background image

 

 

 

 

 

 

 

 

 

 

 

 

 

 
IntraCore

®

 

35516 Series 

Layer 2/3/4 Gigabit Switches 

 

 

User’s Manual 

Summary of Contents for IntraCore 35516 Series

Page 1: ...IntraCore 35516 Series Layer 2 3 4 Gigabit Switches User s Manual ...

Page 2: ...l rights reserved No part of this document or any associated artwork product design or design concept may be copied or reproduced in whole or in part by any means without the express written consent of Asanté Technologies Inc Asanté and IntraCore are registered trademarks and the Asanté logo AsantéCare Auto Uplink and IntraCare are trademarks of Asanté Technologies Inc All other brand names or pro...

Page 3: ...nstallation and Setup 14 2 1 Installation Overview 14 2 1 1 Safety Overview 14 2 1 2 Recommended Installation Tools 14 2 1 3 Power Requirements 15 2 1 4 Environmental Requirements 15 2 1 5 Cooling and Airflow 15 2 2 Installation into an Equipment Rack 15 2 2 1 Equipment Rack Guidelines 16 2 3 Gigabit Interface Converters 16 2 3 1 Installing a GBIC 17 2 3 2 Removing a GBIC 17 2 3 3 GBIC Care and Ha...

Page 4: ...ing the Command Line Interface CLI 25 3 1 User Top User EXEC Mode 25 3 2 Privileged Top Privileged EXEC Mode 26 3 3 Global Configuration Mode 27 3 3 1 Interface Configuration Mode 28 3 3 2 Router Configuration Mode 29 3 3 3 Route Map Configuration Mode 30 3 4 Advanced Features Supported within the Command Mode 30 3 5 Checking Command Syntax 32 3 6 Using CLI Command History 33 3 7 Using the No and ...

Page 5: ...ng the Operating Configuration 40 4 2 Managing Configuration Files 40 4 2 1 Configuring from the Terminal 40 4 2 2 Copying Configuration Files to a Network Server 41 4 2 3 Copying Configuration Files from a Network Server to the IC35516 42 4 3 Configuring SNMP and Spanning Tree 43 4 3 1 Configuring SNMP Support 43 4 3 2 Other SNMP Configuration 45 4 3 3 Configuring Spanning Tree Protocol STP 46 4 ...

Page 6: ...figure Compatibility 71 5 7 4 Configure OSPF Interface Parameters 71 5 7 5 Configure OSPF Network Type 72 5 7 6 Configure OSPF for Non broadcast Networks 72 5 7 7 Configure Area Parameters 72 5 7 8 Configure OSPF Not So Stubby Area NSSA 73 5 7 9 Configure Route Summarization between OSPF Areas 74 5 7 10 Create Virtual Links 74 5 7 11 Control Default Metrics 74 5 7 12 Configure Route Calculation Ti...

Page 7: ...eleting a VLAN 88 6 2 VLAN Port Membership Modes 89 6 2 1 Static Access 89 6 2 2 Trunk IEEE 802 1Q 89 6 2 3 Dot1q Tunnel 91 Chapter 7 Quality of Service QoS Configuration 92 7 1 Weighted Fair Queuing 92 7 1 1 Configuring Flow Based Weighted Fair Queuing Configuration 92 7 1 2 Configuring Type of Service Based WFQ 92 7 1 3 Monitoring Weighted Fair Queuing Lists 93 7 1 4 Weighted Fair Queuing Exampl...

Page 8: ...ent 100 8 1 6 Configuring the Domain Name System IP Servers for the Client 100 8 1 7 Configuring the NetBIOS Node Type for the Client 100 8 1 8 Configuring the NetBIOS Name Server for the Client 100 8 1 9 Configuring the Next Server for the Client 100 8 1 10 Configuring the Default Router for the Client 100 8 1 11 Configuring the Address Lease Time 101 8 1 12 Configuring a DHCP Server Boot File 10...

Page 9: ... 9 Appendix D Console Port Pin Outs 110 Appendix E Online Warranty Registration 111 ...

Page 10: ...0BaseT RJ 45 Gigabit ports or GBIC Gigabit ports The IC35516 G is a 16 port switch that has 12 GBIC style Gigabit Ethernet ports and 4 dual function Gigabit ports that support either 10 100 1000BaseT RJ 45 Gigabit ports or GBIC Gigabit ports The following types of GBIC modules are supported on the IC35516 switches 1000SX multi mode fiber for 500 m applications 1000LX single mode fiber for 2 km app...

Page 11: ...ng sections for LED information specific to the switch s model 1 3 1 IC35516 T The IC35516 T has one power LED indicator one optional emergency power LED and two LED indicators for each of the 16 ports See the table below for a complete LED description LED Color Description Power Green Off Power is on Power is off or main power has failed Emergency Power Green Off Primary power has failed and opti...

Page 12: ...n the port A valid 10 or 100 Mbps link has been established on the port No link has been established on the port BaseT 10 100 1000 Duplex Activity Green Blinking Yellow Blinking Yellow Off A full duplex link has been established on the port Activity is detected in full duplex mode A half duplex link has been established on the port Activity is detected in half duplex mode No link has been establis...

Page 13: ...nd mode s prompt provides a list of commands 1 5 1 Console Interface Support for local out of band management is delivered through a terminal or modem attached to the EIA TIA 232 interface Users can access the switch by connecting a PC or terminal to the console port of the switch via a serial cable The default password set on the console line is Asante it is case sensitive The default IP address ...

Page 14: ...nclude every possible hazard to which you may be exposed Use caution when installing this switch Only trained and qualified personnel should be allowed to install or replace this equipment Always use caution when lifting heavy equipment Keep the switch clean Keep tools and components off the floor and away from foot traffic Avoid wearing rings or chains or other jewelry that could get caught in th...

Page 15: ...ve Humidity 10 to 90 non condensing Avoid direct sunlight heat sources or areas with high levels of electromagnetic interference Failure to observe these limits may cause damage to the switch and void the warranty 2 1 5 Cooling and Airflow The IC35516 switches use internal fans for air cooling Do not restrict airflow by covering or obstructing air vents on the sides of the switch 2 2 Installation ...

Page 16: ...In addition to providing clearance for ventilation ensure that adequate clearance for servicing the switch from the front exists 2 3 Gigabit Interface Converters The GBIC Interface is the industry standard for Gigabit Ethernet Interfaces Some of the benefits of GBIC include reducing the components needed in a spares inventory being able to choose from a wide variety of manufacturers with cross ven...

Page 17: ...a GBIC Caution GBIC 1000T modules run hot under normal operating conditions When it has been removed from the system place it on a heat resistant surface and allow the module to cool before handling Note Unnecessary removals insertions of a GBIC module will lead to premature failure of the GBIC connector The rated duty cycle for a GBIC module is 100 500 removals insertions Follow the steps below t...

Page 18: ...ly attach the 12 VDC connector of the power supply to the jack located in the center of the rear panel of the switch Connect the power cord to the power supply and plug the power cord into an outlet Important The optional power supply becomes HOT under normal operating conditions To avoid damage or injury set the power supply on a heat resistant surface and USE CAUTION when handling the unit 2 5 C...

Page 19: ... 5 UTP straight through cable 100 m maximum with RJ 45 connectors Note These switches have no specific uplink ports All 10 100 1000 ports on these switches are auto sensing MDI MDI X This advanced feature means that when the ports are operating at 10 100Mbps they will automatically determine whether the device at the other end of the link is a hub switch or workstation and adjust its signals accor...

Page 20: ...eT Category 5 or better Unshielded Twisted Pair UTP cable up to 100 m 328 1 When attaching a workstation to the switch a standard straight through CAT5 cable may be used even when the workstation is attached via a patch panel No crossover cable is needed with the MDX MDI ports It is recommended that the switch be kept off the network until proper IP settings have been set 2 7 Setup In order to con...

Page 21: ... Baud g Set data format to 8 data bits 1 stop bit and no parity h Set flow control to NONE Now that terminal is set up correctly power on the switch The boot sequence will display in the terminal After connecting to the console a prompt like the following will appear User Access Verification Password By default the initial password for access via console and telnet is Asante case sensitive See the...

Page 22: ...ge the default telnet password to prevent unauthorized access to the switch Router config line console Primary terminal line vty Virtual terminal Router config line console 0 0 Line number Router config line console 0 Router config line end End current mode and change to enable mode exec timeout Set timeout value exit Exit current mode and down to previous mode help Description of the interactive ...

Page 23: ... an encryption algorithm 2 9 2 The password and login Commands Using the password and login commands is less effective because the password is configured for the port not for the user Therefore any user who knows the password can authenticate successfully This method enables user name and password checking at login time Authentication is based on the user Note that login user is NOT set by default...

Page 24: ...p config file It is also acceptable to enter the subnet mask by typing ip address 192 168 123 254 24 Use the show interface veth1 command from privileged mode to see the new IP address The new IP address automatically writes over the default IP address See Chapter 5 for more information on assigning IP addresses to interfaces 2 10 1 Setting a Default IP Gateway Address To define the default IP gat...

Page 25: ...brackets indicate optional elements Braces indicate a required choice Braces within square brackets indicate a required choice within an optional element Boldface indicates commands and keywords that are entered literally as shown Italics indicate arguments for which you supply values Access Each Command Mode The following sections describe how to access each of the CLI command modes User Top Mode...

Page 26: ...e password protected to prevent unauthorized use The privileged command set includes those commands contained in user EXEC mode as well as the configure command through which you can access the remaining command modes Privileged EXEC mode also includes high level testing commands such as debug The following example shows how to access privileged EXEC mode Note that the prompt changes from Router t...

Page 27: ...ant those changes to remain after a system reload From the privileged level configurations can be saved using the write command or by using the copy running config startup config command From the privileged level you can access global configuration mode as described in the following section 3 3 Global Configuration Mode Global configuration commands apply to features that affect the system as a wh...

Page 28: ...e global configuration command no Negate a command or set its defaults priority list Priority List global configuration commands priority precedence Set priority source precedence queue list Queue List global configuration commands quit Exit current mode and down to previous mode route map Create route map or enter route map command mode router Enable a routing process service Modify use of networ...

Page 29: ... priority group Assign a priority queue list to an interface quit Exit current mode and down to previous mode show Show running system information shutdown Shutdown the selected interface spanning tree Spanning Tree Protocol interface command speed Configure speed operation switchport Port operating in L2 mode tos group Assign a tos list to an interface traffic shape Generic traffic shape QoS inte...

Page 30: ... route map command in global configuration mode In the following example a route map named mymap is configured The new prompt is Router config route map Enter a question mark to list route map configuration commands Router config route map mymap permit 30 Router config route map end End current mode and change to enable mode exit Exit current mode and down to previous mode help Description of the ...

Page 31: ...mmand mode for a brief description of the help system Router help CLI VTY provides advanced help feature When you need help anytime at the command line please press If nothing matches the help list will be empty and you must backup until entering a shows the available options Two styles of help are provided 1 Full help is available when you are ready to enter a command argument e g show and descri...

Page 32: ...r 5 Router config access list 99 deny 192 168 123 0 A B C D Source wildcard e g 0 0 0 255 cr Router config access list 99 deny 192 168 123 0 3 5 Checking Command Syntax The CLI user interface provides an error indicator a caret symbol The caret symbol appears at the point in the command string where you have entered an incorrect letter command keyword or argument In the following example suppose y...

Page 33: ...peat the key sequence to recall successively more recent commands show history While in EXEC mode list the last several commands entered 3 7 Using the No and Default Forms of Commands Almost every router configuration command has an opposite no form that negates or reverses a command In general the no form is used to disable a function that has been enabled To re enable a disabled function or to e...

Page 34: ... complete command name press the Tab key to allow the system to complete a partial entry Keystrokes Purpose Enter the first few letters and press Tab Complete a command name If your keyboard does not have a Tab key press Ctrl I instead In the following example when you enter the letters conf and press the Tab key the system provides the complete command Router conf Tab Router configure The command...

Page 35: ...led to the left Each time the cursor reaches the end of the line it is again shifted 8 spaces to the left Router config access list 101 permit icmp 192 168 123 0 0 0 0 255 192 Router config st 101 permit icmp 192 168 123 0 0 0 0 255 192 168 0 1 When you have completed the entry press Ctrl A to check the complete syntax before pressing Enter to execute the command The dollar sign appears at the end...

Page 36: ...s Ctrl L or Ctrl R Redisplay the current command line 3 8 7 Transposing Mistyped Characters If you have mistyped a command entry you can transpose the mistyped characters by using the following command Keystrokes Purpose Press Ctrl T Transpose the character to the left of the cursor with the character located at the cursor 3 8 8 Controlling Capitalization You can toggle between uppercase and lower...

Page 37: ... change to enable mode exec timeout Set timeout value exit Exit current mode and down to previous mode help Description of the interactive help system no Negate a command or set its defaults password Set a password quit Exit current mode and down to previous mode Router config line password LINE The UNENCRYPTED cleartext line password 0 Specifies an UNENCRYPTED line password will follow 7 Specifie...

Page 38: ... restart To manually set the system clock complete the following commands in privileged mode Use a space and a question mark to display the clock set options Restart the system after configuring the clock by typing reload at the Router prompt and pressing Enter Router clock set Set the time and date Router clock set HH MM SS Current Time Router clock set 09 29 30 1 31 Day of the month Router clock...

Page 39: ...nections with Ping Tests The switch supports IP ping which can be used to test connectivity to remote hosts via their IP addresses Ping sends an echo request packet to an address and listens for a reply The ping request will receive one of the following responses Normal response The normal response occurs in 1 to 10 seconds depending on network traffic Request timed out There is no response indica...

Page 40: ...you can manually change the configuration by typing commands in a configuration mode Startup configuration files are used during system startup to configure the software Running configuration files contain the current configuration of the software The two configuration files can be different For example you may want to change the configuration for a short period rather than permanently In this cas...

Page 41: ...up configuration is in NVRAM it stores the current configuration information in text format as configuration commands recording only non default settings The memory is checksummed to guard against corrupted data 4 2 2 Copying Configuration Files to a Network Server You can copy configuration files from the router to a file server using TFTP You might wish to back up a current configuration file to...

Page 42: ...g the whole file 3 To load the same configuration commands onto all the routers in your network so that they all have the same configurations The copy tftp running config command loads the configuration files into the router as if you were typing the commands in at the command line The router does not erase the existing running configuration before adding the commands unless a command in the copie...

Page 43: ...rmation between an SNMP manager and an SNMP agent The agent and MIB reside on the router In configuring SNMP on the router the relationship between the manager and the agent must be defined The SNMP agent gathers data from the MIB which holds the information about device parameters and network data The agent also responds to the manager s requests to get or set data An agent can also send unsolici...

Page 44: ... Define SNMP Trap Operations A trap is an unsolicited message sent by an SNMP agent to an SNMP manager indicating that some event has occurred The SNMP trap operations let you configure the router to send information to a network management application when a particular event occurs To define traps for the agent to send to the manager use the following commands in global configuration mode Command...

Page 45: ...notify view are none Currently v3 priv is not supported snmp server user user name group name remote host ip address udp port port number v1 v2c v3 auth md5 sha auth password encrypted access access list Define SNMP server users Currently creating v1 v2 users and the sha SHA1 algorithm are not supported snmp server enable traps snmp authentication duplicate ip station move Enable SNMP traps Suppor...

Page 46: ... that forward traffic and place the redundant ports in blocking states Spanning Tree Parameters The operation of the spanning tree algorithm is governed by several parameters You can configure the following parameters from global configuration mode forward time hello time max age and priority Router config spanning tree forward time Set forwarding delay time hello time Set interval between HELLOs ...

Page 47: ... that ranks each port so that if two or more ports have the same path cost the STP selects the path with the highest priority the lowest numerical value By changing the priority of a port it can be more or less likely to become the root port The default value is 128 and the value range is 0 255 Port Path Cost Port path cost is the spanning tree parameter that assigns a cost factor to each port The...

Page 48: ...atus of edge port set to TRUE If the edge port starts receiving the BPDUs it will change the operating edge state to FALSE and start the spanning tree calculations It is recommended to assign any ports that are to be left as a leaf of the LAN with no connection to any bridge as edge ports Root ports If the RSTP selects a new root port it blocks the old root port and immediately transitions the new...

Page 49: ...fig if eth1 spanning tree link type point to point shared By default the link type is determined from the duplex mode of the interface a full duplex port is considered to have a point to point connection a half duplex port is considered to have a shared connection To return the switch to its default setting use the no spanning tree link type interface configuration command Configuring an Edge Port...

Page 50: ...e the table type the following command in privileged mode Router show mac address table Vlan Mac Address Type Ports 3 00 00 1C 01 00 09 Dynamic eth13 1 00 00 94 00 00 10 Dynamic eth9 1 00 00 94 A0 B6 7B Dynamic eth9 1 00 00 94 AA 64 37 Dynamic eth9 1 00 00 94 D2 53 79 Dynamic eth9 00 00 94 D2 56 EA Self 1 00 0A 27 AE 50 66 Dynamic eth9 1 00 50 FC 94 00 0D Dynamic eth9 The switch uses the informati...

Page 51: ...et address allocated the highest 24 bits to the network field and set the three highest order bits to 1 1 0 The remaining eight bits formed the host field The table below lists the traditional classes and ranges of IP addresses and their status Class Address or Range Status A 0 0 0 0 1 0 0 0 to 126 0 0 0 127 0 0 0 Reserved Available Reserved B 128 0 0 0 to 191 254 0 0 191 255 0 0 Available Reserve...

Page 52: ...software supports multiple IP addresses per interface You can specify an unlimited number of secondary addresses Secondary IP addresses can be used in a variety of applications There might not be enough host addresses for a particular network segment Suppose your sub netting allows up to 254 hosts per logical subnet but you need to have 300 host addresses on one physical subnet Using secondary IP ...

Page 53: ...s resolution ARP is used to associate IP addresses with media or MAC addresses Taking an IP address as input ARP determines the associated media address Once a media or MAC address is determined the IP address media address association is stored in an ARP cache for rapid retrieval Then the IP datagram is encapsulated in a link layer frame and sent over the network 5 2 1 Define a Static ARP Cache A...

Page 54: ...and a destination to take a specified path Static routes can be important if the switch cannot build a route to a particular destination To configure static routes perform the following task in global configuration mode Command Purpose ip route prefix mask prefix length address interface 1 255 Establish a static route Note The numeric value is the static administrative distance Enter a number betw...

