background image

DES-3326SR Layer 3 Fast Ethernet Switch User’s Guide 

1

 

I

NTRODUCTION

 

This section describes the functionality features of the DES-
3326SR.  Some background information about Ethernet/Fast 
Ethernet, Gigabit Ethernet, and switching technology is 
presented.   

Layer 3 Switching 

Layer 3 switching is the integration of two proven technologies: 
switching and routing.  In fact, Layer 3 switches are running 
the  same routing routines and protocols as traditional routers.  
The main difference between traditional routing and Layer 3 
switching is the addition of a group of Layer 2 switching 
domains and the execution of routing routines for most 
packets via an ASIC – in hardware instead of software.   

The DES-3326SR can also replace key traditional routers for 
data centers and server farms, routing between these locations 
and the rest of the network, and providing 24 ports of Layer 2 
switching performance combined with wire-speed routing. 

Summary of Contents for DES-3326SR

Page 1: ...DES 3326SR Layer 3 Switch User s Guide First Edition May 2003 6513326SR015 Printed In Taiwan RECYCLABLE ...

Page 2: ...ich am Geräten befinden sind zu beachten 12 Wird das Gerät über einen längeren Zeitraum nicht benutzt sollten Sie es vom Stromnetz trennen Somit wird im Falle einer Überspannung eine Beschädigung vermieden 13 Durch die Lüftungsöffnungen dürfen niemals Gegenstände oder Flüssigkeiten in das Gerät gelangen Dies könnte einen Brand bzw Elektrischen Schlag auslösen 14 Öffnen Sie niemals das Gerät Das Ge...

Page 3: ...18 Zum Netzanschluß dieses Gerätes ist eine geprüfte Leitung zu verwenden Für einen Nennstrom bis 6A und einem Gerätegewicht grőßer 3kg ist eine Leitung nicht leichter als H05VV F 3G 0 75mm2 einzusetzen ...

Page 4: ...EORY OF LIABILITY THIS LIMITATION WILL APPLY EVEN IF D LINK HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE IF YOU PURCHASED A D LINK PRODUCT IN THE UNITED STATES SOME STATES DO NOT ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES SO THE ABOVE LIMITATION MAY NOT APPLY TO YOU Limited Warranty Hardware D Link warrants each of its hardware products to be free ...

Page 5: ...stration Card for the product in question has not been returned to a D Link office then a proof of purchase such as a copy of the dated purchase invoice must be provided when requesting warranty service The term purchase in this software warranty refers to the purchase transaction and resulting license to use such software D Link warrants that its software products will perform in substantial conf...

Page 6: ...vi absolutely error free and no warranty that all defects in the software product within or without the scope of D Link s applicable product documentation will be corrected ...

Page 7: ...ink offices is provided in the back of this manual Trademarks Copyright 2003 D Link Corporation Contents subject to change without prior notice D Link is a registered trademark of D Link Corporation D Link Systems Inc All other trademarks belong to their respective proprietors Copyright Statement No part of this publication may be reproduced in any form or by any means or used to make any derivati...

Page 8: ...s and can radiate radio frequency energy and if not installed and used in accordance with this user s guide may cause harmful interference to radio communications Operation of this equipment in a residential area is likely to cause harmful interference in which case the user will be required to correct the interference at his own expense CE Mark Warning This is a Class A product In a domestic envi...

Page 9: ...hernet Technology 8 Gigabit Ethernet Technology 8 Unpacking and Setup 9 Unpacking 9 Installation 9 Desktop or Shelf Installation 10 Rack Installation 11 Power on 12 Power Failure 13 Redundant Power Supply 13 Identifying External Components 14 Front Panel 14 Rear Panel 15 Side Panels 16 Optional Plug in Modules 16 100BASE FX Fiber Module 2Km 15Km 17 1000BASE T Module 18 1000BASE SX Fiber Module 18 ...

Page 10: ...cal Console Management 30 Diagnostic console port RS 232 DCE 31 Managing Switch Stacks 32 Switch IP Address 35 Traps 37 SNMP 38 MIBs 41 Packet Forwarding 42 Filtering 43 802 1w Rapid Spanning Tree 44 Link Aggregation 47 VLANs 49 IP Addresses 58 Internet Protocols 67 Packet Headers 74 The Domain Name System 81 DHCP Servers 83 IP Routing 84 ARP 86 Multicasting 87 Multicast Routing Protocols 95 Routi...

Page 11: ... 152 USING WEB BASED MANAGEMENT 153 NETWORK MANAGEMENT 181 SNMP Settings 181 Advanced Setup 196 Layer 3 IP Networking 204 IP Multicasting 231 Port Mirroring 246 Forwarding 249 Configure QOS Quality of Service 258 Bandwidth Control 268 Spanning Tree 269 MAC Notification 276 Link Aggregation 279 802 1X Configuration 283 System Log Server 289 Utilities 291 Network Monitoring 302 Technical Specificati...

Page 12: ......

Page 13: ...act Layer 3 switches are running the same routing routines and protocols as traditional routers The main difference between traditional routing and Layer 3 switching is the addition of a group of Layer 2 switching domains and the execution of routing routines for most packets via an ASIC in hardware instead of software The DES 3326SR can also replace key traditional routers for data centers and se...

Page 14: ...auto negotiate NWay between 10Mbps 100Mbps half duplex or full duplex and flow control for half duplex ports One front panel slide in module interface for a 2 port 1000BASE SX 1000BASE LX 1000BASE T 100BASE FX GBIC or 1 port GBIC Stack module RS 232 DCE Diagnostic port console port for setting up and managing the Switch via a connection to a console terminal or PC using a terminal emulation progra...

Page 15: ...em at a later time Layer 2 Features 8 8 Gbps switching fabric capacity Store and forward switching scheme Full and half duplex for both 10Mbps and 100Mbps connections The front port Gigabit Ethernet module operates at full duplex only Full duplex allows the switch port to simultaneously transmit and receive data and only works with connections to full duplex capable end stations and switches Conne...

Page 16: ...t 100 of wire speed for 10Mbps speed Data filtering rate eliminates all error packets runts etc at 148 800 pps per port at 100 of wire speed for 100Mbps speed 8K active MAC address entry table per device with automatic learning and aging 10 to 9999 seconds 8 MB packet buffer per device Broadcast and Multicast storm filtering Supports Port Mirroring Supports Port Trunking up to six trunk groups eac...

Page 17: ...warding rate of 6 6 Mpps 2K active IP address entry table per device Supports RIP Routing Information Protocol version I and II Supports OSPF Open Shortest Path First Supports MD5 and Password OSPF Packet Authentication Supports IP version 4 IGMP version 1 and 2 support RFC 1112 and RFC 2236 Supports PIM Dense Mode Supports DVMRP Supports IP multi netting Supports IP packet de fragmentation Suppor...

Page 18: ...tocol for creation of alternative backup paths and prevention of network loops SNMP v 1 Agent Fully configurable either in band or out of band control via SNMP based software Flash memory for software upgrades This can be done in band via TFTP or out of band via the console Built in SNMP management Bridge MIB RFC 1493 MIB II RFC 1213 Mini RMON MIB RFC 1757 4 groups CIDR MIB RFC 2096 except IP Forw...

Page 19: ...iltering on the management interface DCHP Client support DCHP Relay Agent DNS Relay Agent Password enabled Switch Stacking The DES 3326SR can be used as a standalone or stacked switch using the optional stacking module Up to 8 Switches may be stacked and managed as a unit with a single IP address Management for the entire stack is done through the Master Switch You may add Switches later as needed...

Page 20: ...net protocol Gigabit Ethernet Technology Gigabit Ethernet is an extension of IEEE 802 3 Ethernet utilizing the same packet structure format and support for CSMA CD protocol full duplex flow control and management objects but with a tenfold increase in theoretical throughput over 100Mbps Fast Ethernet and a one hundred fold increase over 10Mbps Ethernet Since it is compatible with all 10Mbps and 10...

Page 21: ...nts The carton should contain the following items One DES 3326SR 24 port Fast Ethernet Layer 3 Switch Mounting kit 2 mounting brackets and screws Four rubber feet with adhesive backing One AC power cord This User s Guide with Registration Card If any item is found missing or damaged please contact your local D Link reseller for replacement Installation Use the following guidelines when choosing a ...

Page 22: ...e is proper heat dissipation from and adequate ventilation around the switch Do not place heavy objects on the switch Desktop or Shelf Installation When installing the Switch on a desktop or shelf the rubber feet included with the device should first be attached Attach these cushioning feet on the bottom at each corner of the device Allow adequate space for ventilation between the device and the o...

Page 23: ...rack which can be placed in a wiring closet with other equipment To install attach the mounting brackets on the switch s side panels one on each side and secure them with the screws provided Figure 2 2 Attaching the mounting brackets to the switch Then use the screws provided with the equipment rack to mount the switch on the rack 11 ...

Page 24: ... at the rear of the unit adjacent to the AC power connector and the system fan The switch s power supply will adjust to the local power source automatically and may be turned on without having any or all LAN segment cables connected After the power switch is turned on the LED indicators should respond as follows All LED indicators will momentarily blink This blinking of the LED indicators represen...

Page 25: ... failure unplug the switch When the power supply is restored plug the switch back in Redundant Power Supply The DES 3326SR can be equipped with a redundant power supply the D Link DPS 200 to ensure continuation of service in a failure of the main power unit An integrated detection circuit continuously monitors the internal power supply In the event of a power interruption the redundant power suppl...

Page 26: ... Switch consists of LED indicators an RS 232 communication port a slide in module slot and 24 10 100 Mbps Ethernet Fast Ethernet ports Figure 3 1 Front panel view of the Switch Comprehensive LED indicators display the status of the switch and the network see the LED Indicators section below An RS 232 DCE console port for setting up and managing the switch via a connection to a console terminal or ...

Page 27: ...full or half duplex and flow control Rear Panel The rear panel of the switch contains an AC power connector Figure 3 2 Rear panel view of the Switch The AC power connector is a standard three pronged connector that supports the power cord Plug in the female connector of the provided power cord into this socket and the male side of the cord into a power outlet Supported input voltages range from 10...

Page 28: ...ts Figure 3 4 Side panel views of the Switch The system fans are used to dissipate heat The sides of the system also provide heat vents to serve the same purpose Do not block these openings and leave at least 6 inches of space at the rear and sides of the switch for proper ventilation Be reminded that without proper heat dissipation and air circulation system components might overheat which could ...

Page 29: ...modules must be purchased separately 100BASE FX Fiber Module 2Km 15Km Figure 3 5 100BASE FX two port module Front panel module Two 100BASE FX with SC type connector Fiber ports Fully compliant with IEEE802 3u Support Full duplex operation only IEEE 802 3x compliant Flow Control support for full duplex ...

Page 30: ... 3 6 1000BASE TX two port module Front panel module Connects to 1000BASE T devices Supports Category 5e UTP or STP cable connections of up to 100 meters 1000BASE SX Fiber Module Figure 3 7 1000BASE SX two port module Front panel module Connects to 1000BASE SX devices at full duplex ...

Page 31: ...rfilled launch Unit MHz km 160 200 400 500 Operating distance Unit meters 220 275 500 550 Channel insertion loss Unit dB 2 33 2 53 3 25 3 43 1000BASE LX Fiber Module Figure 3 8 1000BASE LX two port module Front panel module Connects to 1000BASE LX devices at full duplex Supports multi mode fiber optic cable connections of up to 550 meters or 5 km single mode fiber optic cable connections ...

Page 32: ...C devices at full duplex only Allows multi mode fiber optic connections of up to 550 m SX and LX and single mode fiber optic connections of up to 5 km LX only GBIC modules are available in SX and LX fiber optic media IEEE 802 3x compliant Flow Control for full duplex Stacking Module with GBIC Port Figure 3 10 Stacking Module with one GBIC port ...

Page 33: ... Port One transmitting port and one receiving port Use the connector of IEEE 1394b Data rate up to 1250 Mbps 7 segment LED display to indicate switch ID number within the switch stack The optional Stacking Module allows up to 8 DES 3326SR Switches to be interconnected via their individual Stacking Modules This forms a 8 switch stack that can then be managed and configured as thought the entire sta...

Page 34: ...one switch to an OUT port on the next switch in the stack The last two switches at the top and bottom of the stack must also be connected from the IN port on one switch to the OUT port on the other switch In this way a loop is made such that all of the switches in the switch stack have the IN stacking port connected to another switch s OUT stacking port The Stacking Module s LED indicators are des...

Page 35: ... is being managed via out of band local console management through the RS 232 console port using a straight through serial cable Act Link These indicators are located to the left and right of each port They are lit when there is a secure connection or link to a device at any of the ports The left hand LEDs blink whenever there is reception or transmission i e Activity Act of data occurring at a po...

Page 36: ...tack No seven segment LED displays the Unit number assigned to the switch A 0 a zero in the display indicates that the stacking module is in the process of determining the stack status and has not yet resolved the switch s Unit number The stacking order can be automatically configured using the switch s MAC address the lower the numerical value of a given switch s MAC address the lower the number ...

Page 37: ... The RJ 45 UTP ports on NICs and most routers are MDI II When using a normal straight through cable an MDI II port must connect to an MDI X port An end node can be connected to the Switch via a two pair Category 3 4 5 UTP STP straight cable be sure to use Category 5e UTP or STP cabling for 100 Mbps Fast Ethernet connections The end node should be connected to any of the twenty four ports 2x 24x of...

Page 38: ...ates are possible for an end node to switch connection The 100 LED indicator comes ON for a 100 Mbps and stays OFF for 10 Mbps The Link Act LED indicator lights up upon hooking up a PC that is powered on Switch to Hub or Switch These connections can be accomplished at any port in either straight through cable or a crossover cable because the switch supports Auto MDIX function A 10BASE T hub or swi...

Page 39: ... stack from the serial port on the master switch The CLI can also be used to configure and manage the switch stack via the TELNET protocol using a single IP address the IP address of the Master Switch The stacking ports are marked IN and OUT The IEEE 1394 compliant cable must be connected from an IN port on one switch to an OUT port on the next switch in the stack The last two switches at the top ...

Page 40: ...tch User s Guide 28 Figure 4 Switch Stack connections between optional stacking modules 10BASE T Device For a 10BASE T device the Switch s LED indicators should display the following 100 LED speed indicator is OFF Link Act indicator is ON ...

Page 41: ...DES 3326SR Layer 3 Fast Ethernet Switch User s Guide 29 100BASE TX Device For a 100BASE TX device the Switch s LED indicators should display the following 100 LED speed indicator is ON Link Act is ON ...

Page 42: ...ent these concepts and make use of its many features is discussed in detail in the next chapters Local Console Management A local console is a terminal or a workstation running a terminal emulation program that is connected directly to the switch via the RS 232 serial console port on the front of the switch A console connection is referred to as an Out of Band connection meaning that console is co...

Page 43: ...ent requires connecting a terminal such as a VT 100 or a PC running a terminal emulation program such as HyperTerminal which is automatically installed with Microsoft Windows a to the RS 232 DCE console port of the Switch Switch management using the RS 232 DCE console port is called Local Console Management to differentiate it from management performed via management platforms such as D View HP Op...

Page 44: ... be taken into account when you are placing the Switches in the equipment rack Administrators may find it convenient to place the Switches in the rack in the same order they appear logically in the Switch stack However you also may prefer to override the auto detect stack order feature if for example you add Switches to a stack that is already in place Regardless of the method used to determine Sw...

Page 45: ... to function as the Master The remaining Switches are ordered according to the relative value of their respective MAC addresses see the following example Determining the Switch Stack Order Using the auto stacking mode five MAC addresses appear in the order listed in the table below Stack Order MAC Address 1 Master 001122334451 2 001122334452 3 001122334453 4 001122334454 5 001122334455 6 Not in us...

Page 46: ...rmation in Chapter 6 for information on how to override the stack order auto detect function To override the automatic selection of the stack order you must attach the serial cable to the newly added Switch MAC address 001122334450 Now you can reconfigure the stack to place the original Master Switch MAC address 001122334451 again into the number 1 position and the newly added Switch into the numb...

Page 47: ...nication with an SNMP network manager or other TCP IP application for example BOOTP TFTP The switch s default IP address is 10 90 90 90 You can change the default Switch IP Address to meet the specification of your networking address scheme The switch is also assigned a unique MAC address by the factory This MAC address cannot be changed and can be found from the initial boot console screen shown ...

Page 48: ...ole serial port as follows 1 Starting at the command line prompt DES3326S4 enter the commands config ipif System ipaddress xxx xxx xxx xxx yyy yyy yyy yyy Where the x s represent the IP address to be assigned to the IP interface named System and the y s represent the corresponding subnet mask 2 Alternatively you can enter DES3326S4 enter the commands config ipif system ipaddress xxx xxx xxx xxx z ...

Page 49: ...ers may receive traps from the Switch by entering a list of the IP addresses of authorized network managers Up to four trap recipient IP addresses and four corresponding SNMP community strings can be entered SNMP community strings function like passwords in that the community string entered for a given IP address must be used in the management station software or a trap will be sent The following ...

Page 50: ... any of its configured ports transitions from the Learning state to the Forwarding state or from the Forwarding state to the Blocking state The trap is not sent if a new root trap is sent for the same transition Link Up This trap is sent whenever the link of a port changes from link down to link up Link Down This trap is sent whenever the link of a port changes from link up to link down SNMP The S...

Page 51: ...xchange packets Authentication The authentication protocol ensures that both the router SNMP agent and the remote user SNMP application program discard packets from unauthorized users Authentication is accomplished using community strings which function like passwords The remote user SNMP application and the router SNMP must use the same community string SNMP community strings of up to 20 characte...

Page 52: ...ured and hardware systems are rebooted A cold start is different from a factory reset in that configuration settings saved to non volatile RAM used to reconfigure the switch Warm Start This trap signifies that the Switch has been rebooted however the POST Power On Self Test is skipped Authentication Failure This trap signifies that someone has tried to logon to the switch using an invalid SNMP com...

Page 53: ...also be retrieved by specifying the MIB s Object Identity OID at the network manager MIB values can be either read only or read write Read only MIBs variables can be either constants that are programmed into the Switch or variables that change while the Switch is in operation Examples of read only constants are the number of port and type of ports Examples of read only variables are the statistics...

Page 54: ...nly and transmits nothing through the other ports This process is referred to as learning the network topology MAC Address Aging Time The Aging Time affects the learning process of the Switch Dynamic forwarding table entries which are made up of the source MAC addresses and their associated port numbers are deleted from the table if they are not accessed within the aging time The aging time can be...

Page 55: ...kets from disrupting communications on other parts of the network For intrusion control whenever a switch encounters a packet originating from or destined to a MAC address or an IP Address entered into the filter table the switch will discard the packet Some filtering is done automatically by the switch Dynamic filtering automatic learning and aging of MAC addresses and their location on the netwo...

Page 56: ...entry may specified as either a source a destination or both switch must be in IP Routing mode 802 1w Rapid Spanning Tree The Switch implements two versions of the Spanning Tree Protocol the Rapid Spanning Tree Protocol RSTP as defined by the IEE 802 1w specification and a version compatible with the IEEE 802 1d STP RSTP can operate with legacy equipment implementing IEEE 802 1d however the advant...

Page 57: ...n the STP port transition states disabled blocking or listening or in the RSTP port state discarding there is no functional difference the port is not active in the network topology Table 5 7 below compares how the two protocols differ regarding the port state transition Both protocols calculate a stable topology in the same way Every segment will have a single path to the root bridge All bridges ...

Page 58: ...es the edge port and the point to point P2P port Edge Port The edge port is a configurable designation used for a port that is directly connected to a segment where a loop cannot be created An example would be a port connected directly to a single workstation Ports that are designated as edge ports transition to a forwarding state immediately without going through the listening and learning states...

Page 59: ...gh bandwidth data pipeline The participating parts are called members of a link aggregation group with one port designated as the master port of the group Since all members of the link aggregation group must be configured to operate in the same manner the configuration of the master port is applied to all members of the link aggregation group Thus when configuring the ports in a link aggregation g...

Page 60: ...roup This allows packets in a data stream to arrive in the same order they were sent A aggregated link connection can be made with any other switch that maintains host to host data streams over a single link aggregate port Switches that use a load balancing scheme that sends the packets of a host to host data stream over multiple link aggregation ports cannot have a aggregated connection with the ...

Page 61: ... 3326SR supports IEEE 802 1Q VLANs The port untagging function can be used to remove the 802 1Q tag from packet headers to maintain compatibility with devices that are tag unaware that is network devices that do not support IEEE 802 1Q VLANs or tagging 2 The switch s default is to assign all ports to a single 802 1Q VLAN named 3 The switch allows the assignment of an IP interface to each VLAN in I...

Page 62: ...ire tagging which enables the VLANs to span an entire network assuming all switches on the network are IEEE 802 1Q compliant Any port can be configured as either tagging or untagging The untagging feature of IEEE 802 1Q VLANs allow VLANs to work with legacy switches that don t recognize VLAN tags in packet headers The tagging feature allows VLANs to span multiple 802 1Q compliant switches through ...

Page 63: ...address Their presence is indicated by a value of 0x8100 in the EtherType field When a packet s EtherType field is equal to 0x8100 the packet carries the IEEE 802 1Q 802 1p tag The tag is contained in the following two octets and consists of 3 bits or user priority 1 bit of Canonical Format Identifier CFI used for encapsulating Token Ring packets so they can be carried across Ethernet backbones an...

Page 64: ...acket header making the entire packet longer by 4 octets All of the information contained in the packet originally is retained Figure 5 7 IEEE 802 1Q Tag The EtherType and VLAN ID are inserted after the MAC source address but before the original EtherType Length or Logical Link Control Because the packet is now a bit longer than it was originally the Cyclic Redundancy Check CRC must be recalculate...

Page 65: ...network devices are 802 1Q compliant These devices are referred to as tag unaware 802 1Q devices are referred to as tag aware Prior to the adoption 802 1Q VLANs port based and MAC based VLANs were in common use These VLANs relied upon a Port VLAN ID PVID to forward packets A packet received on a given port would be assigned that port s PVID and then be forwarded to the port that corresponded to th...

Page 66: ...VID is not used to make packet forwarding decisions the VID is Tag aware switches must keep a table to relate PVIDs within the switch to VIDs on the network The switch will compare the VID of a packet to be transmitted to the VID of the port that is to transmit the packet If the two VIDs are different the switch will drop the packet Because of the existence of the PVID for untagged packets and the...

Page 67: ...forwarded by an untagging port will have no 802 1Q VLAN information Remember that the PVID is only used internally within the switch Untagging is used to send packets from an 802 1Q compliant network device to a non compliant network device Ingress Filtering A port on a switch where packets are flowing into the switch and VLAN decisions must be made is referred to as an ingress port If ingress fil...

Page 68: ... that are not on the same VLAN as the ingress port at the point of reception This eliminates the subsequent processing of packets that will just be dropped by the destination port VLANs in Layer 2 Only Mode The switch initially configures one VLAN VID 1 called the DEFAULT_VLAN The factory default setting assigns all ports on the switch to the DEFAULT_VLAN Packets cannot cross VLANs if the switch i...

Page 69: ...ddress to determine VLAN membership no route calculation is performed the RIP protocol is not employed and packets traversing the switch are bridged using the Spanning Tree algorithm A switch that implements layer 3 or subnet VLANs without performing any routing function between these VLANs is referred to as performing IP Switching IP Addressing and Subnetting This section gives basic information ...

Page 70: ... Protocol IP was designed for routing data between network sites Later it was adapted for routing between networks referred to as subnets within a site The IP defines a way of generating a unique number that can be assigned each network in the internet and each of the computers on each of those networks This number is called the IP address IP addresses use a dotted decimal notation Here are some e...

Page 71: ...ctet can represent any decimal value between 0 00000000 and 255 11111111 IP addresses represented in decimal form are four numbers whose value is between 0 to 255 The total range of IP addresses are then Lowest possible IP address 0 0 0 0 Highest possible IP address 255 255 255 255 To convert decimal numbers to 8 bit binary numbers and vice versa you can use the following chart Binary Octet Digit ...

Page 72: ...sk of dividing a network into subnets a bit easier There are 5 address classes The first 4 bits in the IP address determine which class the IP address falls in Class A addresses begin with 0xxx or 1 to 126 decimal Class B addresses begin with 10xx or 128 to 191 decimal Class C addresses begin with 110x or 192 to 223 decimal Class D addresses begin with 1110 or 224 to 239 decimal Class E addresses ...

Page 73: ...ress for a given IP address the node part is set to all 0 s In our example 10 0 0 0 specifies the network address for 10 42 73 210 When the node part is set to all 1 s the address specifies a broadcast address So 10 255 255 255 is the broadcast address for the network 10 0 0 0 Subnet Masking A subnet mask can be applied to an IP address to identify the network and the node parts of the address A b...

Page 74: ...ow it s network address and for all hosts on the network the broadcast address This also applies to subnets A subnet address cannot be all 0 s or all 1 s A 1 bit subnet mask is also not allowed Calculating the Number of Subnets and Nodes To calculate the number of subnets and nodes use the formula 2n 2 where n the number of bits in either the subnet mask or the node portion of the IP address Multi...

Page 75: ...e that this is less than the 16 777 214 possible nodes that an unsubnetted class A network would have Subnetting reduces the number of possible nodes for a given network but increases the segmentation of the network Classless Inter Domain Routing CIDR Under CIDR the subnet mask notation is reduced to a simplified shorthand Instead of specifying all of the bits of the subnet mask it is simply liste...

Page 76: ... 128 0 17 510 32766 16710660 10 255 255 192 0 18 1022 16382 16742404 11 255 255 224 0 19 2046 8190 16756740 12 255 255 240 0 20 4094 4094 16760836 13 255 255 248 0 21 8190 2046 16756740 14 255 255 252 0 22 16382 1022 16742404 15 255 255 254 0 23 32766 510 16710660 16 255 255 255 0 24 65534 254 16645636 17 255 255 255 1 28 25 131070 126 16514820 18 255 255 255 1 92 26 262142 62 16252804 19 255 255 ...

Page 77: ... 255 255 192 26 1022 62 63364 11 255 255 255 224 27 2046 30 61380 12 255 255 255 240 28 4094 14 57316 13 255 255 255 248 29 8190 6 49140 14 255 255 255 252 30 16382 2 32764 Table 5 10 Class B Subnet Masks of Bits Subnet Mask CIDR Notation of Subnets of Hosts Total Hosts 2 255 255 255 192 26 2 62 124 3 255 255 255 224 27 6 30 180 4 255 255 255 240 28 14 14 196 5 255 255 255 248 29 30 6 180 6 255 25...

Page 78: ... 4 Backbone 6 25 26 Table 5 12 VLAN Example Assigned Ports In this case 6 IP interfaces are required so a CIDR notation of 10 32 0 0 11 or a 11 bit addressing scheme will work This addressing scheme will give a subnet mask of 11111111 11100000 00000000 00000000 binary or 255 224 0 0 decimal Using a 10 xxx xxx xxx IP address notation the above example would give 6 network addresses and 6 subnets An...

Page 79: ...55 224 0 0 can be entered into the Setup IP Interface menu A switch that implements layer 3 or subnet VLANs without performing any routing function between these VLANs is referred to as performing IP Switching Internet Protocols This is a brief introduction to the suite of Internet Protocols frequently referred to as TCP IP It is intended to give the reader a reasonable understanding of the availa...

Page 80: ...g including the Internet A diagram of the OSI model is shown below note that this is not a complete listing of the protocols contained within each layer of the model Figure 5 8 OSI Seven Layer Network Model Each layer is a distinct set of programs executing a distinct set of protocols designed to accomplish some necessary tasks They are separated from the other layers within the same system or net...

Page 81: ... is actually a set of guidelines used in writing programs and designing hardware that delegate network functions and allow the layers to communicate How these layers communicate within a stack for example within a given computer is left to the operating system programmers Figure 5 9 The Protocol Stack Between two protocol stacks members of the same layer are known as peers and communicate by well ...

Page 82: ...fferent from a second stack and proprietary but communication between peers on the same OSI layer is open and consistent A brief description of the most commonly used functional layers is helpful to understand the scope of how protocol layering works Layer 1 This is referred to as the physical layer It handles the electrical connections and signaling required to make a physical link from one point...

Page 83: ...ames the Dynamic Host Configuration Protocol DCHP eases the administration of IP addresses and routing protocols such as the Routing Information Protocol RIP the Open Shortest Path First OSPF and the Border Gateway Protocol BGP enable Layer 3 devices to direct data traffic to the intended destination IP security allows for authentication and encryption IP not only allows for user to user communica...

Page 84: ...s They are written to use a specific communication library like the popular WinSock library Software developers must decide what type of transport mechanism is necessary For example Web access requires reliable error free access and would demand TCP Multimedia on the other hand requires low overhead and latency and commonly uses UDP TCP IP The TCP IP protocol suite is a set of protocols that allow...

Page 85: ...rary of routines but with a more general set of functions IP handles the routing of packets from the source to the destination This may require the packets to traverse many different networks IP can route packets through the necessary gateways and provides the functions required for any user on one network to communicate with any user on another connected network The communication interface betwee...

Page 86: ...functions TCP must know how large a packet the network can process To do this the TCP protocols at each end of a connection state how large a packet they can handle and the smaller of the two is selected The TCP header contains at least 20 octets The source and destination TCP port numbers are the most important fields These specify the connection between two TCP protocols on two network devices T...

Page 87: ...f the data up to octet 1000 has been received If the transmitting TCP does not receive an acknowledgement in a reasonable amount of time the data is resent The window field controls the amount of data being sent at any one time It would require too much time and overhead to acknowledge each packet received Each end of the TCP connection declares how much data it is able to receive at any one time ...

Page 88: ...is not concerned with the contents of the packet or the TCP header IP finds a route for the packet to get to the other end of the TCP connection IP adds its own header to the packet to accomplish this The IP header contains the source and destination addresses the protocol number and another checksum The protocol number tells the receiving IP which protocol to give the packet to Although most IP t...

Page 89: ...op develops Ethernet Every active Ethernet device has its own Ethernet address commonly called the MAC address assigned to it by the manufacturer Ethernet uses 48 bit addresses The Ethernet header is 14 octets that include the source and destination MAC address and a type code There is no relationship between the MAC address of a network node and its IP address There must be a database of Ethernet...

Page 90: ...the protocol field is TCP the packet is sent to TCP TCP then looks at the sequence number and uses this number and other data from the headers to reassemble the data into the original file TCP and UDP Well Known Ports Application protocols run on top of TCP IP When an application wants to send data or a message it gives the data to TCP Because TCP and IP take care of the networking details the app...

Page 91: ...xample an FTP client that requests the file to be transferred and an FTP server that sends the file to the FTP client The FTP server accepts commands from the client so the FTP client must know how to connect to the server must know the TCP port number in order to send commands The FTP Server can use any TCP port number to send the file so long as it is sent as part of the connection setup A TCP c...

Page 92: ... that cannot fit into a single packet Looking up computer names is an example Users wanting to make connections to other computers will usually use a name rather than the computer s IP or MAC address The user s computer must be able to determine the remote computer s address before a connection can be made A designated computer on the network will contain a database of computer names and their cor...

Page 93: ...ntrol Message Protocol ICMP is also a simplified protocol used for error messages and messages used by TCP IP ICMP like UDP processes messages that will fit into a single packet ICMP does not however use ports because its messages are processed by the network software The Domain Name System Computer users usually prefer to use text names for computers they may want to open a connection with Comput...

Page 94: ...ames for a single network which is connected to a root DNS server usually maintained by an ISP Domain Name Resolution The domain name system can be used by contacting the name servers one at a time or by asking the domain name system to do the complete name translation The client makes a query containing the name the type of answer required and a code specifying whether the domain name system shou...

Page 95: ... TCP IP network configuration to network devices and computers on the network It also ensures that IP address conflicts do not occur IP addresses are assigned from a pool of free addresses Each IP address assigned has a lease and a lease expiration period The lease must be periodically renewed If the lease is expires the IP address is returned to the pool of available IP addresses Usually it is a ...

Page 96: ...must be attached to a network It is safe to assume that any system on this network can send packets to any other system but when packets must cross other networks to reach a destination on a remote network these packets must be handled by gateways also called routers Gateways connect a network with one or more other networks Gateways can be a computer with two network interfaces or a specialized d...

Page 97: ...emselves need a more complete routing table to be able to forward packets correctly A protocol is required for the gateways to be able to communicate between themselves and to keep their routing tables updated Packet Fragmentation and Reassembly TCP IP can be used with many different types of networks but not all network types can handle the same length packets When IP is transmitting large files ...

Page 98: ...P address correspondence for a network device A local computer will maintain an ARP cache which is a table of MAC addresses and the corresponding IP addresses Before a connection with another computer is made the local computer first checks its ARP cache to determine whether the remote computer has an entry If it does the local computer reads the remote computer s MAC address and writes it into th...

Page 99: ... to multicasting is a decrease in the network load compared to broadcasting Multicast Groups Class D IP addresses are assigned to a group of network devices that comprise a multicast group The four most significant four bits of a Class D address are set to 1110 The following 28 bits is referred to as the multicast group ID Some of the range of Class D addresses are registered with the Internet Ass...

Page 100: ...24 0 0 5 OSPF IGP Routers 224 0 0 6 OSPF IGP Designated Routers 224 0 0 7 ST Routers 224 0 0 8 ST Hosts 224 0 0 9 All RIP2 Routers 224 0 0 10 All IGRP Routers 224 0 0 11 Mobile Agents 224 0 0 12 DHCP Servers and Relay Agents 224 0 0 13 All PIM Routers 224 0 0 14 RSVP Encapsulation 224 0 0 15 All CBT Routers 224 0 0 16 Designated Sbm 224 0 0 17 All Sbms 224 0 0 18 VRRP 224 0 0 19 through 224 0 0 22...

Page 101: ...rs as the querier This router then keep track of the membership of multicast groups that have active members on the network IGMP is used to determine whether the router should forward multicast packets it receives to the subnetworks it is attached to or not A multicast router that has received a multicast packet will check to determine if there is at least one member of a multicast group that has ...

Page 102: ...t leave message Group members have an expiration timer and if this timer expires before a query response is returned the member is dropped from the group IGMP version 2 introduces an explicit leave report When a user wants to leave a group this report is sent to the multicast router for IGMP version 2 Multicast routers send IGMP queries to the all hosts group address 224 0 0 1 periodically to see ...

Page 103: ...d queries that are specific to a particular multicast group The router with the lowest IP address is elected as the querier The explicit group leave message is added to decrease latency and routers can ask for membership reports from a particular multicast group ID The transition states a host will go through to join or leave a multicast group are shown in the diagram below Figure 5 16 IGMP State ...

Page 104: ...ticast packet has been received before in a certain amount of time If it has then the packet does not need to be forwarded at all and can be dropped If the packet is being received for the first time it should be flooded to all interface except the interface on which it was received This will ensure that all routers on the network will receive at least one copy of the multicast packet There are so...

Page 105: ... path back to the source the packet is forwarded on all links except the link on which the packet was received If the packet was not received on the shortest link back to the source the packet is dropped If a link state routing protocol is in use RPB on a local router can determine if the path from the source through the local router to an immediately neighboring router If it is not the packet wil...

Page 106: ...r router are referred to as leaf routers If the multicast packet if forwarded to a leaf router that has no active multicast group members for the source the leaf router will send a prune message to the previous router This will remove the leaf router s branch from the spanning tree and no more multicast packets from that source will be forwarded to it Prune messages have a TTL equal to one so they...

Page 107: ...tion Protocol is discussed in a later section Distance Vector Multicast Routing Protocol DVMRP The Distance Vector Multicast Routing Protocol DVMRP was derived from the Routing Information Protocol RIP with the introduction of multicast delivery trees constructed from information about the distance from the local router back toward the multicast source DVMRP uses an RPM algorithm to construct its ...

Page 108: ...f two multicast routers on a network have the same distance back to a multicast source the router with the lowest IP address is elected DVMRP also supports tunnel interfaces where two multicast routers are connected through a router that cannot process multicast packets This allows multicast packets to cross networks with routers that are not multicast aware Protocol Independent Multicast Dense Mo...

Page 109: ...ng router and the remote network So the vector is the network address and the distance is measured by the number of routers between the local router and the remote network RIP measures distance by an integer count of the number of hops from one network to another A router is one hop from a directly connected network two hops from a network that can be reached through a router etc The more routers ...

Page 110: ...P can also be slow to converge to remove inconsistent unreachable or looped routes from the routing table because RIP messages propagate relatively slowly through a network Slow convergence can be solved by using split horizon update where a router does not propagate information about a route back to the interface on which it was received This reduces the probability of forming transient routing l...

Page 111: ... Ethernet Switch User s Guide 99 RIP Version 1 Message Format There are two types of RIP messages routing information messages and information requests The same format is used by both types Figure 5 17 RIP v 1 Message Format ...

Page 112: ...10 Update Response 11 Update Acknowledgement Table 5 15 RIP Command Codes The field VERSION contains the protocol version number 1 in this case and is used by the receiver to verify which version of RIP the packet was sent RIP 1 Message RIP is not limited to TCP IP Its address format can support up to 14 octets when using IP the remaining 10 octets must be zeros Other network protocol suites can b...

Page 113: ...used to propagate classless addresses Routers running RIP version 1 must send different update messages for each IP interface to which it is connected Interfaces that use the same subnet mask as the router s network can contain subnetted routes other interfaces cannot The router will then advertise only a single route to the network RIP Version 2 Extensions RIP version 2 includes an explicit subne...

Page 114: ...ion 2 also adds a 16 bit route tag that is retained and sent with router updates It can be used to identify the origin of the route Because the version number in RIP2 occupies the same octet as in RIP1 both versions of the protocols can be used on a given router simultaneously without interference ...

Page 115: ...at use OSPF To limit the extent of link state update traffic between routers OSPF defines the concept of Area All routers within an area share the exact same link state database and a change to this database on one router triggers an update to the link state database of all other routers in that area Routers that have interfaces connected to more than one area are called Border Routers and take th...

Page 116: ...the link state advertisement will store the advertisement and then forward a copy to other routers 3 When the link state database of each router is updated the individual routers will calculate a Shortest Path Tree to all destinations with the individual router as the root The IP routing table will then be made up of the destination address associated cost and the address of the next hop to reach ...

Page 117: ...ic that is representative of the overhead required to send packets over that interface This cost is inversely proportional to the bandwidth of the interface i e a higher bandwidth interface has a lower cost There is then a higher cost and longer time delays in sending packets over a 56 Kbps dial up connection than over a 10 Mbps Ethernet connection The formula used to calculate the OSPF cost is as...

Page 118: ...DES 3326SR Layer 3 Fast Ethernet Switch User s Guide 106 Figure 5 19 Constructing a Shortest Path Tree ...

Page 119: ...the viewpoint of Router A Router A can reach 192 213 11 0 through Router B with a cost of 10 5 15 Router A can reach 222 211 10 0 through Router C with a cost of 10 10 20 Router A can also reach 222 211 10 0 through Router B and Router D with a cost of 10 5 10 25 but the cost is higher than the route through Router C This higher cost route will not be included in the Router A s shortest path tree ...

Page 120: ...st path tree but is very important when Router B is constructing its shortest path tree Note also that directly connected networks are reached at a cost of 0 while other networks are reached at the cost calculated in the shortest path tree Router A can now build its routing table using the network addresses and costs calculated in building the above shortest path tree Areas and Border Routers OSPF...

Page 121: ...ng necessary routing information and changes between areas Areas are specific to the router interface A router that has all of its interfaces in the same area is called an Internal Router A router that has interfaces in multiple areas is called a Border Router Routers that act as gateways to other networks possibly using other routing protocols are called Autonomous System Border Routers ASBRs Lin...

Page 122: ...te routing information about other networks within the AS Normally all Summary link state updates are forwarded to the backbone area 0 and are then forwarded to all other areas in the network Border Routers also have the responsibility of distributing routing information from the Autonomous System Border Router in order for routers in the network to get and maintain routes to other Autonomous Syst...

Page 123: ...nerable to passive attacks where a link analyzer is used to obtain the password Message Digest Authentication MD 5 MD 5 authentication is a cryptographic method A key and a key ID are configured on each router The router then uses an algorithm to generate a mathematical message digest that is derived from the OSPF packet the key and the key ID This message digest a number is then appended to the p...

Page 124: ...Linking an area that does not have a physical connection to the backbone 2 Patching the backbone in case there is a discontinuity in area 0 Areas Not Physically Connected to Area 0 All areas of an OSPF network should have a physical connection to the backbone but is some cases it is not possible to physically connect a remote area to the backbone In these cases a virtual link is configured to conn...

Page 125: ... to be possible between any two neighbor routers Any two routers must meet the following conditions before the become neighbors Area ID two routers having a common segment their interfaces have to belong to the same area on that segment Of course the interfaces should belong to the same subnet and have the same subnet mask Authentication OSPF allows for the configuration of a password for a specif...

Page 126: ...participate in the link state database exchange process OSPF elects one router as the Designated Router DR and a second router as the Backup Designated Router BDR on each multi access segment the BDR is a backup in case of a DR failure All other routers on the segment will then contact the DR for link state database updates and exchanges This limits the bandwidth required for link state database u...

Page 127: ...lo packet coming from a neighbor but bi directional communication has not yet been established Two way Bi directional communication with a neighbor has been established The router has seen its address in the Hello packets coming from a neighbor At the end of this stage the DR and BDR election would have been done At the end of the Two way stage routers will decide whether to proceed in building an...

Page 128: ...ged Full The adjacency is now complete The neighboring routers are fully adjacent Adjacent routers will have the same link state database Adjacencies on Point to Point Interfaces OSPF Routers that are linked using point to point interfaces such as serial links will always form adjacencies The concepts of DR and BDR are unnecessary OSPF Packet Formats All OSPF packet types begin with a standard 24 ...

Page 129: ... header contains the information necessary for a receiving router to determine if the packet should be accepted for further processing The format of the OSPP packet header is shown below OSPF Packet Header Type Router ID Area ID Checksum Authentication Authentication Version No Packet Length Authentication Type Figure 5 22 OSPF Packet Header Field Description Version No The OSPF version number Typ...

Page 130: ...n bytes This length includes the 24 byte header Router ID The Router ID of the packet s source Area ID A 32 bit number identifying the area that this packet belongs to All OSPF packets are associated with a single area Packets traversing a virtual link are assigned the backbone Area ID of 0 0 0 0 Checksum A standard IP checksum that includes all of the packet s contents except for the 64 bit authe...

Page 131: ...In addition Hello Packets are multicast on those physical networks having a multicast or broadcast capability enabling dynamic discovery of neighboring routers All routers connected to a common network must agree on certain parameters such as the Network Mask the Hello Interval and the Router Dead Interval These parameters are included in hello packets so that differences can inhibit the forming o...

Page 132: ...gnated Router Backup Designated Ro Neighbor Packet Length thentication Type tions Router Priority val uter Figure 5 23 Hello Packet Field Description Network Mask The network mask associated with this interface Options The optional capabilities supported by the router Hello Interval The number of seconds between this router s Hello packets Router Priority This router s Router Priority The Router ...

Page 133: ...outer The identity of the DR for this network in the view of the advertising router The DR is identified here by its IP interface address on the network Backup Designated Router The identity of the Backup Designated Router BDR for this network The BDR is identified here by its IP interface address on the network This field is set to 0 0 0 0 if there is no BDR Neighbor The Router Ids of each router...

Page 134: ...ure is used One of the routers is designated to be master the other a slave The master seconds Database Description packets polls which are acknowledged by Database Description packets sent by the slave responses The responses are linked to the polls via the packets DD sequence numbers Database Description Packe Version No 2 Router ID Area ID Authentication Authentication Checksum DD Sequence No R...

Page 135: ...Database Description packets will follow MS bit The Master Slave bit When set to 1 this indicates that the router is the master during the Database Exchange process A zero indicates the opposite DD Sequence Number User to sequence the collection of Database Description Packets The initial value indicated by the Initial bit being set should be unique The DD sequence number then increments until the...

Page 136: ...are out of date The Link State Request packet is used to request the pieces of the neighbor s database that are more up to date Multiple Link State Request packets may need to be used The sending of Link State Request packets is the last step in bringing up an adjacency A router that sends a Link State Request packet has in mind the precise instance of the database pieces it is requesting defined ...

Page 137: ...ink State Type Link State ID and Advertising Router This uniquely identifies the advertisement but not its instance Link State Request packets are understood to be requests for the most recent instance The Link State Update Packet Link State Update packets are OSPF packet type 4 These packets implement the flooding of link state advertisements Each Link State Update packet carries a collection of ...

Page 138: ...rried by unicast Link State Update packets The format of the Link State Update packet is shown below Version No Router ID Area ID Authentication Authentication Checksum Link State Update Packet 4 Number of Advertisem Link State Advertisem Packet Length Authentication Type ents ents Figure 5 26 Link State Update Packet The body of the Link State Update packet consists of a list of link state advert...

Page 139: ...on the state of the sending interface and the source of the advertisements being acknowledged a Link State Acknowledgment packet is sent either to the multicast address AllSPFRouters to the multicast address AllDRouters or as a unicast packet The format of this packet is similar to that of the Data Description packet The body of both packets is simply a list of link state advertisement headers The...

Page 140: ... In addition whenever the router is elected as the Designated Router it originates a network links advertisement Other types of link state advertisements may also be originated The flooding algorithm is reliable ensuring that all routers have the same collection of link state advertisements The collection of advertisements is called the link state or topological database From the link state databa...

Page 141: ...o contained in the link state advertisement header The format of the Link State Advertisement Header is shown below Link State Advertisem Link State Age Link State ID Advertising Rou Link State Sequence Link State Checksum ent Header Options Link State Type ter Number Length Figure 5 28 Link State Advertisement Header Field Description Link State Age The time is seconds since the link state advert...

Page 142: ...tents of this field depend on the advertisement s Link State Type Advertising Router The Router ID of the router that originated the Link State Advertisement For example in network links advertisements this field is set to the Router ID of the network s Designated Router Link State Sequence Number Detects old or duplicate link state advertisements Successive instances of a link state advertisement...

Page 143: ...vertisement header Table 5 19 Link State Advertisement Header Router Links Advertisements Router links advertisements are type 1 link state advertisements Each router in an area originates a routers links advertisement The advertisement describes the state and cost of the router s links to the area All of the router s links to the area must be described in a single router links advertisement The f...

Page 144: ... 0 0 V B E tions Link State Type umber Length ents Number of Links TOS 0 Metric Metric Metric Figure 5 29 Routers Links Advertisement In router links advertisements the Link State ID field is set to the router s OSPF Router ID The T bit is set in the advertisement s Option field if and only if the router is able to calculate a separate set of routes for each IP Type of Service TOS Router links adv...

Page 145: ...ertisement This must be the total collection of router links to the area Table 5 20 Routers Links Advertisement The following fields are used to describe each router link Each router link is typed The Type field indicates the kind of link being described It may be a link to a transit network to another router or to a stub network The values of all the other fields describing a router link depend o...

Page 146: ...etwork 4 Virtual link Link ID Identifies the object that this router link connects to Value depends on the link s Type When connecting to an object that also originates a link state advertisement i e another router or a transit network the Link ID is equal to the neighboring advertisement s Link State ID This provides the key for looking up an advertisement in the link state database Type Link ID ...

Page 147: ...I ifIndex value For other link types it specifies the router s associated IP interface address This latter piece of information is needed during the routing table build process when calculating the IP address of the next hop No of TOS The number of different Type of Service TOS metrics given for this link not counting the required metric for TOS 0 If no additional TOS metrics are given this field ...

Page 148: ...S IP Type of Service that this metric refers to Metric The cost of using this outbound router link for traffic of the specified TOS Table 5 22 Routers Links Advertisement Continued Network Links Advertisements Network links advertisements are Type 2 link state advertisements A network links advertisement is originated for each transit network in the area A transit network is a multi access network...

Page 149: ...Age Op Link State ID Advertising Router Link State Sequence N Link State Checksum Network Link Advertisemen Network Mask Attached Router tions umber Length ts 2 Figure 5 30 Network Link Advertisement Field Description Network Mask The IP address mask for the network Attached Router The Router Ids of each of the routers attached to the network Only those routers that are fully adjacent to the Desig...

Page 150: ...number When the destination is an AS boundary router a Type 4 advertisement is used and the Link State ID field is the AS boundary router s OSPF Router ID Other that the difference in the Link State ID field the format of Type 3 and 4 link state advertisements is identical Link State Age Op Link State ID Advertising Router Link State Sequence N Link State Checksum Network Mask Summary Link Adverti...

Page 151: ...is described by the advertisement Otherwise routes for the other TOS values are also described If a cost for a certain TOS is not included its cost defaults to that specified for TOS 0 Field Description Network Mask For Type 3 link state advertisements this indicates the destination network s IP address mask For example when advertising the location of a class A network the value 0xff000000 TOS Th...

Page 152: ...Link State ID field specifies an IP network number AS external link advertisements are also used to describe a default route Default routes are used when no specific route exists to the destination When describing a default route the Link Stat ID is always set the Default Destination address 0 0 0 0 and the Network Mask is set to 0 0 0 0 The format of the AS External Link Advertisement is shown be...

Page 153: ...n any link state path If the E bit is zero the specified metric is a Type 1 external metric This means that is comparable directly to the link state metric Forwarding Address Data traffic for the advertised destination will be forwarded to this address If the Forwarding Address is set to 0 0 0 0 data traffic will be forwarded instead to the advertisement s originator TOS The Type of Service that t...

Page 154: ...tch User s Guide 142 metric depends on the external type indication the E bit above External Route Tag A 32 bit field attached to each external route This is not used by the OSPF protocol itself Table 5 25 AS External System Advertisement ...

Page 155: ...et Explorer The Web browser acts as a universal access tool and can communicate directly with the Switch using the HTTP protocol The Web based management module and the Console program and Telnet are different ways to access the same internal switching software and configure it Thus all settings encountered in web based management are the same as those found in the console program Note this Web ba...

Page 156: ...ill maximize the potential of the DES 3326SR Layer 3 switch General Deployment Strategy 1 Determine how the network would be best segmented This is probably done using VLANs in an existing layer 2 switched network 2 Develop an IP addressing scheme This involves allocating a block of IP addresses to each network segment Each network subnet is then assigned a network address and a subnet mask See Ch...

Page 157: ...etwork 7 Develop a redundancy scheme Planning redundant links and routes to network critical resources can save valuable time in case of a link or device failure The DES 3326SR Spanning Tree function can be used to block the redundant link until it is needed VLAN Layout VLANs on the DES 3326SR have rather more functions than on a traditional layer 2 switch and must therefore be laid out and config...

Page 158: ...f anticipated end nodes for each IP interface must be accommodated with an unique IP address It should be noted that the switch regards a VLAN with an IP network address and corresponding subnet mask assigned as an IP interface Defining Static Routes Routes between the IP interfaces and a default gateway or other router with a WAN connection should be determined beforehand and entered into the sta...

Page 159: ...omputer and point it to the IP address you have defined for the device The URL in the address bar should read something like http 123 123 123 123 where the numbers 123 represent the IP address of the switch Note The Factory default IP address for the switch is 10 90 90 90 In the page that opens click on the Login to make a setup button Figure 6 1 Login Button This opens the management module s mai...

Page 160: ...h User s Guide 148 Configuring the Switch User Accounts Management From the Main Menu highlight Setup User Accounts and press Enter then the User Account Management menu appears Figure 6 2 User Accounts Control Table Click New to add a user ...

Page 161: ...s is shown on the user accounts control table This list is updated when Apply is executed 4 Please remember that Apply makes changes to the switch configuration for the current session only All changes including User additions or updates must be entered into non volatile ram using the Save Changes command on the Main Menu if you want these changes to be permanent Admin and User Privileges There ar...

Page 162: ...er Accounts Yes No View User Accounts Yes No Table 6 1 Root User and User Privileges After establishing a User Account with Admin level privileges highlight Save Changes and press Enter see below The switch will save any changes to its non volatile ram and reboot You can logon again and are now ready to continue configuring the Switch Saving Changes The DES 3326SR has two levels of memory normal R...

Page 163: ...y to save all setting changes to NV RAM before rebooting the switch To retain any configuration changes permanently highlight Save Changes from the Main Menu The following screen will appear Figure 6 4 Save Changes Screen Click the Save Configuration button to save the current switch configuration in NV RAM The following dialog box will confirm that the configuration has been saved Figure 6 5 Save...

Page 164: ...iguration that was supplied by the factory A factory reset returns all configuration options to their default values and restores the switch s configuration to the factory settings All user entered configuration information will be lost Figure 6 6 Factory Reset Screen Click Yes if you want the switch to retain its current IP address Click No to reset the switch s IP address to the factory default ...

Page 165: ...nicate with the switch or allow full management capability These include Default Gateway Trap Destination and Community Name Configuration of these items may be made from the User Interface which is accessible via either the serial console or Telnet Refer to the User Guide that came with your system for more information subsection describe the required configuration Setting an IP Address The IP ad...

Page 166: ...rface named System and the z represents the corresponding number of subnets in CIDR notation Using this method the switch can be assigned an IP address and subnet mask which can then be used to connect a management station to the switch s web based management agent Saving Configuration Changes Clicking the Apply button makes any configuration change active but only for the current session If the s...

Page 167: ...ager 1 Start a Java enabled Web browser from any machine with network access to the switch Preferred browsers include Internet Explorer 4 0 or above or Netscape Navigator 4 0 or above 2 Enter the IP address for the switch you want to manage in the URL field of the browser 3 The screen below will appear prompting you to enter the user name and password for management access ...

Page 168: ...pplication will now launch A three frame page will display with a switch graphic located in the upper right hand frame 3 To stop the web based manager simply close the Web browser application Web based Manager s User Interface The user interface provides access to various switch configuration and management screens allows you to view performance statistics and permits you to graphically monitor th...

Page 169: ...nager Screen Area Function 1 Presents a graphical near real time image of the front panel of the switch This area displays the switch s ports and expansion modules showing port activity duplex mode or flow control depending on the specified mode Various areas of the graphic can be selected for performing management functions including the ports expansion modules management module or the case Area ...

Page 170: ...n arranged by topic describes how to perform common monitoring and configuration tasks on the DES 3326SR switch using the Web based Manager you can perform any of the tasks described in the following sections Setting Up The Switch Basic Setup This section will help prepare the Switch user by describing the Switch Information Basic Settings IP Address Configure Port and Switch Settings windows ...

Page 171: ...DES 3326SR Layer 3 Fast Ethernet Switch User s Guide 159 Switch Information Click the Switch Information link in the Configuration menu Figure 6 10 Switch Information Basic Settings ...

Page 172: ... responsible for the maintenance of the network system that this Layer 3 switch is installed on be listed here IP Address Configuring the Switch s IP Address The Switch needs to have an IP address assigned to it so that an In Band network management system for example the Web Manager or Telnet client can find it on the network The Basic Switch Setup window allows you to change the settings for the...

Page 173: ...DES 3326SR Layer 3 Fast Ethernet Switch User s Guide 161 Figure 6 11 Basic Switch Setup ...

Page 174: ...LANs have been previously configured on the switch you can use the default VLAN named default The default VLAN contains all of the switch ports as members If VLANs have been previously configured on the switch you will need to enter the VLAN name of the VLAN that contains the port that the management station will access the switch on To use the BOOTP or DHCP protocols to assign the switch an IP ad...

Page 175: ...nformation before using the default or previously entered settings Manual Allows the entry of an IP address Subnet Mask and a Default Gateway for the switch These fields should be of the form xxx xxx xxx xxx where each xxx is a number represented in decimal form between 0 and 255 This address should be a unique address on the network assigned for use by the network administrator The fields which r...

Page 176: ...network you can leave this field unchanged VLAN Name This allows the entry of a VLAN name from which a management station a computer will be allowed to manage the switch using TCP IP in band or over the network Management stations that are on VLANs other than the one entered in the VLAN Name field will not be able to manage the switch in band unless their IP addresses are entered in the Management...

Page 177: ...t numbers with the Unit 1 switch corresponding to the icon in the upper left most corner of the icon group Figure 6 12 Switch Stack Display In this case there are two switches in the switch stack The Unit 1 master switch is on top and highlighted in blue The Unit 2 slave switch is below and not highlighted To select a switch in the switch stack to configure simply click on the corresponding switch...

Page 178: ...Figure 6 14 Stacking Information The Unit ID field displays the switch s order in the stack The switch with a Unit ID of 1 is the Master Switch The MAC Address field displays the unique address of the switch assigned by the factory The Start Port field displays the first port assigned to the corresponding switch in the switch stack The Port Range field displays the total number of ports on the swi...

Page 179: ...ent LED displays the Unit number assigned to the switch A 0 a zero in the display indicates that the stacking module is in the process of determining the stack status and has not yet resolved the switch s Unit number The stacking order can be automatically configured using the switch s MAC address the lower the numerical value of a given switch s MAC address the lower the number in the stacking or...

Page 180: ...ll of the relevant stacking information for all of the switches in the stack Figure 6 16 Console CLI show stack Command The same switch stack information is displayed in the console as is displayed in the Web based management agent The config stack command allows you to configure the switch stack manually The syntax of the config stacking command is as follows config stacking mode auto master slav...

Page 181: ...ster Switch and will always be Unit 2 or higher If multiple switches in the stack are configured as slave switches their unit numbers are determined by the numerical value of their respective MAC addresses standalone This command effectively removes the switch connected to the management station via the switch s serial port from the switch stack The switch will be assigned a Unit number of 1 and c...

Page 182: ...0 to always have a Unit number greater than 1 as a slave Now you will have to move the management station s console connection via the serial port to the switch with MAC address 00 11 33 44 55 60 and enter the following command config stacking mode master This will configure the switch with MAC address 00 11 33 44 55 60 to always have a Unit number of 1 as the master You can then use the show stac...

Page 183: ...DES 3326SR Layer 3 Fast Ethernet Switch User s Guide 171 Configure Ports Click the Port Configurations link from the Basic Setup folder Figure 6 18 Port Configurations ...

Page 184: ... allows you to select different switches in a switch stack if you have the optional stacking module installed and the switches in the stack are properly interconnected The Port drop down dialog box allows different ports on the currently selected Unit to be selected for configuration Use the State Enabled pull down menu to either enable or disable the selected port Use the Flow Control Off pull do...

Page 185: ...lf There is no automatic adjustment of port settings with any option other than Auto Port Security and MAC Address Learning A given port s or a range of port s dynamic MAC address learning can be locked such that the current source MAC addresses entered into the MAC address forwarding table can not be changed once the port lock is enabled The port can be locked by using the Learn Disabled pull dow...

Page 186: ...ted to can handle and then to use those settings The other options are 100M Full 100M Half 10M Full and 10M Half There is no automatic adjustment of port settings with any option other than Auto Flow Control Auto Displays the flow control scheme used for the various port configurations Ports configured for full duplex use 802 3x flow control half duplex ports use backpressure flow control and Auto...

Page 187: ...witch User s Guide 175 Port Security Settings Click the selection button on the far left that corresponds to the port you want to configure and click the Edit button Figure 6 20 Configure Port Security Figure 6 21 Port Security Settings ...

Page 188: ...r the port The port can be restricted to 10 or less MAC addresses that are allowed for dynamically learned MAC addresses in the forwarding table Lock Address Mode Delete On Reset Select Delete On Timeout to clear dynamic entries for the ports on timeout of the Forwarding Data Base FDB Specify Delete On Reset to delete all FDB entries including static entries upon system reset or rebooting Configur...

Page 189: ...le is used to limit traffic flow from a single port to other ports on the switch It cannot be used to segment traffic between switch units in a stack For this it would be appropriate to use VLANs or a filtering method This provides an additional tool to direct traffic flow without relying on the Master CPU ...

Page 190: ... the port you want to configure and click the Edit button This will open the following dialog box Figure 6 23 Traffic Segmentation Edit To configure Traffic Segmentation for a port select the ports from the Port List that are allowed to receive forwarded frames from the port that is being configured Click the Apply button to add the ports to the forward list ...

Page 191: ...9 Serial Port Settings The Serial Port Settings window allows the configuration of the switch s serial port and out of band TCP IP communications using SLIP Click on the Serial Port Settings link from the Basic Setup folder Figure 6 24 Serial Port Settings ...

Page 192: ...nd Data Bits Displays the number of bits that make up a word when communicating with the management station The console interface uses 8 data bits Stop Bits Displays the number of bits used to indicate that a word has been completely transmitted The console interface uses 1 stop bit Auto Logout This sets the time the interface can be idle before the switch automatically logs out the user The optio...

Page 193: ...NMP Settings The DES 3326SRSR supports the Simple Network Management Protocol SNMP versions 1 2c and 3 The SNMP version used to monitor and control the switch can be specified by the administrator The three versions of SNMP vary in the level of security provided between the management station and the network device SNMP settings are configured using the menus located on the SNMP V3 folder of the w...

Page 194: ...strings that define which MIB objects can be accessed by an SNMP manager To delete an existing View Table entry click the selection button on the far left that corresponds to the port you want to configure and click the Delete button To create a new entry click the New button a separate menu will appear Figure 6 24 SNMP View Table ...

Page 195: ...y the new SNMP view being created Subtree Type the Object Identifier OID Subtree for the view The OID identifies an object tree MIB tree that will be included or excluded from access by an SNMP manager View Type Select Included to include this object in the list of objects that an SNMP manager can access Select Excluded to exclude this object from the list of objects that an SNMP manager can acces...

Page 196: ...rs identified in the SNMP User Table to the views created in the previous menu Figure 6 26 SNMP Group Table To delete an existing entry click the selection button on the far left that corresponds to the port you want to configure and click the Delete button To create a new entry click the New button a separate menu will appear ...

Page 197: ...e for users that are allowed SNMP write privileges to the switch s SNMP agent Notify View Name Specify a SNMP group name for users that can receive SNMP trap messages generated by the switch s SNMP agent Security Model Use the pull down menu to select the SNMP version Select one of the following SNMPv1 Specifies that SNMP version 1 will be used Type an alphanumeric string of up to 32 characters Th...

Page 198: ...o devices through a combination of authentication and encrypting packets over the network Security Level Use the pull down menu to select the SNMP version NoAuthNoPriv Specifies that there will be no authorization and no encryption of packets sent between the switch and a remote SNMP manager AuthNoPriv Specifies that authorization will be required but there will be no encryption of packets sent be...

Page 199: ...be associated with the community string An Access List of IP addresses of SNMP managers that are permitted to use the community string to gain access to the switch s SNMP agent An MIB view that defines the subset of all MIB objects that will be accessible to the SNMP community Read write or read only level permission for the MIB objects accessible to the SNMP community Figure 6 28 SNMP Community T...

Page 200: ...New Configure the following for the new SNMP Community entry Parameter Description Community Name Type an alphanumeric string of up to 33 characters that is used to identify members of an SNMP community This string is used like a password to give remote SNMP managers access to MIB objects in the switch s SNMP agent View Name Type an alphanumeric string of up to 32 characters that is used to identi...

Page 201: ...using the community string created with this command can only read the contents of the MIBs on the switch read_write Specifies that SNMP community members using the community string created with this command can read from and write to the contents of the MIBs on the switch To setup the switch for remote management Click the Management Station IP link in the Management menu The following screen app...

Page 202: ... If the three IP Address fields contain all zeros 0 then any station with any IP address can access the switch to manage and configure it If there is one or more IP addresses entered in the IP Address fields then only stations with the IP addresses entered will be allowed to access the switch to manage or configure it SNMP Engine ID The Engine ID is a unique identifier used for SNMP V3 implementat...

Page 203: ...ded and click the Apply button SNMP Host Table Use the SNMP Host Table to set up trap recipients Figure 6 32 SNMP Host Table To delete an existing entry click the selection button on the far left that corresponds to the port you want to configure and click the Delete button To create a new entry click the New button a separate menu will appear ...

Page 204: ... management station that will serve as the SNMP host for the switch SNMP Version From the pull down menu select V1 To specifies that SNMP version 1 will be used V2 To specify that SNMP version 2 will be used V3 To specify that the SNMP version 3 will be used Community String or SNMP V3 User Name Type in the community string or SNMP V3 user name as appropriate ...

Page 205: ...r to an existing SNMP group or to a newly created group Figure 6 34 SNMP User Table To delete an existing entry click the selection button on the far left that corresponds to the port you want to configure and click the Delete button To create a new entry click the New button a separate menu will appear Figure 6 35 SNMP User Table Add New ...

Page 206: ...ll identify the SNMP group the new SNMP user will be associated with SNMP Version From the pull down menu select V1 To specifies that SNMP version 1 will be used V2 To specify that SNMP version 2 will be used V3 To specify that the SNMP version 3 will be used If Encryption V3 only is checked configure also Auth Protocol In the Space provided type an alphanumeric sting of between 8 and 20 character...

Page 207: ... that the HMAC SHA 96 authentication level will be used If Encryption V3 only is checked configure also Priv Protocol In the Space provided type an alphanumeric string of between 8 and 16 characters that will be used to encrypt the contents of messages the host sends to the agent ...

Page 208: ...de is changed Configuring VLANs Note the switch allows the assignment of an IP interface to each VLAN in IP Routing mode The VLANs must be configured prior to setting up the IP interfaces To create a new 802 1Q VLAN The VLAN menu adds an entry to edit the VLAN definitions and to configure the port settings for IEEE 802 1Q VLAN support Go to the Advanced Setup folder select VLAN Configurations and ...

Page 209: ...box to the left of the VLAN you want to delete from the switch and then click the Delete button To create a new 802 1Q VLAN click the New button Figure 6 37 802 1Q Static VLANs Entry Settings Add To edit an existing 802 1Q VLAN click the corresponding click box and then click the Edit icon to open the following dialog box ...

Page 210: ...y of a VLAN ID in the Add dialog box or displays the VLAN ID of an existing VLAN in the Edit dialog box VLANs can be identified by either the VID or the VLAN name The Auto Assign click box will instruct the switch to assign VLAN IDs in ascending numerical order starting with 1 to each VLAN as it is created VLAN Name Allows the entry of a name for the new VLAN in the Add dialog box or for editing t...

Page 211: ... tag associated with the VID VLAN Identifier see below When a tagged packet exits the port the packet header is unchanged Untagged Allows an individual port to be specified as Untagged When an untagged packet is transmitted by the port the packet header remains unchanged When a tagged packet exits the port the tag is stripped and the packet is changed to an untagged packet Egress Egress Member spe...

Page 212: ...elow allows you to determine whether the switch will share its VLAN configuration information with other GARP VLAN Registration Protocol GVRP enabled switches In addition Ingress Checking can be used to limit traffic by filtering incoming packets whose PVID does not match the PVID of the port Figure 6 39 Port VLAN ID PVID ...

Page 213: ...ceived on port 2 will be assigned to VLAN 3 This number is generally the same as the VID number assigned to the port in the Edit 802 1Q VLANs menu above GVRP Disabled The Group VLAN Registration Protocol GVRP enables the port to dynamically become a member of a VLAN Ingress Filter Disabled This field can be toggled using the space bar between Enabled and Disabled Enabled enables the port to compar...

Page 214: ...GVRP globally on the switch Go to the VLAN Configurations link and click on the Switch GVRP link Figure 6 40 Switch GVRP Parameter Description GVRP disabled Group VLAN Registration Protocol GVRP this enables and disables GVRP on the switch without changing the port GVRP settings ...

Page 215: ...DES 3326SR Layer 3 Fast Ethernet Switch User s Guide 203 ...

Page 216: ...N Name VID Switch Ports System default 1 5 6 7 8 21 22 23 24 Engineer 2 9 10 11 12 Marketing 3 13 14 15 16 Finance 4 17 18 19 20 Sales 5 1 2 3 4 Backbone 6 25 26 Table 6 3 VLAN Example Assigned Ports In this case 6 IP interfaces are required so a CIDR notation of 10 32 0 0 11 or a 11 bit addressing scheme will work This addressing scheme will give a subnet mask of 11111111 11100000 00000000 000000...

Page 217: ...32 0 0 10 32 0 1 Engineer 2 10 64 0 0 10 64 0 1 Marketing 3 10 96 0 0 10 96 0 1 Finance 4 10 128 0 0 10 128 0 1 Sales 5 10 160 0 0 10 160 0 1 Backbone 6 10 192 0 0 10 192 0 1 Table 6 4 VLAN Example Assigned IP Interfaces The 6 IP interfaces each with an IP address listed in the table above and a subnet mask of 255 224 0 0 can be entered into the Setup IP Interface window To setup IP Interfaces on ...

Page 218: ...er 3 Fast Ethernet Switch User s Guide 206 Figure 6 41 Setup IP Interface To setup a new IP interface click the New button Figure 6 42 Setup IP Interface Add To edit an existing IP interface click on the Edit button ...

Page 219: ...f you are editing an IP Interface the Interface Name will already be in the top field as seen in the window above Enter the interface s IP address and subnet mask in the corresponding fields Pull the Active pull down menu to Yes and click Apply to enter to make the IP interface effective Use the Save Changes dialog box from the Basic Setup folder to enter the changes into NV RAM ...

Page 220: ...mask to be applied to this IP interface VLAN Name This field allows the entry of the VLAN Name for the VLAN the IP interface belongs to Active Yes This field is toggled between Yes and No using the space bar This entry determines whether the interface will be active or not Switch This drop down menu allows the selection of an individual switch from a switch stack if you have the optional stacking ...

Page 221: ...ngs folder Then click on the RIP State link to open the following dialog box Figure 6 44 RIP Status This window allows RIP to be globally enabled and disabled on the switch without changing the RIP configuration To configure RIP on the switch highlight Setup RIP from the RIP Settings folder under the Layer 3 IP Networking folder This will open the following dialog box ...

Page 222: ...ayer 3 Fast Ethernet Switch User s Guide 210 Figure 6 45 RIP Interface Settings To edit a RIP configuration click the corresponding Interface Name click box and then click the Edit button Figure 6 46 Setup RIP Edit ...

Page 223: ...isabled prevents the transmission of RIP packets RX Mode Disabled Toggle among Disabled V1 Only V2 Only and V1 and V2 This entry specifies which version of the RIP protocol will be used to interpret received RIP packets Disabled prevents the reception of RIP packets Password A password to be used to authenticate communication between routers on the network Authentication Toggle between Disabled an...

Page 224: ...icate every packet exchanged between OSPF routers It is used as a security mechanism to limit the exchange of network topology information to the OSPF routing domain MD5 Keys created here can be used in the OSPF Interface Configuration menu below To configure an MD5 Key click the MD5 Key Table Configuration link to open the following dialog box Figure 6 47 MD5 Key Table To add an MD5 key to the ta...

Page 225: ...Fast Ethernet Switch User s Guide 213 Figure 6 48 MD5 Key Table Add To edit an entry in the MD5 key table select the key from the MD5 Key Table Configuration screen and click the Edit button Figure 6 49 MD5 Key Table Edit ...

Page 226: ...an be set Parameter Description Key ID A number from 1 to 255 used to identify the MD5 Key Key A alphanumeric string of between 1 and 16 case sensitive characters used to generate the Message Digest which is in turn used to authenticate OSPF packets within the OSPF routing domain ...

Page 227: ...ows OSPF to be enabled or disabled on the switch without changing the switch s OSPF configuration In addition the switch can be designated as an Autonomous System AS Border Router or not From the Layer 3 IP Networking folder click on the OSPF folder and then click on the General link Figure 6 50 Setup OSPF ...

Page 228: ...t IP address assigned to the switch will become the OSPF Route ID Current Route ID Displays the OSPF Route ID currently in use by the switch This Route ID is displayed as a convenience to the user when changing the switch s OSPF Route ID State Allows OSPF to be enabled or disabled globally on the switch without changing the OSPF configuration OSPF Area Setting This menu allows the configuration of...

Page 229: ... Networking folder click on the OSPF folder and then click on the OSPF Area Setting link Figure 6 51 OSPF Area Setting The first OSPF Area Setting screen displays a summary of all of the OSPF areas defined on the switch OSPF areas can be added edited or deleted from this screen To add an OSPF area to the switch click on the New button Figure 6 52 OSPF Area Setting Add ...

Page 230: ...escription Area ID A 32 bit number in the form of an IP address xxx xxx xxx xxx that uniquely identifies the OSPF area in the OSPF domain Type This field can be toggled between Normal and Stub using the space bar When it is toggled to Stub additional fields appear Stub Import Summary LSA and Default Cost Stub Import Summary LSA Displays whether or not the selected Area will allow Summary Link Stat...

Page 231: ...ation This menu is used to configure the OSPF interface settings To configure an OSPF Interface click on the OSPF Interface Configuration link Figure 6 54 OSPF Interface Configuration All of the IP Interfaces currently configured on the switch will be displayed Select the IP interface you want to configure OSPF for and then click the Edit button This will open the following dialog box ...

Page 232: ...figured on the switch Area ID Allows the entry of an OSPF Area ID configured above Router Priority Allows the entry of a number between 0 and 255 representing the OSPF priority of the selected area If a Router Priority of 0 is selected the switch cannot be elected as the Designated Router for the network Hello Interval Allows the specification of the interval between the transmission of OSPF Hello...

Page 233: ...sible by the Hello Interval State Allows the OSPF interface to be disabled for the selected area without changing the configuration for that area Auth Type This field can be toggled between None Simple and MD5 using the space bar This allows a choice of authorization schemes for OSPF packets that may be exchanged over the OSPF routing domain None specifies no authorization Simple uses a simple pas...

Page 234: ...d allows the entry of a number between 1 and 65 535 that is representative of the OSPF cost of reaching the selected OSPF interface The default metric is 1 OSPF Interface Configuration Monitor The Monitor button opens a display of the status of a selected OSPF interface on the switch To view the current configuration of any OSPF Interface on the switch click the corresponding Interface s click box...

Page 235: ...es are used by OSPF to link areas that do not have a physical connection to the backbone also called Area 0 or to link areas of the backbone itself that are discontinuous This allows routing information to flow from an area that is physically disconnected from area 0 into area 0 by configuring an interface across one of the areas previously defined above ...

Page 236: ...an OSPF Virtual Interface on the switch click the Virtual Interface Configuration link under the OSPF folder Figure 6 57 Virtual Interface Configuration To add an OSPF Virtual Interface on the switch click the New button Figure 6 58 Virtual Interface Configuration Add ...

Page 237: ... is a 32 bit number in the form of an IP address xxx xxx xxx xxx that uniquely identifies the remote area s Area Border Router Status Displays the current status UP or DOWN of the corresponding OSPF Virtual Interface Area Aggregation Configuration Area Aggregation allows all of the routing information that may be contained within an area to be aggregated into a summary LSDB advertisement of just t...

Page 238: ...re OSPF Area Aggregation on the switch click the Area Aggregation Configuration link under the OSPF folder Figure 6 59 OSPF Aggregation Configuration To add an OSPF Area Aggregation entry on the switch click the New button Figure 6 60 OSPF Aggregation Configuration Add ...

Page 239: ...bit number in the form of an IP address that uniquely identifies the network that corresponds to the OSPF Area above Advertisement This field can be toggled between Yes and No It determines whether or not the selected OSPF Area will advertise it s summary LSDB Network Number and Network Mask or not OSPF Host Route Settings This menu is used to configure OSPF host route settings on the switch To co...

Page 240: ... and 65 535 that will be advertised for the route Area ID A 32 bit number in the form of an IP address xxx xxx xxx xxx that uniquely identifies the OSPF area in the OSPF domain Route Redistribution Settings Route redistribution allows routers on the network that are running different routing protocols to exchange routing information This is accomplished by comparing the routes stored in the variou...

Page 241: ...routers on the network that are running OSPF or RIP Routing information entered into the Static Routing Table on the local DES 3326SRs switch is also redistributed To configure Route Redistribution on the switch click on the Route Redistribution link under the Layer 3 IP Network folder Figure 6 63 Route Redistribution Settings To add a Route Redistribution setting on the switch click the New butto...

Page 242: ...tion of the protocol of the source device Available choices are RIP OSPF or Static Destination Protocol Allows the selection of the protocol of the destination device Available choices are RIP and OSPF Metric Type Allows the selection of one of two methods for calculating the metric value Type 1 calculates the metric for RIP to OSPF by adding the destination s interface cost to the metric entered ...

Page 243: ...enabled or disabled on the switch without changing the individual protocol s configuration To enable or disable IGMP Snooping DVMRP and PIM DM globally on the switch From the Layer 3 IP Networking folder click on the IP Multicast Routing Protocols link and then click on the Multicast Global Configurations link to open the following dialog box Figure 6 66 Multicast Global Configurations IGMP Snoopi...

Page 244: ...To configure IGMP Snooping From the Layer 3 IP Networking folder select the IP Multicast Routing Protocols folder and click IGMP Snooping Configurations to open the following dialog box Figure 6 67 IGMP Snooping Configuration To edit an IGMP Snooping entry on the switch select the entry on the IGMP Snooping Configurations screen and then click the edit button ...

Page 245: ...lowing fields can be set Parameter Description VLAN Name Allows the entry of the name of the VLAN for which IGMP Snooping is to be configured Query Interval Allows the entry of a value between 1 and 65500 seconds with a default of 125 seconds This specifies the length of time between sending IGMP queries ...

Page 246: ...time between group specific query messages including those sent in response to leave group messages The default is 1 second Querier State This field can be switched using the pull down menu between Disabled and Enabled Host Timeout Specifies the maximum amount of time a host can be a member of a multicast group without the switch receiving a host membership report The default is 260 seconds Host L...

Page 247: ...fied VLAN IGMP Interface Configuration To configure an IGMP Interface on the switch click on the IGMP Interface Configuration link under the IP Multicast Routing Protocols folder Figure 6 69 IGMP Interface Setup The Internet Group Multicasting Protocol IGMP can be configured on the switch on a per IP interface basis Each IP interface configured on the switch is displayed in the above IGMP Interfac...

Page 248: ...ies can be varied by entering a value between 1 and 65 500 seconds in the Query Interval field The maximum length of time between the receipt of a query and the sending of an IGMP response report can be varied by entering a value in the Max Response Time field The Robustness Variable field allows IGMP to be tuned for sub networks that are expected to lose a lot of packets A high value max 255 for ...

Page 249: ...es on the interface Query Interval 125 Allows the entry of a value between 1 and 65535 seconds with a default of 125 seconds This specifies the length of time between sending IGMP queries Max Response Time 10 Sets the maximum amount of time allowed before sending an IGMP response report A value between 1 and 25 seconds can be entered with a default of 10 seconds Robustness Variable 2 A tuning vari...

Page 250: ...packets DVMRP Interface Configuration To configure DVMRP for an IP interface Click the DVMRP Interface Configurations link from the IP Multicast Routing Protocols folder Figure 6 71 DVMRP Interface Configuration Figure 6 72 DVMRP Interface Configuration Edit ...

Page 251: ...e source of a multicast message but defines a route cost to calculate which branches of a multicast delivery tree should be pruned once the delivery tree is established When a sender initiates a multicast DVMRP initially assumes that all users on the network will want to receive the multicast message When an adjacent router receives the message it checks its unicast routing table to determine the ...

Page 252: ...llows an entry between 0 and 65 535 seconds and defines the interval between probes The default is 10 Neighbor Timeout Interval 35 This field allows an entry between 1 and 65 535 seconds and defines the time period for DVMRP will hold Neighbor Router reports before issuing poison route messages The default is 35 seconds Metric 1 This field allows an entry between 1 and 31 and defines the route cos...

Page 253: ...branches from the multicast delivery tree that do not contain multicast group members PIM DM has no explicit join messages It relies upon periodic flooding of multicast messages to all interfaces and then either waiting for a timer to expire the Join Prune Interval or for the downstream routers to transmit explicit prune messages indicating that there are no multicast members on their respective b...

Page 254: ...e 6 73 PIM DM Interface Configuration The Protocol Independent Multicast Dense Mode PIM DM protocol can be individually configured for each IP interface on the switch The PIM DM Interface Configurations dialog box will display all of the IP interfaces currently configured on the switch To configure PIM DM for a given IP Interface click the corresponding click box and then click the Edit button ...

Page 255: ...configured This must be a previously defined IP interface IP Address Displays the IP address for the IP interface named above Hello Interval 30 This field allows an entry of between 0 and 18724 seconds and determines the interval between sending Hello packets to other routers on the network The default is 30 seconds Join Prune Interval 60 This field allows an entry of between 0 and 18724 seconds T...

Page 256: ...rt is a port that has a multicast router attached to it Generally this router would have a connection to a WAN or to the Internet Establishing a router port will allow multicast packets coming from the router to be propagated through the network as well as allowing multicast messages IGMP coming from the network to be propagated to the router A router port has the following behavior All IGMP Repor...

Page 257: ...packets are detected flowing into a port To setup a static router port Click the Static Router Port Settings link under the IP Multicast Routing Protocols folder Figure 6 75 Static Router Port Settings Ports that have been configured as a Static Router Port will be displayed under the Router Port heading and signified by a capital M as shown above port 8 M is for Multicast enabled router To add a ...

Page 258: ...s can be set Parameter Description VLAN Name Displays the name of the VLAN the static router port belongs to Port Each port can be set individually as a router port by clicking the port s click box entry Port Mirroring To configure a port for port mirroring Click the Mirroring link and then the Target Port Selection link ...

Page 259: ...he source port Up to 25 entries can be made to the port mirroring table but it should be noted that a faster port a 1000 Mbps Gigabit Ethernet port for example should not be mirrored to a slower port one of the 24 100 Mbps Fast Ethernet port because many packets will be dropped The following fields can be set Parameter Description Source Port Allows the entry of the port number of the port to be m...

Page 260: ...SR Layer 3 Fast Ethernet Switch User s Guide 248 Direction Ingress This field can be toggled between Either Ingress and Egress Ingress mirrors only received packets while Egress mirrors only transmitted packets ...

Page 261: ...emain in the forwarding table without being accessed that is how long a learned MAC Address is allowed to remain idle The Aging Time can be set to any value between 10 and 1 000 000 seconds To configure the MAC Address Aging Time click on the Forwarding folder and then the MAC Forwarding folder then click on the MAC Address Aging Time link Figure 6 78 MAC Address Aging Time ...

Page 262: ...e These addresses will never age out To enter a MAC address into the switch s forwarding table click on the Forwarding folder and then the MAC Forwarding folder and then click the Unicast MAC Address Setting Figure 6 79 Unicast MAC Address Settings To add a new MAC address to the MAC Address Forwarding Table click the New button Figure 6 80 Unicast MAC Address Settings Add ...

Page 263: ...ws the entry of the MAC address of an end station that will be entered into the switch s static forwarding table when adding a new entry Displays the currently selected MAC address when editing VLAN Name Allows the entry of the VLAN Name of the VLAN the MAC address below is a member of when editing Displays the VLAN the currently selected MAC address is a member of when editing an existing entry U...

Page 264: ... Forwarding Multicast MAC addresses can be statically entered into the switch s MAC Address Forwarding Table These addresses will never age out To enter a Multicast MAC address into the switch s forwarding table click on the Forwarding folder and then the MAC Forwarding folder and then click on the Multicast MAC Address Settings link Figure 6 82 Multicast MAC Address Settings To add a new multicas...

Page 265: ...entry s corresponding click box and then click the edit button Figure 6 84 Multicast MAC Address Settings Edit The following fields can be set Parameter Description MAC Address Allows the entry of the MAC address of an end station that will be entered into the switch s static forwarding table VLAN Name Allows the entry of the VLAN name of the VLAN the MAC address below is ...

Page 266: ...riginating from the MAC address specified above Forbidden Forbidden Non Member specifies the port as not being a member of the VLAN and that the port is forbidden from becoming a member of the VLAN dynamically IP Forwarding Entries into the switch s forwarding table can be made using both MAC addresses and IP addresses Static IP forwarding is accomplished by the entry of an IP address into the swi...

Page 267: ...r s Guide 255 Figure 6 85 Static Default Routes To delete an existing static default route click corresponding click box and the click the Delete button To add a new static default route click the New button Figure 6 86 Static Default Routes Add ...

Page 268: ... Mask 0 0 0 0 Allows the entry of a subnet mask corresponding to the IP address above Gateway IP 0 0 0 0 Allows the entry of an IP address of a gateway for the IP address above Metric 1 Allows the entry of a routing protocol metric representing the number of routers between the switch and the IP address above Static ARP To make a static ARP entry click the IP Forwarding folder and then the Static ...

Page 269: ...on To add a new static ARP entry click the New button Figure 6 88 Static ARP Add The following fields can be set Parameter Description IP Address The IP address of the ARP entry MAC Address The MAC address of the ARP entry Pririty A Port Priority can be from 0 to 255 The lower the number the greater the probability the port will be chosen as the Root Port ...

Page 270: ...emptied in a round robin fashion beginning with the highest priority queue and proceeding to the lowest priority queue before returning to the highest priority queue For strict priority based scheduling any packets residing in the higher priority queues are transmitted first Only when these queues are empty are packets of lower priority transmitted The weighted priority based scheduling alleviates...

Page 271: ...Classes of Service for each port on the switch Configuring QOS Output Scheduling Click the Configure QOS link on the Advanced Setup menu and the click on the QOS Output Scheduling link Figure 6 89 QOS Output Scheduling The MAX Packets field specifies the number of packets that a queue will transmit before surrendering the transmit buffer to the next lower priority queue in a round robin fashion Th...

Page 272: ... the transmit buffer There is a small amount of additional latency introduced because the priority queue that is transmitting at the time the MAX Latency time expires will finish transmitting its current packet before giving up the transmit buffer Configuring Default Priority The switch allows the assignment of a default 802 1p priority to each port on the switch Click on the Default Priority link...

Page 273: ...s window allows you to assign a default 802 1p priority to any given port on the switch The priority queues are numbered from 0 the lowest priority to 7 the highest priority Configuring 802 1p User Priority The DES 3326SRSR allows the assignment of a User Priority to each of the 802 1p priorities ...

Page 274: ...sign this Class to each of the 8 levels of 802 1p priorities QOS Configuring Priority The DES 3326SRSR allows you to configure how forwarded packet s priority value will be changed or maintained by the switch prior to transmitting the packet You can specify how a packet s priority value will be written by the switch by DSCP 802 1p TCP or UDP port number IP address or MAC address Click on the QOS C...

Page 275: ... screen is divided into two parts the criteria the switch will use to identify which packets will be subject to the actions selected in the second part The first part of the screen consists of the Type drop down menu and the Value field The first part of the screen allows you to specify packets that have DSCP or 802 1p priority values If a packet has the DSCP or 802 1p priority value entered in th...

Page 276: ...lue field The replace_dscp click box instructs the switch to replace the DSCP value in a packet that meets the selected criteria with the value entered in the adjacent field The priority click box instructs the switch to use the 802 1p priority value entered in the adjacent field for packets that meet the criteria A number between 0 lowest priority and 7 highest priority can be entered The replace...

Page 277: ...will be executed The value of the 802 1p tag is between 0 and 7 with 0 being the lowest priority TCP the switch will use the TCP port number contained in an incoming packet to assign the packet to determine if the actions specified in the click boxes will be executed The TCP port number that will receive the specified priority handling is specified in the Value field UDP the switch will use the UD...

Page 278: ... the click boxes will be executed The MAC address that will receive the specified priority handling is entered in the MAC Address field that appears below the Type field when this option is selected Value This field allows the entry of a number that is relevant to the selection made in the Type field above replace_dscp The replace_dscp click box instructs the switch to replace the DSCP value in a ...

Page 279: ...riority click box instructs the switch to replace the 802 1p value in a packet that meets the selected criteria In this way packets meeting the criteria can have their priority handling modified for use within the switch and then have a different priority value assigned when they leave the switch ...

Page 280: ...he Bandwidth Control Table click the selection button in the far left column that corresponds to the port you want to configure and click the Edit button A new dialog box used to edit bandwidth settings opens Figure 6 94 Edit Port Bandwidth To limit either the Rx or Tx rates deselect the No Limit check box and type the desired rate Rates can be expressed using whole numbers up to the maximum avail...

Page 281: ...he Command Line Interface CLI are listed along with the appropriate parameters in the following table STP Switch Settings The Spanning Tree Protocol STP operates on two levels on the switch level the settings are globally implemented On the port level the settings are implemented on a per user defined Group of ports basis Figure 6 96 STP Switch Settings ...

Page 282: ...n to become the Root Bridge If it turns out that your Switch has the lowest Bridge Identifier it will become the Root Bridge Hello Time 1 10 sec 2 The Hello Time can be set from 1 to 10 seconds This is the interval between two transmissions of BPDU packets sent by the Root Bridge to tell all other Switches that it is indeed the Root Bridge Forward Delay 4 30 sec 15 The Forward Delay can be from 4 ...

Page 283: ... transmitted per interval The count can be specified from 1 to 10 Default value 3 Forwarding BPDU Enabled This can enabled or disabled When it is enabled it allows the forwarding of STP BPDU packets from other network devices when STP is disabled on the switch The default is enabled Note the Hello Time cannot be longer than the Max Age Otherwise a configuration error will occur Observe the followi...

Page 284: ... Switch User s Guide 272 Figure 6 97 STP Port Settings To change STP settings for a port or a group of ports on the same switch select the first lowest numbered port from the list and click the Edit button a separate menu will appear ...

Page 285: ... configuration settings An STP Group will use the switch level parameters entered above with the addition of Port Priority and Port Cost An STP Group spanning tree works in the same way as the switch level spanning tree but the root bridge concept is replaced with a root port concept A root port is a port of the group that is elected on the basis of port priority and port cost to be the connection...

Page 286: ...ll be chosen to forward packets Default port cost 100Mbps port 200000 Gigabit ports 20000 Priority 128 A Port Priority can be from 0 to 240 The lower the number the greater the probability the port will be chosen as the Root Port Migration No Select Yes or No Choosing Yes will enable the port to migrate from 802 1d STP status to 802 1w RSTP status RSTP can coexist with standard STP however the ben...

Page 287: ... If a BPDU packet is received it automatically loses edge port status False indicates the port does not have edge port status P2P Yes Select True or False Choosing true indicates a point to point p2p shared link These are similar to edge ports however they are restricted in that a p2p port must operate in full duplex Like edge ports p2p ports transition to a forwarding state rapidly thus benefitin...

Page 288: ...ings Figure 6 99 MAC Notification Global Settings Configure the following MAC notification global settings Parameter Description State Enable or Disable MAC notification switch wide form the pull down menu Interval This is the time in seconds between notifications History Size This is maximum number of entries listed in the history log used for notification Up to 500 entries can be specified ...

Page 289: ...e or disable MAC notification for ports with the menu below Figure 6 100 MAC Notification Port Settings To change MAC Notification settings for a port or a group of ports on the same switch select the first lowest numbered port from the list and click the Edit button a separate menu will appear ...

Page 290: ...owing MAC notification global settings Parameter Description Port Select the port or lowest number of the group of ports being configured State Enable or Disable MAC notification for the port from the pull down menu Configure Ports from __ to __ A consecutive groups of ports may be configured starting with the selected port ...

Page 291: ...g with port 1 a group may not contain ports 8 and 9 for example and all of the ports in the group must be members of the same VLAN Further the aggregated links must all be of the same speed and should be configured as full duplex The configuration of the lowest numbered port in the group becomes the configuration for all of the ports in the aggregation group This port is called the Master Port of ...

Page 292: ... redundant link aggregation groups are configured on the switch STP will block one entire group in the same way STP will block a single port that has a redundant link Figure 6 85 Link Aggregation Algorithm Selection To configure a link aggregation group click on the Link Aggregation link from the Advanced Setup folder Figure 6 86 Link Aggregation ...

Page 293: ...ulticast MAC address to the switch s forwarding table click the New button Figure 6 87 Link Aggregation New To edit an existing entry to the switch s forwarding table click the entry s corresponding click box and then click the edit button Figure 6 88 Link Aggregation Edit ...

Page 294: ...nit Allows the selection of a particular switch in a switch stack if you have the optional stacking module installed and have properly interconnected the switches in the switch stack Port Member Allows the specification of the ports that will make up the link aggregation group State Disabled This field can be toggled between Enabled and Disabled This is used to turn a link aggregation group on or ...

Page 295: ...g criteria for each port on the switch that a user or network device must meet before allowing that port to forward or receive frames IEEE 802 1X operation must be enabled on the switch before it will function This is done using the 802 1 State menu see the end of 802 1 Configuration section 802 1X settings can be configured before it is enabled switch wide 802 1X Port Settings Existing 802 1X por...

Page 296: ...st Ethernet Switch User s Guide 284 Click the selection button on the far left that corresponds to the port you want to configure and click the Edit button a separate menu will appear Figure 6 103 802 1X Port Settings Edit ...

Page 297: ...authorized PAE State Displays the administrative control over the port s authorization status Force Authorized forces the Authenticator of the port to become Authorized Force Unauthorized forces the port to become Unauthorized Backend State Shows the current state of the Backend Authenticator AdminCtlState From the pull down menu select whether a controlled Port that is unauthorized will exert con...

Page 298: ...cation failure and the start of a new authentication attempt Tx Period Select the time to wait for a response from a supplicant user to send EAP Request Identity packets Support Timeout Select the time to wait for a response from a supplicant user for all EAP packets except for the Request Identity packets Server Timeout Select the length of time to wait for a response from a Radius server MaxReq ...

Page 299: ...dius server To add Radius server settings click the New button a separate configuration menu appears To edit an existing Radius settings index select it and click the edit button Figure 6 104 Radius Server Settings The parameters configured for adding and editing Radius settings are the same See the table below for a description Figure 6 105 Radius Server Add New ...

Page 300: ...he shared secret key used by the Radius server and the switch Up to 32 characters can be used AuthPortNumber Type the UDP port number for authentication requests The default is 1812 AcctPortNumber Type the UDP port number for accounting requests if accounting server is being used The default is 1813 802 1X State To enable 802 1x on the switch select Enabled and click the Apply button Figure 6 106 ...

Page 301: ... can send Syslog messages to up to four designated servers Use the System Log Server Figure 6 107 System Log Server list The parameters configured for adding and editing System Log Server settings are the same See the table below for a description Figure 6 108 System Log Server Add menu ...

Page 302: ...elect the level of message sent select Warning Information or All Facility UDP Port Type the UDP port number used for sending Syslog messages The default is 514 Status Choose Enabled or Disabled to activate or deactivate this System Log State To enable the System Log Server settings you have chosen select Enabled and click the Apply button in the System Log State menu Figure 6 109 System Log State...

Page 303: ...ion file can also be loaded into the switch from a TFTP server switch settings can be saved to the TFTP serv er and a history log can be uploaded from the switch to the TFTP server Update Firmware from Server To update the switch s firmware click on the Basic Setup folder and then the Switch Utilities folder and then the TFTP Services folder and finally click on the Download Firmware from TFTP Ser...

Page 304: ... above example the firmware file is in the root directory of the D drive of the TFTP server The TFTP server must be running TFTP server software to perform the file transfer TFTP server software is a part of many network management software packages such as NetSight or can be obtained as a separate program Click Download to record the IP address of the TFTP server Use the Save Settings to enter th...

Page 305: ...erver Click Apply to record the IP address of the TFTP server Use Save Changes from the Maintenance menu to enter the address into NV RAM Click Start to initiate the file transfer Save Settings To Server To download a configuration file for the switch click on the Basic Setup folder and then the Switch Utilities folder and then the TFTP Services folder and finally click on the Upload Settings to T...

Page 306: ...ngs file on the TFTP server and click Apply Highlight Start to initiate the file transfer Save History Log to Server To download a configuration file for the switch click on the Basic Setup folder and then the Switch Utilities folder and then the TFTP Services folder and finally click on the Upload history Log to TFTP Server link Figure 6 113 Save Switch History To TFTP Server ...

Page 307: ...Other Utilities Ping Test Ping is a small program that sends data packets to the IP address you specify The destination node then returns the packets to the switch This is very useful to verify connectivity between the switch and other nodes on the network Figure 6 114 Ping Test Screen The Infinite times checkbox in the Number of Repetitions field tells ping to keep sending data packets to the spe...

Page 308: ...evel The BOOTP DHCP Relay link allows for switch level configuration and the BOOTP DHCP Relay Interface Configurations link allows for configuration on a per IP interface basis To enable and configure BOOTP or DHCP on the switch click on the Others folder from the Switch Utilities folder and then click on the BOOTP DHCP Relay link Figure 6 115 BOOTP DHCP Relay ...

Page 309: ... maximum number of router hops BOOTP messages can be forwarded across The default hop count is 4 BOOTP DHCP Relay Time Threshold 0 Allows an entry between 0 and 65535 seconds and defines the maximum time limit for routing a BOOTP DHCP packet If a value of 0 is entered the switch will not process the value in the seconds field of the BOOTP or DHCP packet If a non zero value is entered the switch wi...

Page 310: ...ry click the New button Figure 6 117 BOOT DHCP Relay Interface Configuration Add The following fields can be set Parameter Description Interface Name The interface name of the IP interface on which the BOOTP or DHCP servers reside on BOOTP DHCP Server 0 0 0 0 Allows the entry of IP addresses for up to four BOOTP or DHCP servers ...

Page 311: ...meter Description DNS Relay State Disabled This field can be toggled between Disabled and Enabled using the pull down menu and is used to enable or disable the DNS Relay service on the switch Name Server 1 0 0 0 0 Allows the entry of the IP address of a primary domain name server DNS Name Server 2 0 0 0 0 Allows the entry of the IP address of a secondary domain name server DNS ...

Page 312: ...a DNS cache will be enabled on the switch DNS Relay Static Table Lookup Status Disabled This field can be toggled using the pull down menu between Disabled and Enabled This determines if the static DNS table will be used or not To make a static DNS table entry click on the DNS Relay Static Table Configurations link Figure 6 119 DNS Relay Static Table Configuration ...

Page 313: ...w entry to the table click on the New button Figure 6 120 DNS Relay Static Table Configuration Add The following fields can be set Parameter Description Domain Name The domain name of the static DNS table entry IP Address 0 0 0 0 The IP address of the domain name above ...

Page 314: ...k monitoring functions are visible on the console when the switch is in Layer 2 Only operating mode Layer 3 network monitoring functions are added to the console when the switch is in IP Routing operating mode Port Utilization The Port Utilization window shows the percentage of the total available bandwidth being used on the port Port utilization statistics may be viewed using a line graph or tabl...

Page 315: ...DES 3326SR Layer 3 Fast Ethernet Switch User s Guide 303 Figure 6 121 Port Utilization chart Figure 6 122 Port Utilization table ...

Page 316: ...owing field can be set Parameter Description Update Interval Suspend The time between updates received from the switch in seconds Suspend stops the updates The default is Suspend Port Error Statistics The Port Error Packet Statistics window displays the packet errors that the switch can detect and displays the results on a per port basis To view the error statistics for a port click on the Port Er...

Page 317: ...Interval field sets the interval at which the error statistics are updated The following fields from above are described in more detail Parameter Description Unit Allows the selection of a particular switch in a switch stack if you have installed the optional stacking module and have properly interconnected the switches Port Allows the selection of a particular port on the switch ...

Page 318: ...ding framing bits but including FCS octets and were otherwise well formed Oversize The total number of frames received that were longer than 1518 octets excluding framing bits but including FCS octets and were otherwise well formed Fragment The total number of frames received that were less that 64 octets in length excluding framing bits but including FCS octets and had either an FCS or an alignme...

Page 319: ...ds the sum of CRC errors and code errors frames received with rxerror signal Late Collision Late Collisions The number of times that a collision is detected later than 512 bit times into the transmission of a packet Excessive Collision Excessive Collisions The number of frames for which transmission failed due to excessive collisions Single Collision Single Collision Frames The number of successfu...

Page 320: ...broadcast packets received by the switch are displayed To view an analysis of packets received or transmitted by a port click on the Port Packet Analysis link Figure 6 124 Port Packet Analysis window The following fields from above are described in more detail Parameter Description Update Interval Suspend The interval in seconds that the table is updated The default is 2 seconds Frames The number ...

Page 321: ...ed by the switch in total number Frames and the rate Frames sec Broadcast RX Displays the number of broadcast packets received by the switch in total number Frames and the rate Frames sec RX Bytes Displays the number of bytes octets received by the switch in total number Total and rate Total sec RX Frames Displays the number of packets frames received by the switch in total number Total and rate T...

Page 322: ...e viewed When the switch learns an association between a MAC address and a port number it makes an entry into its forwarding table These entries are then used to forward packets through the switch To view the MAC address forwarding table from the Address Tables folder click the MAC Address Table link Figure 6 125 Browse Address Table sequential window ...

Page 323: ...DES 3326SR Layer 3 Fast Ethernet Switch User s Guide 311 IP Address Table To view the contents of the IP Routing table click on the IP Address Table link Figure 6 126 IP Address Table ...

Page 324: ...ve destination IP address Gateway Displays the default or next hop gateway to reach the destination Jump Click the Jump button to go to a particular combination of destination IP address subnet mask and gateway address Interface Name Displays the IP interface name the destination resides on Hops Displays the number of hops routers between the switch and the destination Protocol Displays the routin...

Page 325: ...7 Routing Table Parameter Description IP Address The IP address of the router Netmask The subnet mask corresponding to the IP address above Gateway The IP address of the gateway between the switch and this router Interface Name The name of the IP interface on which this router resides Hops The number of routers between the switch and this router ...

Page 326: ...DES 3326SR Layer 3 Fast Ethernet Switch User s Guide 314 Protocol The routing protocol in use by this router ARP Table To view the switch s ARP table click on the ARP Table link ...

Page 327: ...DES 3326SR Layer 3 Fast Ethernet Switch User s Guide 315 Figure 6 128 ARP Table ...

Page 328: ...he Link State Advertisements LSA for OSPF Antonymous Systems AS The External LSDB describes the LSAa for those ASs not belonging to OSPF The internal OSPF Link State Database LSDB table can be viewed using the Web based manager To view the switch s OSPF LSDB table from the Network Monitoring folder click on the OSPF folder and then click on the OSPF LSDB Table link Figure 6 129 OSPF LSDB Table ...

Page 329: ...Autonomous System link ASSummary Adv Router ID Displays the Advertising Router s ID Link State ID This field identifies the portion of the internet environment that is being described by the advertisement The contents of this field depend on the advertisement s LS type LS Type Link State ID _________________________________________ 5 The destination network s IP address Cost Displays the routing m...

Page 330: ...IP Address The IP address of the neighboring router Neighbor Options This field indicates whether the neighbor router can accept OSPF optional operation within its OSPF domain For example TOS routing Neighbor Priority The priority value of the neighboring router Neighbor State Indicates the relationship between the switch and the neighbor router State Changes The number of times the neighbor route...

Page 331: ...k resides on Virtual Neighbor ID The router ID of the neighboring router via the virtual link IP Address The IP address of the neighboring router Virtual Neighbor Options This field indicates whether the neighbor router can accept OSPF optional operation within its OSPF domain For example TOS routing Virtual Neighbor State Indicates the relationship between the switch and the neighbor router State...

Page 332: ... search the table for Click Find and the DVMRP Routing table will be searched for the IP address and subnet mask above The following fields are displayed Parameter Description Source Address The IP address of the DVMRP router Source Mask The subnet mask corresponding to the IP address above Next Hop Router The IP address of the next hop router Hop The number of hops routers that are between the sw...

Page 333: ...le To view the DVMRP neighbor address table click on the DVMRP Neighbor Address Table link Figure 6 133 DVMRP Neighbor Table The following fields are displayed Parameter Description Interface The name of the IP interface the router resides on Neighbor Address IP address of the DVMRP neighbor Generation ID Indicates if the neighbor supports generation ID Expire Time Time in seconds until the DVMRP ...

Page 334: ...th the corresponding next hop Source Mask value identifies the source for which this entry specifies a next hop on an outgoing interface Source Mask The network mask which when combined with the corresponding next hop Source value identifies the source for which this entry specifies a next hop on an outgoing interface Interface Name The name of the IP interface the router resides on Type Type is 0...

Page 335: ...Status This allows the GVRP status for each of the switch s ports to be viewed by VLAN The GVRP status screen displays the ports on the switch that are currently Egress or Untagged ports To view the GVRP status table click on the GVRP Status link Figure 6 135 GVRP Status ...

Page 336: ...he console or Web based management interfaces is displayed as a static router port designated by S A router port that is dynamically configured by the switch is designated by D To view the Router Port table click on the Router Ports link Figure 6 136 Browse Router Port S signifies a static router port configured by the user D signifies a dynamically assigned router port configured by the switch ...

Page 337: ...t Group IP address and the corresponding MAC address from IGMP packets that pass through the switch You may specify a VLAN by name to view To view the IGMP Snooping table click on the IGMP Snooping Status link Figure 6 137 IGMP Snooping Group Table Specify the VLAN The following fields can be set or are displayed Parameter Description Multicast Group The IP address of the multicast group ...

Page 338: ...ng Forwarding table to be viewed IGMP Snooping allows the switch to read the Multicast Group IP address and the corresponding Source IP address from IGMP packets that pass through the switch You may specify a VLAN by name to view To view the switch s IGMP Snooping Forwarding table click on the IGMP Snooping Forwarding Table link Figure 6 138 IGMP Forwarding Table pecify the VLAN The following fiel...

Page 339: ...the IGMP packets were snooped are displayed IP Multicast Forwarding Table To view the switch s IP multicast forwarding table click on the IP Multicast Forwarding Table link Figure 6 139 IP Multicast Forwarding Table Parameter Description Multicast Group The IP address of the multicast group Source IP Address The IP address of the multicast source ...

Page 340: ...r on the path from the switch to the multicast source Expire Time The number of hops routers the packets are allowed to cross Protocol The routing protocol in use IGMP Group Table To view the switch s IGMP group table click on the IGMP Group Table link Figure 6 140 IGMP Group Table Parameter Description Interface Name The name of the IP interface the IGMP Group resides on ...

Page 341: ...ier IP The IP address of the IGMP querier Expire The total number of hops routers packets are allowed to cross DVMRP Routing Table To view the switch s DVMRP routing table click on the DVMRP Routing Table link Figure 6 141 DVMRP Routing Table Parameter Description Source Address The IP address of the DVMRP router Source Mask The subnet mask corresponding to the IP address above ...

Page 342: ...mic learned or not Interface Name The name of the IP interface the router resides on Expire The total number of routers that the packets can cross Switch History This allows the Switch History Log to be viewed The switch records all traps in sequence that identify events on the switch The time since the last cold start of the switch is also recorded To view the switch history log Click the Switch ...

Page 343: ...DES 3326SR Layer 3 Fast Ethernet Switch User s Guide 331 Figure 6 142 Switch History ...

Page 344: ...TX Fast Ethernet IEEE 802 3z 1000BASE SX Gigabit Ethernet IEEE 802 3ab 1000BASE T Gigabit Ethernet IEEE 802 1 P Q VLAN IEEE 802 3x Full duplex Flow Control ANSI IEEE 802 3 Nway auto negotiation Protocols CSMA CD Data Transfer Rates Ethernet Fast Ethernet Gigabit Ethernet Half duplex Full duplex 10 Mbps 20Mbps 100Mbps 200Mbps n a 2000Mbps Topology Star ...

Page 345: ...MTRJ or SC optical connector Number of Ports 24 x 10 100 Mbps NWay ports 2 Gigabit Ethernet optional Physical and Environmental AC inputs 100 240 VAC 50 60 Hz internal universal power supply Power Consumption 29 watts maximum DC fans 2 built in 40 x 40 x10 mm fans Operating Temperature 0 to 50 degrees Celsius Storage Temperature 25 to 55 degrees Celsius Humidity Operating 5 to 95 RH non condensing...

Page 346: ...S NZS3548 BSMI CNS 13438 Safety UL CSA CE Mark TUV GS CSA International Performance Transmission Method Store and forward RAM Buffer 8 MB per device Filtering Address Table 8K MAC address per device Packet Filtering Forwarding Rate Full wire speed for all connections 148 800 pps per port for 100Mbps 1 488 000 pps per port for 1000Mbps MAC Address Learning Automatic update Forwarding Table Age Time...

Page 347: ...hey are both 1 then the result is 1 otherwise the result is 0 0 1 0 0 0 1 0 1 OR The logical OR operation compares 2 bits and if either or both bits are 1 then the result is 1 otherwise the result is 0 0 1 0 0 1 1 1 1 XOR The logical XOR exclusive OR operation compares 2 bits and if exactly one of them is a 1 then the result is 1 otherwise the result is 0 ...

Page 348: ...336 0 1 0 0 1 1 1 0 NOT The logical NOT operation simply changes the value of a single bit If it is a 1 the result is 0 if it is a 0 the result is 1 This operation is carried out on a single bit 0 1 1 0 ...

Page 349: ...DES 3326SR Layer 3 Fast Ethernet Switch User s Guide 337 INDEX ...

Page 350: ...2 D Data filtering 3 Data filtering rate 3 Data forwarding 3 Data forwarding rate 3 Default Gateway 161 Diagnostic port 2 Dimensions 330 Dynamic filtering 41 E Egress port 47 End Node 23 Ethernet protocol 6 F Filtering 40 Flash memory 5 Forwarding 39 Front Panel 12 Full duplex 3 G Gigabit Ethernet 6 H half duplex 3 Humidity 330 I IEEE 802 1Q tagging 47 IEEE 802 1Q VLANs 47 Ingress port 47 52 IP Ad...

Page 351: ...The Switch 155 Setting Up Web Management 150 Setup 7 Single Coll 304 Spanning Tree Algorithm 5 Spanning Tree Protocol 41 Storage Temperature 330 Store and forward switching 3 Subnet Mask 160 Switch Stacking determining stack order 31 managing Switch stacks 30 placing in equipment rack 5 T tagging 47 TCP IP Settings 157 Third party vendors SNMP software 39 Transmission Methods 331 Trap managers 35 ...

Page 352: ...340 W web based management 140 Weight 331 ...

Page 353: ......

Page 354: ...lle Ontario L6H 5W1 Canada TEL 1 905 829 5033 FAX 1 905 829 5223 BBS 1 965 279 8732 FTP ftp dlinknet com TOLL FREE 1 800 354 6522 URL www dlink ca E MAIL techsup dlink ca Chile D Link South America Sudamérica Isidora Goyenechea 2934 Oficina 702 Las Condes Santiago Chile TEL 56 2 232 3185 FAX 56 2 232 0923 URL www dlink com cl China D Link Beijing Level 5 Tower W1 The Tower Oriental Plaza No 1 East...

Page 355: ...NFO 00800 7250 0000 toll free HELP 00800 7250 4000 toll free REPAIR 00800 7250 8000 HELP support dlink de URL www dlink de E MAIL info dlink de India D Link India Plot No 5 Kurla Bandra Complex Rd Off Cst Rd Santacruz East Mumbai 400 098 India TEL 91 022 2652 6696 6788 6623 FAX 91 022 2652 8914 8476 URL www dlink co in E MAIL service dlink co in tushars dlink co in Italy D Link Mediterraneo Srl D ...

Page 356: ...link co za E MAIL attie d link co za Spain D Link Iberia S L Sabino de Arana 56 bajos 08028 Barcelona Spain TEL 34 93 409 0770 FAX 34 93 491 0795 URL www dlink es E MAIL info dlink es Sweden D Link Sweden P O Box 15036 S 167 15 Bromma Sweden TEL 46 8 564 61900 FAX 46 8 564 61901 URL www dlink se E MAIL info dlink se Taiwan D Link Taiwan 2F No 119 Pao chung Road Hsin tien Taipei Taiwan TEL 886 2 29...

Page 357: ...ad Colindale London NW9 5AB United Kingdom TEL 44 020 8731 5555 SALES 44 020 8731 5550 FAX 44 020 8731 5511 SALES 44 020 8731 5551 BBS 44 0 181 235 5511 URL www dlink co uk E MAIL info dlink co uk U S A D Link U S A 53 Discovery Drive Irvine CA 92618 USA TEL 1 949 788 0805 FAX 1 949 753 7033 INFO 1 800 326 1688 URL www dlink com E MAIL tech dlink com support dlink com ...

Page 358: ...r product 1 Where and how will the product primarily be used Home Office Travel Company Business Home Business Personal Use 2 How many employees work at installation site 1 employee 2 9 10 49 50 99 100 499 500 999 1000 or more 3 What network protocol s does your organization use XNS IPX TCP IP DECnet Others_____________________________ 4 What network operating system s does your organization use D...

Page 359: ......

Reviews: