THE LINKBUILDER MSH 4 PORT ETHERNET BRIDGE MODULE USER GUIDE Part No.
3Com Corporation ■ 5400 Bayfront Plaza ■ Santa Clara, California ■ 95052-8154 © 3Com Corporation, 1994. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without permission from 3Com Corporation.
CONTENTS ABOUT THIS GUIDE Introduction ix How To Use This Guide x Conventions xi Special Messages xii Related Publications xiii 1 INTRODUCTION The LinkBuilder MSH 1-2 The LinkBuilder MSH 4 Port Ethernet Bridge Module 1-3 Managing The Bridge 1-7 Bridging 1-8 Why Use A Bridge? 1-8 Local And Remote Bridges 1-9 Bridge Network Topology 1-10 Learning, Filtering And Forwarding 1-12 Spanning Tree Algorithm And Protocol (STAP) 1-16 Bridge Filters 1-20 What Is Custom Filtering? 1-20 Filter Sets 1-23 Host-to-Host Fi
2 GETTING STARTED Introduction 2-2 The VT100 Management Interface 2-3 The VT100 Bridge Screens 2-4 The VT100 Bridge Menu Map 2-6 Bridge Control Keys 2-8 Simple Bridge Configuration 2-11 Logging On To The LinkBuilder MSH 2-12 Logging On To The Bridge 2-17 Establishing Operator Accounts 2-18 Adding Bridge Information 2-24 Saving And Making Changes Effective 2-26 Erasing All Changes 2-27 Logging Off The Bridge 2-28 IP Address Configuration 2-29 Bridge Connections 2-30 Logging On To The Bridge 2-30 Telnet From
Custom Filter Configuration 3-9 Setting Up A Host-to-Host Filter Set 3-10 Saving Host-to-Host Filters 3-12 Setting Up A Host-to-Port Filter Set 3-13 Saving Host-to-Port Filters 3-15 Setting Up A Port-to-Port Filter Set 3-16 Saving Port-to-Port Filters 3-17 Setting Up A Multicast-to-Port Filter Set 3-18 Saving Multicast-to-Port Filters 3-19 Setting Up A Protocol Filter Set 3-20 Saving Protocol Filters 3-22 Setting Up A Bit Filter 3-23 Saving Bit Filters 3-26 The Host Filtering Table 3-27 Saving Host Filterin
Delete Permanent Entry 5-8 Transfer Permanent Entries 5-9 Editing ARP Information 5-10 ARP Parameters 5-10 Add ARP Entry 5-11 Delete ARP Entry 5-12 Changing TCP Characteristics 5-13 Changing Telnet Characteristics 5-14 Port Queuing 5-16 Monitoring 5-17 Viewing General Bridge Information 5-17 Viewing Node Table Information 5-19 Node Table By Address 5-19 Node Table By Hash Bucket 5-20 Viewing The Hardware Configuration 5-22 Viewing Socket Statistics 5-23 Viewing UDP Statistics 5-26 Viewing TCP Information 5-
6 PROBLEM SOLVING Spot Checks 6-2 Using The LEDs For Fault Diagnosis 6-3 Correcting Problems 6-4 Network Problems 6-4 PING Or Telnet Problems 6-4 Port Problems 6-5 Performance Problems 6-5 Collision Problems 6-6 STAP Problems 6-6 Filter Problems 6-6 SNMP Problems 6-7 Operation Problems 6-7 Removing And Replacing Equipment 6-8 Spares 6-9 What To Do Next 6-10 A LINK SETTINGS B TECHNICAL INFORMATION Electrical B-1 Safety B-1 EMC B-1 Environmental B-1 Reliability B-1 MIB B-2 C TECHNICAL SUPPORT On-line Techni
INDEX RADIO FREQUENCY INTERFERENCE STATEMENTS LIMITED WARRANTY
ABOUT THIS GUIDE Introduction This guide contains all the information you need to install and use the LinkBuilder MSH 4 Port Ethernet Bridge Module. It is written for the person responsible for the management and maintenance of the network. The guide explains: ■ How to configure the 4 Port Bridge Module. ■ How to identify 4 Port Bridge Module problems and possible solutions to these problems. The guide does not explain: ■ How to design your network.
x ABOUT THIS GUIDE How To Use This Guide The following list shows where to find specific information: If you are looking for: Turn to: An introduction to the LinkBuilder MSH, the 4 Port Ethernet Bridge Module, bridging and filtering Chapter 1 How to configure a simple bridge Chapter 2 How to configure an advanced bridge Chapter 3 How to perform simple bridge monitoring Chapter 4 Information about further bridge configuration and monitoring Chapter 5 Information about problem solving Chapter 6
Conventions xi Conventions The following table lists conventions that are used throughout this guide: “Enter” vs. “Type” When the word “enter” is used in this guide, it means type something, then press the [Return] or [Enter] key. Do not press the [Return] or [Enter] key when an instruction simply says “type.
xii ABOUT THIS GUIDE Special Messages A special format indicates notes, cautions, and warnings. These messages are defined as follows: Notes call attention to important features or instructions. CAUTION: Cautions contain directions that you must follow to avoid immediate system damage or loss of data. WARNING: Warnings contain directions that you must follow for your personal safety. Follow all instructions carefully.
Related Publications xiii Related Publications If you need more information about subjects not covered by this guide, you may find it useful to refer to the guides that accompany your other LinkBuilder products. If you have lost or do not have a particular guide, copies can be obtained from your supplier.
xiv ABOUT THIS GUIDE DUA1860-0AAA01
1 INTRODUCTION This chapter contains the following topics: ■ The LinkBuilder MSH ■ The LinkBuilder MSH 4 Port Ethernet Bridge Module ■ Managing The Bridge ■ Bridging ■ Bridge Filters ■ Simple Network Management Protocol (SNMP) ■ Installation And Removal
1-2 CHAPTER 1: INTRODUCTION The LinkBuilder MSH The LinkBuilder MSH is an extremely versatile chassis-based hub, which enables you to connect and manage large, mixed-technology, mixed-media LANs. The basis of the LinkBuilder MSH is the chassis, into which a series of network specific modules can be installed, as shown in Figure 1-1. The modules within the chassis connect to a backplane.
The LinkBuilder MSH 4 Port Ethernet Bridge Module 1-3 The LinkBuilder MSH 4 Port Ethernet Bridge Module The bridge module provides a bridge connection between the three Ethernet busses of the MSH and an external port (the bridge module's transceiver module), as shown in Figure 1-2. The bridge's connections are referred to as ports (1, 2, 3 and E).
1-4 CHAPTER 1: INTRODUCTION The bridge module provides: ■ Connection to each Ethernet bus in the MSH. ■ An external connection by transceiver module. ■ LEDs for indicating bridge activity and diagnosing possible problems. ■ Standard IEEE 802.1 Part D transparent bridging.
The LinkBuilder MSH 4 Port Ethernet Bridge Module 1-5 Below its top ejector, the bridge has a panel of LEDs that indicate bridge activity, as shown in Figure 1-3. Each port has a row of three LEDs; transmit (TX), receive (RX) and enabled (EN). Ports with numbers signify the Ethernet bus in the LinkBuilder MSH chassis to which the port is connected. The unnumbered row is for the external port, the Transceiver Module.
1-6 CHAPTER 1: INTRODUCTION A Transceiver Module can be fitted to the bridge, providing its fourth port, as shown in Figure 1-4.
Managing The Bridge 1-7 Managing The Bridge The bridge can be managed using either the VT100 management interface or remotely via SNMP using a suitable application, as shown in Figure 1-5. SNMP provides a subset of the VT100 management facilities. Figure 1-5 VT100 Management To use the VT100 management interface: ■ Connect a VT100 terminal or VT100 terminal emulator directly to the serial port on the display panel of the LinkBuilder MSH. ■ Use a VT100 terminal emulator over a network, via Telnet.
1-8 CHAPTER 1: INTRODUCTION Bridging This section describes bridges and how they work. Why Use A Bridge? Bridges provide a way of joining two or more networks together to form a single logical and physical network. You can overcome various network restrictions that apply to large individual networks by bridging smaller networks together. The bridge remains transparent to the users of these networks. The original networks that form the bridged network are called network segments.
Bridging 1-9 Local And Remote Bridges There are two main types of bridge, local and remote. The LinkBuilder MSH 4 Port Ethernet Bridge Module is a local bridge. Local bridges are used for bridging networks on the same site, as shown in Figure 1-6. Figure 1-6 Local Bridge Remote bridges are used for bridging networks across large areas. A remote bridge is often called a half bridge because each network connects to half of the remote bridge.
1-10 CHAPTER 1: INTRODUCTION Bridge Network Topology The topology of a network is essentially its layout; how its component parts are inter-connected. The topology of your network is dependent on the amount of bridges that you use and the way in which you use them. If you use one 4 Port Ethernet Bridge Module, you may have a star topology. In the example setups shown in Figure 1-8 and Figure 1-9, the bridge connects all three MSH busses and an external segment.
Bridging Figure 1-9 An Example Topology DUA1860-0AAA01 1-11
1-12 CHAPTER 1: INTRODUCTION Learning, Filtering And Forwarding Transparent bridges remain transparent to the network segments, treating them as one overall network. The main operations of a transparent bridge are learning, filtering and forwarding. These operations are 802.1 bridge features and enable it to control the flow of traffic to each network segment. Devices send information as frames. The two main types of frame are 802.3 and Ethernet.
Bridging 1-13 Figure 1-11, Figure 1-12, Figure 1-13 and Figure 1-14 illustrate how a bridge learns device addresses and uses address lists to reduce unnecessary network traffic. Figure 1-11: The bridge does not know what devices are on the network. Figure 1-11 An Example Network Figure 1-12: Device A, connected to port 1, transmits a packet for device B. The bridge learns the address of device A but does not know where device B is, so it passes the packet to ports 2, 3 and E.
1-14 CHAPTER 1: INTRODUCTION Figure 1-13: Device C, connected to port 2, transmits a packet for device A. The bridge learns the address of device C and recognizes the address of device A, so it forwards the packet to port 1. Figure 1-13 Learns C, Forwards Packet Figure 1-14: Device D, connected to port 2, transmits a packet for device C. The bridge learns the address of device D and recognizes the address of device C is on the same address list, so it filters the packet.
Bridging 1-15 The bridge performs ageing on address list entries. If a port has not received a packet from a device within a configured time (the ageing time), the device's address will be removed from the port's address list. This helps the bridge to efficiently remember devices that communicate frequently without having to cope with devices that communicate infrequently or are no longer there.
1-16 CHAPTER 1: INTRODUCTION Spanning Tree Algorithm And Protocol (STAP) You can make your network more resilient by adding bridges and network segments. If a network segment or bridge fails, traffic can still travel through the network by using the additional bridges and network segments. The key to resilience is the number of paths through the network. Multiple paths, however, result in active loops.
Bridging 1-17 In a bridged network, a root bridge is elected to control the other bridges. The root bridge is made aware of any active loops by consulting the other bridges. The STAP constructs a spanning tree which provides unique paths between all devices in the network, and applies it by putting various bridges' ports in to a blocking state, as shown in Figure 1-16.
1-18 CHAPTER 1: INTRODUCTION The STAP is also capable of constructing a new spanning tree should the unique path fail, see Figure 1-17, leading to quick network recovery.
Bridging 1-19 Network resilience obviously leads to some path redundancy, as shown in Figure 1-18. Figure 1-18 Network Resilience For more detailed STAP information, please refer to the latest revision of the IEEE 802.1 Part D standard.
1-20 CHAPTER 1: INTRODUCTION Bridge Filters The LinkBuilder MSH 4 Port Ethernet Bridge Module allows the use of customised filtering, which can be used in addition to basic transparent filtering, as explained in Learning, Filtering And Forwarding on page 1-12.
Bridge Filters 1-21 Figure 1-19: A filter set for port 2 has been set up allowing device A to communicate through the bridge and out of that port. No other device can communicate through the bridge and out of that port. Figure 1-19 An Example Network With Filter Set Figure 1-20: Device A transmits a packet for device C. The bridge knows that device C is connected to port 2, so it checks that port's filter set. Communication is allowed, so it forwards the packet.
1-22 CHAPTER 1: INTRODUCTION Figure 1-21: Device B transmits a packet for device C. The bridge knows that device C is connected to port 2, so it checks that port's filter set. Communication is not allowed, so it filters the packet.
Bridge Filters 1-23 Filter Sets A filter set is a group of devices that are allowed to communicate with each other. The 4 Port Ethernet Bridge Module's default filter sets let all hosts and ports communicate. If you want to restrict communication, you must edit the default filter sets. Each custom filter type has specific filter sets. Host-to-Host Filtering A host-to-host filter set is a group of devices that are allowed to communicate through the bridge.
1-24 CHAPTER 1: INTRODUCTION Figure 1-22 illustrates a host-to-host filter example, and shows four network segments connected by a bridge. A filter set has been set up allowing communication between devices A and D only, through the bridge. Every packet received by the bridge has its source address and destination address checked. If both addresses match the addresses in the filter sets, the packet is forwarded.
Bridge Filters 1-25 Exclusion means that devices in the set cannot communicate out of that port, and all other devices can. If the set is empty, all devices can communicate out of that port. The default host group is contained in all host-to-port filter sets following an initialization. Sets default to inclusion. The host-to-port default host represents all hosts except those defined in the host-to-port filter sets.
1-26 CHAPTER 1: INTRODUCTION Port-to-Port Filtering A port-to-port filter set is a group of ports that are allowed to communicate through the bridge. There is a port-to-port filter set for each bridge port. Figure 1-24 and Figure 1-25 illustrate a port-to-port filter example. Figure 1-24 shows four network segments connected by a bridge. The ports' filter sets have been set up, allowing communication between ports 1 and 2, ports 1 and E, and ports 2 and 3.
Bridge Filters 1-27 Changes made to port-to-port filter sets are mirrored by the other port-to-port filter sets. For example, if ports 1 and E are added to port 3's filter set, port 3 is automatically added to port 1's and port E's filter sets. Multicast-to-Port Filtering A multicast-to-port filter set is a group of ports that are allowed to send and receive broadcast and multicast packets from a specific bridge port. There is a multicast-to-port filter set for each bridge port.
1-28 CHAPTER 1: INTRODUCTION Bit Filtering Bit filters selectively filter out traffic based on bit values occurring in the first 64 bytes of each frame. This provides extremely flexible filtering. You can test any combination of bits within a six-byte long field falling within the first 64 bytes of the frame and beginning on a byte boundary. You can have up to five input filters and five output filters. When you set up a bit filter, you define a bit pattern.
Bridge Filters 1-29 Enabling Custom Filtering You have to enable custom filtering before it becomes effective. You can enable and disable all custom filters or individual custom filters with ease. As custom filtering can involve multiple checking of packets, it can have an adverse impact on bridge performance in a high traffic rate environment. Therefore, it is best to plan custom filtering carefully, enabling filters only as necessary.
1-30 CHAPTER 1: INTRODUCTION Simple Network Management Protocol (SNMP) SNMP is an application-level protocol for managing products such as bridges on TCP/IP networks. You can issue requests using an SNMP application. The application passes the requests to the SNMP agent software on the device to be managed. The agent carries out the requests and sends responses to the application. Requests and responses are referred to as SNMP messages.
Installation And Removal 1-31 Installation And Removal WARNING: Please read the following safety and anti-static information before removing the module from its anti-static packaging. Safety Information To avoid having dangerous equipment: ■ Installation of this module should be carried out by qualified personnel only.
1-32 CHAPTER 1: INTRODUCTION DUA1860-0AAA01
2 GETTING STARTED This chapter contains the following topics: ■ The VT100 Management Interface ■ The VT100 Bridge Menu Map ■ Bridge Control Keys ■ Simple Bridge Configuration ■ IP Address Configuration ■ SNMP Configuration
2-2 CHAPTER 2: GETTING STARTED Introduction This chapter describes setting up the bridge for the first time. If you have not set up the bridge before, or are setting it up again after initializing NVRAM, you should read this chapter. The chapter contains the following information: ■ A general introduction to the VT100 Management Interface, which is used to manage the bridge. ■ A description of how to configure a simple bridge that connects up to four network segments.
The VT100 Management Interface 2-3 The VT100 Management Interface The VT100 management interface is used for bridge management. The screens are based on forms and are controlled using special interface control keys. The bridge has different control keys to the MSH management module. When you log on to the bridge, the bridge control keys take over. The bridge control keys are described in Bridge Control Keys on page 2-8. The screens are grouped hierarchically.
2-4 CHAPTER 2: GETTING STARTED The VT100 Bridge Screens The VT100 bridge screens have the same general layout. The components of a bridge screen are shown in Figure 2-1. Figure 2-1 Bridge Screen Components The components are: A - Screen title. The boxed words starting in the top left hand corner of the screen. B - Highlight. A dark or bright bar over the input field that receives the information you enter into the input area. C - System name.
The VT100 Management Interface 2-5 E - Remote login identifier. The name of the user currently remotely logged on to the bridge. F - Input area. The line below the screen area provides the data entry location for input screens. The area starts with a short description of the highlighted field. You enter the value in the input area, where you can change or correct your typing as necessary. When you press [Enter] or [Return], your input area appears in the highlighted field.
2-6 CHAPTER 2: GETTING STARTED The VT100 Bridge Menu Map The VT100 bridge menu map, as shown in Figure 2-2, shows the links between the bridge management screens. The italic number at the bottom left of each screen box is the page in this manual, where you will find the description of that screen.
The VT100 Bridge Menu Map 2-7 Operators with Administrator privileges are unrestricted. Operators with Operator privileges cannot configure the bridge, initialize NVRAM, or reset the bridge (the Administrative Screens).
2-8 CHAPTER 2: GETTING STARTED Bridge Control Keys There are special control keys for operating the bridge. These are different to the MSH management module control keys and should be used from the time you log on to the bridge. For [Ctrl] key sequences, hold down the [Ctrl] key while pressing the specified key. For [Esc] key sequences, press [Esc] and then press the specified key.
Bridge Control Keys 2-9 Table 2-1 Bridge Control Keys Key Description Return to Main Menu [Ctrl] + [T] [Ctrl] + [C] [Ctrl] + [Y] [Esc] [T] Returns you to the Main Menu. Return to MSH Management Module [Ctrl] + [P] When logged on locally, this returns you to the MSH Management Module screens. We recommend you log off the bridge before entering this command. Move up [Up Arrow] Selects the previous menu item or highlights the previous entry field.
2-10 CHAPTER 2: GETTING STARTED Table 2-1 Bridge Control Keys Key Description Refresh screen [Ctrl] + [V] [Esc] [V] Refreshes the screen. Next step [Esc] [N] Takes you to the next menu or screen, or returns you from help. Using this from a menu, takes you to the screen associated with the highlighted item. Interrupt Telnet [Break] Interrupts a Telnet connection without waiting for it to time out.
Simple Bridge Configuration 2-11 Simple Bridge Configuration This section describes how to configure a simple bridge that connects up to four network segments. Ensure all bridge connections are in place before you start. Initially, the bridge has no IP address. Without a unique IP address, it cannot be remotely managed, so you must first log on to the LinkBuilder MSH, then log on to the bridge, then set up a unique IP address.
2-12 CHAPTER 2: GETTING STARTED Logging On To The LinkBuilder MSH Logging on to the LinkBuilder MSH is also described in The LinkBuilder MSH Management Module manual. Connect to the LinkBuilder MSH. The Main Banner appears, as shown in Figure 2-3. Press [Enter] to continue.
Simple Bridge Configuration 2-13 The Logon screen appears and stays displayed until a valid User Name and Password have been entered, as shown in Figure 2-4. Enter a User Name and Password for the LinkBuilder MSH.
2-14 CHAPTER 2: GETTING STARTED When you are logged on to the LinkBuilder MSH, the Main Menu appears, as shown in Figure 2-5. It offers various LinkBuilder MSH management options. The LOGOFF option closes down the session, allowing the interface to ‘sleep’. Select SERVICE SELECTION.
Simple Bridge Configuration 2-15 The Service Selection screen appears, listing all the services within the LinkBuilder MSH Chassis with the number of the slot or backplane to which it is attached, as shown in Figure 2-6. Highlight 4 PORT .3 BRIDGE, press [Space] and select OK to select the LinkBuilder MSH 4 Port Ethernet Bridge Module.
2-16 CHAPTER 2: GETTING STARTED The Address Table screen appears, showing default address information for the bridge, as shown in Figure 2-7. If the bridge's IP address is unconfigured, a random IP address is shown. Select MANAGE to continue.
Simple Bridge Configuration 2-17 Logging On To The Bridge When you connect to the bridge, the Operator Login screen appears, as shown in Figure 2-8. Until it is configured, the bridge has no Operator IDs or Passwords, meaning that the bridge has no security. You must set up an administrator account before any security becomes active. This configuration includes this set up. If no accounts have been set up, press [Enter] for both fields.
2-18 CHAPTER 2: GETTING STARTED Establishing Operator Accounts When you have logged on to the bridge, the bridge's Main Menu appears, offering various management options, as shown in Figure 2-9. The bridge's security is disabled if no administrative operator accounts have been set up, so you should set up these accounts first. Select CONFIGURATION.
Simple Bridge Configuration 2-19 The Configuration menu appears, as shown in Figure 2-10. You can access all the configuration screens and sub-menus from this menu. Select SYSTEM. Figure 2-10 Configuration Menu The System menu appears. Select OPERATOR ACCOUNTS from the System menu.
2-20 CHAPTER 2: GETTING STARTED The Operator Accounts screen appears, listing the operator accounts that are set up for the bridge, see Figure 2-11. You can set up 60 operator accounts for the bridge. Enter the number of the operator account you want to set up. Figure 2-11 Operator Accounts No: Display Field. The account numbers of the 60 accounts. Account: Display Field. The operator ID for the account. This can be changed with the Edit User Accounts screen that follows on from this screen.
Simple Bridge Configuration 2-21 Account Number: Text Field. Enter the account number of the operator you want to set up. You can set up from 1 to 60 accounts. After entering an account number, the Edit User Accounts screen appears.
2-22 CHAPTER 2: GETTING STARTED The Edit User Accounts screen appears with information on the operator account you entered in the Operator Accounts screen, as shown in Figure 2-12. You use this screen for entering and modifying operator account information. Any existing information is displayed. Set up operator accounts by entering an Operator ID, Operator Privilege and Password (repeat the Password for verification). To set up a different operator account, enter its Account Number.
Simple Bridge Configuration 2-23 Operator Privilege: Choice Field (A / O). Designate the privileges for the operator. A is for administrator and O is for operator. Bridge operators can be set up with either Administrator or Operator privileges. Operators with Administrator privileges are unrestricted. Operators with Operator privileges cannot configure the bridge, initialize NVRAM, or reset the bridge. Security checking remains disabled if no operators are allocated administrator privileges.
2-24 CHAPTER 2: GETTING STARTED Adding Bridge Information You should provide general device information for your bridge the first time you set it up. This information is required by all MIB II conformant devices and is generally useful because it includes the location of the bridge and the name of the person responsible for it (useful if the bridge is not operating correctly). Select SYSTEM INFORMATION from the System menu. The System Information screen appears, as shown in Figure 2-13.
Simple Bridge Configuration 2-25 System Contact: Text Field. Enter the name of the person who is responsible for the bridge. This is a string of 1 to 16 characters. Changes to this field are only saved during a bridge reset, and take effect from then on. System Location: Text Field. Enter the physical location of the bridge. This helps if ever it needs to be located. This is a string of 1 to 16 characters. Changes to this field are only saved during a bridge reset, and take effect from then on.
2-26 CHAPTER 2: GETTING STARTED Saving And Making Changes Effective Some of the changes you can make to the bridge are not saved if you simply log off. However, not all fields require a bridge reset to save them and make them effective. The field descriptions that accompany each screen, in this manual, describe the necessary procedures. Any changes that are saved, are saved in NVRAM (Non Volatile Random Access Memory). Changes in NVRAM are remembered over a power cycle.
Simple Bridge Configuration 2-27 Erasing All Changes If you want to erase all the changes made to the bridge since logging on, simply log off the bridge. However, if you want to erase all the changes ever made to the bridge, you must initialize NVRAM (Non Volatile Random Access Memory) and reset the bridge. If you initialize NVRAM but do not reset the bridge, logging off instead, the changes will not be erased. Select INITIALIZE NOVRAM from the Configuration menu.
2-28 CHAPTER 2: GETTING STARTED Logging Off The Bridge Selecting LOGOUT from the Main Menu will log you off the bridge and return you to the display you had before logging on. Any changes that have been made since logging on will be erased. Most fields, but not all, require a bridge reset to save them and make them effective, see Saving And Making Changes Effective on page 2-26. We recommend that you log off the bridge before returning to the MSH Management Module screens.
IP Address Configuration 2-29 IP Address Configuration This section describes how to assign an IP address to the bridge. When the bridge has an IP address, you can remotely manage it via Telnet, and will not need to go through the LinkBuilder MSH. Telnet is a TCP/IP application. SNMP also requires the bridge to have an IP address.
2-30 CHAPTER 2: GETTING STARTED Bridge Connections The Telnet protocol is used for remotely logging on to a device. The following requirements must be met for remote login: ■ You must have an account on the host and you must know the operator ID and password for that account. ■ You must know either the host name or IP address of the host. You can only use the host names configured in your local IP Host Table screen. ■ If you are logging on from a remote host, the terminal must support VT100.
IP Address Configuration 2-31 Setting Up Remote Access Initially, the bridge has no IP addressing information. When set up, the IP address identifies the bridge. The IP Addresses screen is used for setting up an IP address for the bridge so that other devices can communicate with its management agent. Select CONFIGURATION from the Main Menu. Select NETWORK PROTOCOL from the Configuration menu. Select IP ADDRESSES from the Network Protocol menu.
2-32 CHAPTER 2: GETTING STARTED Active IP Address: Display Field. The bridge's current IP address. A line of dashes indicates that no IP address has been assigned to the bridge. Subnet Mask: Display Field. The bridge's current subnet mask. Next Reset IP Address: Text Field. Enter the IP address you want to assign to the bridge. It must be unique and of the form nnn.nnn.nnn.nnn (decimal). Enter 0.0.0.0 to remove the bridge's IP address.
IP Address Configuration 2-33 Static Routes If you are using a routed network, you will need to enter a default gateway to ensure remote communication with the bridge. A more resilient network can be set up by defining a set of static routes. Static routes are predefined routes, with different levels of priority, through the routed network. The highest priority route will be used until a router or cable goes down, breaking the route. When this happens, the next priority route is used.
2-34 CHAPTER 2: GETTING STARTED Item: Text Field. The number of a configured static route or 0 (to enter a new route). Static routes are sorted by IP address and assigned numbers according to their positions in the sorted list. Entering the number of a configured static route causes that route to be displayed. Destination Host: Text Field. The IP address of a network, host, or gateway, or a [Space] character, or the keyword default. Specify the address in decimal notation, nnn.nnn.nnn.nnn.
IP Address Configuration 2-35 Preference: Text Field. A whole number from 0 to 255, designating the rank to be assigned to the route specified by the DESTINATION HOST and GATEWAY fields. 0 represents the most desirable route, 255 represents the least desirable route. The default is 50. Enter y for the SAVE CHANGES? field to save changes to this field. Changes only take effect after a bridge reset. Save changes?: Text Field.
2-36 CHAPTER 2: GETTING STARTED Assigning Host Name / IP Address Pairs You can assign symbolic names (host names) for devices that can communicate with or from the bridge. If a device has an IP address, a host name can be assigned to it. This host name can then be used instead of the IP address to identify the device, when using the bridge. It is not necessary to assign host names, but they are a lot easier to remember than IP addresses.
IP Address Configuration 2-37 IP Address: Text Field. Enter the IP address for the device. It must be in decimal and of the form nnn.nnn.nnn.nnn. Changes to this field are only saved during a bridge reset, and take effect from then on. Host Name: Text Field. Enter the host name for the device. Changes to this field are only saved during a bridge reset, and take effect from then on.
2-38 CHAPTER 2: GETTING STARTED Using PING To Test Connections The PING (Packet InterNet Groper) program checks for a valid connection to a network device. Any device with an IP address can respond to a PING session. It tests network connections by sending packets to a specified IP address and checking the response. If you have just set up address information for the bridge, reset the bridge to save the information and for it to take effect.
IP Address Configuration 2-39 Select PING from the Applications menu. The Ping Settings screen appears, as shown in Figure 2-19. Enter the IP address or host name of the remote device and confirm the packet size and timeout parameters (modify these only if necessary). Figure 2-19 Ping Settings Destination IP address: Text Field. Enter the IP address for the remote device. It must be in decimal and of the form nnn.nnn.nnn.nnn. or Enter the host name for the remote device.
2-40 CHAPTER 2: GETTING STARTED The Ping screen appears, as shown in Figure 2-20, after the information for the Ping Settings screen has been supplied. The Ping screen immediately starts displaying status messages when information is received. When you've finished with the Ping screen, press [Enter] or [Return] to exit from it. Figure 2-20 Ping Destination: Display Field. The IP address or host name of the remote device being pinged. Packet Size: Display Field.
IP Address Configuration 2-41 Packets Received: Display Field. The number of ICMP echo response messages that have been received from the destination address. Minimum: Display Field. The shortest amount of time (in milliseconds) that elapsed between sending an ICMP echo request and receiving an ICMP echo response. Average: Display Field. The average amount of time (in milliseconds) that elapsed between sending an ICMP echo request and receiving an ICMP echo response. Maximum: Display Field.
2-42 CHAPTER 2: GETTING STARTED Telnet Log On To Another IP Device From The Bridge The bridge has Telnet capabilities, allowing you to remotely log on to an IP device. This is especially useful for logging on to other LinkBuilder MSH 4 Port Bridge Modules. However, the bridge does not always allow you to Telnet out. For information on when you can Telnet, see Bridge Connections on page 2-30. You may wish to Telnet to the LinkBuilder MSH Management Module. Select APPLICATIONS from the Main Menu.
IP Address Configuration ■ 2-43 If the Remote Connect screen appears, as shown in Figure 2-21, you are allowed to Telnet out from the bridge. Enter the host name or IP address of the device you want to log on to. If you use a host name, it must appear in the bridge's host table. If you use an IP address, it must be in the decimal form nnn.nnn.nnn.nnn.
2-44 CHAPTER 2: GETTING STARTED Talking To Another Bridge User The bridge can accept two users, one local and one remote. If both users are present, they can exchange messages via the Chat screen. The Chat screen, as shown in Figure 2-22, is intended for exchanging uncomplicated information: ■ Warning the other user that you are about to reset the bridge or change its configuration. ■ Exchanging telephone numbers so you can discuss any network issues you may have.
IP Address Configuration 2-45 Telnet Suspension You can suspend your Telnet session from the bridge at any time. You may want to do this if you want to return to the bridge but stay connected to the remote device. To suspend a remote session, press [Ctrl] + [ ] ]. You will be returned to the Main Menu of the bridge. To resume a suspended session, press [Ctrl] + [ ] ] again. Telnet Log Off To disconnect from the remote device, select END CONNECTION from the Connections menu.
2-46 CHAPTER 2: GETTING STARTED SNMP Configuration This section describes configuration of the SNMP agent on the bridge. When the SNMP agent has been configured, SNMP applications can obtain information from it about the bridge. This section describes how to: ■ Configure the basic characteristics of each community and globally enable or disable the Authentication Failure trap. ■ Enable traps for individual communities and specify the IP addresses to which the traps should be sent.
SNMP Configuration 2-47 Traps An SNMP agent can send messages, traps, when exceptional events occur. Traps include the name of the community involved in the event. They are sent to an IP address that you define for each community during configuration of the agent. The main advantage of traps is that you do not have to constantly monitor the bridge because it alerts you when any exceptional events occur.
2-48 CHAPTER 2: GETTING STARTED Configuring Basic Community Characteristics Select CONFIGURATION from the Main Menu and then NETWORK PROTOCOL from the Configuration menu. Select SNMP from the Network Protocol menu to get the Configure SNMP menu. Select COMMUNITIES from the Configure SNMP menu. The SNMP Community Basic Configuration screen appears, as shown in Figure 2-24. You use this screen for enabling or disabling the authentication trap for the SNMP agent running on the bridge.
SNMP Configuration 2-49 Authentication Failure Trap: Text Field (e / d). Enable or disable the authentication failure trap for the SNMP agent. Enter e to enable, or enter d to disable. The default is disable. If the trap is enabled, the agent generates a trap message whenever a client tries to access it using a community name you have not defined. The message is sent to the trap destination of each community for which traps are enabled.
2-50 CHAPTER 2: GETTING STARTED Access: Text Field (r/o / r/w). Enter the access mode for the community's MIB view. The effect this has on operations permissible for the community depends on the ACCESS: in the MIB definition of the object. Enter r/o to specify that the community can perform read operations (GET and TRAP) on the value of a MIB object in the MIB view, if the object's MIB ACCESS: is read-write or read-only. The value of an object whose ACCESS: is write-only or not-accessible cannot be read.
SNMP Configuration 2-51 Configuring Community Traps Select COMMUNITY TRAPS from the Configure SNMP menu. The SNMP Community Trap Configuration screen appears, as shown in Figure 2-25, displaying the existing community name (configured in the SNMP Community Basic Configuration screen). You use this screen for configuring the community name, enabling or disabling traps, defining the device to which the agent is to send trap messages, and defining the UDP port to which the agent is to send trap messages.
2-52 CHAPTER 2: GETTING STARTED IP Address / Host Name: Text Field. The host to which traps pertaining to the community name are to be sent. Specify either an IP address in the dotted decimal notation (nnn.nnn.nnn.nnn), or the name of the host that has been defined in the host table (via the IP Host Table screen). If you enter a host name defined in the host table, the corresponding IP address is displayed preceding the name.
SNMP Configuration 2-53 Enable: Text Field (y / n). Enter y to enable, or n to disable the Authentication Failure, Cold Start, Interface Up, Interface Down, New Root and Topology Change traps. An Authentication Failure trap is generated when an SNMP client has tried to access the agent using a community name the agent does not recognize. The Authentication Failure trap must also be enabled on the SNMP Community Basic Configuration screen.
2-54 CHAPTER 2: GETTING STARTED DUA1860-0AAA01
3 ADVANCED BRIDGING This chapter contains the following topics: ■ Spanning Tree Configuration ■ Custom Filter Configuration
3-2 CHAPTER 3: ADVANCED BRIDGING Introduction This chapter describes how to set up the bridge's advanced features. If you have not previously set up the bridge, read Chapter 2. Spanning Tree Configuration The Spanning Tree Algorithm and Protocol (STAP) is explained in the IEEE Computer Society's MAC Bridges P802.1D document. You should not change any spanning tree parameters unless you have significant knowledge and experience with the Spanning Tree Algorithm and Protocol (STAP).
Spanning Tree Configuration 3-3 Spanning Tree Bridge Configuration Select CONFIGURATION from the Main Menu. Select BRIDGES from the Configuration menu. Select SPANNING TREE from the Bridges menu. The Spanning Tree screen appears, as shown in Figure 3-1. You use this screen for editing the bridge's spanning tree information. The screen is split and shows the spanning tree information for this bridge (on the left) and the current root bridge (on the right).
3-4 CHAPTER 3: ADVANCED BRIDGING ID: Display Field. The identification number for the bridge. The ID number uniquely identifies each bridge. The number is a combination of the lowest Ethernet device address on the bridge and a hexadecimal representation of the PRIORITY field. The Ethernet device address is hard-coded in the Ethernet chip and cannot be changed. Priority: Text Field. Enter the priority of the bridge.
Spanning Tree Configuration 3-5 Hello Time: Text Field. Enter the hello time for the bridge. The hello time is the amount of time the bridge pauses between sending spanning tree configuration C-BPDUs. The hello time must be between 1 and 10 seconds and must be lower than the maximum age. The default is 2 seconds. Changes to this field are saved and take effect immediately. Forward Delay: Text Field. Enter the forward delay for the bridge.
3-6 CHAPTER 3: ADVANCED BRIDGING Spanning Tree Port Configuration Select SPANNING PORT from the Bridges menu. The Port Settings screen appears, as shown in Figure 3-2. You use this screen for editing various port spanning tree information. The screen is split and shows the spanning tree information for this bridge (on the left) and the current root bridge (on the right).
Spanning Tree Configuration 3-7 Port: Text Field. Enter the name of the port who's spanning tree parameters you want to change. Use 1, 2, 3 or E. ID: Display Field. The identification number for the port. The port's ID is the same as the bridge's ID, which is a combination of two numbers, the bridge priority and the Ethernet address of the bridge. State: Display Field. The current status of the port. This value changes depending on when you view it, or when you enable or disable a port.
3-8 CHAPTER 3: ADVANCED BRIDGING Path Cost: Text Field. Enter the path cost. The path cost represents the performance cost of sending information through a port and measures the impact of sending packets through the network. The path cost setting establishes a hierarchy among the ports of the spanning tree topology. A high cost indicates a low position in the topology. A low cost indicates a high position in the topology.
Custom Filter Configuration 3-9 Custom Filter Configuration You can control the traffic that flows through the bridge by using the bridge's custom filters. For example, you can prevent communication between specific devices, and allow only TCP/IP communication between specific bridge ports. The basic concepts of custom filtering are explained in Bridge Filters on page 1-20. If you are unfamiliar with filtering, it is easy to produce unexpected results.
3-10 CHAPTER 3: ADVANCED BRIDGING Setting Up A Host-to-Host Filter Set Select CONFIGURATION from the Main Menu. Select BRIDGES from the Configuration menu. Select BRIDGE FILTERS from the Bridges menu. The Bridge Filters menu lists each filter option. Selecting the relevant filter will take you through to that filter's setup screen. Select HOST-TO-HOST from the Bridge Filters menu. The Host-to-Host screen appears, as shown in Figure 3-3. You use this screen for setting up host-to-host filter sets.
Custom Filter Configuration 3-11 Set Number: Text Field. Enter the number of the filter set you want to set up. You can use any number from 1 to 32 but remember that set number 1 is the absolute exclusion set. Press [Return] to accept the set number. Set Name: Text Field. This is optional. Enter a name for the filter set. The set name helps you identify the set. Set Type: Text Field. Ensure this is `inclusion' (for sets 2 to 32). Set number 1 is the absolute exclusion set. Host Name: Text Field.
3-12 CHAPTER 3: ADVANCED BRIDGING Saving Host-to-Host Filters When you have set up your filter sets, you must use the Filter Options screen to save them. Exit from the Host-to-Host screen and select FILTER SWITCHES from the Bridge Filters menu. You also use the Filter Options screen for enabling and disabling filters. Enter y for the SAVE HTOH SETS INFO? field and the SAVE HOST TABLE INFO? field. Reset the bridge.
Custom Filter Configuration 3-13 Setting Up A Host-to-Port Filter Set Select HOST-TO-PORT from the Bridge Filters menu. The Host-to-Port screen appears, as shown in Figure 3-4. You use this screen for setting up a port's host-to-port filter set. The screen displays the hosts included in the filter set of the port denoted in the PORT NAME field. Simply alter this field to work on a different filter set. There are four host-to-port filter sets, one for each port. Enter all hosts that belong to the set.
3-14 CHAPTER 3: ADVANCED BRIDGING Set Type: Text Field (inclusion / exclusion). Enter the filter set's type. You can define a filter set by inclusion or exclusion. Enter inclusion to define the filter set as inclusion, or exclusion to define the filter set as exclusion. The default is inclusion. For example, if you want to allow communication between a few devices and a port, list the devices and define the set by inclusion.
Custom Filter Configuration 3-15 Saving Host-to-Port Filters When you have set up your filter sets, you must use the Filter Options screen to save them. Exit from the Host-to-Port screen and select FILTER SWITCHES from the Bridge Filters menu. You also use the Filter Options screen for enabling and disabling filters. Enter y for the SAVE HTOP SETS INFO? field and the SAVE HOST TABLE INFO? field. Reset the bridge.
3-16 CHAPTER 3: ADVANCED BRIDGING Setting Up A Port-to-Port Filter Set Select PORT-TO-PORT from the Bridge Filters menu. The Port-to-Port screen appears, as shown in Figure 3-5. You use this screen for setting up a port's port-to-port filter set. The screen displays the ports included in the filter set of the port denoted in the SET PORT SYMBOLIC NAME field. Simply alter this field to work on a different port's filter set. There are four port-to-port filter sets, one for each port.
Custom Filter Configuration 3-17 Set Name: Text Field. This is optional. Enter a name for the filter set. The set name helps you identify the set. If you enter a name that is already used for a port-to-port filter set, that filter set will be displayed. Ports Member: Text Field (1 / 0). Move to the field, under PORTS MEMBER, next to the relevant port. Enter 1 to include the port as a member of the filter set, or 0 to exclude the port as a member of the filter set. The default is 1.
3-18 CHAPTER 3: ADVANCED BRIDGING Setting Up A Multicast-to-Port Filter Set Select MULTICAST from the Bridge Filters menu. The Multicast screen appears, as shown in Figure 3-6. You use this screen for setting up a port's multicast-to-port filter set. The screen displays the ports included in the filter set of the port denoted in the SET PORT SYMBOLIC NAME field. Simply alter this field to work on a different port's filter set. There are four multicast-to-port filter sets, one for each port.
Custom Filter Configuration 3-19 Set Name: Text Field. This is optional. Enter a name for the filter set. The set name helps you identify the set. If you enter a name that is already used for a multicast-to-port filter set, that filter set will be displayed. Ports Member: Text Field (1 / 0). Move to the field, under PORTS MEMBER, next to the relevant port. Enter 1 to include the port as a member of the filter set, or 0 to exclude the port as a member of the filter set. The default is 1.
3-20 CHAPTER 3: ADVANCED BRIDGING Setting Up A Protocol Filter Set Select PROTOCOL from the Bridge Filters menu. The Protocol screen appears, as shown in Figure 3-7. You use this screen for setting up a protocol filter set. The screen displays protocol families (on the left) and individual protocols (on the right), included in the filter set of the port denoted in the SET PORT SYMBOLIC NAME field. Simply alter this field to work on a different port's filter set.
Custom Filter Configuration 3-21 permit/deny: Text Field (permit / deny). Denote whether you want the protocols listed as members of the filter set to be forwarded (permitted) or filtered (denied). Enter permit to forward all packets with protocols listed as members, or deny to filter all packets with protocols listed as members. The default is deny with no protocols listed as members. MEMBER: Text Field (1 / 0). Move to the field, under MEMBER, next to the relevant protocol family.
3-22 CHAPTER 3: ADVANCED BRIDGING Saving Protocol Filters When you have set up your filter sets, you must use the Filter Options screen to save them. Exit from the Protocol screen and select FILTER SWITCHES from the Bridge Filters menu. You also use the Filter Options screen for enabling and disabling filters. Enter y for the SAVE PROTOCOL INFO? field. Reset the bridge.
Custom Filter Configuration 3-23 Setting Up A Bit Filter Select BIT FILTERS from the Bridge Filters menu. The Configure Bit Filters screen appears, as shown in Figure 3-8. You use this screen for setting up bit filters, of which you can have up to five input and five output bit filters. The screen displays the bit filters' names (on the left) and a bit filter edit area (on the right).
3-24 CHAPTER 3: ADVANCED BRIDGING Function: Text Field (O / I / A / Dn / En / n / S / H). Enter O to choose the output filter type, or I to choose the input filter type. Press [Return]. The NAME list will change to show existing filters of the chosen type. Enter A to add a bit filter of the chosen filter type. Enter Dn to delete filter entry n from the list. For example, D2 will delete the second entry. Enter En to edit filter entry n in the list. Enter n to adjust the list to begin with entry n.
Custom Filter Configuration 3-25 Byte Offset: Text Field. Defines the location of the beginning of VALUE as the number of bytes from the beginning of the frame. It can be a number from 0 to 58. For example, a byte offset of 12 lines up VALUE with the Ethernet type field, as shown in Figure 3-9. Destination Source Type Data (including other headers) 0 6 12 14 Figure 3-9 Ethernet Header Showing Byte Offsets Action: Text Field (filter / pass). The action the filter set will take with relevant packets.
3-26 CHAPTER 3: ADVANCED BRIDGING Saving Bit Filters When you have set up your bit filters, you can use the Configure Bit Filters screen or the Filter Options screen to save them. To save bit filters with the Configure Bit Filters screen, enter S for the FUNCTION: field. To save bit filters with the Filter Options screen, enter y for the SAVE BIT FILTER INFO? field. Reset the bridge.
Custom Filter Configuration 3-27 The Host Filtering Table It can be confusing to know which host-to-host and host-to-port filter sets devices are in. All devices entered into these filter sets are added to the bridge's host filtering table. The Host Filter Info screen is a very useful screen which uses this host filtering table to show which sets devices are in. You can also use it to change the contents of the filter sets. Select HOST FILTER INFO from the Bridge Filters menu.
3-28 CHAPTER 3: ADVANCED BRIDGING Table Size: Display Field. The number of devices in the host filtering table (including the default host). Add htoh: Text Field. Enter the number of the host-to-host set you want to add the device to. Enter 0 if you do not want to add the device to any host-to-host set. Remove htoh: Text Field. Enter the number of the host-to-host set you want to remove the device from. Enter 0 if you do not want to remove the device from any host-to-host set. Add htop: Text Field.
Custom Filter Configuration 3-29 Saving Host Filtering Table And Filter Set Changes Use the Filter Options screen to save any changes made. Exit from the Host Filter Info screen and select FILTER SWITCHES from the Bridge Filters menu. You also use the Filter Options screen for enabling and disabling filters. To save changes to the host-to-host filter sets, enter y for the SAVE HTOH SETS INFO? field and the SAVE HOST TABLE INFO? field.
3-30 CHAPTER 3: ADVANCED BRIDGING Saving And Turning Filters On And Off You will need to turn bridge filters on for them to take effect. You can turn them all on individually or all at once. Select FILTER SWITCHES from the Bridge Filters menu. The Filter Options screen appears, as shown in Figure 3-11. You use this screen for saving filters and enabling / disabling them. This screen is used for saving custom filtering information.
Custom Filter Configuration 3-31 To disable all filters: 1 Enter off for the FILTERING ON/OFF field. 2 Reset the bridge. In all cases, resetting the bridge causes the desired filtering to take effect. Any changes to filter sets that are in operation, take effect immediately.
3-32 CHAPTER 3: ADVANCED BRIDGING DUA1860-0AAA01
4 MONITORING This chapter contains the following topics: ■ Checking Bridge Statistics ■ Checking Port Activity ■ Viewing Ethernet Statistics ■ Checking User Access
4-2 CHAPTER 4: MONITORING Introduction This chapter describes simple checks you can make at regular intervals to ensure the bridge and network are working as you intend. If you want information on other monitoring screens, refer to Chapter 5. Monitoring the bridge and network is a good way of ensuring that the bridge and network are working as you intend. It is a good idea to have a regular checklist of monitoring screens.
Checking Bridge Statistics 4-3 Checking Bridge Statistics Select MONITORING from the Main Menu. Select BRIDGES from the Monitoring menu. Select BRIDGE STATISTICS from the Bridges menu. The Bridge Statistics screen appears, as shown in Figure 4-1. You use this screen for monitoring the various port and spanning tree parameters. These statistics display the state of the ports and the traffic on the bridge. This screen is useful as a problem solving aid.
4-4 CHAPTER 4: MONITORING Port State: Display Field. Displays the ports and their present state. The possible states are MOS, Forwarding, Blocking, Listening and Learning. The external port may go into a disconnected state (DCONN) when a segment has not been attached, or a transceiver module is not fitted. MOS (Manually Out of Service) means that the port has been manually disabled by a bridge administrator. No network traffic passes through it.
Checking Bridge Statistics 4-5 Learning means that the port is one step closer to bridging packets. Since the active topology may still be changing, a port in this state receives packets but does not bridge them. However, because the active topology is more stable than when the port is in the listening state, the port participates in the learning process of its bridge.
4-6 CHAPTER 4: MONITORING Pkts Filter: Display Field. The number of packets filtered by the bridge. Fwd: Display Field. The number of packets forwarded by the bridge. Also counts flooded packets. Flood: Display Field. The number of packets flooded by the bridge, regardless of whether they are filtered by ports. Queued: Display Field. This indicates that buffers allocated to bridge ports have been full. Receptions from or transmissions out of them have therefore been queued. Discards: Display Field.
Checking Bridge Statistics 4-7 There are three major observations you can make from the Bridge Statistics screen: ■ Note the status of each port. You can check the status of each port to see if it is abnormal. ■ Note the overall traffic. Occasional errors and overruns are normal in busy networks but you should investigate unusually high numbers in these fields. Familiarize yourself with normal received and transmitted traffic volumes for your configuration.
4-8 CHAPTER 4: MONITORING Checking Port Activity You can monitor individual bridge port activity for more specific traffic information if you suspect a problem with a port. Select BRIDGE PORT STATS from the Bridges menu. The Bridge Port Statistics screen appears, as shown in Figure 4-2. You use this screen for viewing statistics on packets received, transmitted and filtered by a port. The help screen for this screen displays port states that you will not see in this version of the product.
Checking Port Activity 4-9 Averaging: Display Field. This field displays whether the averaging feature has been turned on or off. If it is on, the number of packets or bytes displayed on this screen reflect averages per second. If it is off, the screen displays the numbers of packets or bytes accumulated since power-up. This feature is set on the System Information screen. The default is on. Port State: Display Field. Displays the ports and their present state.
4-10 CHAPTER 4: MONITORING Listening means that the port is preparing to enter the active topology. At this point the port is not used for bridging packets, but C-BPDUs are received and transmitted on it, and it is included in the spanning tree calculations. If, after a predetermined amount of time, no information has been received indicating that the port should be blocked, the port passes into the learning state. Learning means that the port is one step closer to bridging packets.
Checking Port Activity 4-11 Pkts Filter: Display Field. The number of packets filtered by the port. Fwd: Display Field. The number of packets forwarded by the port. Also counts flooded packets. Flood: Display Field. The number of packets flooded by the port, regardless of whether they are filtered by ports. Queued: Display Field. This indicates that the buffer allocated to the bridge port has been full. Receptions from or transmissions out of it have therefore been queued. Discards: Display Field.
4-12 CHAPTER 4: MONITORING Viewing Ethernet Statistics You can use the Ethernet Statistics screen to check for suspected hardware problems on a port. Select MONITORING from the Main Menu. Select PHYSICAL INTERFACES from the Monitoring menu. Select ETHER STATISTICS from the Physical Interfaces menu. The Ethernet Statistics screen appears, as shown in Figure 4-3. You use this screen for viewing statistics of individual bridge ports.
Viewing Ethernet Statistics 4-13 Received Bytes: Display Field. The number of bytes received by the port. Packets: Display Field. The number of packets received by the port. Multicasts: Display Field. The number of multicast packets received by the port. Broadcasts: Display Field. The number of broadcast packets received by the port. Flooded: Display Field. The number of packets ’flooded’ by the port. When the destination address is unknown, packets are forwarded to all but the receiving port.
4-14 CHAPTER 4: MONITORING Overflow: Display Field. Due to exceptional loading conditions, the bridge has become overloaded and packets have been lost. Buffer: Display Field. Due to exceptional loading conditions, the bridge has become overloaded and packets have been lost. Transmitted Bytes: Display Field. The number of bytes transmitted by the port. Packets: Display Field. The number of packets transmitted by the port. Multicasts: Display Field. The number of multicast packets transmitted by the port.
Viewing Ethernet Statistics 4-15 Deferrals: Display Field. The total number of deferrals on this port. Carrier Loss: Display Field. During a transmission, carrier loss was detected. Underflow: Display Field. Due to exceptional loading conditions, the bridge has become overloaded and packets have been lost. Buffer: Display Field. Due to exceptional loading conditions, the bridge has become overloaded and packets have been lost.
4-16 CHAPTER 4: MONITORING Checking User Access Select MONITORING from the Main Menu. Select SYSTEM from the Monitoring menu. Select LOGIN HISTORY from the System menu. The Login History screen appears, as shown in Figure 4-4. You use this screen to view details of logins since the bridge was last reset. This is useful for detecting attempted security breaches. The screen displays entries for the ten most recent logins.
Checking User Access 4-17 Number of unsuccessful logins: Display Field. The number of logins since the last bridge reset. An unsuccessful login can result from an incorrect entry of an operator ID or password.
4-18 CHAPTER 4: MONITORING DUA1860-0AAA01
5 FURTHER CONFIGURATION AND MONITORING This chapter contains the following topics: ■ General Help ■ Configuration ■ Monitoring ■ Viewing Node Table Information ■ Viewing UDP Statistics
5-2 CHAPTER 5: FURTHER CONFIGURATION AND MONITORING General Help Select GENERAL HELP from the Main Menu. The General Help screen appears, providing information on how to control the VT100 bridge management screens. When you are looking at a screen or menu, you can obtain help by typing ? at the prompt. Some screens have their own, more specific, help screens which will appear instead of the General Help screen.
Configuration 5-3 Configuration Downloading Software Upgrades Select CONFIGURATION from the Main Menu. Select SYSTEM from the Configuration menu. Select BOOT/LOADER INFO from the System menu. The Boot/Loader Info screen appears, as shown in Figure 5-1. You use this screen for downloading any upgrades to the bridge's software. Ensure the bridge has an IP address before attempting this procedure. Figure 5-1 Boot/Loader Info File Name: Text Field.
5-4 CHAPTER 5: FURTHER CONFIGURATION AND MONITORING Gateway IP Address: Text Field. If you're on a routed network, you will need to enter the IP address of a suitable gateway through which the server can be accessed. Download new software after reboot: Text Field. Enter yes to download the new software. Reset the bridge to start the procedure. Enter no to return to the FILE NAME field. To leave this screen, back out as normal. The default is no.
Configuration ■ 5-5 Software does not download The Boot Block User Interface appears, as shown in Figure 5-2, prompting you to change download information. You can do one of two things: ■ Change the download information Enter 1 to update download parameters. The screen for changing download information appears, as shown in Figure 5-3. Enter the correct information and save the changes (enter 5). Return to the Boot Block User Interface and enter 2.
5-6 CHAPTER 5: FURTHER CONFIGURATION AND MONITORING The Permanent Database Upto 1000 entries in the filtering database can be made permanent. Permanent entries are non-volatile and will not age. Entries can be added, deleted or transferred. Add Permanent Entry Select CONFIGURATION from the Main Menu. Select BRIDGES from the Configuration menu. Select PERMANENT DATABASE from the Bridges menu. Select ADD ENTRY from the Permanent Database menu. The Add Permanent Entry screen appears, as shown in Figure 5-4.
Configuration 5-7 Port Name: Text Field. The port you want to make the device permanent for. Changes to this field are saved immediately. Reset the bridge for the change to take effect. Total Entries: Display Field. The total number of permanent entries in the filtering database.
5-8 CHAPTER 5: FURTHER CONFIGURATION AND MONITORING Delete Permanent Entry Select CONFIGURATION from the Main Menu. Select BRIDGES from the Configuration menu. Select PERMANENT DATABASE from the Bridges menu. Select DELETE ENTRY from the Permanent Database menu. The Delete Permanent Entry screen appears, as shown in Figure 5-5. You use this screen for deleting permanent entries from the filtering database. Figure 5-5 Delete Permanent Entry Ethernet Address: Text Field.
Configuration 5-9 Transfer Permanent Entries Select CONFIGURATION from the Main Menu. Select BRIDGES from the Configuration menu. Select PERMANENT DATABASE from the Bridges menu. Select TRANSFER ENTRIES from the Permanent Database menu. The Transfer Permanent Entries screen appears, as shown in Figure 5-6. You use this screen for transferring learnt addresses from the filtering database to the permanent database. The permanent database can hold up to 1000 entries.
5-10 CHAPTER 5: FURTHER CONFIGURATION AND MONITORING Editing ARP Information ARP Parameters Select CONFIGURATION from the Main Menu. Select NETWORK PROTOCOL from the Configuration menu. Select ARP from the Network Protocol menu. Select PARAMETERS from the ARP menu. The ARP Parameters screen appears, as shown in Figure 5-7. You use this screen for configuring the way in which the bridge manages the local ARP (Address Resolution Protocol) tables.
Configuration 5-11 Add ARP Entry Select CONFIGURATION from the Main Menu. Select NETWORK PROTOCOL from the Configuration menu. Select ARP from the Network Protocol menu. Select ADD ENTRY from the ARP menu. The Add ARP Entry screen appears, as shown in Figure 5-8. This screen is used for manually adding entries to the ARP tables and is intended for use by Product Support Engineering personnel only.
5-12 CHAPTER 5: FURTHER CONFIGURATION AND MONITORING Delete ARP Entry Select CONFIGURATION from the Main Menu. Select NETWORK PROTOCOL from the Configuration menu. Select ARP from the Network Protocol menu. Select DELETE ENTRY from the ARP menu. The Delete ARP Entry screen appears, as shown in Figure 5-9. This screen is used for manually deleting entries from the ARP tables and is intended for use by Product Support Engineering personnel only.
Configuration 5-13 Changing TCP Characteristics Select CONFIGURATION from the Main Menu. Select NETWORK PROTOCOL from the Configuration menu. Select TCP from the Network Protocol menu. The TCP Protocol Settings screen appears, as shown in Figure 5-10. You use this screen for changing operational characteristics of the bridge's TCP (Transmission Control Protocol) software. TCP supports the operation of Telnet, which allows users to log into remote devices from the bridge.
5-14 CHAPTER 5: FURTHER CONFIGURATION AND MONITORING Changing Telnet Characteristics Select CONFIGURATION from the Main Menu. Select NETWORK PROTOCOL from the Configuration menu. Select TELNET from the Network Protocol menu. The Telnet Protocol Settings screen appears, as shown in Figure 5-11. You use this screen for changing operational characteristics of the bridge's Telnet software. Telnet allows users to log into remote devices from the bridge.
Configuration 5-15 Negotiate display options: Text Field. Causes the local system to display a transcription of the negotiation of virtual terminal options. This negotiation takes place regardless of the value of this parameter, which controls the display of the transcription only. This intended for use by Product Support Engineering personnel only. Enter yes to display negotiations, or no to not display negotiations. The default is no.
5-16 CHAPTER 5: FURTHER CONFIGURATION AND MONITORING Port Queuing Select CONFIGURATION from the Main Menu. Select SOFTWARE QUEUES from the Configuration menu. The Software Queues screen appears, as shown in Figure 5-12. Do not change the default values of 14 (for MAX SIZE) and 10 (for MAX LIFE).
Monitoring 5-17 Monitoring Viewing General Bridge Information Select MONITORING from the Main Menu. Select SYSTEM from the Monitoring menu. Select SYSTEM INFO from the System menu. The General System Information screen appears, as shown in Figure 5-13. You use this screen for viewing general bridge information and statistics. Figure 5-13 General System Information System Name: Display Field. The name by which the bridge is known. This is not it's host name. System Location: Display Field.
5-18 CHAPTER 5: FURTHER CONFIGURATION AND MONITORING Available Buffers: Display Field. The number of buffers currently free in the bridge. This number changes over time. System Type: Display Field. The type of bridge. This entry is automatically set. Serial Number: Display Field. The serial number of the bridge, as recorded in the hardware. Instruction Ram Size: Display Field. The number of bytes of instruction RAM in the bridge. This number only changes if the motherboard changes.
Viewing Node Table Information 5-19 Viewing Node Table Information Node Table By Address Select MONITORING from the Main Menu. Select BRIDGES from the Monitoring menu. Select NODE TABLE/ADDRESS from the Bridges menu. The Node Table By Address screen appears, as shown in Figure 5-14. You use this screen for monitoring traffic by displaying information from the bridge's forwarding database.
5-20 CHAPTER 5: FURTHER CONFIGURATION AND MONITORING Node Table By Hash Bucket Select MONITORING from the Main Menu. Select BRIDGES from the Monitoring menu. Select NODE TABLE/HASH from the Bridges menu. The Node Table By Hash Bucket screen appears, as shown in Figure 5-15. This screen shows the bridge's filtering database, with the permanent and learnt devices. This screen displays a subset of the hash values used by the database.
Viewing Node Table Information 5-21 Total Entries: Display Field. The total number of entries in the filtering database. You can have 4953 entries (additional to the permanent entries). Starting Hash Value: Text Field. The first value of the subset you want to display. Enter a number from 0 to 511. The default is 0. Ageing Timer: Display Field. The number of seconds left in the current ageing time interval. The ageing timer keeps the bridge's forwarding database current.
5-22 CHAPTER 5: FURTHER CONFIGURATION AND MONITORING - indicates that the address has not yet appeared at the port as a source address during the current ageing time interval. When the ageing time interval expires, entries set as - are discarded. Viewing The Hardware Configuration Select MONITORING from the Main Menu. Select PHYS INTERFACES from the Monitoring menu. Select HARDWARE STATUS from the Phys Interfaces menu. The Hardware Configuration screen appears, as shown in Figure 5-16.
Viewing Node Table Information 5-23 Viewing Socket Statistics Select MONITORING from the Main Menu. Select NETWORK PROTOCOL from the Monitoring menu. Select SOCKET STATISTICS from the Network Protocol menu. The Socket Statistics screen appears, as shown in Figure 5-17. You use this screen for checking the status of active socket addresses being used by the bridge. A socket is an address of an application that is using the services of a transport protocol, either UDP or TCP.
5-24 CHAPTER 5: FURTHER CONFIGURATION AND MONITORING Proto: Display Field. The type of protocol in use at the local address displayed in the local address column. Recv-Q: Display Field. The number of bytes of data that have been received and are in the socket buffer waiting to be delivered. Send-Q: Display Field. The number of bytes of data that are in the socket buffer ready to be sent. Local Address: Display Field. The IP address and socket number of the local interface (separated by a period).
Viewing Node Table Information 5-25 FIN_WAIT_1 which means that the socket is closed and the connection is being closed. CLOSING which means that the local socket has closed and is awaiting remote shutdown acknowledgement. LAST_ACK which means that the remote socket has shut down and is awaiting acknowledgement. FIN_WAIT_2 which means that the local socket is closed and is waiting for remote shutdown. TIME_WAIT which means that the local socket is closed and is waiting for remote shutdown re-transmission.
5-26 CHAPTER 5: FURTHER CONFIGURATION AND MONITORING Viewing UDP Statistics Select MONITORING from the Main Menu. Select NETWORK PROTOCOL from the Monitoring menu. Select UDP STATISTICS from the Network Protocol menu. The UDP Statistics screen appears, as shown in Figure 5-18. You use this screen for viewing statistics for the bridge's UDP (User Datagram Protocol) activity. UDP is a transport-layer protocol of the Internet Protocol suite. SNMP uses UDP as its transport protocol.
Viewing UDP Statistics 5-27 Input Packets: Display Field. The total number of UDP packets received by the system. (udpInDatagrams in the MIB.) No Receive Port: Display Field. The number of UDP packets discarded by the system because there was no application at the destination protocol port. (udpNoPorts in the MIB.) Unchecksummed: Display Field. The number of UDP packets received by the system without a checksum in the header (i.e. with a checksum of 0). This is permissible with UDP, but not advisable.
5-28 CHAPTER 5: FURTHER CONFIGURATION AND MONITORING Viewing TCP Information TCP Data Statistics Select MONITORING from the Main Menu. Select NETWORK PROTOCOL from the Monitoring menu. Select TCP STATISTICS from the Network Protocol menu. The TCP Data Statistics screen appears, as shown in Figure 5-19. You use this screen for viewing statistics on a bridge's TCP (Transmission Control Protocol) activity. TCP is a transport-layer protocol of the Internet Protocol suite.
Viewing UDP Statistics 5-29 duplicate acks: Display Field. The number of frames received where the TCP ACK bit was set and the Acknowledgement number was the same as the previously received ACK. acks for unsent data: Display Field. The number of frames received where the TCP ACK bit was set and the Acknowledgement number is greater than the last byte number in the datastream sent so far. pkts rcvd in-sequence: Display Field. The number of packets received where the sequence numbers follow one another.
5-30 CHAPTER 5: FURTHER CONFIGURATION AND MONITORING discarded for bad header offset fields: Display Field. The number of packets received that were discarded because the header offset is invalid. discarded because pkt too short: Display Field. The number of frames received and discarded because the data section ends before the length specified by the TCP LENGTH field. Packets Sent Packets Sent: Display Field. The number of TCP packets sent. data pkts: Display Field.
Viewing UDP Statistics 5-31 TCP Connection Statistics The TCP Connection Statistics screen appears, as shown in Figure 5-20, after the TCP Data Statistics screen. You use this screen for viewing statistics on a bridge's TCP (Transmission Control Protocol) activity. TCP is a transport-layer protocol of the Internet Protocol suite. Telnet uses TCP as its transport protocol. This screen is only of use in rare cases involving Telnet. Figure 5-20 TCP Connection Statistics connection requests: Display Field.
5-32 CHAPTER 5: FURTHER CONFIGURATION AND MONITORING embryonic connections closed: Display Field. The number of connections where a FIN followed a SYN SYN-ACK sequence without an ACK to the SYN-ACK. segments updated rtt: Display Field. The `segment updated rtt' counter. retransmit timeouts: Display Field. The number of times the retransmit timer has fired resulting in retransmission of the previous packet. connections dropped by retransmit timeout: Display Field.
Viewing UDP Statistics 5-33 Viewing IP Statistics Select MONITORING from the Main Menu. Select NETWORK PROTOCOL from the Monitoring menu. Select IP STATISTICS from the Network Protocol menu. The IP Statistics screen appears, as shown in Figure 5-21. You use this screen for viewing a statistical summary for all IP activity on the bridge. All statistic values displayed in this screen reset to zero when the bridge is reset.
5-34 CHAPTER 5: FURTHER CONFIGURATION AND MONITORING with size smaller than minimum: Display Field. The number of TCP packets received where the size of the packet is too small. with data size < data length: Display Field. The number of TCP packets received where the actual data is smaller than that specified in the TCP header. header length < data size: Display Field. The number of TCP packets received where the length specified in the header is smaller than the data received.
Viewing UDP Statistics 5-35 packets were fragmented on transmit: Display Field. The number of fragments the bridge transmitted. The FRAGMENTS CREATED subcount (in brackets) shows the number of fragments this bridge created, as opposed to those that it simply forwarded. packets forwarded: Display Field. The number of packets the bridge has forwarded. packets not forwardable: Display Field. The number of packets the bridge was unable to forward. packets redirects sent: Display Field.
5-36 CHAPTER 5: FURTHER CONFIGURATION AND MONITORING Viewing ICMP Packet Statistics Select MONITORING from the Main Menu. Select NETWORK PROTOCOL from the Monitoring menu. Select ICMP STATISTICS from the Network Protocol menu. The ICMP Packet Statistics screen appears, as shown in Figure 5-22. You use this screen for viewing statistics on the bridge's ICMP (Internet Control Message Protocol) activity. ICMP supports several IP activities, including flow control.
Viewing UDP Statistics 5-37 destination unreachable: Display Field. The number of ’destination unreachable’ messages sent (output) and received (input). When a node receives an IP packet that it cannot forward to its destination, it sends a ’destination unreachable’ message to the sending node. source quench: Display Field. The number of ’source quench’ messages sent (output) and received (input). A ’source quench’ is a flow control message that requests a reduction in the rate of datagram transmission.
5-38 CHAPTER 5: FURTHER CONFIGURATION AND MONITORING time stamp reply: Display Field. The number of ’time stamp reply’ messages sent (output) and received (input). ’Time stamp reply’ is an answer to a ’time stamp’ request. Time information in the ’time stamp reply’ allows the requesting host to estimate the differences between local and remote clocks. This headings displays the reply form of the original ’time stamp’. information request: Display Field.
Viewing UDP Statistics 5-39 Viewing SNMP Information SNMP Statistics Select MONITORING from the Main Menu. Select NETWORK PROTOCOL from the Monitoring menu. Select SNMP STATISTICS from the Network Protocol menu. The SNMP Statistics screen appears, as shown in Figure 5-23. You use this screen for viewing statistics on the SNMP (Simple Network Management Protocol) activity of the bridge. This screen is followed by the SNMP Authentication Statistics screen.
5-40 CHAPTER 5: FURTHER CONFIGURATION AND MONITORING Get Requests: Display Field. The number of GET requests received by the SNMP agent. Get Next Requests: Display Field. The number of GET-NEXT requests received by the SNMP agent. Total Requested Variables: Display Field. The number of MIB variables retrieved by the SNMP agent as the result of GET and GET-NEXT requests. Set Requests: Display Field. The number of SET requests received by the SNMP agent. Total Set Variables: Display Field.
Viewing UDP Statistics 5-41 Out Bad Values: Display Field. The number of messages sent by the agent that contained the value ’badValue’ in the error-status field. These messages respond to requests that contain invalid values. Out General Errors: Display Field. The number of messages sent by the agent that contained the value ’genErr’ in the error-status field. These messages respond to requests that contain errors not covered by any other error-status value. Read-Only Errors: Display Field.
5-42 CHAPTER 5: FURTHER CONFIGURATION AND MONITORING SNMP Authentication Statistics The SNMP Authentication Statistics screen appears, as shown in Figure 5-24, after the SNMP Statistics screen. You use this screen for viewing access errors detected by the bridge's SNMP agent. All statistic values displayed in this screen reset to zero when the bridge is reset. Figure 5-24 SNMP Authentification Statistics Community Administration: Display Field.
Viewing UDP Statistics 5-43 Viewing ARP Tables Select MONITORING from the Main Menu. Select NETWORK PROTOCOL from the Monitoring menu. Select ARP TABLES from the Network Protocol menu. The ARP Tables screen appears, as shown in Figure 5-25. You use this screen for viewing the ARP table. The ARP (Address Resolution Protocol) defines a standard for mapping 32-bit IP addresses to 48-bit physical (MAC) Ethernet addresses and communicating this mapping to the network node that requested the information.
5-44 CHAPTER 5: FURTHER CONFIGURATION AND MONITORING Line: Display Field. The line number of the entry. IP Address: Display Field. The 32-bit internet address of a remote node. Ethernet Address: Display Field. The 48-bit physical (MAC) address of the remote node whose IP address is displayed in the IP ADDRESS field. Min: Display Field. The number of minutes since this entry in the table was updated. When this value reaches 20, the entry is removed from the table. Interface: Display Field.
Viewing UDP Statistics 5-45 Viewing Diagnostic Information Error Log Select MONITORING from the Main Menu. Select DIAGNOSTICS from the Monitoring menu. Select ERROR LOG from the Diagnostics menu. The Error Log screen is shown in Figure 5-26. You use this screen for viewing start-up errors and logged errors. When a bridge is booted up, it runs through a series of diagnostics that, if faulty, are recorded in this screen.
5-46 CHAPTER 5: FURTHER CONFIGURATION AND MONITORING Interactive Diags Select MONITORING from the Main Menu. Select DIAGNOSTICS from the Monitoring menu. Select INTERACTIVE DIAGS from the Diagnostics menu. The Interactive Diags screen appears, as shown in Figure 5-27. You use this screen for selecting the type of hardware diagnostics you wish to view. You can set up four fields, each with three options; yes, no, or periodically. Yes (y) always records data with errors.
Viewing UDP Statistics 5-47 Buffer Mem Check: Text Field. This verifies the memory buffers. Each time the test is performed, it will randomly allocate a buffer of memory to verify. Clear Error Log Select MONITORING from the Main Menu. Select DIAGNOSTICS from the Monitoring menu. Select CLEAR ERROR LOG from the Diagnostics menu. The Clear Error Log screen appears, as shown in Figure 5-28. You use this screen for clearing the accumulated data recorded in the error log.
5-48 CHAPTER 5: FURTHER CONFIGURATION AND MONITORING DUA1860-0AAA01
6 PROBLEM SOLVING This chapter contains the following topics: ■ Spot Checks ■ Using The LEDs For Fault Diagnosis ■ Correcting Problems ■ Removing And Replacing Equipment ■ Spares ■ What To Do Next
6-2 CHAPTER 6: PROBLEM SOLVING Spot Checks This chapter explains how to check for problems and solve them. It is good practice to carry out regular checks of your LinkBuilder MSH equipment. Check the following: ■ LEDs Press the LAMP TEST button, on the LinkBuilder MSH's Display Panel. All yellow LEDs should light continuously and all bi-color LEDs should flash red/green alternately. ■ Cabling Check that all external cabling connections are secure and that no cables are pulled taut.
Using The LEDs For Fault Diagnosis 6-3 Using The LEDs For Fault Diagnosis The LEDs on the front of the module indicate bridge activity and faults: ■ PWR (Power) Green on - Normal: power present, self-test completed successfully and bridge operating normally. Green flashing - Self-test is in progress (this lasts about one second). Red on - Fault: a fault has occurred during power-up self-test or in operation. You should contact your supplier immediately for advice.
6-4 CHAPTER 6: PROBLEM SOLVING Correcting Problems By working through this section, you should be able to isolate faults or find some possible causes and recommended actions. Network Problems Symptom: Network communication problems. Action: ■ Check the cabling in your network and that it meets the IEEE standard for cabling. ■ Find out whether any other devices on your network are also having communication problems.
Correcting Problems ■ 6-5 If no other action works, there may be a problem with the other bridge's configuration. Erase the other bridge's parameters. Remember, this will erase all configurations ever made to it. Re-enter it's IP address and reset it. Port Problems Symptom: One of the bridge ports is unexpectedly blocking. Action: ■ Check that you do not have a redundant link, causing the port to block. ■ Try turning off Spanning Tree.
6-6 CHAPTER 6: PROBLEM SOLVING Collision Problems Symptom: Excessive collisions on an Ethernet port. Action: ■ Check that your network is not too long or too large. ■ Check that there are not too many repeaters on your network. ■ Check that there are not too many users on a single Ethernet. STAP Problems Symptom: Spanning Tree problems. Action: ■ Return all Spanning Tree settings to their default settings. Filter Problems Symptom: Filters not working properly.
Correcting Problems 6-7 SNMP Problems Symptom: Cannot establish communication via SNMP. Action: ■ Check that you have an IP address entered. If you cannot PING or Telnet the bridge, check the IP address and default gateway address. ■ Check that SNMP is properly configured. ■ If you have not reset the bridge since enabling SNMP, do so. Operation Problems Symptom: The bridge does not respond to the keyboard, or freezes in operation.
6-8 CHAPTER 6: PROBLEM SOLVING Removing And Replacing Equipment Inserting additional modules or a second Power Supply Unit into an active LinkBuilder MSH, known as hot insertion, should not cause any damage to your equipment. However, the following points should be noted: ■ Packets of data passing through the unit at the time of insertion can be corrupted. ■ Inserting a second Power Supply Unit can cause a dip in the logic supply which would reset all modules.
Spares 6-9 Spares We recommend that you have one spare module or Power Supply Unit for every ten in use. In the unlikely event that you should have problems with the LinkBuilder MSH, you should swap the faulty item with a spare. This allows you to continue operation and may also help in singling out a fault, if the replacement solves the problem. It is advisable to hold spare replaceable components, such as fuses and Transceiver Modules, even though they are unlikely to fail.
6-10 CHAPTER 6: PROBLEM SOLVING What To Do Next If any of your LinkBuilder MSH equipment fails to operate correctly, contact your supplier with the following information before returning the equipment: ■ Serial Number ■ Revision Number ■ A brief description of the fault For modules, the Serial Number and Revision Number are printed on the circuit board. The reference guides that accompany these modules show the location of these numbers.
A LINK SETTINGS The LinkBuilder MSH 4 Port Ethernet Bridge Module has a link, LK1, for resetting its configuration to default values, see Figure A-1. Figure A-1 The Location Of The Link WARNING: This method of resetting the module has the same effect as initializing NVRAM via the VT100 management interface. All changes ever made to the bridge will be reset to default settings.
A-2 CHAPTER A: LINK SETTINGS We recommend that the link method is only used when VT100 management is not possible, for example, when you've forgotten your password, as this method involves physically removing and installing the module twice. For information on resetting the module via VT100, see Erasing All Changes on page 2-27. To reset the bridge module: 1 Remove the module from the LinkBuilder MSH chassis. 2 Change the link to the reset position, see Figure A-2.
B TECHNICAL INFORMATION The LinkBuilder MSH 4 Port Ethernet Bridge Module conforms to the following standards: Electrical ■ IEEE 802.
B-2 CHAPTER B: TECHNICAL INFORMATION MIB ■ IETF Bridge MIB (RFC 1286) ■ RFC 1213 (MIB II) and RFC 1229/1239 extensions DUA1860-0AAA01
C TECHNICAL SUPPORT 3Com provides easy access to technical support information through a variety of services. This appendix describes these services.
.C-2 APPENDIX C: TECHNICAL SUPPORT Country Baud Rate Telephone Number Japan up to 14400 baud (81) (3) 3243 9245 Singapore up to 9600 baud (65) 534 5693 Taiwan up to 14400 baud (886) (2) 577 6160 U.K. up to 14400 baud (44) (442) 278278 U.S. up to 14400 baud (1) (408) 980 8204 Ask3Com on CompuServe Ask3Com is a CompuServe-based service containing patches, software, drivers, and technical articles about all 3Com products, as well as an interactive forum for technical questions.
.. 3Com Documentation on CD-ROM ■ C-3 NetFacts provides data sheets and technical articles on 3Com Corporation’s hub, bridge, router, terminal server, and software products. Document 8888 provides you with an index of system product documents. Call 3ComFacts using your touchtone telephone. International access numbers are: Country Fax Number Hong Kong (852) 537 5610 U.K. (44) (442) 278279 U.S.
.C-4 APPENDIX C: TECHNICAL SUPPORT Country Telephone Number Fax Number U.S. and Canada (800) 827 7889, ext. 515 (212) 503 4487 Outside the U.S. and Canada (212) 503 4400, ext. 515 (212) 503 4487 Support from Your Network Supplier If additional assistance is required, contact your network supplier.
..
.C-6 APPENDIX C: TECHNICAL SUPPORT DUA1860-0AAA01
INDEX Numerics 3ComBBS C-1 3ComFacts C-2 A access, user 4-16 active loops 1-16 Add ARP Entry screen 5-11 Add Permanent Entry screen 5-6 adding bridge information 2-24 adding permanent entries 5-6 ageing 1-15 ageing time 1-15 ARP 5-10, 5-43 add entry 5-11 delete entry 5-12 parameters 5-10 ARP Pararmeters screen 5-10 ARP Tables screen 5-43 Ask3Com C-2 assigning IP address / host name pairs 2-36 Authentication Failure trap 2-47 bridge information, viewing 5-17 bridge menu map 2-6 bridge module 1-3 connectio
2 Index Checking for valid network connection 2-38 LEDs, cabling and modules 6-2 port activity 4-8 user access 4-16 Clear Error Log screen 5-47 Cold Start trap 2-47 collision problems 6-6 communication, with another bridge user 2-44 communities, SNMP 2-46 community administration 2-46 community traps 2-51 CompuServe, See Ask3Com configuration IP address 2-29 port queuing 5-16 simple bridge 2-11 SNMP 2-46 STAP 3-2 Configure Bit Filters screen 3-23 correcting problems 6-4 custom filtering 1-20 bit 1-28, 3-2
INDEX H Hardware Configuration screen 5-22 hardware initialize A-1 hash bucket 5-20 help 5-2 Host Filter Info screen 3-27 host filtering table 3-27 saving changes 3-29 host names, assigning 2-36 host table 2-36 host-to-host filtering 1-23 saving and making effective 3-12 setting up 3-10 Host-to-Host screen 3-10 host-to-port filtering 1-24 saving and making effective 3-15 setting up 3-13 Host-to-Port screen 3-13 I ICMP Packet Statistics screen 5-36 Initialize NOVRAM screen 2-27 initializing NVRAM 2-27, A-1
4 Index operator accounts editing 2-22 setting up 2-18 Operator Accounts screen 2-20 Operator Login screen 2-17 P packet statistics 5-36 performance problems 6-5 permanent database 5-6 permanent entries adding 5-6 deleting 5-8 transferring 5-9 PING 2-38 problems 6-4 Ping screen 2-40 Ping Settings screen 2-39 port problems 6-5 Port Queuing 5-16 Port Settings screen 3-6 port-to-port filtering 1-26 saving and making effective 3-17 setting up 3-16 Port-to-Port screen 3-16 problems collision 6-6 custom filter
INDEX screen Host Filter Info 3-27 Host-to-Host 3-10 Host-to-Port 3-13 ICMP Packet Statistics 5-36 Initialize NOVRAM 2-27 Interactive Diags 5-46 IP Addresses 2-31 IP Host Table 2-36 IP Statistics 5-33 LinkBuilder MSH Address Table 2-16 LinkBuilder MSH Logon 2-13 LinkBuilder MSH Main Banner 2-12 LinkBuilder MSH Main Menu 2-14 LinkBuilder MSH Service Selection 2-15 Login History 4-16 Multicast 3-18 Node Table By Address 5-19 Node Table By Hash Bucket 5-20 Operator Accounts 2-20 Operator Login 2-17 Ping 2-40
6 Index STAP 1-16 problems 6-6 root bridge 1-17 starting a Telnet session 2-42 static routes 2-33 configuring 2-33 Static Routes screen 2-33 subnet mask 2-31 suspending a Telnet session 2-45 System Information screen 2-24 T talking to another bridge user 2-44 TCP changing characteristics 5-13 viewing information 5-28 TCP Connection Statistics screen 5-31 TCP Data Statistics screen 5-28 TCP Protocol Settings screen 5-13 technical information B-1 technical support C-1 Telnet 2-30, 5-14 ending a session 2-4
RADIO FREQUENCY INTERFERENCE STATEMENTS FCC Statement This equipment has been tested with a class A computing device and has been found to comply with part 15 of FCC Rules. Operation in a residential area may cause unacceptable interference to radio and TV receptions requiring the operator to take whatever steps are necessary to correct the interference.
Information To The User If this equipment does cause interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: ■ Reorient the receiving antenna. ■ Relocate the equipment with respect to the receiver. ■ Move the equipment away from the receiver. ■ Plug the equipment into a different outlet so that equipment and receiver are on different branch circuits.
LIMITED WARRANTY HARDWARE: 3Com warrants its hardware products to be free from defects in workmanship and materials, under normal use and service, for the following lengths of time from the date of purchase from 3Com or its Authorized Reseller: Internetworking products Network adapters Ethernet stackable hubs and Unmanaged Ethernet fixed port repeaters One year Lifetime Lifetime* (One year if not registered) *Power supply and fans in these stackable hubs and unmanaged repeaters One Year Other hardware pro
WARRANTIES EXCLUSIVE: If a 3Com product does not operate as warranted above, Customer's sole remedy shall be repair, replacement, or refund of the purchase price paid, at 3Com's option. THE FOREGOING WARRANTIES AND REMEDIES ARE EXCLUSIVE AND ARE IN LIEU OF ALL OTHER WARRANTIES, EXPRESS OR IMPLIED, EITHER IN FACT OR BY OPERATION OF LAW, STATUTORY OR OTHERWISE, INCLUDING WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.