Page 55: ...ectly connected network has a metric of zero an unreachable network has a metric of 16 This makes RIP an unsuitable routing protocol for large networks with many routers A router that is running RIP can receive a default network via an update from another router that is running RIP or the router can source the default network itself with RIP In both cases the default network is advertised to other...

Page 56: ...he following task in router configuration mode Command Purpose version 1 2 Configure the software to receive and send only RIP Version 1 or only RIP Version 2 packets You can override the router s RIP version by configuring a particular interface to behave differently To control which RIP version an interface sends perform one of the following tasks in interface configuration mode Command Purpose ...

Page 57: ...ution does not meet any of the match criteria the route is passed through the next instance of the route map with the same map name and next higher sequence number Route processing continues until a match is made or the route is processed by all instances of the route map with no match If the route is processed by all instances of a route map with no match the route is not accepted inbound route m...

Page 58: ...sly degrade network operation To use the current routing protocol s metric value for all redistributed routes enter the following command in router configuration mode Command Purpose default metric metric value Cause the current routing protocol to use the same metric value for all redistributed routes Note The metric value range is very large for compatibility with other protocols 0 2494967295 Fo...

Page 59: ...er routing protocol information Suppress the sending of routing updates on a particular router interface in order to prevent other systems on an interface from dynamically learning about routes Suppress networks from being advertised in routing updates in order to prevent other routers from learning a particular device s interpretation of one or more routes Apply an offset to routing metrics in or...

Page 60: ...seconds Upon expiration of the timeout an unresponsive route becomes invalid however it is retained in the routing table for a short time so that neighbors can be notified that the route has been dropped The garbage collect timer is 120 seconds Upon expiration of the garbage collection timer the unresponsive route is finally removed from the routing table To adjust the timers use the following com...

Page 61: ...ip authentication mode text md5 Configure the interface to use MD5 digest authentication or let it default to simple password authentication ip rip authentication string string Set the interface with plain text authentication The string must be shorter than 16 characters 5 4 12 Monitor and Maintain RIP You can display specific router statistics such as the contents of IP routing tables and databas...

Page 62: ... used on the MBONE the multicast backbone of the Internet 5 5 1 IGMP The Internet Group Management Protocol IGMP manages the multicast groups on a LAN IP hosts use IGMP to report their group membership to directly connected multicast routers Routers executing a multicast routing protocol maintain forwarding tables to forward multicast datagrams Routers use the IGMP to learn whether members of a gr...

Page 63: ...n 1 if your hosts do not support Version 2 To control which version of IGMP the router uses use the following command in interface configuration mode Command Purpose ip igmp version 2 1 Select the IGMP version that the router uses Changing the Maximum Query Response Time By default the maximum query response time advertised in IGMP queries is 10 seconds If the router is using IGMP Version 2 you ca...

Page 64: ...e If redundant paths are on the source tree packets are not forwarded along those paths Forwarding occurs until Prune messages are received on those links which further constrain the broadcast of multicast packets DVMRP is designed as an interior gateway protocol IGP within a multicast domain 5 5 4 Configuring DVMRP This section presents the commands for configuring DVMRP IP Multicast Routing Prot...

Page 65: ...hed DVMRP neighbor router as down DVMRP must be enabled on the router for this command to be operational Command Purpose nbr timeout 35 8000 seconds Sets neighbor timeout value Default value 40 seconds Probe interval This value defines how often neighbor probe messages are sent to the ALL DVMRP ROUTERS IP multicast group address A router s probe message lists those neighbor DVMRP routers from whic...

Page 66: ...eleted on a DVMRP router DVMRP must be enabled on the router for this command to be operational Command Purpose route discard timeout 40 8000seconds Defines the period of time before a route is deleted on a DVMRP router Default value 340 seconds Route expire timeout This value defines how long a route is considered valid without the next route update DVMRP must be enabled on the router for this co...

Page 67: ...vailable memory Remark Access list entry comment This may be useful to keep track of numbered lists Permit deny Indicates whether this entry allows or blocks traffic from the specified source address Source address Enter the source IP address to match Any Specifies any source address to match Source wildcard mask Identifies which bits in the address field are to be matched A 0 indicates that posit...

Page 68: ...he access list to which an entry belongs IP ICMP TCP UDP Specifies protocol connection Destination address Specifies the destination address to match Operator operand Select eq equal to gt greater than lt less than or neq not equal to to specify how to match the protocol port number 0 65535 Specifies the protocol port number Well known ports are listed below 20 File Transfer Protocol FTP data 21 F...

Page 69: ... Creating an Access List with a Name From the global configuration mode you can also create access lists through the Router config ip command Through this method you may name your access list rather than using a number The new prompt reflects the named access list mode Router config ip access list Named access list forward protocol Controls forwarding of physical and directed IP prefix list Build ...

Page 70: ...acket authentication and IP multicasting when sending receiving packets OSPF works best in a hierarchical routing environment The first and most important decision on OSPF network is to determine area border routers routers connected to multiple areas and autonomous system boundary routers At a minimum OSPF based routers can be configured with all the default parameter values no authentication and...

Page 71: ...ore be sure that if you have configured any of these parameters the configurations for all routers on your network have compatible values In interface configuration mode specify any of the following interface parameters as needed for the network Command Purpose ip ospf cost cost Specify the cost of sending a packet on an OSPF interface This cost value is set to the metric field of the Link State A...

Page 72: ...e router that has virtual circuits to both routers This feature saves you from having to configure neighbors If an OSPF point to multipoint interface is not defined in non broadcast networks you must configure neighbors on OSPF network To configure the OSPF network type use the following command in interface configuration mode Command Purpose ip ospf network broadcast non broadcast point to multip...

Page 73: ...g behavior through an area 5 7 8 Configure OSPF Not So Stubby Area NSSA The NSSA is similar to OSPF stub area NSSA does not flood Type 5 external link state advertisements LSAs from the core into the area but it has the ability of importing AS external routes in a limited fashion within the area The OSPF Specification RFC 1583 prohibits the summarizing or filtering of Type 5 LSAs It is an OSPF req...

Page 74: ...ge prefix length not advertised Define an address range where a single route will be advertised area area address range prefix suppress substitute prefix Announce an address range where a route will not be injected 5 7 10 Create Virtual Links In OSPF all areas must be connected to a backbone area If there is a break in backbone continuity or the backbone is purposefully portioned you can establish...

Page 75: ...nto OSPF You can re advertise route information in an OSPF routing domain and conditionally control the redistribution of routes between two domains by defining route maps Perform the following tasks associated with route redistribution in router configuration mode Command Purpose redistribute kernel connected static rip bgp metric metric value metric type 1 2 route map map tag Redistribute routes...

Page 76: ...10 To change any of the OSPF distance values use the following command in router configuration mode Command Purpose distance ospf external distance1 inter area distance2 intra area distance2 Change the OSPF administrative distance values 5 7 17 Suppress Routes on an Interface The interface specified as passive appears as a stub network in the OSPF domain OSPF routing information is neither sent no...

Page 77: ...rk nssa external router summary link state id show ip ospf database asbr summary external network nssa external router summary link state id self originate show ip ospf database asbr summary external network nssa external router summary link state id adv router ip address show ip ospf database asbr summary external network nssa external router summary self originate show ip ospf database asbr summ...

Page 78: ...SPF related debugging messages 5 8 Virtual Router Redundancy Protocol VRRP Virtual Router Redundancy Protocol VRRP specifies a protocol that dynamically elects a gateway router from among virtual routers running VRRP on a LAN VRRP enables a group of routers to form a single virtual router The LAN hosts can then be configured with the virtual router as their default gateway The virtual router repre...

Page 79: ...RP operation If this is enabled then VRRP displays the debug messages onto the console 5 9 Configuring ICMP Router Discovery Protocol IRDP When IP routing is disabled you can configure router discovery The ICMP Router Discovery Protocol IRDP allows the router to dynamically learn about routes to other networks When operating as a client router discovery packets are generated When operating as a ho...

Page 80: ...distribution tree If the multicast traffic from a specific source is sufficient the receiver s immediate router may send Join messages toward the source to build a source based distribution tree PIM uses the Bootstrap Router BSR to discover and announce RP set information for each group prefix to all the routers in a PIM domain To avoid a single point of failure there are usually several candidate...

Page 81: ...ks You can enable forwarding of IP directed broadcasts on an interface where the broadcast becomes a physical broadcast To enable forwarding of IP directed broadcasts use the ip directed broadcast command in router interface configuration mode 5 12 Monitoring and Maintaining the Network You can monitor the network by displaying specific statistics such as the contents of IP routing tables and data...

Page 82: ...able identifier will be 1 6 which means you can create 6 EtherAggregates with a maximum of 4 physical ports eth1 eth16 in each EtherAggregate Command Purpose interface port aggregate port aggregate id Enter aggregate configuration mode which is required for all the following commands access vlan vlan Configure an EtherAggregate group as an access mode description line Add an aggregate specific des...

Page 83: ...ber in an EtherAggregate cannot be greater or equal than 8 For example eth1 and eth9 cannot be in the same EtherAggregate When an EtherAggregate is first created all ports follow the parameters set for the primary port which is the lowest port number to be added to the EtherAggregate For example out of eth2 eth5 eth1 the primary port will be eth1 If you change the configuration of one of these par...

Page 84: ...em interface port aggregate 2 name EtherAggregate 2 description Marketing EtherAggregate port member add eth 5 8 access vlan 2 mode dot1q trunk dot1q trunk native vlan 2 dot1q trunk allowed vlan add all The below configures port aggregate 3 with 9 12 eth ports set to speed 100 Mbps interface port aggregate 3 name EtherAggregate 3 description Purchase EtherAggregate port member add eth 9 12 access ...

Page 85: ... Authentication port 1812 Shared key radius key NAS identifier IntraCore_35516 XXXXXX dot1x sys auth ctrl enable disable Enables disables the authentication feature of the switch dot1x max req 1 10 Sets the maximum number of times an EAP request identity frame is sent before restarting the authentication process dot1x re authenticate interface IFNAME Manually re authenticate an interface or all in...

Page 86: ...ts on the port no dot1x multiple hosts Disables multiple host mode so that after the interface is authenticated by a host it is accessible only to that host dot1x port control auto force authorized force unauthorized Sets the interface to the operating mode below auto interface is subject to 802 1X control force authenticated interface is set to be always authenticated so it is accessible to all t...

Page 87: ...ies the traffic of only one VLAN see Virtual Interfaces below Traffic is received and sent in native formats with no VLAN tagging Traffic arriving on an access port is assumed to belong to the VLAN assigned to the port If an access port receives a tagged packet 802 1Q tagged the packet is dropped and the source address is not learned Static access ports are manually assigned to a VLAN Router confi...

Page 88: ...ed as active with eth9 listed as a member port Repeat the previous step to add additional switchports to VLAN 2 Finally create a virtual interface by binding VLAN 2 to veth2 Use the interface veth2 vlan 2 command from the global configuration mode Router config interface veth2 vlan 2 Router config if veth2 Now this virtual interface is ready to have an IP address assigned to it Router config if ve...

Page 89: ...static access mode switchport access vlan vid This command assigns the interface to the VLAN VID Use the no form of this command to reset the static access VLAN to default VID 1 end Return to Enable mode 6 2 2 Trunk IEEE 802 1Q By default a trunk port is a member of all VLANs However membership can be limited by configuring a VLAN Allowed List Use the following commands beginning in config mode to...

Page 90: ...remove Remove the VLANs specified in the VLAN list vlan list The VLAN list can be a single VLAN or a range of VLANs from 1 4094 Separate the VID numbers by a comma or by a hyphen when listing a range e g 120 158 4090 4094 Use the no form of this command to reset to default setting of all VLANs in the VLAN Allowed List end Return to Enable mode The trunk port accepts tagged and untagged frames All ...

Page 91: ...owing commands beginning in config mode to configure an interface as an IEEE 802 1q tunnel port Command Purpose interface ifname Enter the interface name to access the interface configuration mode switchport mode dot1q tunnel This command will put the interface into IEEE 802 1q dot1q tunnel access mode Use the no form of this command to reset to the default of static access mode switchport access ...

Page 92: ...iguration For flow based WFQ packets are classified by flow Packets with the same source IP address destination IP address source TCP or UDP port destination TCP or UDP port and protocol belong to the same flow The bandwidth allocation is determined by the precedence field in the IP header To enable this feature use the fair queue command in interface configuration mode When you enable flow based ...

Page 93: ...uence 7 2 1 Defining the Priority List A priority list contains the definitions for a set of priority queues The priority list specifies in which queue a packet will be placed In order to perform queuing using a priority list you must assign the list to an interface The same priority list can be applied to multiple interfaces Alternatively you can create many different priority policies to apply t...

Page 94: ...rs interface configuration mode priority group list number Assigns a priority list number to the interface 7 2 4 Monitoring Priority Queuing Lists To display information about the input and output queues use the show queueing priority command in EXEC mode as needed 7 2 5 Priority Queuing Example This example configures the access list 1 traffic going out on interface 15 to have a medium priority D...

Page 95: ...verage number because whole packets must be forwarded To specify the approximate number of bytes to be forwarded from each queue during its turn in the cycle use the following command in global configuration mode as needed Router config queue list list number queue queue number byte count byte count number This designates the average number of bytes forwarded per queue The byte count number argume...

Page 96: ...g commands in EXEC mode as needed Command Purpose show queueing custom Displays the status of the CQ lists show interfaces interface name Displays the current status of the custom output queues when CQ is enabled 7 3 1 Custom Queuing Example This example configures the telnet traffic to eth13 to have a minimum bandwidth of 80M Defining the queue minimum bandwidth router config queue list 2 queue 4...

Page 97: ...S Configuration To monitor the current traffic shaping configuration and statistics use the following commands in EXEC mode as needed Command Purpose show traffic shape interface type number Displays the current traffic shaping configuration 7 4 4 Generic Traffic Shaping Example This example configures that the DNS traffic to eth13 have maximum bandwidth of 50M Defining the access list router conf...

Page 98: ...lt drop probability values Precedence Value Drop Probability 0 high 1 high 2 medium 3 medium 4 normal 5 normal 6 low 7 low 7 5 2 Configuring RED to Use DSCP To configure RED to use the IP precedence value when it calculates the drop probability use the following commands in interface configuration mode Command Purpose random detect dscp based Indicates that RED is to use the IP precedence value wh...

Page 99: ... or an integer number Configuring a DHCP address pool also places you in DHCP pool configuration mode identified by the config dhcp prompt from which you can configure pool parameters for example the IP subnet number and default router list To configure the DHCP address pool name and enter DHCP pool configuration mode use the following command in global configuration mode Router config ip dhcp poo...

Page 100: ...etBIOS node type for a Microsoft DHCP use the following command in DHCP pool configuration mode Router config dhcp netbios node type type Use the no form of this command to reset to default NetBIOS type 8 1 8 Configuring the NetBIOS Name Server for the Client To configure NetBIOS Windows Internet Naming Service WINS name servers that are available to Microsoft Dynamic Host Configuration Protocol D...

Page 101: ...esses single or range to be dynamically assigned use the following command in DHCP pool configuration mode Router config dhcp range A B C D A B C D Use the no form of this command to remove the address range 8 1 14 Configuring Manual Bindings An address binding is a mapping between the IP address and Media Access Control MAC address of a client The IP address of a client can be assigned manually b...

Page 102: ...on of the client in dotted hexadecimal notation for example 014a 9f16 9b4c dd where 01 represents the Ethernet media type Use the no form of this command to remove the configured client identifier Router config dhcp client name name Specifies the name of the client using any standard ASCII character Optional The client name should not include the domain name For example the name moon should not be...

Page 103: ...bles DNS based host name to address address to name translation ip name server A B C D Specifies the address of DNS name servers no ip name server A B C D Deletes the address of DNS name servers ip domain name WORD Defines a default domain name that the software uses to complete unqualified host names names without a dotted decimal domain name Do not include the initial period that separates an un...

Page 104: ...n Example The following example enables DNS lookup on the router and specified name servers and domain names DNS example configuration file vlan 1 name Engineering VLAN vlan 2 name Marketing VLAN vlan 3 name Purchase VLAN vlan 4 name Finance VLAN ip domain lookup ip name server 192 108 250 1 ip name server 192 108 250 4 ip name server 192 108 250 5 ip domain name asante com ip domain list stanford...

Page 105: ...connections Make sure the connectors are seated correctly in each port and that the correct type of cable is used in each port See Chapter 2 6 Connecting to the Network for more information The GBIC Link LED is not lit Check the GBIC connector Make sure the cables are inserted correctly with the Transmit Tx connector on one side of the link connected to the Receive Rx connector on the other side o...

Page 106: ...104ºF 0º to 40ºC Relative Humidity 10 to 90 non condensing Power Auto switching 110 240 VAC 50 60 Hz grounded IEC cord Redundant DC Power 12 VDC Auto switching from main 110 240 VAC for emergency backup B 1 Standards Compliance IEEEE IEEE 802 1D spanning tree and bridge filters IEEE 802 1p prioritization class of service IEEE 802 1Q virtual LAN VLAN IEEE 802 3x full duplex and flow control IEEE 80...

Page 107: ...ort 24 hour support via web and ftp complete product warranty with second business day within the United States advanced replacement and software maintenance agreement AsantéCare Optional extended technical support and product warranty for 1 2 additional years See Appendix C FCC Compliance and Warranty Statements for more detailed information ...

Page 108: ...d sofa or rug This product should never be placed near or over a radiator or heat register This product should not be placed in a built in installation unless proper ventilation is provided 8 This product should be operated from the type of power source indicated on the marking label If you are not sure of the type of power available consult your dealer or local power company 9 This product is equ...

Page 109: ...or calibration b software interfacing parts or supplies not received from Asanté c unauthorized modification or misuse d operation outside of the published environmental specifications for the product or e improper site preparation or maintenance This warranty expressly excludes problems arising from compatibility with other vendors products or future compatibility due to third party software or d...

Page 110: ...able from Radio Shack s website www radioshack com catalog 26 117 The setting is 9600 N81 The table below lists the pin outs Pin Number Signal Name 1 CD Carrier Detect 2 RD Receive Data 3 TD Transmit Data 4 DTR Data Terminal Ready 5 SG Signal Ground 6 DSR Data Set Ready 7 RTS Request to Send 8 CD Carrier Detect 9 RI Ring Indicator ...

Page 111: ... the switch online at www asante com support warranty index html By doing so you ll be entitled to special offers up to date information and important product bulletins You may also register the switch by using the warranty card found in the printed Setup Guide ...

Reviews: