes over data transmission should the other fail. See also main port and standby port. RMON IETF Remote Monitoring MIB. A MIB that allows you to remotely monitor LANs by addressing up to nine different groups of information.
GLOSSARY standby port STP switch Switch Database TCP/IP 169 The port in a resilient link that takes over data transmission if the main port in the link fails. See Spanning Tree Protocol (STP). A device that interconnects several LANs to form a single logical LAN that comprises of several LAN segments. Switches are similar to bridges, in that they connect LANs of a different type; however they connect more LANs than a bridge and are generally more sophisticated. See Forwarding Database.
GLOSSARY VLT WAN Virtual LAN Trunk. A Switch-to-Switch link that carries traffic for all the VLANs on each Switch. Wide Area Network. A communications network that covers a wide area. A WAN can cover a large geographic area, and may contain several LANs within it.
INDEX Numbers C 1000BASE-SX port 16 3Com bulletin board service (3Com BBS) 158 3Com Knowledgebase Web Services 157 3Com URL 157 3ComFacts 159 CLI A access levels 40 access profiles configuration commands (table) 44 creating 44 example 45 reverse mask 45 rules 45 use 43 accounts, creating 42 admin account 41 aging entries, FDB 81 alarm actions 123 Alarms, RMON 120 Alarms, RMON group 122 B blackhole entries, FDB 82 boot option commands (table) 135 BOOTP, using 46 BootROM menu, accessing 133 prompt 134 u
INDEX E enabling a port 55 errors, port 114 Events, RMON 121, 122 F factory defaults 23 fax service (3ComFacts) 159 FDB adding an entry 82 aging entries 81 blackhole entries 82 clear and delete commands (table) 85 configuration commands (table) 83 configuring 83 contents 81 creating a permanent entry example 83 displaying 84 dynamic entries 81 entries 81 non-aging entries 81 permanent entries 81 QoS profile association 82 removing entries 85 features 15 fonts, browser 126 Forwarding Database.
INDEX O online technical services 157 P passwords default 41 forgetting 42 permanent entries, FDB 81 ping command 54 port commands (table) 56 enabling and disabling 55 errors,viewing 114 master port 59 monitoring display keys 115 priority, STP 94 receive errors 114 statistics, viewing 113 STP state, displaying 97 STPD membership 90 transmit errors 114 port-based VLANs 66 port-mirroring configuration commands (table) 61 description 60 example 61 virtual port 60 power on self-test (POST) 30 power socket 23
INDEX shortcuts, command 35 Simple Network Management Protocol. See SNMP SNAP protocol 75 SNMP authorized managers 52 community strings 52 configuration commands (table) 52 configuring 52 reset and disable commands (table) 54 settings, displaying 53 supported MIBs 51 trap receivers 52 using 51 socket, power 23 Spanning Tree Protocol.
INDEX configuring 76 default 75 delete and reset commands (table) 79 description 17 displaying settings 78 mixing port-based and tagged 72 names 75 port-based 66 protocol filters 73 protocol-based 72 restoring default values 79 tagged 69 trunks 70 types 66 W Web Interface accessing 126 browser controls 128 browser setup 126 description 125 fonts 126 home page 51, 126 navigating 127 saving changes 129 screen layout 127 screen resolution 126 status messages 128 VLAN configuration 125 World Wide Web (WWW) 15
INDEX
INDEX OF COMMANDS C clear counters 119 clear fdb 85, 104 clear igmp snooping 66 clear iparp 50 clear log 116, 119 clear session 39, 49 config access-profile 44 config access-profile add 44 config access-profile delete 44 config account 38 config banner 38 config dot1p type 105 config dot1q ethertype 76 config fdb agingtime 83 config igmp 65 config igmp snooping 66 config iparp add 50 config iparp delete 50 config iparp timeout 50 config iproute add default 50 config iproute delete default 50 config log dis
INDEX OF COMMANDS disable log display 118 disable mirroring 61 disable ports 55, 57 disable qosmonitor 108 disable rmon 123 disable sharing 57, 59 disable snmp access 54 disable snmp traps 54 disable stpd 97 disable stpd port 97 disable syslog 118 disable telnet 39, 49 disable web 39, 51, 125 download bootrom 133, 135 download image 131, 135 E enable autodst 38 enable bootp 38 enable bootp vlan 47 enable cli-config-logging 38, 118 enable clipaging 38 enable idletimeout 39 enable igmp 65 enable igmp s
INDEX OF COMMANDS U unconfig management 54 unconfig ports display-string 56 unconfig stpd 97 unconfig switch 40, 133 unconfig vlan ipaddress 79 use configuration 133, 135 use image 132, 135 179
INDEX OF COMMANDS
3Com Corporation LIMITED WARRANTY This warranty applies to customers located in the United States, Australia, Canada (except Quebec), Ireland, New Zealand, U.K., and other English language countries, and countries for which a translation into the local language is not provided.
3Com shall not be responsible for any software, firmware, information, or memory data of Customer contained in, stored in, or integrated with any products returned to 3Com for repair, whether under warranty or not. Dead- or Defective-on-Arrival.
GOVERNING LAW This Limited Warranty shall be governed by the laws of the State of California, U.S.A. excluding its conflicts of laws principles and excluding the United Nations Convention on Contracts for the International Sale of Goods. 3Com Corporation 5400 Bayfront Plaza P.O.
EMC STATEMENTS FCC STATEMENT This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications.