Asante Technologies IC36240 Bedienungsanleitung
- Schauen Sie die Anleitung online durch oderladen Sie diese herunter
- 108 Seiten
- 2.58 mb
Zur Seite of
Ähnliche Gebrauchsanleitungen
-
Switch
Asante Technologies IC36240 Series
42 Seiten 0.81 mb -
Network Card
Asante Technologies AL1011
2 Seiten 0.15 mb -
Switch
Asante Technologies 1016-IQ
77 Seiten 1.06 mb -
Network Card
Asante Technologies ASANTE MacCon Family Ethernet Network Cards for the Macintosh
65 Seiten 0.69 mb -
Switch
Asante Technologies GX5-424W
34 Seiten 2.07 mb -
Switch
Asante Technologies FH208B
36 Seiten 0.77 mb -
Switch
Asante Technologies IC35160G
5 Seiten 0.66 mb -
Switch
Asante Technologies IC35516G
5 Seiten 0.68 mb
Richtige Gebrauchsanleitung
Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Asante Technologies IC36240 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Asante Technologies IC36240, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.
Was ist eine Gebrauchsanleitung?
Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Asante Technologies IC36240 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.
Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Asante Technologies IC36240. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.
Was sollte also eine ideale Gebrauchsanleitung beinhalten?
Die Gebrauchsanleitung Asante Technologies IC36240 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Asante Technologies IC36240
- Den Namen des Produzenten und das Produktionsjahr des Geräts Asante Technologies IC36240
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Asante Technologies IC36240
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen
Warum lesen wir keine Gebrauchsanleitungen?
Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Asante Technologies IC36240 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Asante Technologies IC36240 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Asante Technologies finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Asante Technologies IC36240 zu überspringen, wie es bei der Papierform passiert.
Warum sollte man Gebrauchsanleitungen lesen?
In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Asante Technologies IC36240, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.
Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Asante Technologies IC36240 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.
Inhaltsverzeichnis der Gebrauchsanleitungen
-
Seite 1
IntraCore ® IC36240 Series Layer 2+ Gigabit Ethernet Switch User ’ s Manual[...]
-
Seite 2
IntraCore IC36240 Layer 2+ Gigabit Ethernet Switch User’s Manual Asante Technologies, Inc. 2223 Oakland Road San Jose, CA 95131 USA SALES 800-662-9686 Home/Office Solutions 800-303-9121 Enterpris e Solutions 408-435-8388 TECHNICAL SUPPORT 801-566-8991: W orldwide 801-566-3787: F ax www.asante.com/support support@asante.com SWITCH DEFAULTS IP addr[...]
-
Seite 3
Table of Contents Table of Conten ts ........................................................................................................................................................... 3 Chapter 1: Introduc tion ........................................................................................................ .........................[...]
-
Seite 4
3.2 Connecting to a PC ......................................................................................................... ................................... 19 3.3 Passwords and Priv ileges Co mmands .......................................................................................... ..................... 20 3.3.1 Privilege s Comma nd[...]
-
Seite 5
4.8.5 Scrolling Down a Line or a Scr een ........................................................................................ ....................... 35 4.8.6 Redisplaying the Current Comma nd Line .................................................................................... ................ 35 4.8.7 Transposing Mi styped Char acters ...[...]
-
Seite 6
6.4 Using A ccess Li sts ......................................................................................................... .................................... 57 6.4.1 Create a St andard Acce ss List ............................................................................................ .........................60 6.4.2 Create a MA C [...]
-
Seite 7
9.4 Spanning Tr ee Protocol C onfigurat ion....................................................................................... ......................... 81 9.4.1 STP Port Configur ation ................................................................................................... ............................. 82 9.4.2 Global STP Br idge Co[...]
-
Seite 8
Chapter 1: Introduction The IntraCore IC36240 24-por t Layer 2+ Managed Giga bit Switch is a high-performance net work switch used to reduce network congestion a nd application response times. The 24-port IntraCore IC36240 multi-protoc ol switch supports Layer 2+ and Giga bit Ethernet switching. The s witch has 24 10/100/100 0BaseT ports with Auto-[...]
-
Seite 9
1.2 Package Contents The following items are included in the s witch’s package: • Swi tch • AC power cord • USB cable for management console port • RS232 null-modem cable for manageme nt console port • Rack mount brackets with screws • IntraCore IC36240 CD-ROM • Release Note Contact your dealer immediat ely if any of these items is [...]
-
Seite 10
1.3.1 LEDs The IC36240 front panel LE D display allo ws you to monitor the status of the switch. The IC36240 has one po wer LED indicator, one (optional) ext e rnal power LED and one f an LED. There are also LED indicators for each of the 24 ports. Refer to the following tabl e for LED information. LED Color Description System Green Green Flashing [...]
-
Seite 11
1.4 Management and Configuration The switch is managed usin g Command Line Interface (CLI ) in order to a ccess several different command modes. Entering a question mark (?) at each command mode’s prompt provides a list of commands. 1.4.1 Console Interface Support for local, out-of-band management is deliv ered thr ough a terminal or modem attach[...]
-
Seite 12
Chapter 2: Hardware Installation and Setup Use the following guidelines to easi ly install the switch, ens uring that it ha s the proper power supply and environment. 2.1 Installation Overview Follow these steps to install the IntraCore IC36240 s witch: 1. Open the box and che ck the contents. See Cha pter 1.2 Package Contents for a complete list o[...]
-
Seite 13
2.1.2 Recommended Installation Tools You need the following ad ditional tools and equ ipment to install the switch into an equipment rack: • Flat head screwdriver • Phillips head screwdriver • Antistatic mat or foam 2.1.3 Power Requirements The electrical outlet should be properl y grounded, locat ed near the switch and be easil y accessible.[...]
-
Seite 14
5. Place the switch in the equipment rack. 6. Secure the switch by securing its mounting br acke ts onto the equipment rack with the appropriate screws (supplied). Important: Make sure the switch is supported until all the mounting scre ws for each bracket are secured to the equipment rack. Failure to do so could caus e the switch to fall, which ma[...]
-
Seite 15
To verify the primary power status, use the Switch# show system command. Under System Informat ion, you see the power unit status. System Information ------------------ System up for: 000day(s), 01hr(s), 46min(s), 54sec(s) PROM Image Version/Date: 1.00C/Nov 11 2004 17:03:04 DRAM Size: 64.0MB Flash Size: 8.0MB Config NVRAM Size: 128KB Console Baud R[...]
-
Seite 16
Important: The switch must be located within 100 meters of its attached 10Bas eT or 100BaseTX dev ices. Use the following guidelines to determi ne the cabling requirements for the network devices: • Connecting to Network Station: Category 5 UTP (Uns hielded T wisted-Pair) stra ight-through cable (100 m maximum) with RJ-45 connectors • Connectin[...]
-
Seite 17
• 1000BaseLH GBIC: Cables wit h SC-type fiber connectors; 10µ sing le-mode fiber media up to 20 km (65,617') • 1000BaseLX Long H aul GBIC: Cables with SC-type fiber connectors; 10µ single-mode fiber media up to 100 km (328,100') • 1000BaseLZ GBIC: Cables with SC-type fiber connectors; 10µ single-mode fiber med ia up to 120 km (39[...]
-
Seite 18
Chapter 3: Initial Software Setup Configure the switch by connecting directly to it th rough a console (out-of-band managem ent), running a terminal emulation program, such as HyperT erminal or by using telnet. 3.1 Connecting to a Console To connect the switch to a console or computer , set up the system in the following manner: 1. Plug power cord [...]
-
Seite 19
e. Press the Configuration button from the Connect To window. e f. Set the data rate to 9600 Baud. g. Set data format to 8 data bits, 1 stop bit and no parit y. h. Set flow control to NONE. f g h Now that terminal is set up correctly, power on the sw itch. The boot sequ ence will display in the termin al. After connecting to the console, the follo [...]
-
Seite 20
3.3 Passwords and Privileges Commands The switch has not default pass word, which allows any one on the net work access to various privilege levels. T o prevent unauthorized changes to the switch’s configuration, you sho uld set an enable password for access to s witch management. Follow the example belo w to assign a privileged password. Switch&[...]
-
Seite 21
3.3.3 Password To specify a password on a line, use the password command in line confi guration mode. Use the no form of this command to remove the password. Switch(config)# line ? console Primary terminal line vty Virtual terminal Switch(config)# line console ? <0-0> Line number Switch(config)# line console 0 Switch(config-line)# ? end End c[...]
-
Seite 22
3.4 Login Security Two methods are available o n the IntraCore IC36240 to co nfigur e an authentication quer y process for better login security: the username command for the g lobal configuration mode an d password and login commands from the line configuration mode. 3.4.1 The username Command To establish a username-based authentication system, u[...]
-
Seite 23
5. Type ip address and the new addr ess. The following screen appears: Switch> enable Switch# configure Switch(config)# ip address 192.168.123.254/24 Switch(config)# end Switch# show ip Dhcp Client Enabled ..........: No IP Address ...................: 192.108.250.51 Subnet Mask ..................: 255.255.255.0 Default Gateway ..............: 1[...]
-
Seite 24
Chapter 4: Understanding the Command Line Interface (CLI) The switch utilizes Command Lin e Interface (CLI) to pr ovide access to seve ral different command modes. Each command mode provides a group of related commands. After logging into the system, you are autom atically in the user top (user E XEC) mode . From the user top mode you can enter int[...]
-
Seite 25
To list the commands available in user top m ode, enter a question mark (?). Use a space and a questi on mark (?) after entering a command to see all the options for that particular command. Command Purpose ? Lists the user EXEC commands. show ? Lists all the options avail able for the given command. User top commands: Switch> ? enable Turn on p[...]
-
Seite 26
In general, the top (privileged) commands allow you to change terminal set tings on a temporary b asis, perform basic tests, and list system information. To list the commands av ailable in top mo de, enter a question mark (?) at the prompt, as shown in the following example. Enter a questio n mark (?) after a command to see all the options for that[...]
-
Seite 27
To exit global config uration command mode and return to privile ged EXEC mode, use on e of the following commands: Command Purpose exit end Ctrl-Z Exits global configuration mo de and returns to privileged EXEC mode. To list the commands available in gl obal configuration mo de , enter a question mark (?) at the prompt, as shown in the following e[...]
-
Seite 28
4.3.1 Interface Configuration Mode Many features are enabled on a per-interface basis. Interface configuration commands m odify the operation of an interface such as an Ethernet or serial port. In terface configuration commands al ways follow an interface global configuration command, which defin es the interface type as Ethernet. In the following [...]
-
Seite 29
In the following example, the switch shows the multiple Spanni ng Trees (MST) command. Switch(config)# spanning-tree mst configuration Switch(config-mst)# ? end End current mode and change to enable mode exit Exit current mode and down to previous mode help Description of the interactive help system instance MST instance name Set MST configuration [...]
-
Seite 30
To get help specific to a command mode, a command, a keyword, or an argument, perform one of the following commands: Command Purpose Help Obtain a brief description of the help system in an y command mode. ? List all commands available for a particu lar command mode. When using context-sensitive hel p, the space (or lack of a space) before the ques[...]
-
Seite 31
Switch# configure ? configure Enter configuration mode Note that in the example below, if you e nter the ip comman d followed by the Return Key or Enter, the system returns the prompt that the command is incomplete. Switch# ip % Command incomplete. Switch# Generally, uppercase letters represent variables. For example, after enter ing a command, suc[...]
-
Seite 32
4.6 Using CLI Command History The CLI user interface provides a histor y or record of co mmands that you have e ntered. This feature is particularl y useful for recalling long or co mplex commands or entries, including access lists. To recall commands from the history buffer, use one of the following commands: Keystrokes/Comman d Purpose Press Ctrl[...]
-
Seite 33
4.8.1 Moving Around on the Command Line Use the following keystrokes to move the cur sor around on the command line in order to make corrections or changes: Keystrokes Purpo se Press Ctrl-B or the left arrow. Move the cursor back one character. Press Ctrl-F or the right arrow. Move the cursor forward one character. Press Ctrl-A . Move the cursor to[...]
-
Seite 34
4.8.3 Editing Command Lines That Wrap The enhanced editi ng feature provides a wraparound for comm ands that extend beyond a sing le line on the screen. When the cursor reaches the ri ght margin, the command line shifts eight s paces to the left. You cannot see the first eight characters of the line, but you can scroll back and chec k the syntax at[...]
-
Seite 35
When you have completed th e entry, press Ctrl-A to check the complete syntax before pr essing Enter to execute the command. The dollar sign ($) appears at the end of the l ine to indicate that the line has been scrolled to the right: Switch(config)# access-list 101 permit icmp 192.168.123.0 0.0.0.255 192 $ Use line wrapping in conjunc tion with th[...]
-
Seite 36
4.8.7 Transposing Mistyped Character s If you have mistyped a command e ntry, you can transpose the mist yped characters by using the follo wing command: Keystrokes Purpo se Press Ctrl-T . Transpose the character to the left of the cursor with the character located at the cursor. 4.8.8 Controlling Capitalizatio n You can toggle bet ween uppercase a[...]
-
Seite 37
Chapter 5: Managing the System and Configuration Files This chapter explains ho w to manage the system information, as well as how to manage the configuration files for the IntraCore IC36240. 5.1 Managing the System This section discusses the follo wing tasks needed to mana ge the system information of the IntraCor e IC36240: • Setting the System[...]
-
Seite 38
5.1.2 Specifying the Hostname The factory-assigned default host name is Switch . To specify or modify the host name for the network, use the hostname global config uration command. Command Purpose hostname name T his system’s hostname. 5.1.3 Changing the Password The switch ships with a default of no pass word for privil ege mode, which allo ws i[...]
-
Seite 39
To log messages, use the follo wing command in global configur ation mode. Command Purpose logging address IP address of the host to be used as a syslog server. logging facility Facility parameters for syslog messages. logging trap Set syslog server logging level. 5.1.6 Displaying the Operating Config uration The configuration file may be disp l ay[...]
-
Seite 40
You can add comments to a configuration file descri bin g the commands you hav e entered. Precede a comment with an exclamation point (!). Use the following commands to configure th e software from the terminal. Command Purpose configure Enters global configuration mode and select the termina l option. Switch(config)# The global conf iguration pr o[...]
-
Seite 41
The following is an example of cop ying the startup-config for use on the swit ch. Switch# copy startup-config ? running-config Update (merge with) current system configuration tftp:[//A.B.C.D/filename] Copy to tftp: file system 41 Asante IntraCore IC36240 User’s Manual[...]
-
Seite 42
The following is an example of copying the running-config for use on the switch. Switch# copy running-config ? startup-config Copy to startup configuration tftp:[//A.B.C.D/filename] Copy to tftp: file system Switch# copy running-config tftp Enter TFTP Server IP Address [A.B.C.D]? Enter file name 'my-config' to copy? Reply to any prompts f[...]
-
Seite 43
In the following example, the software is configured from the file my-config at IP address 19 2.168.123.59: Switch# copy tftp://192.168.123.59/my-confg running-config Download file ‘my-config’ from 192.168.123.59 to running-config? [y/n] y Accessing tftp://192.168.123.59/my-config... [OK] 487 bytes copied in time <1 sec Updating running-conf[...]
-
Seite 44
5.3.3 Security Levels SNMPv3 has three levels of security. The lo west level does not provide authentication or privac y (noAuthNoPriv). This level is comparable to SNMPv1. T he second level pr ovides authentication, but no privac y (AuthNoPriv). The highest level provides auth entication and securit y (Aut hPriv). Based on protection needs you sho[...]
-
Seite 45
To set up the community access string to per mit access to the SNMP, use the following command from the global command mode. Command Purpose Snmp-server community string [ view view-name ] { ro | rw } [ access-list-number ] Define the community access string. T he access-list-number parameter is numbered from 1–99 an d 1300–1999. Establish the [...]
-
Seite 46
5.3.5 SNMP Configuration Commands Command Purpose snmp-server Enable the SNMP agent. The first snmp-server g lobal configuration command enables SNMP. snmp-server engin eID { local engineid- string | remote host-ip-address [ udp-port port-number ] enginei d-string } Set Engine ID for local or remote devices. The remote engine ID is used to create u[...]
-
Seite 47
All of the bridges (a switch is a comp lex bridge) on the network communicate with each other using special packets of data called Bridge Protocol Data Units (BPDUs). The info r mation exchanged in the BPD Us allows the bridges on the network to do the follo wing: • Elect a single bridge to be the root bridge • Calculate the shortest path from [...]
-
Seite 48
Reducing the values of these timers makes the spanni ng tree react faster when the topology changes, but may cause temporary loops as the tree stabilizes i n its new configuration. Increasing the values of th ese timers makes the spanning tree react more slowl y to changes in topology, but will make an unintended reco nfiguration less likely. All o[...]
-
Seite 49
• Alternate port—offers an alternate path toward the root s witch to that provided by the current root port. • Backup port—acts as a backup for t he path provided b y a designated port to ward the leaves of the spanning tree. A backup port can exist only when two ports are con nected together in a loop-b ack by a point-to-point link or when[...]
-
Seite 50
Configuring Link Ty pe Use the following interface mode co mm and to configure port link-t ype: Switch(config)# interface eth1 Switch(config-if-eth1)# spanning-tree link-type { point-to-point | shared } By default, the link type is determined from the duple x mode of the interface: a full-duplex port is considered to have a point-to-point connectio[...]
-
Seite 51
5.4.4 Multiple Spanning-Tree (MST) MST extends the IEEE 802.1w rapid spanning tree (RST) algorithm to multiple spann ing trees. This extension provides both rapid conv ergence and load balancin g in a VLAN environment. MST allows you to build multiple span ning trees over tr unks. You can group and associate VLANs to spann ing tree instances. Each [...]
-
Seite 52
5.5 Configuring VLAN VLANs are used to organize any group of net work nodes into separate broadcast dom ains. VLANs confine broadc ast traffic to the originating group and elim i nate broadcast storms in large net works. VLANs provide a secure and efficient network environment. VLANs are based on untagged port groups, or traffic can be e x plicitly[...]
-
Seite 53
5.6 MAC Address Table The MAC Address Table is a table of nod e addresses that the switch automatically builds by “learning.” It performs this task by monitoring the packets that pass through the switch, checking the source and destinatio n addresses, and then recording the source addr ess information in the table. To see the table, type the fo[...]
-
Seite 54
Chapter 6: Configuring IP The Internet Protocol (IP) is a packet-based protocol used to exchange data over comput er networks. All other IP protocols are built on the foundation. IP is a network-layer protocol that cont ai ns addressing and control inform ation that allows data packets to be routed. This section describes how to configur e the Inte[...]
-
Seite 55
6.2 Establish Address Resolution A device in the IP can have both a local add ress (which uniquely identifies the device on its local segment or LAN) and a network address ( which identifies the network to which the device belongs). The local address is m ore properly known as a data link address because it is contained in the data lin k layer (Lay[...]
-
Seite 56
6.3 Managing IP Multicast Traffic Multicast traffic is a means to transmit a multimedia str eam from the Internet (a video conferenc e, for example) without requiring a TCP conne ction from every re mote host that wants to receive the stream. Traditional IP communication allo ws a host to send packets to one host (unicast transmission) or to all ho[...]
-
Seite 57
All systems on the subnet must suppor t the same version. T he switch does not automatically detect Version 1 systems and switch to Version 1. Config ure the s witch for Version 2 if all dev ices on the subnet support IGMP version 2. To control which version of IGMP the switch uses , use the follo wing command in configuration mo de: Command Purpos[...]
-
Seite 58
When configuring an access li st, you can add multiple stat ements by adding criteria to the same number ed list. The order of the statements is important, as the switch tests addresses against the criteria in an access list one by one (in the order the statements are entered) unt il it finds a match. T he first match det ermines whether the system[...]
-
Seite 59
Other types of traffic to consider include the follo wing. External protocols an d IP Addresses • ICMP from service provider IP Addresses Explicitly permitted return traffic for internal connections to the Internet • Specific Internet Control Me ssage Protocol (ICMP) types • Outbound Domain Name System (DNS) quer y replies • TCP established[...]
-
Seite 60
6.4.1 Create a Standard Access Lis t Standard access lists filter at Layer 3, and can al low or block access to networks and host addresses. T he parameters for a standard access list are des cribed below: • Access list number (1–99) : Identifies the ac cess list to which an entry belongs. There is no limit to ho w many entries make up an acces[...]
-
Seite 61
6.4.2 Create a MAC Acce ss List The IntraCore IC36240 has a 16K Mac address. The parameters for a MAC access list ar e described belo w: • MAC access-list standard (700-799): Ident ifies the access l ist to which an entry belongs. There is no limi t to how many entries make up a MAC access list, other than av ailable memory. • MAC access list e[...]
-
Seite 62
In the following example, an extended acces s list is creat ed to deny FTP and allo w all other traffic from subnet 192.168.123.0 to be for warded to all other networks or subnets. Note : Remember when the cursor reaches the right margin, the command line shifts 8 spaces to the left. You cannot see the first eight characters of the line, but you ca[...]
-
Seite 63
6.4.4 Creating an Access List w ith a Name From the global configuration mode, you can also create access lists. Usin g the Switch(config)#ip command you can name your access lis t, rather than using a numb er. T he new prompt reflects the named access list mode. Switch(config)# ip ? access-list Named access-list forward-protocol Controls forwardin[...]
-
Seite 64
6.4.6 Configuring Common Access Li sts This section provides examples the most common ACLs used when configuring a net work. Change the IP addresses in the following examples when using them in your network. The following exampl e shows denying speci al-use address sources. Switch(config)# access-list 110 deny ip 127.0.0.0 0.255.255.255 any Switch([...]
-
Seite 65
The following example sho ws explicitly denying all other DN S traffic. Switch(config)# access-list 110 deny udp any any eq 53 Switch(config)# access-list 110 deny tcp any any eq 53 The following example sho ws explicitly permitting intern et -sourced connections to publicl y accessible servers. Switch(config)# access-list 110 permit tcp any host p[...]
-
Seite 66
Chapter 7: VLAN Configuration A VLAN is a group of end stations with a common set of requirements, indep endent of physical location. VLANs have the same attributes as a physical LAN b ut allow you to group end stations even if the y are not located physicall y on the same LAN segment. Usually VLANs are associated with IP subnetworks. For exam ple,[...]
-
Seite 67
First, a VLAN is created and named tester . Switch# configure Switch(config)# vlan 2 Switch(config-vlan)# name tester Switch(config-vlan)# exit Switch(config)# exit Switch# show vlan In the output of the show vlan command, the ne w VLAN will be listed, but will not yet be active. Next, choose a switchport to belong to VLAN 2. Switch# configure Swit[...]
-
Seite 68
7.2 VLAN Port Membership Modes Assign a switchport to a VLAN by designating a members h ip mode. The membership m ode determines the type of traffic the port carries and the number of VLANs that bel ong to a specific port. The following is a list of the membership modes: • Static Access • Trunk (IEEE 802.1Q) 7.2.1 Static Access A static-access [...]
-
Seite 69
Use the following commands, beginning in config mode, to config ure the VLAN Allowed List for the trunk port: Command Purpose interface IFNAME Enter the interface name to a ccess the interface configuration mod e. switchport mode trunk This command designates the interface as IEEE 802.1q trun k- access mode. Use the no form of this command to reset[...]
-
Seite 70
Chapter 8: Quality of Service Configuration Quality of Service (QoS) is a general term referring to va riou s methods of traffic management you can e mploy on your network to ensure that traffic you identif y as high-prio rity can use a sufficient share of the available band width. The IC36240 supports the foll owing QoS methods: • Weighted Fair [...]
-
Seite 71
queues; the queue with the highest priorit y is serviced first until it is empty, then the lo wer queues are serviced in sequence. 8.2.1 Defining the Priority List A priority list contains the definitions for a set of priorit y queues. The priority list specifies in which queue a packet will be placed. In order to perform queuing using a pr iority [...]
-
Seite 72
8.4.2 Configuring Traffic Shaping for an Access List To configure traffic shaping for outbound traffic on an acc ess list, use the following commands b eginning in global configuration mode: Command Purpose access-list access-list-number Assigns traffic to an access list . interface interface-type-numb er Enters interface configurati on mode. traff[...]
-
Seite 73
The following examples sho w setting the rate of interf ace Ethernet 1 to 100M, setting an associated access list and limiting the rate of the access list on the interface to 200M. Switch(config)# inter eth1 Switch(config-if-eth1)# rate-limit input 100000000 Switch(config-if-eth1)# access-list 1 permit 192.203.56.1 Switch(config-if-eth1)# rate-limi[...]
-
Seite 74
Chapter 9: Configuring the Switch Using the GUI This chapter provides and overvie w of configuring the switch with the graph ical user interf ace (GUI). For more information about the different features and ho w to implement them refer to the chapters specific to that function. Refer to the following example for the commands require d to set the GU[...]
-
Seite 75
• System Check Information • Save The following example sho ws the main screen menu bar. 9.2 Information Screens To monitor the switch use the two information screens. T he follo wing sections describe the Front Panel a nd the General Information screens. 9.2.1 Front Panel Information Screen Use this section to access general information about [...]
-
Seite 76
Use this screen to view statistics about all the ports on the s witch. The following example sho ws the Front Panel information screen. Click on a specific port number h yperlink to go to the Port Configuration and Port Statis tics Information screen. Refer to section 9.3.1 for information on the Port Configuration and Po rt Statistics screen. 9.2.[...]
-
Seite 77
The table below lists the traditiona l classes and ranges of IP address es and their status. Class Address or Range Status A 0.0.0.0 1.0.0.0 to 126.0.0.0 127.0.0.0 Reserved Available Reserved B 128.0.0.0 to 191.0.0.0 255.255.255.0 Available C 192.0.0.0 to 223.255.255.0 Available D 224.0.0.0 to 239.255.255.25 5 Multicast group addresses E 240.0.0.0 [...]
-
Seite 78
9.3 Port Configuration Menu From the port configuration screen, you ca n view current information and config ure individual ports. To access the Port Configuration screen, clic k on Port Config in the menu bar on the left side of the screen. To configure individual ports click on the port number on t he left side of the screen. To c onfigure a port[...]
-
Seite 79
1. Click on the port number from the Front Panel Information Screen • You are now at the Port Configurati on a nd Port Statistics screen. From this screen, you can set the port status, auto-negotiation, flow control, and default priorit y. Yo u also use this screen to view and manage traffic on a specific port. The following is an example of the [...]
-
Seite 80
a b c d e From this screen, you can also navigate b etween different ports and go to different units in the network. To go to another port number change the port number at the top of the screen and press Go. Select p ort number Press g o You can set how the system updates the statistics about t he selected port you selectin g Auto or Manual and pre[...]
-
Seite 81
9.4 Spanning Tree Prot ocol Configuration The Spanning T ree Protocol (STP) is par t of the IEEE 802.1D standard. It provi des for a redund ant network without the redundant traffic through closed paths. For example, in a net work without spanning tree protoc ol, a message is broadcast through multiple paths, leadi ng to an unending packe t-pass in[...]
-
Seite 82
Use the Spanning Tree Protocol Confi guration screen to vie w information and configure spanning trees . The information about current spanning trees d isplayed on the l eft side of the screen include the bridge ID, desig nated root, root port, root port cost, hello time, maximum age and forward delay information. Use the right side of the screen t[...]
-
Seite 83
The lower the assigned port path cost is, the more likel y that port will be accessed. The default port path cost for a 10 Mbps or 100 Mbps port is t he result of the equation: Path cost = 1000/LAN speed (in Mbps) Therefore, for 10 Mbps ports, the default port path cost is 100. For 100 Mb ps ports, it is 10. To allow for faster networks, the port p[...]
-
Seite 84
• Select the ports on each bridge that for ward traffic, and place the redundant ports in bloc king states To change the global ST P status, select t he desired state from the drop down menu. Use this screen to change the bridge priorit y, hello time maximum age, forward delay by entering the desired time in the text boxes and pressing A pply Cha[...]
-
Seite 85
Use this screen to set the read/write access and to enable or disa ble the trap authentication for this s witch. The default SNMP read community access is pub lic; the default SN MP write community access is private; the default trap authentication is disable. You can also set SNMP Traps for specific IP addresses allo wing them to have access to co[...]
-
Seite 86
1 2 3 4 5 To restore the defaults pr ess the Restore but ton. 9.6 Address Table Screen Use this screen to view IP address tables. From the main screen yo u can view the stat us of each ports, the address counts of the VID, IP and MAC addresses. You can searc h for specific IP and MAC addresses and sort the results either IP or MAC. The display is s[...]
-
Seite 87
The following example sho ws the Address Table screen. Click on the port number to filter the display a nd sho w the address table for a specific port. 87 Asante IntraCore IC36240 User’s Manual[...]
-
Seite 88
The following screen shows the output from selecting Port 1. T he Address table at the bottom of the screen filtered out all the ports except port 1 . The MAC address of the switch is identified as “self”. To sort the Address Table by IP address, cli ck the Sort by IP button. The table is now sorted numerically by IP address. The MAC Address Ta[...]
-
Seite 89
To sort the Address Table by MAC address, click the Sort by MAC button. Your table will be sorted numerically by MAC address. 9.7 VLAN Configuration VLANs are used to organize any group of net work nodes into separate broadcast dom ains. VLANs confine broadc ast traffic to the originating group and elim i nate broadcast storms in large net works. V[...]
-
Seite 90
To access the VLAN configuration screen click on VLAN in the menu bar on the left side of the screen To sort the display enter the VLAN ID numb er you want the display to start with and pr ess GO. The following example shows the output from the VLAN Group information screen. Assign a switchport to a VLAN by designating a members h ip mode. The memb[...]
-
Seite 91
3. Click Apply 2 4. Click on the VLAN ID number in the VLAN table to move to the configuration page for the new VLAN From the VLAN Group Configuration page, you can enable or disab le the management access and link a VLAN to a specific port. Use the VLAN feature to partition a singl e IntraCore IC362 40 into a VLAN each conta ining its own set of p[...]
-
Seite 92
The following example sho ws output from creating a new VLAN (4) with the name Asante and assig ning it to port 7. To remove a VLAN from an associated port follow these steps: 1. Click the membership check box of the des ired port to deselect the assoc iation. 2. Click on the Remove unchecked memb er button. 9.8 IGMP Configuration The Internet Grou[...]
-
Seite 93
To access the IGMP configuration screen clic k on the IGMP button in the menu bar on the left side of the screen. The following example sho ws the IGMP main screen. Use th is screen to view the IGMP information. To enable or disable IGMP on a specific VLAN by entering the VLAN ID number selecting the d esire d state and clicking appl y. Click on th[...]
-
Seite 94
3. Click Apply To configure a specific VLAN click on the VLAN ID number access the a dvanced IGM P configuration screen. The following example sho ws the IGMP information for VLAN1. Multicast switches send IGMP host-query messag es to disc over which multicast gro ups are present on attached networks. These messages are sent to the all- systems gro[...]
-
Seite 95
3. Click Apply 1 2 3 9.9 Web CLI Screen Use the Web Command Line Interface (CLI) screen to use acce ss the CLI from an http server. This feature provides the flexibility of the CLI with the usability of the GUI. You can set the clock, ping the system and sho w the running configuration. To access the Web CLI Screen click on the Web CLI bu tton in t[...]
-
Seite 96
The following example sho ws the main access point of the CLI from the Web interface. 9.10 System Clock Menu You can set the system clock from the System Clock Menu. After selecting the correct date and time for the system click apply. The operatio n resets the switch using the time you specif y. This operation takes a fe w minutes to complete. Vie[...]
-
Seite 97
After you set the desired date and time click appl y. 9.11 Save Click on Save to automatically retain an y configuration chan ges you made. 97 Asante IntraCore IC36240 User’s Manual[...]
-
Seite 98
Appendix A: Basic Troubleshooting In the unlikely event that the s witch does not operate properly, follo w the troubleshooting tips below. If more help is needed, contact Asante’s technical support at www.asante.com/support . Problem Possible Solutions The Power LED is not lit. Check the power connection. Plug the po wer cord into another known [...]
-
Seite 99
Appendix B: Specifications The sections below list the feat ures and product specificati ons for the IntraCore IC36240 switch. Connectors: 24 RJ-45 auto-MDI/MDIX Ports 24 10/100/1000BaseT ports that have auto-negotiation for speed, duple x mode and flow control Gig Modular Ports 4 SFP slots for 1000SX or 10 00LX trans ceiver that is auto- disabling[...]
-
Seite 100
Security User password, SNMP access filter, port security (MAC address filter with notification), 802.1x (port-based, L2/L4 ACL, RADIUS, TACACS+ Management Male DB9 RS-232 DTE (auto bau d to 115k), USB, Cisco CLI x 4 sessions, Web RMON (1, 2, 3, 9), port mirroring Firmware Upgrade TFTP, dual banks of code an d configuration SNMP v1, v2, v3 Logs Sys[...]
-
Seite 101
Appendix C: FCC Complian ce and Warranty Statements C.1 FCC Compliance Statement This equipment has bee n tested and found to comply with t he limits for a Class A digital devic e, pursuant to part 15 of the FCC Rules. These limits a re designed to provide reas onable protection agai nst harmful interference when the equipment is operated in a comm[...]
-
Seite 102
C.3 IntraCare Warranty Statement Products: IntraCore IC36240 Duration: 3 years Advanced Warrant y United States: Second Business Day Replacement: Other countries: See your local distributor or resell er 1. Asante Technologi es warrants (to the original end-user purchaser) the covered IntraCore products against defects in materials and workmanship f[...]
-
Seite 103
Appendix D: Online Warranty Registration Please register this product online at http:// www.asante.com/support/supRegistration.asp or by filling out and mailin g the card below. 103 Asante IntraCore IC36240 User’s Manual[...]
-
Seite 104
Index Access List apply ..................................................................... 63 classifica tion ......................................................... 58 configuring standar d ............................................. 60 create expa nded ................................................... 61 exampl es .......................[...]
-
Seite 105
ping ....................................................................... 38 save, GU I .............................................................97 show running- config ............................................. 39 show sy stem ......................................................... 15 show system clock..................................[...]
-
Seite 106
general information scree n ................................... 76 IGMP configur ation ............................................... 93 IP address tables .................................................. 86 MAC addres s ........................................................ 89 port configurat ion scree n ...................................... [...]
-
Seite 107
default ................................................................... 11 privileg ed .............................................................. 20 securi ty ................................................................. 22 setting ................................................................... 20 Priority Queuing configur ing .....[...]
-
Seite 108
default ................................................................... 50 forward time .......................................................... 47 global config uratio n ..............................................83 GUI ....................................................................... 81 hello ti me .................................[...]