3Com 11.3 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung 3Com 11.3 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von 3Com 11.3, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung 3Com 11.3 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung 3Com 11.3. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung 3Com 11.3 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts 3Com 11.3
- Den Namen des Produzenten und das Produktionsjahr des Geräts 3Com 11.3
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts 3Com 11.3
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von 3Com 11.3 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von 3Com 11.3 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service 3Com finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von 3Com 11.3 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts 3Com 11.3, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von 3Com 11.3 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    ® http://www.3com.com/ New Installation for Enterprise OS Softwar e Version 11.3 Part No. 09-1550-001 Published May 1999[...]

  • Seite 2

    ii 3Com Corporation 5400 Bayfront Plaza Santa Clara, California 95052-8145 Copyright © 1999, 3Com Corporation. All rights reserved. No part of this documentation may be r epr oduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without written permission from 3Com Corporation. [...]

  • Seite 3

    iii C ONTENTS A BOUT T HIS G UIDE Introduction 5 How to Use This Guide 5 Conventions 6 Y ear 2000 Compliance 6 1 O VERVIEW NETBuilder II Systems 7 EZBuilt Preassembled NETBuilder II System 7 Component System 7 NETBuilder II Chassis DPE Module 7 Software 7 Installation Checklist 8 2 I NSTALLING S OFTWARE AND B OOTING A NETB UILDER II S YSTEM Install[...]

  • Seite 4

    iv Full-Form Syntax 22 Abbreviated Syntax 22 Symbols 23 Full and Abbr eviated Syntax Examples 24 V ariations in Command Syntax 25 Entering Service Names in Command Lines 25 Determining the Display of Ports and Virtual Ports 25 Using Aliases 26 Command History Substitution 26 Privilege Level 27 Command-Line Parameter Attributes 27 Syntax for Assigni[...]

  • Seite 5

    A BOUT T HIS G UIDE Introduction This guide describes how to get started with your new NETBuilder II ® bridge/router . It describes how to install Enterprise OS software and perform the initial system boot. It also explains how to access and use the command-line interface to establish basic settings. If you are upgrading softwar e from an earlier [...]

  • Seite 6

    6 A BOUT T HIS G UIDE Conventions T able 1 and T able 2 list conventions that are used thr oughout this guide. Y ear 2000 Compliance For information on Y ear 2000 compliance and 3Com products, visit the 3Com Y ear 2000 Web page: http://www.3com.com/products/yr2000.html T able 1 Notice Icons Icon Notice Type Alerts you to... Information note Importa[...]

  • Seite 7

    1 O VERVIEW This chapter is an overview of how to get started with your new NETBuilder II ® system. This chapter provides you with an installation checklist that describes the basic steps for starting a NETBuilder II system with a Dual Processor Engine (DPE) module. NETBuilder II Systems The NETBuilder II system consists of a 4-Slot, 8-Slot, or 8-[...]

  • Seite 8

    8 C HAPTER 1: O VERVIEW Installation Checklist This section contains a checklist for installing software and booting a NETBuilder II system with a DPE module. Install System Software and Boot — See Chapter 2. Change the Primary Boot Source — See Chapter 3. Configure Basic Settings — See Chapter 4. Configure Specific Services for Y our Netw[...]

  • Seite 9

    2 I NSTALLING S OFTWARE AND B OOTING A NETB UILDER II S YSTEM This chapter contains the following procedur es: ■ Installing and booting Enterprise OS software ■ Making a backup copy of the software flash memory car d Installing Software and Performing Initial Boot Enterprise OS software can be installed in the following ways: ■ From a flash[...]

  • Seite 10

    10 C HAPTER 2: I NSTALLING S OFTWARE AND B OOTING A NETB UILDER II S YSTEM Booting a Component NETBuilder II System T o boot a component NETBuilder II system, follow these steps: 1 Insert a flash memory card with pr einstalled software in drive A on the DPE module. 2 T ur n on the NETBuilder II bridge/router . The NETBuilder II system boots from t[...]

  • Seite 11

    Using the Backup Flash Card 11 2 Format the blank flash memory card in drive B by entering: FORMAT b: T ype Y for yes when the formatting confirmation message is displayed. 3 Create a dir ectory on the formatted flash memory card by entering: MakeDir b:primary 4 Copy the software fr om the Enterprise OS software flash memory car d in drive A t[...]

  • Seite 12

    12 C HAPTER 2: I NSTALLING S OFTWARE AND B OOTING A NETB UILDER II S YSTEM 3 Reboot the NETBuilder II bridge/router by pr essing the two outer buttons on the LCD control panel. The system boots from the Enterprise OS softwar e flash memory card in drive A. 4 Make a copy of the flash memory card in drive A by following the steps in the previous pr[...]

  • Seite 13

    3 C HANGING THE B OOT S OURCE This chapter describes how to change the primary boot source on a bridge/r outer or tunnel switch. The Enterprise OS software boot files for the main pr ocessor module are factory shipped with a:/primary/boot.29k as the default primary boot source for NETBuilder bridge/routers. If you have installed the Enterprise OS [...]

  • Seite 14

    14 C HAPTER 3: C HANGING THE B OOT S OURCE For more information about the Boot Monitor utility , see the Firmware appendix in Reference for Enterprise OS Software . 2 T o enter the Boot Monitor utility , enter r: 3 Enter a boot path using: BT <drive>:/<path>/<filename> If you do not enter the <drive> value, drive A is used. [...]

  • Seite 15

    Configuring the Primary Boot Source 15 4 At the Enterprise OS prompt, enter: SysconF 2 The Primary Boot Source menu is displayed: 5 Enter 1 to select a boot filename. Information similar to the following is displayed: Current Boot Filename: a:/primary/boot.29k Enter Boot Filename (CR = no change): 6 Enter a new boot filename (such as b:/primary/b[...]

  • Seite 16

    16 C HAPTER 3: C HANGING THE B OOT S OURCE[...]

  • Seite 17

    4 C ONFIGURING B ASIC S ETTINGS This chapter describes preliminary tasks for configuring basic bridge/r outer settings. Before you begin configuring ports and paths (described in Chapter 1 of Using Enterprise OS Software ), complete the following tasks: ■ Log on to the system. ■ Familiarize yourself with the user interface. ■ Learn how to g[...]

  • Seite 18

    18 C HAPTER 4: C ONFIGURING B ASIC S ETTINGS 3 Log on as root: root 4 Press the Return key . Pressing the Return key when prompted for the password enters a null string, which is the default local password. Later in this chapter , you will be instructed on how to change the password. The bridge/router system pr ompt is displayed: Enterprise OS # Y [...]

  • Seite 19

    Learning About the User Interfaces 19 Accessing the User Interface T o access the user interface or to modify the configuration of the bridge/router or tunnel switch, use one of the following methods: ■ Access the bridge/router commands locally thr ough the console port. ■ Establish an HTTP session with the bridge/router using the W eb Link ap[...]

  • Seite 20

    20 C HAPTER 4: C ONFIGURING B ASIC S ETTINGS 5 Log in as root. T ype: root or admin 6 Click the OK button to enter a null string as the password, which is the default local password. The default Web Link page opens in the br owser window . Web Link Interface Description The Web Link application window has thr ee frames. All of the frames can be res[...]

  • Seite 21

    Learning About the User Interfaces 21 The Main menu (Level 1) is displayed. Depending on your software package, the number of services in your Main menu may vary . 2 Select the service you want to use. For example, selecting 1 from the Main menu (Level 1) display generates a menu for the SYS Service. 3 Select the parameter you want to configure. F[...]

  • Seite 22

    22 C HAPTER 4: C ONFIGURING B ASIC S ETTINGS The value part of the command specifies how you want the parameter to be set. V alues include numerics, strings, or addr esses, depending on the parameter . For additional information, see “Syntax for Assigning V alues” on page 28 . 2 After entering the complete command, press the Return key . The b[...]

  • Seite 23

    Learning About the User Interfaces 23 Figure 2 Abbr eviated Syntax Additional syntax examples are pr ovided in “Full and Abbreviated Syntax Examples” on page 24 . Symbols Y ou may see a variety of symbols shown as part of the command syntax. These symbols usually explain how to enter the command, and you do not type them as part of the command [...]

  • Seite 24

    24 C HAPTER 4: C ONFIGURING B ASIC S ETTINGS Full and Abbreviated Syntax Examples The following examples show the full form first, followed by the abbreviated command syntax. The full-form command syntax: ADD !<port> -NRIP AdvToNeighbor <network>%<mac address> [...] can be abbreviated to: ADD !<port> -NRIP ATN <network&g[...]

  • Seite 25

    Learning About the User Interfaces 25 V ariations in Command Syntax Each command has its own syntax. When a command is used for configuring parameters, its syntax or values may change according to the parameter and service. For example, the SETDefault command sets the NetMapT ime parameter in the SYS Service and the MaxAge parameter in the STP Ser[...]

  • Seite 26

    26 C HAPTER 4: C ONFIGURING B ASIC S ETTINGS Software . For more information about the Curr entPorts parameter , see Reference for Enterprise OS Software . The syntax convention for ports, virtual ports, and group ports is: !<port> For a port, <port> is a variable ID number , for example, !1. For a virtual port or group port, <port&g[...]

  • Seite 27

    Learning About the User Interfaces 27 Privilege Level The privilege level determines which commands and parameters a user can access. The network manager must set the Network Manager password and the User password to be the same in or der to provide equal levels of security . If only the Network Manager password is set, any other user r eceives Use[...]

  • Seite 28

    28 C HAPTER 4: C ONFIGURING B ASIC S ETTINGS Syntax for Assigning V alues Most parameters must be assigned a value of a particular type. T able 4 shows the possible types. The SET , SETDefault, and SYSgen commands requir e both parameter names and parameter values. The parameter name is followed by an equal sign (=) and a value. Spaces are permitte[...]

  • Seite 29

    Learning About the User Interfaces 29 example, to include an apostrophe in string text, enter a backslash followed by an apostrophe ('). T o include a backslash () in string text, enter two backslashes (). The first backslash prevents the bridge/r outer from tr eating the second as a special character . When specifying AppleT alk zone str[...]

  • Seite 30

    30 C HAPTER 4: C ONFIGURING B ASIC S ETTINGS The syntax variation for non-ISDN interfaces applies to local area network (LAN) and data terminal equipment (DTE) interfaces. Enterprise OS software menus and help strings do not display the syntax variation for ISDN interfaces. The variation in syntax is caused partially by the differ ent path-numberin[...]

  • Seite 31

    Learning About the User Interfaces 31 Frame Relay Requires an addr ess called a Data Link Connection Identifier (DLCI). DLCIs are assigned by the appr opriate authority at subscription time. A DLCI follows an at sign (@) and can range from 1 thr ough 1022 decimal. The DLCI identifies a virtual circuit on the Frame Relay network, and is used by th[...]

  • Seite 32

    32 C HAPTER 4: C ONFIGURING B ASIC S ETTINGS Network Layer Addresses ISDN An ISDN address is a phone number provided by your telecommunications carrier . It can include a dial prefix, country code, area code, and phone number . It can consist of a maximum of 30 characters. If you create a subaddr ess, you must separate the phone number and the sub[...]

  • Seite 33

    Learning About the User Interfaces 33 T able 6 Internet Address Format Class Range of First Address Field Address Format A 0–127 nnn.hhh.hhh.hhh * * n represents a digit of the network number; h represents a digit of the host number. B 128–191 nnn.nnn.hhh.hhh * C 192–223 nnn.nnn.nnn.hhh * D 224–239 yyy.yyy.yyy † † Class D addresses are [...]

  • Seite 34

    34 C HAPTER 4: C ONFIGURING B ASIC S ETTINGS Getting Help The user interface provides help menus as memory aids. T o display the help menu, enter a question mark (?). The question mark can be used with differ ent options as described in T able 7. Storing Configuration Parameter V alues Configuration parameters are stor ed in flash memory or on t[...]

  • Seite 35

    Obtaining Network Manager Privilege Level 35 modifying it and see the new value, the new value has taken effect immediately . If a command changes only the default value, the new value takes effect only after reboot. In this guide, if the description does not specify when the new value of a parameter takes effect after being enabled or disabled, it[...]

  • Seite 36

    36 C HAPTER 4: C ONFIGURING B ASIC S ETTINGS T o change the password, follow these steps: 1 At the Enterprise OS prompt (Enterprise OS #), enter: SysPassWord When a menu is displayed, Select 1, Set Network Manager Privilege Password. 2 Enter the new Network Manager password. Retype it when pr ompted to do so. Y ou are returned to the SysPassWor d m[...]

  • Seite 37

    Assigning Internet Addresses 37 The system location can contain no more than 255 characters. The default value is “ “ (null string). 3 Specify a string that identifies the contact person managing the bridge/router or tunnel switch, using: SETDefault -SYS SysCONtact = “<string>” For example, to specify John Smith as the system contact[...]

  • Seite 38

    38 C HAPTER 4: C ONFIGURING B ASIC S ETTINGS The following example illustrates how to assign an Internet address to a bridge. Example Figure 3 shows a configuration in which you need to assign an Internet address to a bridge. Hosts A and B are two hosts belonging to the same IP network, network 10. The IP host on Network A has an Internet address [...]

  • Seite 39

    Assigning Internet Addresses 39 Figure 4 Assigning an IP Addr ess to a bridge/r outer Port For additional information on Internet addresses and subnet masks, see Using Enterprise OS Software . After assigning an Internet address or addresses to the bridge/router or tunnel switch, go to Chapter 1 in Using Enterprise OS Software. Obtaining an Interne[...]

  • Seite 40

    40 C HAPTER 4: C ONFIGURING B ASIC S ETTINGS If you do not plan to be connected to the Internet, you can assign network addresses on your own. However , if you plan on accessing the Internet in the future, you may want to apply for an Internet network address so you will not have to change network addresses when you make the connection. After obtai[...]

  • Seite 41

    NETBuilder Security 41 For example: ADD -SNMP COMmunity “public” TRiv RO AL1 4 Create a new manager with r ead/write access to the bridge/router or tunnel switch. For security reasons, limit the number of network management stations. For example: ADD -SNMP MANager “private” 129.213.224.1 255.255.0 5 Enable the SNMP service by entering: SETD[...]

  • Seite 42

    42 C HAPTER 4: C ONFIGURING B ASIC S ETTINGS[...]

  • Seite 43

    A T ECHNICAL S UPPORT 3Com provides easy access to technical support information thr ough a variety of services. This appendix describes these services. Information contained in this appendix is correct at time of publication. For the most recent information, 3Com r ecommends that you access the 3Com Corporation World Wide Web site. Online T echnic[...]

  • Seite 44

    44 A PPENDIX A: T ECHNICAL S UPPORT Y ou do not need a user name and password with Web browser software such as Netscape Navigator and Internet Explorer . 3Com Bulletin Board Service The 3Com BBS contains patches, software, and drivers for 3Com pr oducts. This service is available through analog modem or digital modem (ISDN) 24 hours a day , 7 days[...]

  • Seite 45

    Support from 3Com 45 Support from 3Com If you are unable to obtain assistance fr om the 3Com online technical r esources or from your network supplier , 3Com offers technical telephone support services. T o find out more about your support options, please the 3Com technical telephone support phone number at the location nearest you. When you conta[...]

  • Seite 46

    46 A PPENDIX A: T ECHNICAL S UPPORT Retur ning Products for Repair Before you send a pr oduct directly to 3Com for r epair , you must first obtain an authorization number . Products sent to 3Com without authorization numbers will be returned to the sender unopened, at the sender’ s expense. T o obtain an authorization number , call or fax: 23 MA[...]

  • Seite 47

    47 I NDEX Numerics 3Com bulletin board service (3Com BBS) 44 3Com URL 43 3ComFacts 44 A abbreviated command syntax 22 , 24 address formats media AppleT alk 32 Frame Relay 31 ISDN 32 MAC 30 SMDS 31 X.25 31 network layer DECnet 32 Internet 32 IP 32 IPX 33 OSI 33 VIP 33 XNS 34 addresses Internet, assigning to bridge/router 37 Internet, assigning to sw[...]

  • Seite 48

    48 paths naming restrictions 29 using instance identifiers 29 ports naming restrictions 29 syntax conventions 26 using instance identifiers 29 privilege level changing 35 changing SNMP access to files 40 obtaining Network Manager 35 to access commands and parameters 27 Q question mark(?) help command 34 R ReBoot command 15 RemoteManager paramete[...]

  • Seite 49

    3Com Corporation L IMITED W ARRANTY H ARDWARE 3Com warrants its hardware products to be free from defects in workmanship and materials, under normal use and service, for the following lengths of time from the date of purchase from 3Com or its authorized reseller: If a product does not operate as warranted above during the applicable warranty period[...]

  • Seite 50

    USE, PERFORMANCE, FAILURE, OR INTERRUPTION OF ITS PRODUCTS, EVEN IF 3COM OR ITS AUTHORIZED RESELLER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, AND LIMITS ITS LIABILITY TO REPAIR, REPLACEMENT, OR REFUND OF THE PURCHASE PRICE PAID, AT 3COM’S OPTION. THIS DISCLAIMER OF LIABILITY FOR DAMAGES WILL NOT BE AFFECTED IF ANY REMEDY PROVIDED HEREI[...]