SUMMIT.BK Page i Thursday, September 25, 1997 12:33 PM Summit Switch Installation and User Guide Extreme Networks, Inc. 10460 Bandley Drive Cupertino, California 95014 (888) 257-3000 http://www.extremenetworks.
SUMMIT.BK Page ii Thursday, September 25, 1997 12:33 PM Copyright © Extreme Networks, Inc., 1997. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without permission from Extreme Networks, Inc. Extreme Networks, ExtremeWare, Summit, and the Extreme Networks logo are trademarks of Extreme Networks.
SUMMIT.BK Page i Thursday, September 25, 1997 12:33 PM PREFACE This preface provides an overview of this guide, describes guide conventions, tells you where to look for speciÞc information and lists other publications that may be useful. INTRODUCTION This guide provides the required information to install and conÞgure the Summit1 and Summit2 Gigabit Ethernet Switch. This guide is intended for use by network administrators who are responsible for installing and setting up network equipment.
SUMMIT.BK Page ii Thursday, September 25, 1997 12:33 PM Explanations about features and operations that are the same among all members of the Summit family simply refer to the product as the Summit. CONVENTIONS Table 1 and Table 2 list conventions that are used throughout this guide. Table 1: Notice Icons Icon Notice Type Alerts you to... Note Important features or instructions. Caution Risk of personal injury, system damage, or loss of data. Warning Risk of severe personal injury.
SUMMIT.BK Page iii Thursday, September 25, 1997 12:33 PM RELATED PUBLICATIONS The command syntax is explained in Chapter 4. RELATED PUBLICATIONS The Summit documentation set includes the following: ¥ Summit Quick Reference Guide ¥ Summit Release Note You may Þnd the following Web site of interest: ¥ Extreme Networks Home Page: http://www.extremenetworks.
SUMMIT.
SUMMIT.
SUMMIT.BK Page 2 Thursday, September 25, 1997 12:33 PM SUMMIT OVERVIEW SUMMARY OF FEATURES The Summit family of switches is comprised of two models: the Summit1 and the Summit2.
SUMMIT.BK Page 3 Thursday, September 25, 1997 12:33 PM SUMMARY OF FEATURES Figure 1-1 shows the front view of the Summit1. Unit status LEDs Port status LEDs Gigabit Ethernet ports Gigabit Ethernet ports Figure 1-1: Summit1 front view The Summit2 is a workgroup switch featuring sixteen 10Base-T/100Base-TX ports, two Gigabit Ethernet uplinks, and one redundant Gigabit Ethernet uplink. The 10Base-T/100Base-TX ports use standard RJ-45 connectors.
SUMMIT.BK Page 4 Thursday, September 25, 1997 12:33 PM SUMMIT OVERVIEW FULL-DUPLEX The Summit Switch provides full-duplex support for all ports. Full-duplex allows frames to be transmitted and received simultaneously and, in effect, doubles the bandwidth available on a link. All 10/100 Mbps ports on the Summit autonegotiate for half- or full-duplex operation. PORT REDUNDANCY The Summit2 has an optional redundant Gigabit Ethernet port.
SUMMIT.BK Page 5 Thursday, September 25, 1997 12:33 PM SUMMARY OF FEATURES ¥ It helps to control broadcast trafÞc. If a device in VLAN marketing transmits a broadcast frame, only VLAN marketing devices receive the frame. ¥ It provides extra security. Devices in VLAN marketing can only communicate with devices on VLAN sales using a device that provides routing services. ¥ It eases the change and movement of devices on networks.
SUMMIT.BK Page 6 Thursday, September 25, 1997 12:33 PM SUMMIT OVERVIEW IP UNICAST ROUTING The Summit can route IP trafÞc between the VLANs that are conÞgured as virtual router interfaces. Both dynamic and static IP routes are maintained in the routing table. RIP version 1 and RIP version 2 are supported. For more information on IP unicast routing, see Chapter 9. NETWORK CONFIGURATION EXAMPLES This section describes where to position the Summit1 and Summit2 within your network.
SUMMIT.BK Page 7 Thursday, September 25, 1997 12:33 PM NETWORK CONFIGURATION EXAMPLES Regional wiring closet Workgroup hubs PCs 4th floor Regional wiring closet Workgroup switches PCs Gigabit Ethernet risers 3rd floor Power workgroup Workstations 2nd floor Backbone Meshed campus backbone Router Internet Workstations 1st floor Figure 1-4: Summit family used in a backbone configuration The Summit2 on each ßoor is connected to the backbone Summit1 using a 1 Gbps, full-duplex link.
SUMMIT.BK Page 8 Thursday, September 25, 1997 12:33 PM SUMMIT OVERVIEW Another common use for the Summit family is in a campus environment, as shown in Figure 1-5. Building 2 PCs Building 1 Intranet/Internet Dual-homing Loadbalanced links Meshed backbone Building 3 Workstations Figure 1-5: Summit family used in a campus environment The Summit1 switches located in each building form a meshed backbone, providing load balancing and redundancy.
SUMMIT.BK Page 9 Thursday, September 25, 1997 12:33 PM SUMMIT1 FRONT VIEW SUMMIT1 FRONT VIEW Figure 1-6 shows the Summit1 front view. Unit status LEDs Port status LEDs Gigabit Ethernet ports Gigabit Ethernet ports Figure 1-6: Summit1 front view PORTS The Summit1 has eight Gigabit Ethernet ports. Six of the ports use SC connectors and support 1000Base-SX over 850nm Þber-optic cable. Ports 1 and 8 have GBIC connectors and support the media types and distances listed in Table 1-1.
SUMMIT.BK Page 10 Thursday, September 25, 1997 12:33 PM SUMMIT OVERVIEW LEDS Table 1-2 describes the light emitting diode (LED) behavior on the Summit1. Table 1-2: Summit1 LEDs LED Color Indicates Power Green The Summit1 is powered up. Yellow The Summit1 is indicating a power, overheat, or fan failure. MGMT Green flashing ■ Slow ■ Power On Self Test (POST) in progress. ■ Medium ■ The Summit1 is operating normally. ■ Fast ■ Software download in progress.
SUMMIT.BK Page 11 Thursday, September 25, 1997 12:33 PM SUMMIT2 FRONT VIEW SUMMIT2 FRONT VIEW Figure 1-7 shows the Summit2 front view. Port status LEDs Unit status LEDs Gigabit Ethernet ports 10/100 Mbps ports Figure 1-7: Summit2 front view PORTS The Summit2 has 16 autosensing 10Base-T/100Base-TX ports, two Gigabit Ethernet ports, one of which has a redundant Gigabit Ethernet port. Table 1-3 describes the ports, connectors, media, and maximum distances for each port type.
SUMMIT.BK Page 12 Thursday, September 25, 1997 12:33 PM SUMMIT OVERVIEW LEDS Table 1-4 describes the LED behavior on the Summit2. Table 1-4: Summit2 LEDs LED Color Indicates Power Green The Summit2 is powered up. Yellow The Summit2 is indicating a power, overheat, or fan failure. MGMT Green flashing ■ Slow ■ Power On Self Test (POST) in progress. ■ Medium ■ The Summit2 is operating normally. ■ Fast ■ Software download in progress. Yellow The Summit2 has failed its POST.
SUMMIT.BK Page 13 Thursday, September 25, 1997 12:33 PM SUMMIT REAR VIEW SUMMIT REAR VIEW Figure 1-8 shows the rear view for the Summit1 and the Summit2. Power socket and fuse RPS port U L C Console port U L ! MODEL/NUMBER MADE IN USA PART NUMBER SERIAL NUMBER MAC ADDRESS 130001-00 Rev.03 Figure 1-8: Summit rear view POWER SOCKET The Summit automatically adjusts to the supply voltage. The power supply operates down to 90 V. The fuse is suitable for both 110 V AC and 220-240 V AC operation.
SUMMIT.BK Page 14 Thursday, September 25, 1997 12:33 PM SUMMIT OVERVIEW MAC ADDRESS This label shows the unique Ethernet MAC address assigned to this device. FACTORY DEFAULTS Table 1-5 shows factory defaults for the Summit features. Table 1-5: Summit Factory Defaults Item Default Setting Port status Enabled on all ports. Serial or Telnet user account admin with no password and user with no password.
SUMMIT.
SUMMIT.BK Page 2 Thursday, September 25, 1997 12:33 PM INSTALLATION AND SETUP When deciding where to install the Switch, ensure that: ¥ The Switch is accessible and cables can be connected easily. ¥ Water or moisture cannot enter the case of the unit. ¥ Air-ßow around the unit and through the vents in the side of the case is not restricted. You should provide a minimum of 25mm (1-inch) clearance. ¥ No objects are placed on top of the unit.
SUMMIT.BK Page 3 Thursday, September 25, 1997 12:33 PM INSTALLING THE SUMMIT Figure 2-1: Fitting the mounting bracket 5 Repeat the three previous steps for the other side of the Switch. 6 Insert the Switch into the 19-inch rack and secure with suitable screws (not provided). Ensure that ventilation holes are not obstructed. 7 Connect the Summit to the redundant power supply (if applicable). 8 Connect cables. FREE-STANDING The Summit is supplied with four self-adhesive rubber pads.
SUMMIT.BK Page 4 Thursday, September 25, 1997 12:33 PM INSTALLATION AND SETUP CONNECTING EQUIPMENT TO THE CONSOLE PORT Connection to the console port is used for direct local management. The Switch console port settings are set as follows: ¥ Baud rate Ñ 9600 ¥ Data bits Ñ 8 ¥ Stop bit Ñ 1 ¥ Parity Ñ None ¥ Flow control Ñ XON/XOFF The terminal connected to the console port on the Switch must be conÞgured with the same settings.
SUMMIT.BK Page 5 Thursday, September 25, 1997 12:33 PM POWERING-UP THE SWITCH Figure 2-3 shows the pin-outs for a 9-pin to 9-pin PC-AT null-modem serial cable.
SUMMIT.BK Page 6 Thursday, September 25, 1997 12:33 PM INSTALLATION AND SETUP LOGGING IN FOR THE FIRST TIME After the Summit has completed the POST, it is operational. Once operational, you can log in to the Switch and conÞgure an IP address for the default VLAN (named default). To manually conÞgure the IP settings, perform the following steps: 1 Connect a terminal or workstation running terminal-emulation software to the console port.
SUMMIT.BK Page 1 Thursday, September 25, 1997 12:33 PM 3 Accessing The Switch This chapter provides the following required information to begin managing the Summit: ¥ ConÞguring the Switch for management ¥ Switch management methods ¥ ConÞguring SNMP ¥ ConÞguring Switch ports In order for configuration changes to be retained through a Switch power cycle or reboot, you must issue a SAVE command after you have made the change. For more information on the SAVE command, refer to Chapter 11.
SUMMIT.BK Page 2 Thursday, September 25, 1997 12:33 PM ACCESSING THE SWITCH A user-level account can use the ping command to test device reachability, and change the password assigned to the account name. If you have logged on with user capabilities, the command-line prompt will end with a (>) sign. For example: Summit1:2> An administrator-level account can view and change all Switch parameters. It can also add and delete users, and change the password associated with any account name.
SUMMIT.BK Page 3 Thursday, September 25, 1997 12:33 PM CONFIGURING MANAGEMENT ACCESS CHANGING THE DEFAULT PASSWORD Default accounts do not have passwords assigned to them. Passwords must have a minimum of 4 characters and can have a maximum of 12 characters. Passwords are case-sensitive. To add a password to the default admin account, follow these steps: 1 Log in to the Switch using the name admin. 2 At the password prompt, press [Return].
SUMMIT.BK Page 4 Thursday, September 25, 1997 12:33 PM ACCESSING THE SWITCH To create a new account, follow these steps: 1 Log in to the Switch as admin. 2 At the password prompt, press [Return]. 3 Add a new user by using the following command: create account [admin | user] 4 Enter the password at the prompt. 5 Re-enter the password at the prompt. VIEWING SWITCH ACCOUNTS To view the accounts that have been created, you must have administrator privileges.
SUMMIT.BK Page 5 Thursday, September 25, 1997 12:33 PM USING TELNET ¥ Access the Web interface over a TCP/IP network, using a standard Web browser (such as Netscape Navigatorª 3.0 or greater, or Microsoft Internet Explorerª 3.0 or greater). ¥ Use an SNMP Network Manager over a network running the IP protocol. The Switch can support up to four user sessions concurrently (for example, one console port, one Web session, and two Telnet connections).
SUMMIT.BK Page 6 Thursday, September 25, 1997 12:33 PM ACCESSING THE SWITCH USING A BOOTP SERVER If you are using IP and you have a BOOTP server set up correctly on your network, you must add the following information to the BOOTP server: ¥ Switch Media Access Control (MAC) address ¥ IP address ¥ Subnet address mask (optional) ¥ Default gateway The Switch MAC address is found on the rear label of the Switch.
SUMMIT.BK Page 7 Thursday, September 25, 1997 12:33 PM USING TELNET 3 At the login prompt, enter your user name and password. Note that they are both case-sensitive. Ensure that you have entered a user name and password with administrator privileges. Ñ If you are logging in for the Þrst time, use the default user name admin to log in with administrator privileges. For example: login: admin Administrator capabilities enable you to access all Switch functions.
SUMMIT.BK Page 8 Thursday, September 25, 1997 12:33 PM ACCESSING THE SWITCH DISCONNECTING A TELNET SESSION The administrator-level account can disconnect a management session that has been established by way of a Telnet connection. If this happens, the user logged in by way of the Telnet connection is notiÞed that the session has been terminated. To terminate a Telnet session, follow these steps: 1 Log in to the Switch with administrator privileges.
SUMMIT.BK Page 9 Thursday, September 25, 1997 12:33 PM USING THE WEB INTERFACE For more information on assigning an IP address, refer to “Configuring Switch IP Parameters,” on page 3-5. The default home page of the Switch can be accessed using the following address: http:// When you access the home page of the Switch, you are presented with the Logon screen. SUMMIT MANAGEMENT INTERFACE SCREEN After logging in to the Switch, the Web interface presents the Summit Management Interface Screen.
SUMMIT.BK Page 10 Thursday, September 25, 1997 12:33 PM ACCESSING THE SWITCH ¥ ICMP statistics ¥ RIP statistics SUPPORT The Support option includes the following features: ¥ Upgrade software ¥ Contact Support LOGOUT The Logout option ends your management session, and returns you to the Logon page. DISABLING WEB ACCESS By default, web access is enabled on the Summit.
SUMMIT.BK Page 11 Thursday, September 25, 1997 12:33 PM USING SNMP The following sections describe how to get started if you want to use an SNMP manager. It assumes you are already familiar with SNMP management. If not, refer to the following publication: ÒThe Simple BookÓ by Marshall T. Rose ISBN 0-13-8121611-9 Published by Prentice Hall ACCESSING SWITCH AGENTS In order to have access to the SNMP agent residing in the Switch, at least one VLAN must have an IP address assigned to it.
SUMMIT.BK Page 12 Thursday, September 25, 1997 12:33 PM ACCESSING THE SWITCH ¥ Authorized managers Ñ An authorized manager can be one or more network management stations on your network. The Summit can have a maximum of six authorized managers. ¥ Community strings Ñ The community strings allow a simple method of authentication between the Switch and the remote Network Manager. There are two community strings on the Summit. The read community string provides read-only access to the switch.
SUMMIT.BK Page 13 Thursday, September 25, 1997 12:33 PM USING SNMP Table 3-3: SNMP Configuration Commands (continued) Command Description config snmp delete [ | all] Deletes the IP address of a specified SNMP management station or all SNMP management stations. config snmp delete trapreceiver [ community | all] Deletes the IP address of a specified trap receiver or all authorized trap receivers.
SUMMIT.BK Page 14 Thursday, September 25, 1997 12:33 PM ACCESSING THE SWITCH RESETTING AND DISABLING SNMP To reset and disable SNMP settings, use the commands in Table 3-4. Table 3-4: SNMP Reset and Disable Commands Command Description disable snmp access Disables SNMP on the Switch. disable snmp trap Prevents SNMP traps from being sent from the Switch. Does not clear the SNMP trap receivers that have been configured. unconfig management Restores default values to all SNMP-related entries.
SUMMIT.BK Page 15 Thursday, September 25, 1997 12:33 PM CONFIGURING PORTS TRACEROUTE The traceroute command enables you to trace the routed path between the Switch and a destination endstation. The traceroute command syntax is as follows: traceroute where the ip_address is the IP address of the destination endstation.
SUMMIT.BK Page 16 Thursday, September 25, 1997 12:33 PM ACCESSING THE SWITCH CONFIGURING PORT SPEED AND DUPLEX SETTING By default, the Summit is conÞgured to use autonegotiation to determine the port speed and duplex setting for each port. You can select to manually conÞgure the duplex setting and the speed of the 10/100 Mbps ports on the Summit2, and you can manually conÞgure the duplex setting on the Summit1. Ports 1 through 16 on the Summit2 can connect to either 10Base-T or 100Base-T networks.
SUMMIT.BK Page 17 Thursday, September 25, 1997 12:33 PM PORT COMMANDS Table 3-6: Port Commands (continued) Command Description config port auto off {speed [10 | 100]} duplex [half | full] Changes the configuration of a group of ports.
SUMMIT.
SUMMIT.BK Page 1 Thursday, September 25, 1997 12:33 PM 4 Commands This chapter contains a description of each command-line interface command for the Summit. It also provides the following information related to Summit commands: ¥ Command syntax ¥ Line-editing commands ¥ Command history substitution In order for configuration changes to be retained through a Switch power cycle or reboot, you must issue a SAVE command after you have made the change.
SUMMIT.BK Page 2 Thursday, September 25, 1997 12:33 PM COMMANDS a If the command has additional options, include them after the command name. b If the command includes a parameter, enter the parameter name and values. The value part of the command speciÞes how you want the parameter to be set. Values include numerics, strings, or addresses, depending on the parameter. 3 After entering the complete command, press [Return].
SUMMIT.BK Page 3 Thursday, September 25, 1997 12:33 PM UNDERSTANDING THE COMMAND SYNTAX Once you have created the VLAN with a unique name, you can then eliminate the keyword vlan from all other commands that require the name to be entered.
SUMMIT.BK Page 4 Thursday, September 25, 1997 12:33 PM COMMANDS Table 4-1: Command Syntax Symbols (continued) Symbol Description square brackets [ ] Enclose a required value or list of required arguments. One or more values or arguments can be specified. For example, in the syntax disable vlan [ | all] you must specify either the VLAN name for , or the keyword all when entering the command. Do not type the square brackets.
SUMMIT.BK Page 5 Thursday, September 25, 1997 12:33 PM COMMAND HISTORY Table 4-2: Line-Editing Keys (continued) Key(s) Description Up Arrow Displays the previous command in the command history buffer, and places cursor at end of command. Down Arrow Displays the next command in the command history buffer, and places cursor at end of command. COMMAND HISTORY The Summit ÒremembersÓ the last 50 commands you enter.
SUMMIT.BK Page 6 Thursday, September 25, 1997 12:33 PM COMMANDS Table 4-3: Common Commands (continued) Command Description config devicemode [bridging | iprouting | ipmc ] Configures the operating mode of the Switch.
SUMMIT.BK Page 7 Thursday, September 25, 1997 12:33 PM SUMMIT COMMANDS Table 4-3: Common Commands (continued) Command Description unconfig switch {all} Resets all switch parameters (with the exception of defined user accounts) to the factory defaults. If you specify the keyword all, the user account information is reset as well. SUMMIT COMMANDS The tables in this section list all of the commands used on the Summit Switch.
SUMMIT.BK Page 8 Thursday, September 25, 1997 12:33 PM COMMANDS GENERAL SWITCH COMMANDS Table 4-4 describes general Switch commands.
SUMMIT.BK Page 9 Thursday, September 25, 1997 12:33 PM SUMMIT COMMANDS Table 4-4: General Switch Commands (continued) Command Description config devicemode [bridging | iprouting ] Configures the operating mode of the Switch. Specify: ■ bridging — Layer 2 bridging functions only ■ iprouting — Bridging and IP unicast routing functions If this command is used to change the operating mode of the Summit once it is up and running, it causes the Switch to save the configuration and reboot.
SUMMIT.BK Page 10 Thursday, September 25, 1997 12:33 PM COMMANDS Table 4-5: User Account Commands Command Description show account Displays the account names, access level, number of successful and failed login attempts, and the number of active sessions in the user database. This command is available only to admin level users. create account [admin | user] {} Creates a user account.
SUMMIT.BK Page 11 Thursday, September 25, 1997 12:33 PM SUMMIT COMMANDS Table 4-6: Switch Management Commands (continued) Command Description disable web Disables web access to the Switch. Requires a reboot to take effect. enable snmp access Turns on SNMP support for the Switch. disable snmp access Disables SNMP on the Switch. enable snmp trap Turns on SNMP trap support. disable snmp trap Prevents SNMP traps from being sent from the Switch.
SUMMIT.BK Page 12 Thursday, September 25, 1997 12:33 PM COMMANDS VLAN COMMANDS Table 4-7 describes VLAN commands. Table 4-7: VLAN Commands Command Description show vlan { | all> When used with the keyword all, or with no named VLANs, displays a summary list of VLAN names with a portlist and associated status of each. When used with a named identifier, displays port information, including membership list, IP address, and tag information. create vlan Creates a named VLAN.
SUMMIT.BK Page 13 Thursday, September 25, 1997 12:33 PM SUMMIT COMMANDS PROTOCOL COMMANDS Table 4-8 describes protocol commands. Table 4-8: Protocol Commands Command Description show protocol { | all} Displays protocol-related information, including: ■ Protocol name ■ List of protocol fields ■ List of VLANs that use this protocol create protocol Creates a user-defined protocol. delete protocol Removes a protocol.
SUMMIT.BK Page 14 Thursday, September 25, 1997 12:33 PM COMMANDS Table 4-9: FDB Commands (continued) Command Description create fdbentry vlan Creates a permanent FDB entry. Specify the following: ■ mac_address — Device MAC address, using colon-separated bytes. ■ name — VLAN associated with MAC address. ■ portlist — Port number associated with MAC address.
SUMMIT.BK Page 15 Thursday, September 25, 1997 12:33 PM SUMMIT COMMANDS Table 4-10: Port Commands Command Description config port auto off {speed [10 | 100]} Changes the configuration of a group of ports. duplex [half | full] Specify the following: ■ auto off — The port will not autonegotiate the settings. ■ speed — The speed of the port (for 10/100 Mbps ports on the Summit2, only. ■ duplex — The duplex setting (half- or full-duplex).
SUMMIT.BK Page 16 Thursday, September 25, 1997 12:33 PM COMMANDS Table 4-11: STP Commands (continued) Command Description config stpd delete vlan [ | all] Removes one or all VLANs from an STPD. If all is specified, the association between the STPD and VLAN is removed, but both are still instantiated. config stpd hellotime Specifies the time delay (in seconds) between the transmission of BPDUs from this STPD when it is the Root Bridge. The range is 1 through 10.
SUMMIT.BK Page 17 Thursday, September 25, 1997 12:33 PM SUMMIT COMMANDS Table 4-11: STP Commands (continued) Command Description config stpd port priority Specifies the priority of the port in this STPD. By changing the priority of the port, you can make it more or less likely to become the Root Port. The range is 0 through 255. The default setting is 128. A setting of 0 indicates the lowest priority.
SUMMIT.BK Page 18 Thursday, September 25, 1997 12:33 PM COMMANDS Table 4-12: QoS Commands (continued) Command Description config qosmode [explicit | implicit] Changes the QoS mode to explicit mode or implicit mode. create qosprofile Creates a QoS profile. The default values assigned to a created QoS profile are as follows: ■ Minimum bandwidth — 0% ■ Maximum bandwidth — 100% ■ Priority — low delete qosprofile Deletes a QoS profile.
SUMMIT.BK Page 19 Thursday, September 25, 1997 12:33 PM SUMMIT COMMANDS Table 4-13: Basic IP Commands (continued) Command Description show ip stats {vlan [ | vlan | all} Displays the contents of the IP forwarding database table. Use for technical support purposes.
SUMMIT.BK Page 20 Thursday, September 25, 1997 12:33 PM COMMANDS Table 4-13: Basic IP Commands (continued) Command Description config bootprelay add Adds IP addresses to be used as IP destinations to forward BOOTP packets. config bootprelay delete [ | all] Deletes one or all IP addresses that were used as IP destinations to forward BOOTP packets.
SUMMIT.BK Page 21 Thursday, September 25, 1997 12:33 PM SUMMIT COMMANDS Table 4-14: IP ARP Commands (continued) Command Description config iproute add default {} Adds a default gateway. A default gateway must be located on a configured IP interface. config iproute delete default Deletes a default gateway. IP ROUTE TABLE COMMANDS Table 4-15 describes IP Route Table commands.
SUMMIT.BK Page 22 Thursday, September 25, 1997 12:33 PM COMMANDS ICMP COMMANDS Table 4-16 describes the commands used to conÞgure the ICMP protocol. Table 4-16: ICMP Commands Command Description enable icmp redirects {vlan | all} Enables generation of ICMP redirect messages on one or more VLANs. The default setting is enabled. disable icmp redirects {vlan | all} Disables the generation of ICMP redirects on one or more VLANs.
SUMMIT.BK Page 23 Thursday, September 25, 1997 12:33 PM SUMMIT COMMANDS Table 4-16: ICMP Commands (continued) Command Description config irdp Configures the router advertisement message timers, using seconds. Specify: ■ mininterval — The minimum amount of time between router advertisements. The default setting is 450 seconds. ■ maxinterval — The maximum time between router advertisements. The default setting is 600 seconds.
SUMMIT.BK Page 24 Thursday, September 25, 1997 12:33 PM COMMANDS Table 4-17: RIP Commands (continued) Command Description Displays RIP-specific statistics. Statistics include the following per interface: ■ Packets transmitted ■ Packets received ■ Bad packets received ■ Bad routes received ■ Number of RIP peers ■ Peer information enable rip Enables RIP. disable rip Disables RIP. config rip add {vlan | all} Configures RIP on an IP interface.
SUMMIT.BK Page 25 Thursday, September 25, 1997 12:33 PM SUMMIT COMMANDS Table 4-17: RIP Commands (continued) Command Description disable rip exportstatic Disables the filtering of static routes. config rip updatetime {} Changes the periodic RIP update timer. The default setting is 30 seconds. config rip routetimeout {} Configures the route timeout. The default setting is 180 seconds. config rip garbagetime {} Configures the RIP garbage time.
SUMMIT.BK Page 26 Thursday, September 25, 1997 12:33 PM COMMANDS LOGGING COMMANDS Table 4-18 describes Switch logging commands. Table 4-18: Logging Commands Command Description show log config Displays the log configuration, including the syslog host IP address, the priority level of messages being logged locally, and the priority level of messages being sent to the syslog host. show log {} {} Displays the current snapshot of the log.
SUMMIT.BK Page 27 Thursday, September 25, 1997 12:33 PM SUMMIT COMMANDS Table 4-18: Logging Commands (continued) Command Description config syslog {} {} Configures the syslog host address and filter messages sent to the syslog host. Options include: ■ ipaddress — The IP address of the syslog host. ■ facility — The syslog facility level for local use. ■ priority — Filters the log to display messages with the selected priority or higher (more critical).
SUMMIT.BK Page 28 Thursday, September 25, 1997 12:33 PM COMMANDS Table 4-19: Configuration and Image Commands (continued) Command Description use config {primary | secondary} Configures the Switch to use a particular configuration on the next reboot. Options include the primary configuration area, or the secondary configuration area. If not specified, the Switch will use the primary configuration area. use image {primary | secondary} Configures the Switch to use a particular image on the next reboot.
SUMMIT.BK Page 1 Thursday, September 25, 1997 12:33 PM 5 Virtual LANs (VLANs) Setting up Virtual Local Area Networks (VLANs) on the Summit eases many time-consuming tasks of network administration while increasing efÞciency in network operations. This chapter describes the concept of VLANs and explains how to implement VLANs on the Summit. OVERVIEW OF VIRTUAL LANS The term VLAN is used to refer to a collection of devices that communicate as if they were on the same physical LAN.
SUMMIT.BK Page 2 Thursday, September 25, 1997 12:33 PM VIRTUAL LANS (VLANS) ¥ VLANs provide extra security. Devices within each VLAN can only communicate with member devices in the same VLAN. If a device in VLAN Marketing must communicate with devices in VLAN Sales, the trafÞc must cross a routing device. ¥ VLANs ease the change and movement of devices. With traditional networks, network administrators spend much of their time dealing with moves and changes.
SUMMIT.BK Page 3 Thursday, September 25, 1997 12:33 PM TYPES OF VLANS For example, in Figure 5-1, ports 1, 2, and 5 are part of VLAN Marketing; ports 3, 4, and 6 are part of VLAN Sales; and ports 7 and 8 are in VLAN Finance. Marketing Finance Sales Figure 5-1: Example of a port-based VLAN Even though they are physically connected to the same Switch, for the members of the different VLANs to communicate, the trafÞc must go through the IP routing functionality provided in the Summit.
SUMMIT.BK Page 4 Thursday, September 25, 1997 12:33 PM VIRTUAL LANS (VLANS) Figure 5-2: illustrates a single VLAN that spans two Switches. All ports on both Switches belong to VLAN Sales. The two Switches are connected using port 2 on Switch 1, and port 6 on Switch 2. Sales Figure 5-2: Single port-based VLAN spanning two Switches In a port-based VLAN, to create multiple VLANs that span two Switches, a port on Switch 1 must be cabled to a port on Switch 2 for each VLAN you want to create.
SUMMIT.BK Page 5 Thursday, September 25, 1997 12:33 PM TYPES OF VLANS Figure 5-3 illustrates two VLANs spanning two Switches. On Switch 1, ports 1-4 are part of VLAN Accounting; ports 5 - 8 are part of VLAN Engineering. On Switch 2, ports 1-4 are part of VLAN Accounting; ports 5 - 8 are part of VLAN Engineering. VLAN Accounting spans Switch 1 and Switch 2 by way of a connection between Switch 1 port 2 and Switch 2 port 4.
SUMMIT.BK Page 6 Thursday, September 25, 1997 12:33 PM VIRTUAL LANS (VLANS) USES OF TAGGED VLANS Tagging is most commonly used to create VLANs that span Switches. The Switch-to-Switch connections are typically called trunks. Using tags, multiple VLANs can span multiple Switches using one or more trunks. In a port-based VLAN, each VLAN requires its own pair of trunk ports, as shown in Figure 5-3. Using tags, multiple VLANs can span two Switches with a single trunk.
SUMMIT.BK Page 7 Thursday, September 25, 1997 12:33 PM TYPES OF VLANS Figure 5-4 illustrates the physical view of a network that uses tagged and untagged trafÞc. MS M S M MS Switch 1 M = Marketing S = Sales 802.1Q Tagged server = Tagged port MS M S M S Switch 2 Figure 5-4: Physical diagram of tagged and untagged traffic Figure 5-5 shows a logical diagram of the same network.
SUMMIT.BK Page 8 Thursday, September 25, 1997 12:33 PM VIRTUAL LANS (VLANS) In Figure 5-4 and Figure 5-5: ¥ The trunk port on each Switch carries trafÞc for both VLAN Marketing and VLAN Sales. ¥ The trunk port on each Switch is tagged. ¥ The server connected to port 1 on Switch 1 has a NIC that supports 802.1Q tagging. ¥ The server connected to port 1 on Switch 1 is a member of both VLAN Marketing and VLAN Sales . ¥ All other stations use untagged trafÞc.
SUMMIT.BK Page 9 Thursday, September 25, 1997 12:33 PM TYPES OF VLANS The IP trafÞc has been divided into two IP subnets, 192.207.35.0 and 192.207.36.0. The subnets are internally routed by the Summit. The subnets are assigned different VLAN names, Finance and Personnel, respectively. The remainder of the trafÞc belongs to the VLAN named MyCompany. All ports are members of the VLAN MyCompany. 192.207.35.1 My Company 192.207.35.0 Finance 1 192.207.36.1 2 192.207.36.
SUMMIT.BK Page 10 Thursday, September 25, 1997 12:33 PM VIRTUAL LANS (VLANS) DEFINING PROTOCOL FILTERS If necessary, you can deÞne a customized protocol Þlter based on EtherType, LLC, and/or SNAP. Up to six Þlters may be part of a protocol Þlter.
SUMMIT.BK Page 11 Thursday, September 25, 1997 12:33 PM CONFIGURING VLANS ON THE SUMMIT DEFAULT VLAN The Summit ships with one default VLAN that has the following properties: ¥ The VLAN name is default. ¥ It contains all the ports on a new or initialized Switch. ¥ The default VLAN is untagged on all ports. It has an internal VLAN ID of 1. CONFIGURING VLANS ON THE SUMMIT This section describes the commands associated with setting up VLANs on the Summit.
SUMMIT.BK Page 12 Thursday, September 25, 1997 12:33 PM VIRTUAL LANS (VLANS) Table 5-1: VLAN Configuration Commands (continued) Command Description config vlan [add | delete] port {tagged | untagged} Adds and deletes ports. You can specify tagged and untagged port(s). By default, ports are untagged. config vlan protocol [ | any] Configures a protocol-based VLAN. If the keyword any is specified, then it becomes the default VLAN.
SUMMIT.BK Page 13 Thursday, September 25, 1997 12:33 PM DISPLAYING VLAN SETTINGS The following example creates a VLAN named Sales, with the VLAN ID 120. The VLAN uses both tagged and untagged ports. Ports 1 through 3 are tagged, and ports 4 and 7 are untagged. Note that when not explicitly speciÞed, ports are added as untagged. create config config config vlan sales sales tag 120 sales add port 1-3 tagged sales add port 4,7 The following example creates a protocol-based vlan named IPSales.
SUMMIT.BK Page 14 Thursday, September 25, 1997 12:33 PM VIRTUAL LANS (VLANS) “accounting”, Untagged (Internal tag 4095), created by user. IP Address 192.208.37.13 netmask 255.255.255.0 Member of Spanning Tree Domain s0 Number of ports: 4 Configured untagged ports: 3 2 1 6 Protocol=ANY = [EtherType=ffff] “video”, 802.1Q Tag 100, created by user.
SUMMIT.BK Page 15 Thursday, September 25, 1997 12:33 PM DELETING VLANS To display protocol information, use the following command: show protocol { | all} Sample output from this command is as follows.
SUMMIT.
SUMMIT.BK Page 1 Thursday, September 25, 1997 12:33 PM 6 Switch Forwarding Database (FDB) This chapter describes contents of the the Switch forwarding database (FDB), how the FDB works, and how to conÞgure the FDB. OVERVIEW OF THE FDB The Summit maintains a database of all media access control (MAC) addresses received on all of its ports. It uses the information in this database to decide whether a frame should be forwarded or Þltered. FDB CONTENTS The database holds up to a maximum of 128K entries.
SUMMIT.BK Page 2 Thursday, September 25, 1997 12:33 PM SWITCH FORWARDING DATABASE (FDB) Switch is reset or a power off/on cycle occurs. For more information about setting the aging time, refer to the section ÒConÞguring FDB Entries,Ó later in this chapter. ¥ Static entries Ñ If the aging time is set to zero, all aging entries in the database are deÞned as static, non-aging entries. This means that they do not age, but they are still deleted if the Switch is reset.
SUMMIT.BK Page 3 Thursday, September 25, 1997 12:33 PM DISPLAYING FDB ENTRIES Table 6-1: FDB Configuration Commands (continued) Command Description config fdb agingtime Configures the FDB aging time. The range is 15 through 1,000,000 seconds. The default value is 300 seconds. A value of 0 indicates that the entry should never be aged out.
SUMMIT.
SUMMIT.BK Page 1 Thursday, September 25, 1997 12:33 PM 7 Spanning Tree Protocol (STP) Using the Spanning Tree Protocol (STP) functionality of the Summit makes your network more fault tolerant. The following sections explain more about STP and the STP features supported by the Switch. STP is a part of the 802.1D bridge specification defined by the IEEE Computer Society. To explain STP in terms used by the 802.1D specification, the Summit will be referred to as a bridge.
SUMMIT.BK Page 2 Thursday, September 25, 1997 12:33 PM SPANNING TREE PROTOCOL (STP) A port can belong to only one STPD. If a port is a member of multiple VLANs, then all those VLANs must belong to the same STPD. The key points to remember when conÞguring VLANs and STP are the following: ¥ Each VLAN forms an independent broadcast domain. ¥ STP blocks paths to create a loop-free environment. ¥ When STP blocks a path, no data can be transmitted or received on the blocked port.
SUMMIT.BK Page 3 Thursday, September 25, 1997 12:33 PM STP CONFIGURATIONS Two STPDs are deÞned: ¥ STPD1 contains VLANs Sales and Personnel. ¥ STPD2 contains VLANs Manufacturing and Engineering. The VLAN Marketing is not assigned to a STPD.
SUMMIT.BK Page 4 Thursday, September 25, 1997 12:33 PM SPANNING TREE PROTOCOL (STP) Within a single STPD, you must be extra careful when conÞguring your VLANs. Figure 7-2 illustrates a network that has been incorrectly set up using a single STPD so that the STP conÞguration disables the ability of the Switches to forward VLAN trafÞc.
SUMMIT.BK Page 5 Thursday, September 25, 1997 12:33 PM CONFIGURING STP ON THE SUMMIT CONFIGURING STP ON THE SUMMIT STP conÞguration involves the following actions: ¥ Create one or more STP domains using the following command: create stpd STPD, VLAN, and QoS profile names must all be unique. For example, a name used to identify a VLAN cannot be used when you create an STPD or a QoS profile.
SUMMIT.BK Page 6 Thursday, September 25, 1997 12:33 PM SPANNING TREE PROTOCOL (STP) Table 7-1 shows the commands used to conÞgure STP. Table 7-1: STP Configuration Commands Command Description create stpd Creates an STPD. When created, an STPD has the following default parameters: ■ Bridge priority — 32,768 ■ Hello time — 2 seconds ■ Forward delay — 15 seconds enable stpd [ | all] Enables the STP protocol for one or all STPDs. The default setting is disabled.
SUMMIT.BK Page 7 Thursday, September 25, 1997 12:33 PM CONFIGURING STP ON THE SUMMIT Table 7-1: STP Configuration Commands (continued) Command Description config stpd priority Specifies the priority of the STPD. By changing the priority of the STPD, you can make it more or less likely to become the Root Bridge. The range is 0 through 65,535. The default setting is 32,768. A setting of 0 indicates the highest priority.
SUMMIT.
SUMMIT.BK Page 9 Thursday, September 25, 1997 12:33 PM DISABLING AND RESETTING STP DISABLING AND RESETTING STP To disable STP or return STP settings to their defaults, use the commands listed in Table 7-2. Table 7-2: STP Disable and Reset Commands Command Description delete stpd Removes an STPD. An STPD can only be removed if all VLANs have been deleted from it. disable stpd [ | all] Disables the STP mechanism on a particular STPD, or for all STPDs.
SUMMIT.
SUMMIT.BK Page 1 Thursday, September 25, 1997 12:33 PM 8 Quality of Service (QoS) This chapter describes the concept of Quality of Service (QoS) and explains how to implement QoS on the Summit. OVERVIEW OF QUALITY OF SERVICE QoS is a feature of the Summit that allows you to specify different service levels for outbound trafÞc. QoS is an effective control mechanism for networks that have heterogeneous trafÞc patterns. Using QoS, you can specify the service that a trafÞc type receives.
SUMMIT.BK Page 2 Thursday, September 25, 1997 12:33 PM QUALITY OF SERVICE (QOS) QOS MODE The QoS mode for the Switch determines with which types of trafÞc classiÞcations the Switch will be dealing, explicit or implicit. The default is implicit. If you want to change the QoS mode, it requires performing the change, saving the conÞguration, and rebooting the Switch. In the explicit mode, the selection of QoS proÞles is Þxed and cannot be modiÞed because it is based only on priority.
SUMMIT.BK Page 3 Thursday, September 25, 1997 12:33 PM BUILDING BLOCKS PREDEFINED QOS PROFILES The following predeÞned QoS proÞles are provided, depending upon the QoS conÞguration of the Switch: ¥ Implicit QoS Mode Ñ A single QoS mode, called besteffort, is provided. It allows for 0% minimum and 100% maximum bandwidth along with a low-priority setting. Up to 15 other QoS proÞles may be deÞned. ¥ Explicit QoS Mode Ñ Four separate explicit QoS proÞles, each with varying priorities, are deÞned.
SUMMIT.BK Page 4 Thursday, September 25, 1997 12:33 PM QUALITY OF SERVICE (QOS) EXPLICIT TRAFFIC CLASSIFICATION Examples of trafÞc that have an explicit classiÞcation include tagged 802.1Q trafÞc that contains the deÞned 802.1p priority bits and other similar mechanisms (such as 3ComÕs PACEª). It can also be made explicit by virtue of which port in the Switch the trafÞc was sourced from. Explicitly deÞned trafÞc uses only priority in differentiating its QoS.
SUMMIT.BK Page 5 Thursday, September 25, 1997 12:33 PM CONFIGURING QOS CONFIGURING QOS Table 8-1 describes the commands used to conÞgure QoS. Table 8-1: QoS Configuration Commands Command Description create qosprofile Creates a QoS profile. The default values assigned to a created QoS profile are: ■ Minimum bandwidth — 0% ■ Maximum bandwidth — 100% ■ Priority — low config qosmode [explicit | implicit] Changes the QoS mode to explicit mode or implicit mode.
SUMMIT.
SUMMIT.BK Page 1 Thursday, September 25, 1997 12:33 PM 9 IP Unicast Routing The chapter describes how to conÞgure IP routing on the Summit. It assumes that you are already familiar with IP unicast routing.
SUMMIT.BK Page 2 Thursday, September 25, 1997 12:33 PM IP UNICAST ROUTING As you create VLANs with IP addresses belonging to different IP subnets, you can also choose to route between the VLANs. Both the VLAN switching and IP routing function occur within the Summit. In Figure 9-1, A Summit is depicted with two VLANs deÞned; Finance and Personnel. Ports 1 and 3 are assigned to Finance; ports 2 and 4 are assigned to Personnel. Finance belongs to the IP network 192.207.35.
SUMMIT.BK Page 3 Thursday, September 25, 1997 12:33 PM OVERVIEW OF IP UNICAST ROUTING DYNAMIC ROUTES Dynamic routes are typically learned by way of RIP. Routers that use RIP exchange information in their routing tables in the form of RIP advertisements. Using dynamic routes, the routing table contains only networks that are reachable. Dynamic routes are aged out of the table when a RIP update for the network is not received for a period of time.
SUMMIT.BK Page 4 Thursday, September 25, 1997 12:33 PM IP UNICAST ROUTING CONFIGURING IP UNICAST ROUTING This section describes the commands associated with conÞguring IP unicast routing on the Summit. ConÞguring routing involves the following steps: ¥ Verify the Switch operating mode is set to iprouting, by using the following command: show switch If it is not, use the following command: config devicemode iprouting ¥ Create and conÞgure two or more VLANs.
SUMMIT.BK Page 5 Thursday, September 25, 1997 12:33 PM CONFIGURING IP UNICAST ROUTING Table 9-1 describes the commands used to conÞgure basic IP settings on the Switch. Table 9-1: Basic IP Commands Command Description enable bootp {vlan | all} Enables the generation and processing of BOOTP packets on a VLAN to obtain an IP address for the VLAN from a BOOTP server. The default setting is enabled for all VLANs.
SUMMIT.BK Page 6 Thursday, September 25, 1997 12:33 PM IP UNICAST ROUTING Table 9-1: Basic IP Commands (continued) Command Description clear iparp [ | vlan | all] Removes dynamic entries in the IP ARP table. Permanent IP ARP entries are not affected. clear ipfdb [ | vlan | all] Removes the dynamic entries in the IP forwarding database. Table 9-2 describes the commands used to conÞgure the IP route table.
SUMMIT.BK Page 7 Thursday, September 25, 1997 12:33 PM CONFIGURING IP UNICAST ROUTING Table 9-3 describes the commands used to conÞgure RIP. Table 9-3: RIP Configuration Commands Command Description enable rip Enables RIP. The default setting is disabled. enable rip aggregation Enables RIP aggregation of subnet information on a RIP version 2 interface. The default setting is enabled. enable rip exportstatic Enables the advertisement of static routes using RIP. The default setting is enabled.
SUMMIT.BK Page 8 Thursday, September 25, 1997 12:33 PM IP UNICAST ROUTING Table 9-3: RIP Configuration Commands (continued) Command Description config rip rxmode [none | v1only | v2only | any] {vlan | all} Changes the RIP receive mode for one or more VLANs. Specify: ■ none — Drop all received RIP packets. ■ v1only — Accept only RIP version 1 format packets. ■ v2only — Accept only RIP version 2 format packets. ■ any — Accept both version 1 and version 2 packets.
SUMMIT.BK Page 9 Thursday, September 25, 1997 12:33 PM CONFIGURING IP UNICAST ROUTING Table 9-4 describes the commands used to conÞgure the ICMP protocol. Table 9-4: ICMP Configuration Commands Command Description enable icmp redirects {vlan | all} Enables generation of ICMP redirect messages on one or more VLANs. The default setting is enabled. enable icmp unreachables {vlan | all} Enables the generation of ICMP unreachable messages on one or more VLANs.
SUMMIT.BK Page 10 Thursday, September 25, 1997 12:33 PM IP UNICAST ROUTING Table 9-4: ICMP Configuration Commands (continued) Command Description disable irdp {vlan | all} Disables the generation of router advertisement messages on one or more VLANs. ROUTING CONFIGURATION EXAMPLE Figure 9-2 illustrates a Switch that has three VLANs deÞned as follows: ¥ Finance Ñ Protocol-sensitive VLAN using the IP protocol Ñ Ports 1 and 3 have been assigned Ñ IP address 192.207.35.
SUMMIT.BK Page 11 Thursday, September 25, 1997 12:33 PM ROUTING CONFIGURATION EXAMPLE 192.207.35.1 192.207.36.1 My Company 192.207.35.0 Finance 192.207.36.0 Personnel 1 2 3 4 IP NetBIOS IP NetBIOS IP NetBIOS IP NetBIOS = IP traffic = NetBIOS traffic Figure 9-2: Unicast Routing Configuration Example In this conÞguration, all IP trafÞc from stations connected to ports 1 and 3 have access to the router by way of the VLAN Finance. Ports 2 and 4 reach the router by way of the VLAN Personnel.
SUMMIT.BK Page 12 Thursday, September 25, 1997 12:33 PM IP UNICAST ROUTING DISPLAYING ROUTER SETTINGS To display settings for various IP routing components, use the commands listed in Table 9-5.
SUMMIT.BK Page 13 Thursday, September 25, 1997 12:33 PM RESETTING AND DISABLING ROUTER SETTINGS Table 9-5: Router Show Commands (continued) Command Description show rip {vlan | all} Displays RIP configuration and statistics for one or more VLANs. Display includes the state for RIP settings, and interface states.
SUMMIT.BK Page 14 Thursday, September 25, 1997 12:33 PM IP UNICAST ROUTING Table 9-6: Router Reset and Disable Commands (continued) Command Description disable icmp redirects {vlan | all} Disables the generation of ICMP redirects on one or more VLANs. disable icmp unreachables Disables the generation of ICMP unreachable messages on one or more VLANs. disable icmp useredirects Disables the changing of routing table information when an ICMP redirect message is received.
SUMMIT.BK Page 1 Thursday, September 25, 1997 12:33 PM 10 Status Monitoring and Statistics This chapter describes how to view the current operating status of the Switch, how to display information in the Switch log, and how to take advantage of the RMON capabilities available in the Switch. Viewing statistics on a regular basis allows you to see how well your network is performing.
SUMMIT.BK Page 2 Thursday, September 25, 1997 12:33 PM STATUS MONITORING AND STATISTICS Table 10-1: Switch Monitoring Commands (continued) Command Description show fdb {all | | vlan | | permanent} Displays the forwarding database contents including MAC address, associated VLAN, port, age-of-entry configuration method, and status. Providing one of the options acts as a filter on the display. Providing a VLAN name displays all entries for the VLAN.
SUMMIT.BK Page 3 Thursday, September 25, 1997 12:33 PM STATUS MONITORING Table 10-1: Switch Monitoring Commands (continued) Command Description show log {} {} Displays the current snapshot of the log. Options include: ■ priority — Filters the log to display message with the selected priority or higher (more critical). Priorities include critical, warning, and informational. If not specified, informational priority messages and higher are displayed.
SUMMIT.BK Page 4 Thursday, September 25, 1997 12:33 PM STATUS MONITORING AND STATISTICS Table 10-1: Switch Monitoring Commands (continued) Command Description show rip {vlan | all} Displays RIP configuration and statistics for one or more VLANs. Display includes the state for RIP settings, and interface states.
SUMMIT.
SUMMIT.BK Page 6 Thursday, September 25, 1997 12:33 PM STATUS MONITORING AND STATISTICS PORT STATISTICS The Summit provides a facility for viewing port statistic information. The summary information lists values for the current counter against every port on the Switch, and it is refreshed approximately every two seconds. Values are displayed to nine digits of accuracy.
SUMMIT.BK Page 7 Thursday, September 25, 1997 12:33 PM PORT ERRORS PORT ERRORS The Summit keeps track of errors for each port. To view port error, enter show port errors The following port error information is collected by the Switch: ¥ Link Status Ñ The current status of the link. Options are Ñ Ready Ñ The port is ready to accept a link. Ñ Active Ñ The link is present at this port.
SUMMIT.BK Page 8 Thursday, September 25, 1997 12:33 PM STATUS MONITORING AND STATISTICS ¥ Receive Frames Lost (RX Lost) Ñ The total number of frames received by the port that were lost because of buffer overßow in the Switch. SWITCH LOGGING The Summit log tracks all conÞguration and fault information pertaining to the device.
SUMMIT.BK Page 9 Thursday, September 25, 1997 12:33 PM SWITCH LOGGING Table 10-3: Fault Log Subsystems Subsystem Description Telnet Information related to Telnet login and configuration performed by way of a Telnet session. VLAN VLAN-related configuration information. Port Port management-related configuration. Examples include port statistics and errors. ¥ Message Ñ The message contains the log information with text that is speciÞc to the problem.
SUMMIT.BK Page 10 Thursday, September 25, 1997 12:33 PM STATUS MONITORING AND STATISTICS If you enable the log display on a terminal connected to the console port, your settings will remain in effect even after your console session is ended (unless you explicitly disable the log display). When using a Telnet connection, if your Telnet session is disconnected (because of the inactivity timer, or for other reasons), the log display is automatically halted.
SUMMIT.BK Page 11 Thursday, September 25, 1997 12:33 PM SWITCH LOGGING LOGGING COMMANDS The commands described in Table 10-4 allow you to conÞgure logging options, reset logging options, display the log, and clear the log. Table 10-4: Logging Commands Command Description config log display {} {} Configures the real-time log display.
SUMMIT.BK Page 12 Thursday, September 25, 1997 12:33 PM STATUS MONITORING AND STATISTICS Table 10-4: Logging Commands (continued) Command Description disable log display Disables the log display. disable syslog Disables logging to a remote syslog host. show log {} {} Displays the current snapshot of the log. Options include: ■ priority — Filters the log to display message with the selected priority or higher (more critical).
SUMMIT.BK Page 13 Thursday, September 25, 1997 12:33 PM RMON ABOUT RMON RMON is the common abbreviation for the Remote Monitoring Management Information Base (MIB) system deÞned by the Internet Engineering Task Force (IETF) documents RFC 1271 and RFC 1757, which allows you to monitor LANs remotely. A typical RMON setup consists of the following two components: ¥ RMON probe Ñ An intelligent, remotely controlled device or software agent that continually collects statistics about a LAN segment or VLAN.
SUMMIT.BK Page 14 Thursday, September 25, 1997 12:33 PM STATUS MONITORING AND STATISTICS HISTORY The History group provides historical views of network performance by taking periodic samples of the counters supplied by the Statistics group. The group features user-deÞned sample intervals and bucket counters for complete customization of trend analysis.
SUMMIT.BK Page 15 Thursday, September 25, 1997 12:33 PM RMON For example, statistics can be related to individual ports. Also, because a probe must be able to see all trafÞc, a stand-alone probe must be attached to a nonsecure port. Implementing RMON in the Switch means that all ports can have security features enabled. EVENT ACTIONS The actions that you can deÞne for each alarm are shown in .. Table 10-5: Event Actions Action High Threshold No action Notify only Send trap to all trap receivers.
SUMMIT.
SUMMIT.BK Page 1 Thursday, September 25, 1997 12:33 PM 11 Software Upgrade and Boot Options This chapter describes the procedure for upgrading the Switch software image. This chapter also discusses how to save and load a primary and secondary image and conÞguration Þle on the Switch. USING TFTP TO DOWNLOAD A NEW IMAGE The image Þle contains the executable code that runs on the Summit. It comes preinstalled on the Switch from the factory.
SUMMIT.BK Page 2 Thursday, September 25, 1997 12:33 PM SOFTWARE UPGRADE AND BOOT OPTIONS The Summit can store up to two images: a primary and a secondary. When you download a new image, you must select into which image space (primary or secondary) you want the new image to be placed. You can select which image the Switch will load on the next reboot by using the following command: use image {primary | secondary} If you do not specify which image to use, the Switch automatically loads the primary image.
SUMMIT.BK Page 3 Thursday, September 25, 1997 12:33 PM BOOT OPTION COMMANDS To save the conÞguration, use the following command: save {config} {primary | secondary} To use the conÞguration, use the following command: use config {primary | secondary} The conÞguration takes effect on the next reboot.
SUMMIT.BK Page 4 Thursday, September 25, 1997 12:33 PM SOFTWARE UPGRADE AND BOOT OPTIONS Table 11-1: Boot Option Commands (continued) Command Description use config {primary | secondary } Configures the Switch to use a particular configuration on the next reboot. Options include the primary configuration area, or the secondary configuration area. If not specified, the Switch will use the primary configuration area.
SUMMIT.BK Page 1 Thursday, September 25, 1997 12:33 PM A Safety Information IMPORTANT SAFETY INFORMATION Please read the following safety information thoroughly before installing the Summit Switch. ¥ Installation and removal of the unit must be carried out by qualiÞed personnel only. ¥ To reduce the risk of Þre or electrical shock, install the unit in a temperature- and humidity-controlled indoor area free of conductive contaminants.
SUMMIT.BK Page 2 Thursday, September 25, 1997 12:33 PM SAFETY INFORMATION ¥ This unit operates under Safety Extra Low Voltage (SELV) conditions according to IEC 950. The conditions are only maintained if the equipment to which it is connected also operates under SELV conditions. ¥ The appliance coupler (the connector to the unit and not the wall plug) must have a conÞguration for mating with an EN60320/IEC320 appliance inlet. ¥ France and Peru only This unit cannot be powered from IT supplies.
SUMMIT.BK Page 3 Thursday, September 25, 1997 12:33 PM IMPORTANT SAFETY INFORMATION FUSE ¥ Disconnect power from the unit before opening the fuse holder cover. The unit automatically adjusts to the supply voltage. The fuse is suitable for both 110V A.C. and 220-240V A.C. operation. To change the fuse, release the fuse holder by gently levering a small screwdriver under the fuse holder catch. Only fuses of the same manufacturer, rating, and type as the original must be used with the unit.
SUMMIT.BK Page 4 Thursday, September 25, 1997 12:33 PM SAFETY INFORMATION LITHIUM BATTERY ¥ Replace the lithium battery with the same or equivalent type, as recommended by the manufacturer. There is a danger of explosion if the battery is incorrectly replaced. ¥Dispose of used batteries according to the manufacturerÕs instructions. Ñ Do not dispose of the batteries in water, or by Þre. Ñ Disposal requirements vary by country and by state.
SUMMIT.BK Page 1 Thursday, September 25, 1997 12:33 PM B Technical Specifications Physical Dimensions Height: 3.5 inches x Width: 17.32 inches x Depth: 17.32 inches Weight: 10 kg Environmental Requirements Operating Temperature 0 to 40˚ C Storage Temperature -10 to 70 ˚ C Operating Humidity 10% to 95% relative humidity, noncondensing Standards EN60068 (IEC68) Safety Agency Certifications UL 1950 3rd Edition, listed cUL listed to CSA 22.
SUMMIT.BK Page 2 Thursday, September 25, 1997 12:33 PM TECHNICAL SPECIFICATIONS Heat Dissipation 118W maximum (341.2 BTU/hr maximum) Power Supply AC Line Frequency 47Hz to 63Hz Input Voltage Options 90VAC to 264VAC, auto-ranging Current Rating 100-120/200-240 VAC 3.0/1.
SUMMIT.BK Page 1 Thursday, September 25, 1997 12:33 PM C Troubleshooting If you encounter problems when using the Switch, this appendix may be helpful. If you have a problem not listed here or in the release notes, contact your local technical support representative. LEDS Power LED does not light: Check that the power cable is Þrmly connected to the device and to the supply outlet. Check the unit fuse. For information on changing the fuse, see Appendix A.
SUMMIT.BK Page 2 Thursday, September 25, 1997 12:33 PM TROUBLESHOOTING Both sides if the gigabit link must be enabled or disabled. It the two are different, typically the side with autonegotiation disabled will have the link LED list, and the side with autonegotiation enabled will not list. The default conÞguration for a gigabit port is autonegotiation enabled.
SUMMIT.BK Page 3 Thursday, September 25, 1997 12:33 PM USING THE COMMAND-LINE INTERFACE Traps are not received by the SNMP Network Manager: Check that the SNMP Network Manager's IP address and community string are correctly conÞgured, and that the IP address of the Trap Receiver is conÞgured properly on the Switch. The SNMP Network Manager or Telnet workstation can no longer access the device: Check that Telnet access or SNMP access is enabled.
SUMMIT.BK Page 4 Thursday, September 25, 1997 12:33 PM TROUBLESHOOTING You forget your password and cannot log in: If you are not an administrator, another user having administrator access level can log in, delete your user name, and create a new user name for you, with a new password. Alternatively, another user having administrator access level can log in and initialize the device. This will return all conÞguration information (including passwords) to the initial values.
SUMMIT.BK Page 5 Thursday, September 25, 1997 12:33 PM USING THE COMMAND-LINE INTERFACE VLAN names: There are restrictions on VLAN names. They cannot contain white spaces and cannot start with a numeric value unless you use quotation marks around the name. If a name contains white spaces or starts with a numeric, you must use quotation marks whenever referring to the VLAN name. 802.1Q links do not work correctly: Remember that VLAN names are only locally signiÞcant through the command-line interface.
SUMMIT.BK Page 6 Thursday, September 25, 1997 12:33 PM TROUBLESHOOTING The Switch keeps aging out endstation entries in the Switch Forwarding Database (FDB): Reduce the number of topology changes by disabling STP on those Switches that do not use redundant paths. Specify that the endstation entries are static or permanent.