Cabletron Systems 3E08-04 Uživatelská příručka

Procházejte online nebo si stáhněte Uživatelská příručka pro Síťové přepínače Cabletron Systems 3E08-04. Cabletron Systems 3E08-04 User`s guide Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 242
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
ATX
USER’S GUIDE
POWER STATUS
ENGINE STATUS
TURBO STATUS
SUPPLY A
SUPPLY B
1.6 Gbps
RESET
PACKET PROCESSING ENGINE
NMS PORT
POWER
FastNET ATX
TM
OFFLINE
PROC
PWR
OCTAL IEEE 802.3 / ETHERNET 10BASE-T
3X 4X 5X 6X 7X 8X2X1X
SEGMENT
LINK
ACT
COL
12345678
OFFLINE
RING 1
RX ST
RING 2
RX ST
RING 3
RX ST
RING 4
RX ST PROC
TX 16 TX 16 TX 16 TX 16 PWR
QUAD IEEE 802.5 TOKEN RING (UTP)
OFFLINE
RX
LK
TX
QUAD FAST ETHERNET / 802.3 100BASE-FX
TX RX
SEGMENT 4SEGMENT 3SEGMENT 2 SEGMENT 1
RX
LK
TX
RX
LK
TX
RX
LK
TX
PROC
PWR
TX RX TX RX TX RX
OFFLINE
TX PWR
INTELLIGENT FDDI
RING A
RING B
THRU
WRAP
RX
PROC
FDDI MIC A FDDI MIC BOPTICAL BYPASS
MULTI-MODE MULTI-MODE
OFFLINE
PROCRX
TX
PWR
QUAD IEEE 802.3 / ETHERNET 10BASE2
SEGMENT 4SEGMENT 3SEGMENT 2 SEGMENT 1
RX
TX
RX
TX
RX
TX
OFFLINE
PROCRX
TX
PWR
QUAD IEEE 802.3 / ETHERNET 10BASE2
SEGMENT 4SEGMENT 3SEGMENT 2 SEGMENT 1
RX
TX
RX
TX
RX
TX
Zobrazit stránku 0
1 2 3 4 5 6 ... 241 242

Shrnutí obsahu

Strany 1 - USER’S GUIDE

ATXUSER’S GUIDE POWER STATUSENGINE STATUSTURBO STATUSSUPPLY ASUPPLY B 1.6 Gbps RESET PACKET PROCESSING ENGINENMS PORTPOWERFastNET ATXTMOFFLINE PRO

Strany 2

viiiContents 3.11.4 Example #1: LOCAL Port Mirroring...3-383.11.5 Example #2: REMOTE Port Mirroring...

Strany 3 - FCC NOTICE

3-28Configuringworkgroup mktg 11,12-18 ipx 0x12343.10 CLASSIFICATIONWhen a broadcast packet is received on a workgroup defined port, the packet is clas

Strany 4 - VCCI NOTICE

Configuring3-29Broadcast from C will only be seen by A, B and DBroadcast from D will only be seen by CBroadcast from E will be seen by all forwarding p

Strany 5

3-30ConfiguringAn ARP from:A or B destined for 100.100.1.xxx will only be seen by A, B and CA or B destined for 100.100.2.xxx will only be seen by A, B

Strany 6 - DECLARATION OF CONFORMITY

Configuring3-313.10.3 Workgroup of Type IPXTo determine the workgroup of an IPX broadcast the destination IPX network number is used (see Example #3).

Strany 7 - CONTENTS

3-32ConfiguringC destined for the 0x1234 network will only be seen by DC destined for the 0x999 network will be seen by all forwarding portsC destined

Strany 8

Configuring3-33A SAP from:A or B destined for the 0x1234 network will only be seen by A, B and CA or B destined for the 0x999 network will only be seen

Strany 9

3-34ConfiguringC sends an IP packet destined for any network other than 100.100.1.0 the broadcast is forwarded out every other forwarding port. Even th

Strany 10 - Contents

Configuring3-35ipaddress P7 134.141.200.7 255.255.255.0 Results: • Stations A, B and C IP communication will be switched between ports 3, 4 and 5 since

Strany 11

3-36ConfiguringThe LCM command format for Remote Port Mirroring is:Local ATX (in reference to the diagnostic port)mirror remote offoff - to turn remote

Strany 12

Configuring3-37Furthermore, mirroring traffic of a higher speed interface out to a lower speed interface may impose a strain on performance (e.g. captur

Strany 13

Contentsix CHAPTER 5 FILTERS 5.1 FILTERING AND PERFORMANCE CONSIDERATIONS ...5-25.2 USING FILTERS FOR SECURITY PURPOSES...

Strany 14

3-38Configuring3.11.3 Mirrored FiltersThe ATX also allows you (via the existing port filtering feature; (Chapter 5 in the ATX LAN Switch User’s Guide)

Strany 15

Configuring3-39Mirror Filters with LOCAL Port Mirroring: • Desired - analyze IP traffic from station A (on P2) to station B (on P3) and vice versa • Imp

Strany 16 - Introduction

3-40ConfiguringConfig on ATX #2mirror remote 2 to 134.141.100.1Mirror Filters with REMOTE Port Mirroring: • Desired - to see packets from station A (on

Strany 17

Configuring3-413.15 EVENT LOGGING COMMANDSThe Event Log is established using the LCM. New LCM commands have been added in order to manage the event l

Strany 18

3-42Configuringoption will turn off event logging. The event logging entries will be kept in a circular buffer, and the logging entries will be overwri

Strany 19

Configuring3-43networks like Ethernet and FDDI. RIF is not supported on Ethernet networks and is seldom used on FDDI networks. In order to merge sour

Strany 20

3-44ConfiguringOther - enables stripping and caching of RIF on AppleTalk, SNA and NetBIOS framesAll - enables stripping and caching of RIF on IP, IPX a

Strany 21

Configuring3-45TP- transparent SR- source route SRT- source route transparent (non token ring port) SRT/TR- source route transparent on a token ring po

Strany 22

3-46Configuringand NetBIOS frames. All other protocols will NOT have their RIF cached. Support for other protocols will be in future releases.Example #

Strany 23

Configuring3-47Example 2:Port 1 is configured for TransparentPort 2 is configured for Source Route TransparentPort 3 is configured for Source RouteSRTB is

Strany 24

xContents 5.10.1 Filtering for Security Purposes...5-20Example 1 — Blocking access to a network segmen

Strany 25

3-48ConfiguringScenario 2Station C sends out a broadcast for station B. The frame from station C will have a Null RIF (2 bytes). Since the ATX’s P3 is

Strany 26

Configuring3-49Example #4: Maximum Transmit UnitThe maximum frame size on FDDI is 4500 bytes, maximum on Ethernet is 1518 bytes and the maximum on Toke

Strany 27

3-50Configuringdescribe a few configurations and possible solutions that address this problem.Scenario 1: Local StationsProblem:Assume station A has alr

Strany 28

Configuring3-51Scenario 2: Stations across a Source Route only bridgeProblem:Assume station C has already communicated and the ATX has learned the RIF

Strany 29

3-52Configuring

Strany 30

4-1CHAPTER 4MONITORING AND MANAGING THE ATXMonitoring your ATX consists of collecting and analyzing statistics and status information. You can use LC

Strany 31

4-2Monitoring and Managing the ATX • General status and statistics • IP status and statistics • ICMP status and statistics • UDP status and statistics

Strany 32

Monitoring and Managing the ATX4-3 • Number of packets that were sourced from outside a network that were not forwarded to the network. • Number of pa

Strany 33

4-4Monitoring and Managing the ATX4.1.1 General Status and StatisticsThe following statistics profile the general status of the ATX. (The MIB variable

Strany 34

Monitoring and Managing the ATX4-5 • The total number of IP packets received from all ports (including the UART). [ipInReceives] • The number of packe

Strany 35

Contentsxi 8.3 MAINTENANCE...8-38.3.1 Power Fuse...

Strany 36

4-6Monitoring and Managing the ATX • The number of IP fragments received which needed to be reassembled within this ATX. [ipReasmReqds] • The number o

Strany 37

Monitoring and Managing the ATX4-7 • The number of ICMP Parameter Problem messages received. [icmpInParmProbs] • The number of ICMP Source Quench mess

Strany 38 - Logical Network A

4-8Monitoring and Managing the ATX • The number of ICMP Parameter Problem messages sent. [icmpOutParmProbs] • The number of ICMP Source Quench message

Strany 39 - Logical Network A, B, and C

Monitoring and Managing the ATX4-9level; all datagrams forwarded to UDP are always forwarded to the ATX's local management agent. [udpInErrors] •

Strany 40

4-10Monitoring and Managing the ATX • The total number of SNMP GetRequest PDUs received by the ATX, which have been processed with no errors. [snmpInG

Strany 41

Monitoring and Managing the ATX4-11 • Whether a topology change is currently in progress. [stTopChange] • If a topology change is in progress then th

Strany 42

4-12Monitoring and Managing the ATX • The time, in centiseconds, since a packet was last received from the station. • The number of packets received f

Strany 43

Monitoring and Managing the ATX4-13address as source address match. [filterPktCnts] • Number of packets sent from Segment A to Station B.Configure pseu

Strany 44

4-14Monitoring and Managing the ATXType: <CR> to display port 2 status...If you don’t want to view the status of each port, use the Ctrl-C keys

Strany 45

Monitoring and Managing the ATX4-15 • TempOk – indicates whether the module is overheating. Normal is displayed when the module temperature is within

Strany 46

xiiContents

Strany 47

4-16Monitoring and Managing the ATXAddress Type Port Age(secs) Frames-from Frames-to08:00:20:02:3a:44 Le

Strany 48

Monitoring and Managing the ATX4-17Address Type Port Age(secs) Frames-from Frames-to10 00 90 c1 d1 1d Learned 6 0

Strany 49

4-18Monitoring and Managing the ATX4.4.1 Disabling a PortThere may be times when you need to disable a specific port. Disabling a port effectively sto

Strany 50

Monitoring and Managing the ATX4-19Enabling bridging/routing functions for port 7Enabling bridging/routing functions for port 8Enabling bridging/routi

Strany 51

4-20Monitoring and Managing the ATX4.4.5 Setting The Baud RateYou can set the baud rate for your LCM console connection. The options for baud rate in

Strany 52

Monitoring and Managing the ATX4-21the MIB variable configAnyPass; you must then enter the community name to perform any gets or sets. What you type i

Strany 53

4-22Monitoring and Managing the ATX

Strany 54

5-1CHAPTER 5FILTERSOne of the most significant features of the ATX is its powerful user-configurable filtering capabilities. Flexible filtering is useful

Strany 55

5-2Filters5.1 FILTERING AND PERFORMANCE CONSIDERATIONSWhen filters are implemented, the ATX must process packets to determine if they should be filtere

Strany 56

Filters5-3Detailed examples of filter applications are presented later in this chapter. (See Filtering Application Examples.)5.3 USING FILTERS TO IMPR

Strany 57

1-1 CHAPTER 1INTRODUCTION Welcome to the Cabletron Systems ATX User Guide. This manual explains installation instructions, and provides specification

Strany 58

5-4Filtersbut it is not a filter. Multicast storm protection is described in Chapter 3, Configuring Multicast Storm Protection.5.4 ADDRESS TABLE FILT

Strany 59 - command.)

Filters5-5to filter (ON) or not filter (OFF) packets from the specified address.With the address table entry shown in Table 5-1, you could use any of the

Strany 60

5-6FiltersAn example of a source address filter is shown in Table 5-3. For illustration purposes, this example uses the same format as the address tabl

Strany 61

Filters5-7designated MAC address will be filtered. Multicast packets are those destined for more than one address (using a multicast destination addres

Strany 62 - Figure 2-1. ATX Front Panel

5-8Filtersport filters are described in the next section.The ATX allows you to implement up to 100 combination port filters (total, for all connected po

Strany 63 - Switch Function

Filters5-9 • Pseudo – allows you to create a pseudo filter to monitor traffic patterns without discarding packets. • And/Or – allows you to combine mu

Strany 64 - Fasteners

5-10FiltersSource Range MaskMAC address mask to apply to the range of source MAC addresses. ff:ff:ff:ff:ff:ff is the default.Destination RangeEither N

Strany 65

Filters5-11Exit. NA is the default.Note: You can assign a filter to a group by entering a group number rather than a port number. You can assign a gro

Strany 66 - Power-up Diagnostics Sequence

5-12FiltersField OriginEither IP, MAC, or SR (see Field Offset below). The origin is the field from which the offset count starts. IP is the default.Fi

Strany 67

Filters5-13Values greater than 3600 (one hour) are not valid; a value of zero indicates that no alarms should be generated. Zero is the default. Thres

Strany 68

1-2Introduction • Chapter 2, Installing and Connecting to the Network , describes the ATX front panel, how to install the ATX, and how to connect t

Strany 69

5-14Filters • Monitoring traffic patterns as an aid in determining optimum network design, usage policies, etc. • Monitoring potential security threats

Strany 70

Filters5-15Note: If you are adding a filter to be used in conjunction with another filter and they must be ordered sequentially, use the filters displ

Strany 71 - ATX>

5-16Filters6. Enter the first MAC address in the source range.7. Enter the last MAC address in the source range.8. Enter the source range MAC address m

Strany 72

Filters5-1714. Enter the protocol type to match.15. Select whether the filter will use a field match.NA is the default. You don’t need to enter anything

Strany 73

5-18Filters If you want the filter to have another index number, enter the value you wish to use.LCM displays the filter you have just entered and promp

Strany 74

Filters5-195.9 DISPLAYING A FILTERTo display a filter complete the following steps:1. Type: filters display.LCM prompts you for the port number.2. Ent

Strany 75

5-20Filters • Using a firewall filter to prevent problems and enhance performance.For each application example, the situation is described first, and the

Strany 76

Filters5-21Figure 5-1. Using Filters To Restrict Access To An Adjoining SubnetThe company wishes to allow Engineering and Accounting workstations to

Strany 77

5-22Filterspackets from Accounting destined for Engineering (LAN 4 to LAN 3). Each filter includes: • The source LAN or port number • The destination p

Strany 78

Filters5-23 Figure 5-2. Using Filters To Restrict Access To Specific WorkstationsIn this example, a combination port filter is configured which instruct

Strany 79

Introduction1-3 • Appendix E, Big Endian to Little Endian Address Conversion , describes how to convert MAC addresses from big endian (Token Ring n

Strany 80

5-24Filters • Filter fields – destination address F-H (range, match) source LAN = 1 (match).Note that a Match flag is specified for both fields; this inst

Strany 81

Filters5-25Example 3 — Restricting access to authorized usersThe example, shown in Figure 5-3, is very similar to the previous example. The difference

Strany 82

5-26Filtersall traffic that does not match both fields. All packets destined for the restricted computers (F, G, or H) will be filtered unless the source

Strany 83

Filters5-27Note: In order for this trap to work, you must have ConfigAlarmDynamic set and your NMS must be able to process traps from the ATX.Example

Strany 84

5-28FiltersThis filter is configured as follows: • Filter identifier – port number of the port attached to LAN 4 as a destination • Filter fields – protoc

Strany 85

6-1CHAPTER 6TRAPSThe ATX sends trap PDUs to an SNMP Manager, using a pre-configured SNMP Manager IP address. (See configNMSAddress in the ATX MIB Refe

Strany 86

6-2Trapsfor one of the debugging attributes; those PDUs must always provide the configAnyPass. • egpNeighborLoss (5) – Not used by the ATX. • enterpri

Strany 87

Traps6-36.2 ATX UNIQUE TRAP IDSThe ATX possesses unique trap IDs which allow a SNMP Manager (Spectrum Element Manager, Spectrum) to have more control

Strany 88

6-4Traps • trunkState (10) - A trunking state change transition has occurred. The possible transitions are: • CLOSED - ONEWAY • ONEWAY - PERTURBED • P

Strany 89

Traps6-5topChangeEnd (20) - The spanning tree topology has stopped changing.ifErrors (21) - Sent whenever the number of hardware errors in received an

Strany 90

1-4Introduction 1.3 RELATED DOCUMENTATION You may need to refer to the following documentation: • ATX MIB Reference Guide – contains enterprise

Strany 91

6-6TrapsfddimibSMTCFState (200) - Sent whenever the FDDI port's CFM state has changed.The fddimibPORTMACIndicated (one or two instances, dependin

Strany 92

Traps6-7sfddiOBSFuseBad (212) - Sent whenever the fuse to the FDDI port's optical bypass becomes bad, or switches from bad to good.sfddiStationSt

Strany 93

6-8TrapseePromReconfig (230) - The unit's EEPROM has been reconfigured.maxNextHop (231) - Maximum number of next hops reached.ripBadNet (232) - RI

Strany 95

6-10Traps

Strany 96

7-1CHAPTER 7DIAGNOSTICS AND TROUBLESHOOTINGThe main topics covered in this chapter are: • Power-up diagnostics • Diagnostics while the ATX is operati

Strany 97

7-2Diagnostics and Troubleshooting • Power-up • Reset using the front panel reset button • Reset via the NMS (a soft reset) • Automatic reset occurs i

Strany 98

Diagnostics and Troubleshooting7-3modules are on for approximately 3 seconds.b. The ENGINE STATUS LED on the PPE begins to flash. c. The ENGINE STATUS

Strany 99

7-4Diagnostics and Troubleshooting7.2.3 Software Checksum ComparisonWhen the ATX reboots, its operational software is verified by a checksum compariso

Strany 100 - Configuring

Diagnostics and Troubleshooting7-5Failure IndicatorsIf an FDDI or Ethernet module has failed, its front panel STATUS LED will be off. NMS Failure Trap

Strany 101

Introduction1-5 1.4 GETTING HELP If you need additional support related to this device, or if you have any questions, comments, or suggestions conce

Strany 102

7-6Diagnostics and Troubleshootingloopback tests, the ATX creates LLC Type 1 test packets for LANs, and PPP echo-request packets for WANs and UARTs.Bo

Strany 103

Diagnostics and Troubleshooting7-7Table 7-1. Meaning Of ATX LEDsLED MeaningPOWER STATUS On – Power is on and the voltage is within the acceptable ra

Strany 104

7-8Diagnostics and TroubleshootingFigure 7-1. LED Activity During Normal Operation7.5 TROUBLESHOOTINGThis section lists several problem situations t

Strany 105

Diagnostics and Troubleshooting7-9Because every situation is potentially unique and may involve unique external factors, the corrective actions sugges

Strany 106

7-10Diagnostics and Troubleshooting • Check for loose port connections. Check all connectors to the modules (especially twisted pair connectors, which

Strany 107

Diagnostics and Troubleshooting7-11 • Check that a pathway to the ATX exists (intermediate bridges and routers are functioning). • Verify ATX’s IP add

Strany 108

7-12Diagnostics and Troubleshooting

Strany 109

8-1CHAPTER 8ADDING/SWAPPING MODULES AND MAINTENANCEThe ATX configuration may include a total of five interface modules in various combinations. This me

Strany 110

8-2Adding/Swapping Modules and Maintenance4. Loosen the screws at each end of the panel that covers the interface slot and remove the protective panel

Strany 111

Adding/Swapping Modules and Maintenance8-33. Remove the installed interface module by pulling gently but firmly on the “ears” at the ends of the module

Strany 113

1-6Introduction • Any previous Return Material Authorization (RMA) numbersFor additional information about Cabletron Systems products, visit our Wor

Strany 114

8-4Adding/Swapping Modules and Maintenance1. Disconnect the power cord from the ATX.2. Pull the small plastic fuse drawer below the power input connec

Strany 115

Adding/Swapping Modules and Maintenance8-5supply into the chassis at an angle, or if you position the power supply above the tabs shown in Figure 8-1,

Strany 116

8-6Adding/Swapping Modules and Maintenance4. Slide the new power supply straight into the chassis under the tabs shown in Figure 8-1.The power supply

Strany 117

A-1APPENDIX ASPECIFICATIONS FOR THE ATXA.1 PACKET PROCESSING ENGINEDual AMD 29000 RISC processors4 MB FLASH memory8 MB main memory2 MB shared memory

Strany 118

A-2Specifications For The ATXA.2.3 Local Routing • IP Routing (RIP) • AppleTalk Routing • IPX Routing (RIP, SAP, Diagnostic) • IP Multicast Suppor

Strany 119

Specifications For The ATXA-3A.5 ELECTRICALInput voltage Auto-ranging from 100 to 120 or 200 to 240 VacFrequency 47 to 65 HzAC power 380 WMaximum AC C

Strany 120

A-4Specifications For The ATXPower supply BResetA.10 SOFTWARE LOADINGFLASH memory via TFTPA.11 ADDRESS TABLE SIZE8,192 dynamic (learned) entries defa

Strany 121

B-1APPENDIX BPACKET TRANSLATION PROCEDURESince the ATX is a multi-media unit, packets are converted from the different media into a standard canonica

Strany 122

B-2Packet Translation ProcedureFigure B-2. Canonical Packet FormatDA (big endian)SA (big endian)dsapssapcontrolprotocol IDdata or frame typemore data

Strany 123

Packet Translation ProcedureB-3Figure B-3. IP Header (After Canonical Packet Format)Figure B-4. UDP Header (After IP Header)IPversionheaderlengthser

Strany 124

Introduction1-7Processing Engine.The ATX offers features which allow you to easily manage and maintain your network, such as: • Protection against mul

Strany 125

B-4Packet Translation ProcedureFigure B-5. TCP Header (After IP Header)acknowledgment numberwindowoptions (if any)...padding(if necessary)source port

Strany 126

C-1APPENDIX CNULL MODEM CABLE PINOUTSTo connect LCM you need to insert a null modem cable at either the terminal end or the ATX port end. The null m

Strany 127

C-2Null Modem Cable Pinouts

Strany 128

D-1APPENDIX DGLOSSARY4B/5BPrimary data encoding scheme used for FDDI.AARP (AppleTalk Address Resolution Protocol)AppleTalk ARP performs network addre

Strany 129

D-2GlossaryagentNetwork management software that runs within a managed network device.alarmSee trap.ANSI American National Standards Institute – One o

Strany 130

GlossaryD-3attenuationThe amount of power (or light) lost as power travels through a medium, from the transmitter to the receiver. Difference between

Strany 131

D-4GlossaryBPDU (bridge protocol data unit)A data unit transmitted as part of the IEEE 802.1d Spanning Tree Protocol. The exchange of BPDUs allows bri

Strany 132

GlossaryD-5combination port filterA filter which may include several configurable fields and may be used to filter bridge traffic in a very specific manner.c

Strany 133

D-6GlossaryDAS (dual attachment station)An FDDI station connected to both the primary and secondary rings.data link layerLayer 2 in the OSI model. Defi

Strany 134

GlossaryD-7downstream from another station if it receives the token or data after the other station receives the token or data. dual homingA method of

Strany 135

1-8IntroductionWith an innovative, multiple RISC processor architecture, the ATX’s Packet Processing Engine is capable of filtering and forwarding at f

Strany 136

D-8GlossaryentityAn active element within an Open Systems Interconnection (OSI) network layer or sublayer.Ethernet input/output moduleThe ATX componen

Strany 137

GlossaryD-9filtering rateA measure (in packets per second) of a bridge's efficiency in examining each frame, comparing it with an address table, an

Strany 138

D-10GlossaryICMP (Internet control message protocol)An auxiliary protocol of IP used to convey advice and error messages about events in the IP layer.

Strany 139

GlossaryD-11initializationTransition of a device or network from startup state to operational state.intelligent bridgeA bridge that is able to identif

Strany 140

D-12Glossarymodule. I/OSee input-output module.IP (Internet protocol)IP is the basic datagram protocol used at the network layer of the TCP/IP stack.I

Strany 141

GlossaryD-13LLC (logical link control)A part of the data link layer of the OSI model that defines the transmission of a frame of data between two stati

Strany 142

D-14GlossaryMbps (megabits per second)1 million bits per second.MIB (management information base)A collection of objects unique to a specific device th

Strany 143

GlossaryD-15router on each of those networks. The destination router(s) then multicasts a lookup request on the destination network. A response is the

Strany 144

D-16Glossaryoptical transmitterA circuit that converts an electrical signal to an optical signal.OSI (Open Systems Interconnection)Refers to the OSI r

Strany 145

GlossaryD-17requirements and the encoding of data for transmission.physical layerLayer 1 of the OSI model. Defines and handles the electrical and physi

Strany 146

Introduction1-9unicast address.Name_Query_Request frames provide the ATX with the name of the source workstation, the MAC address, the port which reci

Strany 147

D-18Glossaryprotocol suiteA group of protocols related to a common framework.RARP (reverse address resolution protocol)A protocol that translates MAC

Strany 148

GlossaryD-19network and master (M) ports for the attachment of stations or other concentrators. SAS (single attachment station)An FDDI station that us

Strany 149

D-20Glossaryopposed to those automatically “learned” by the bridge).STP (spanning tree protocol)A protocol which ensures that only one path will be us

Strany 150

GlossaryD-21transmit.token ringLocal area network access mechanism and topology in which a supervisory frame (the token) is passed from station to sta

Strany 151

D-22GlossaryTTRT (target token rotation time)A time defined for tokens to travel around an FDDI ring; used to synchronize the clocking of traffic on the

Strany 152

GlossaryD-23groups must consist of ports with all the same underlying link type.WAN (wide area network)A communication network that spans a large geog

Strany 153

D-24Glossary

Strany 154

E-1APPENDIX EBIG ENDIAN TO LITTLE ENDIAN CONVERSIONThe chart below provides the bit swap values and a conversion formula.The conversion process has t

Strany 155

E-2Big Endian To Little Endian Conversion1. First, swap the big endian bits, use the conversion chart to find the equivalent values. For example:00 0

Strany 156

Index-1INDEXAaddingfilters 5-15IP addresses 3-6IPX addresses 3-13address classes, IP 3-5Address Resolution Protocol. See ARPaddress table filtersabout

Strany 157

1-10Introduction1.6.3 IPX with Token Ring Source RoutingToken ring networks often interconnect with source routing (SR) bridges. Although the source

Strany 158

Index-2Indexbridging functions 3-5IP routing 3-12IPX routing 3-15ports 4-18displayingbaud rate 4-20bridge functions 3-4ES/1 status 4-13filters 5-19IP

Strany 159

IndexIndex-3LLCMconnecting 2-10description of 1-39LCM command syntax 1-40LED sequencenormal operation 7-6power-up 7-2LEDs, front panel meaning 2-2Loca

Strany 160

Index-4IndexService Advertising Protocol. See SAPset password, defined 3-24setting baud rate 4-20statistics, monitoring 4-1status, displayingES/1 4-13

Strany 161

Introduction1-11preserves network bandwidth for important user data and frees up valuable end station processing. By defining virtual workgroups, broa

Strany 162

1-12IntroductionFigure 1-2. ATX Architecture1.6.7 Input/output ModulesThe ATX has four types of modules available. The modules slide into the face o

Strany 163 - 18. Enter the field value

Introduction1-13 • 3T02-04, 3T05-04 and 3T01-04 - Four ring Token Ring modules accepting data frames from and sending data frames to four Token Ring n

Strany 164

1-14Introductionas the originating packet, the ATX immediately forwards the packet to the segment associated with the destination address. Local traffi

Strany 165

Introduction1-15multicast packets.If source routing is desired, and either Ethernet or FDDI is to be used as a backbone between Token Rings, then the

Strany 166

Noticei NOTICE Cabletron Systems reserves the right to make changes in specifications and other information contained in this document without prior n

Strany 167 - FastNET ATX

1-16Introduction1.7.1 Transparent BridgingTransparent or spanning tree bridging requires no initial programming. After being installed on the network

Strany 168

Introduction1-17learning database to learn addresses on the incorrect ports. This could result in frames not getting forwarded and loss of communicati

Strany 169

1-18IntroductionFigure 1-3. Source Routing ExampleIn the example in Figure 1-3, a data packet traveling from station C on LAN 43 through bridge B to

Strany 170

Introduction1-19where each bridge is likely to become congested. Figure 1-4. Data Path Using Source Routing BridgingIn contrast to spanning tree brid

Strany 171 - A B C D E F G H

1-20Introduction1.7.5 TranslationThe ATX is a translating bridge; meaning it translates packets across unlike protocols. For example, if an Ethernet

Strany 172

Introduction1-21The ATX uses a standardized internal format called canonical format, for packet translation. (Refer to Appendix B, Packet Translation

Strany 173

1-22Introductionprivate/enterprise/sigma/ecs1/admin/config. The default setting for this MIB is 0. Query the MIB and change this value to the address

Strany 174

Introduction1-23destination device. If the device is on the network, it will respond with its hardware address. Reverse Address Resolution Protocol (R

Strany 175

1-24Introduction1.8.2 Multiple IP Networks Per PortThe ATX’s routing software allows you to configure a single IP network to span multiple physical ne

Strany 176

Introduction1-25In addition, by overlapping logical networks, a user who moves to another physical network segment can remain on the same logical netw

Strany 177

Noticeii DOC NOTICE This digital apparatus does not exceed the Class A limits for radio noise emissions from digital apparatus set out in the Radio I

Strany 178

1-26Introductionupon the operating system or TCP/IP being used. The host becomes aware of a gateway in one of three ways: • The host is manually config

Strany 179

Introduction1-27addressing (i.e., those IP addresses with 1110 as their high-order four bits). Using Internet standard dotted decimal notation, host g

Strany 180

1-28IntroductionFor example, in Figure 1-8, LANs B, C, and D are bridged to backbone LAN A. A packet originating from LAN C destined to the host group

Strany 181

Introduction1-29Figure 1-9. Bridged LAN With Two Host Group Members1.8.4 IP Routing Over Source RoutingToken Ring networks are often connected by so

Strany 182

1-30IntroductionThe architecture behind source-routing bridges is that a packet header containing a route is inserted by the source end-station. For t

Strany 183

Introduction1-31Figure 1-12. Packet Headers With And Without Source-routing Bit SetIn TCP/IP hosts, an explorer packet exchange is normally accomplis

Strany 184

1-32Introduction • Transmit IP multicast packets as single route explorer packets. • Transmit subnet-specific broadcasts as single route explorer packe

Strany 185

Introduction1-33Routing Information Protocol (RIP)RIP is one of the protocols that allows the ATX to build an accurate, current routing table. Routers

Strany 186

1-34Introduction1.8.7 Appletalk RoutingAppleTalk routing allows end-nodes to send packets to and receive packets from other end-nodes through the use

Strany 187

Introduction1-35to an address. In the ATX implementation, the maximum number of zones that a router may be configured is 22 ports. Each configured zone

Strany 188

Noticeiii EXCLUSION OF WARRANTY AND DISCLAIMER OF LIABILITY 1. EXCLUSION OF WARRANTY. Except as may be specifically provided by Cabletron in writing

Strany 189

1-36Introductionreceives a response, it knows its network range and then performs additional AARP probes to choose a host number. The router then send

Strany 190

Introduction1-37A router that learns its network address from a seed router shows a status of garnered; meaning you did not configure it.1.9 TRUNKINGI

Strany 191

1-38IntroductionFigure 1-13. Trunk ConnectionsTrunk GroupsEach set of connections between ATXs is called a trunk group. You can configure several trun

Strany 192 - 7.5 TROUBLESHOOTING

Introduction1-39To solve this problem, you could connect A to B with one trunk group, and connect B to C with a second trunk group.Figure 1-14. Trunk

Strany 193

1-40Introduction1.10.1 Command Syntax ConventionsThe following conventions apply as you use LCM commands: • Press the Return key to execute a comman

Strany 194

Introduction1-411.10.2 Basic LCM CommandsThe basic LCM commands allow you to get help and log out. LCM commands used for configuring your ATX are desc

Strany 195

1-42Introduction[clear|[overwrite|stopwhenfull][add|del][FILTERS]]to set or display event filter eventtrap {on | off} to manage event/SNMP trap mappin

Strany 196

Introduction1-43Usage: bridge [PORT-RANGE [{off | transparent | sr | srt} [noBPDU]]]ATX> idSoftware Currently Running: Release ATX 3.3.09 12-Mar-9

Strany 197

1-44IntroductionUsage: nbcache [PORT-RANGE [{off | on}]]Usage: nbname {display|delete} [big] {<NB_NAME>|any}Usage: ping [-rvsx] host [datasize

Strany 198

Introduction1-45[{arp|bootp|srArp|ipx|ipxsr|apple|none|netbios|sna|all} OPTION]] Port 2 is not configured for token ring. Port 3 is not configured f

Strany 199

Noticeiv DECLARATION OF CONFORMITY Application of Council Directive(s): 89/336/EEC73/23/EEC Manufacturer’s Name: Cabletron Systems, Inc. Manufacturer

Strany 200

1-46Introduction

Strany 201 - Shelf Indicated

2-1CHAPTER 2INSTALLING AND CONNECTING TO THE NETWORKCarefully unpack the ATX from the shipping carton and inspect it for possible damage. If any dama

Strany 202

2-2Installing and Connecting to the NetworkFigure 2-1. ATX Front PanelATX LEDs and their functions are described in Table 2-1. Refer to the module do

Strany 203

Installing and Connecting to the Network2-3ATX switches and their functions are described in Table 2-2. Refer to the module documentation for a descri

Strany 204 - Specifications For The ATX

2-4Installing and Connecting to the NetworkFigure 2-2. Rack-Mounting The ATX2.3 CONNECTING THE POWER SUPPLYThe ATX utilizes a two power supply syste

Strany 205

Installing and Connecting to the Network2-5The ATX should now be ready for operation after completing its automatic power-up diagnostics sequence and

Strany 206

2-6Installing and Connecting to the NetworkFigure 2-3. LED Activity During Normal OperationPower-up Diagnostics SequenceTo observe the power-up seque

Strany 207 - followed by frame type

Installing and Connecting to the Network2-7supplies. LEDs are described in Table 2-1.When you power up your ATX, the following occurs:1. All LEDs turn

Strany 208 - Packet Translation Procedure

2-8Installing and Connecting to the Network2. Observe the power-up sequence again.3. If the power-up sequence is still abnormal, contact Cabletron Sys

Strany 209

Installing and Connecting to the Network2-9Figure 2-4. Chassis With Power Supply A Positioning Tabs And Supporting Shelf IndicatedTo replace the powe

Strany 210

v CONTENTS CHAPTER 1 INTRODUCTION 1.1 USING THIS MANUAL ...1-11.2 DOCUMENT C

Strany 211

2-10Installing and Connecting to the NetworkFigure 2-5. ATX With Power Supply A Position Indicated2.4 CONNECTING THE LOCAL CONSOLE MANAGER The Local

Strany 212 - Null Modem Cable Pinouts

Installing and Connecting to the Network2-113. Set the terminal to 9600 baud, 8 data bits, 1 stop bit, and no parity. 4. Press the Return key a few ti

Strany 213

2-12Installing and Connecting to the Network

Strany 214 - Glossary

3-1CHAPTER 3CONFIGURINGThe ATX does not require any additional configuration to operate as a standard transparent bridge. However, if you want it to c

Strany 215

3-2ConfiguringFigure 3-1. Typical Bridging ApplicationBridges regulate network traffic on the basis of the source and destination addresses that are in

Strany 216

Configuring3-3As a bridge reads addresses from the packets it processes, it builds an address table. In this way, it learns the addresses of connected

Strany 217

3-4Configuringtransparent bridging on port 2. LCM responds:Port 2 bridging: SRT (segment = 1 bridge = 9)To change the bridging functions for a port, re

Strany 218

Configuring3-5[noBPDU]]]Port 2 bridging: Transparent/TranslatingPort 3 bridging: SRT (segment = 1 bridge = 9)Port 4 bridging: SR (segment = 41 bridge =

Strany 219

3-6Configuring • Class A addresses are used in very large networks that support many nodes. The first byte identifies the network and the other three byt

Strany 220

Configuring3-73.2.3 Changing a Subnet MaskYou can optionally set the subnet mask for a port. If the subnet mask is 0.0.0.0, the ATX will automatically

Strany 221

viContents 1.8.7 Appletalk Routing...1-34AppleTalk addressing...

Strany 222

3-8Configuring3.2.5 Enabling IP Routing FunctionsThe IP routing functions you can enable for ports on the ATX may be any combination of the following:

Strany 223

Configuring3-9Type: iproute <port range> <functions>For example, iproute 5-6 rip bootp would enable routing on ports 5 and 6 with the RIP a

Strany 224

3-10ConfiguringNote: All IP addresses sharing a common subnet must use the same subnet mask. In addition, two IP addresses assigned to the same physica

Strany 225

Configuring3-11addresses on port 2. LCM responds by prompting for the next command. To display the current IP Address Table, type ipaddr with no argume

Strany 226

3-12Configuring3.2.10 Displaying IP Routing FunctionsTo display the IP routing functions that are enabled for all ports: Type: iprouteLCM responds wit

Strany 227

Configuring3-133.3.1 Assigning an IPX Address IPX addresses for each port must be unique and non-zero. When you assign an address, you can also design

Strany 228

3-14ConfiguringType: ipxaddressTable 3-2. Displaying IPX Addresses3.3.3 Enabling IPX Routing FunctionsThe IPX routing functions you can enable for p

Strany 229

Configuring3-153.3.4 Displaying IPX Routing FunctionsTo display the IPX routing functions that are enabled for all ports: Type: ipxrouteLCM responds w

Strany 230

3-16Configuringtheir network number. Refer to Chapter 1, Appletalk Routing for a conceptual overview of AppleTalk routing, including the concept of a s

Strany 231

Configuring3-17Port 8 AppleTalk routing: enabled...Port 21 AppleTalk routing: disabled3.4.3 Disabling AppleTalk RoutingAppleTalk routing can be disabl

Strany 232

Contentsvii 3.2.11 Disabling Routing Functions...3-123.3 CONFIGURING IPX ROUTING...

Strany 233

3-18Configuringthe previously seeded information.You can create a new network range by using the ataddr command to assign a new range. However, if the

Strany 234

Configuring3-193.4.5 Displaying the Network NumberYou can find the current network range for any port on which AppleTalk routing is enabled by using LC

Strany 235

3-20ConfiguringPort 6 EngineeringTo make the zone name you are adding the designated default zone name:Type: atzone <port number> <“zon

Strany 236

Configuring3-21additional hardware on your network. You can use LCM to configure trunking. You can enable trunking between ATXs or between an ATX and a

Strany 237

3-22Configuringgroup is momentarily halted to guarantee the first-in, first-out ordering of the Ethernet packets.Note: The ATX-to-ATX connections must be

Strany 238

Configuring3-23For example, if you configure port 3 to accept no more than 5 multicasts per 60 seconds, any multicasts destined for port 3 are discarded

Strany 239

3-24Configuring3.7.2 System NameThe system name is a name assigned to the ATX by the network administrator. By convention, the system name is the full

Strany 240

Configuring3-25Note: configAnyPass permits read-write access. configGetPass permits read only access.Get PasswordThe get password variable (configGetPa

Strany 241

3-26ConfiguringConfiguration Alarm DynamicWhen the ATX learns a new address or ages (deletes) an old address it may or may not send a trap based on the

Strany 242

Configuring3-27value of the Netbios aging timer. The age-timeout argument can be modified and is interpreted in terms of seconds. This timer is the amou

Komentáře k této Příručce

Žádné komentáře