Cisco RJ-45-to-AUX Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Cisco RJ-45-to-AUX an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Cisco RJ-45-to-AUX, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Cisco RJ-45-to-AUX die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Cisco RJ-45-to-AUX. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Cisco RJ-45-to-AUX sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Cisco RJ-45-to-AUX
- Den Namen des Produzenten und das Produktionsjahr des Geräts Cisco RJ-45-to-AUX
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Cisco RJ-45-to-AUX
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Cisco RJ-45-to-AUX zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Cisco RJ-45-to-AUX und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Cisco finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Cisco RJ-45-to-AUX zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Cisco RJ-45-to-AUX, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Cisco RJ-45-to-AUX widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    [...]

  • Seite 2

    Table of Contents Cisco Switching Black Book ...............................................................................................................................1 Introduction .........................................................................................................................................................4 Overview[...]

  • Seite 3

    Table of Contents Chapter 2: Basic Switch Configuration The RJ−45−to−AUX Port Console Connector Pinouts ...................................................................36 Switch IOSs ...........................................................................................................................................38 The IOS Configur[...]

  • Seite 4

    Table of Contents Chapter 3: WAN Switching BPX 8600 Series Wide−Area Switches ..........................................................................................58 MGX 8800 Series Wide−Area Edge Switches...............................................................................59 WAN Switch Hardware Overview .........................[...]

  • Seite 5

    Table of Contents Chapter 4: LAN Switch Architectures LCP ..................................................................................................................................................75 SAGE ASIC ....................................................................................................................................7[...]

  • Seite 6

    Table of Contents Chapter 5: Virtual Local Area Networks .......................................................................................................88 In Depth .................................................................................................................................................88 The Flat Network of Yesterday [...]

  • Seite 7

    Table of Contents Chapter 6: InterVLAN and Basic Module Configuration ..........................................................................114 In Depth ...............................................................................................................................................114 Internal Route Processors ....................[...]

  • Seite 8

    Table of Contents Chapter 7: IP Multicast Time to Live ..................................................................................................................................147 Multicast at Layer 2 .............................................................................................................................147 IGMP Snoopi[...]

  • Seite 9

    Table of Contents Chapter 7: IP Multicast Configuring Packet−Based Suppression ..............................................................................................159 Disabling Multicast Suppression .........................................................................................................159 Chapter 8: WAN Cell Switching.[...]

  • Seite 10

    Table of Contents Chapter 9: LightStream Switches Verifying an ATM Interface Connection Status ..................................................................................190 Viewing the Configured Virtual Connections .....................................................................................191 Configuring the LECS ATM Address on a[...]

  • Seite 11

    Table of Contents Chapter 10: Layer 2 Redundant Links Verifying the Port Cost Configuration on Both a Set/Clear Command− and CLI−Based Interface ...217 Configuring the Port Priority on a Set/Clear Command−Based IOS ..................................................217 Configuring the Port Priority on a CLI−Based IOS.........................[...]

  • Seite 12

    Table of Contents Chapter 11: Multilayer Switching Assigning a VLAN ID ...................................................................................................................236 Adding an MLS Interface to a VTP Domain................................................................................236 Enabling MLS on an Individual Interfa[...]

  • Seite 13

    Table of Contents Chapter 12: Hot Standby Routing Protocol Enabling Interface Tracking................................................................................................................252 Using the show standby Command.....................................................................................................252 Using the deb[...]

  • Seite 14

    Table of Contents Chapter 15: The Standard Edition IOS [V] Virtual LAN ............................................................................................................................293 [R] Multicast Registration .............................................................................................................294 [F] Firmwar[...]

  • Seite 15

    Table of Contents Chapter 16: Switch Troubleshooting Using the show log Command on a Set/Clear Command−Based IOS ................................................336 Configuring SPAN for Port Monitoring on a Set/Clear Command−Based IOS .................................337 Configuring SPAN for VLAN Monitoring on a Set/Clear Command−Based IOS ..[...]

  • Seite 16

    Table of Contents Appendix E: Switch Features........................................................................................................................359 Access Layer Switches ........................................................................................................................359 Cisco Catalyst 1900 ...............[...]

  • Seite 17

    Cisco Switching Black Book Sean Odom Hanson Nottingham © 2001 The Coriolis Group. All rights reserved. This book may not be duplicated in any way without the express written consent of the publisher, except in the form of brief excerpts or quotations for the purposes of review. The information contained herein is for the personal use of the reader[...]

  • Seite 18

    Steve Sayre Acquisitions Editor Charlotte Carpentier Product Marketing Manager Tracy Rooney Project Editor Toni Zuccarini Ackley Technical Reviewer Deniss Suhanovs Production Coordinator Carla J. Schuder Cover Designer Jody Winkler Layout Designer April Nielsen Dear Reader: Coriolis Technology Press was founded to create a very elite group of books[...]

  • Seite 19

    Jeff Duntemann VP and Editorial Director This book is dedicated to all those who endeavor to turn dreams into realities. —Sean Odom To my wife, Sonia, and my daughter, Sabrina. —Hanson Nottingham About the Authors Sean Odom is a CCNP, MCSE, and CNX−Ethernet. He has been in the computer networking field for over 12 years and can be found instr[...]

  • Seite 20

    Introduction Overview For many years I have been a consultant for different companies and have written books on switch and router configurations and troubleshooting. During my years as a consultant I have had to either install, administer, or troubleshoot switching problems and configurations for switches without a good handbook. I have constantly [...]

  • Seite 21

    Words in brackets that are separated by bars are used when indicating that there are multiple choices of commands. For example, when configuring VTP you can enable the trunk port to choose one mode: on, off, desirable, or auto mode. This will be shown like this: [on|off|desirable|auto]. • Knowledge of what configuration mode you are in and how to[...]

  • Seite 22

    Chapter 1: Network Switching Fundamentals In Depth Although writing the first paragraph of a book is probably the least important part, it’s invariably the most difficult section to write. To get a good picture of the different parts of networking, readers need to know where networking began and the history behind the networks of today. You may h[...]

  • Seite 23

    Port switching —Takes place in the backplane of a shared hub. For instance, ports 1, 2, and 3 could be connected to backplane 1, whereas ports 4, 5, and 6 could be connected to backplane 2. This method is typically used to form a collapsed backbone and to provide some improvements in the network. • Cell switching —Uses Asynchronous Transfer M[...]

  • Seite 24

    Many different types of physical cable media have been introduced over the years, such as Token Ring, FDDI, and Ethernet. At one time, Token Ring was seen as a technically superior product and a viable alternative to Ethernet. Many networks still contain Token Ring, but very few new Token Ring installations are being implemented. One reason is that[...]

  • Seite 25

    Client/Server Network Model Peer−to−peer model networks evolved into the client/server model, in which the server shares applications and data storage with the clients in a somewhat more centralized network. This setup includes a little more security, provided by the operating system, and ease of administration for the multiple users trying to [...]

  • Seite 26

    After each frame transmission, all stations on the network contend equally for the next frame transmission. This competition allows access to the network channel in a fair manner. It also ensures that no single station can lock out the other stations from accessing the network. Access to the shared channel is determined by the Media Access Control [...]

  • Seite 27

    Six types of hubs are found in the network: Active hubs —Act as repeaters and eliminate attenuation by amplifying the signals they replicate to all the attached ports. • Backbone hubs —Collect other hubs into a single collection point. This type of design is also known as a multitiered design. In a typical setup, servers and other critical de[...]

  • Seite 28

    segment, it transmits the packet on that segment or port to that segment only. If the bridge does not know the destination segment, the bridge transmits a copy of the frame to all the interface ports in the source segment using a technique known as flooding . For each packet an interface receives, the bridge stores in its table the following inform[...]

  • Seite 29

    Routers Routers are devices that operate at Layer 3 of the OSI Model. Routers can be used to connect more than one Ethernet segment with or without bridging. Routers perform the same basic functions as bridges and also forward information and filter broadcasts between multiple segments. Figure 1.2 shows routers segmenting multiple network segments.[...]

  • Seite 30

    To improving network performance, switches must address three issues: They must stop unneeded traffic from crossing network segments. • They must allow multiple communication paths between segments. • They cannot introduce performance degradation. • Routers are also used to improve performance. Routers are typically attached to switches to co[...]

  • Seite 31

    designed the most efficient path to the destination. Single points of failure need to be analyzed, as well. As we stated earlier, every large−network user has suffered through his or her share of network outages and downtime. By analyzing all the possible points of failure, you can implement redundancy in the network and avoid many network outage[...]

  • Seite 32

    Although the nodes on each port are in their own collision domain, the broadcast domain consists of all of the ports assigned to a particular VLAN. Therefore, when a broadcast is sent from a node in VLAN 1, all the devices attached to ports assigned to VLAN 1 will receive that broadcast. The switch segments the users connected to other ports, there[...]

  • Seite 33

    bridged networks. To resolve the issue, your network administrator may even upgrade your PC to a faster CPU or more RAM. This allows your PC to generate more input/output (I/O), increasing the saturation on the network. In this type of environment, every data packet is sent to every machine, and each station has to process every frame on the networ[...]

  • Seite 34

    Poorly designed and implemented switched networks can have awful effects. Let’s take a look at the effects of a flat area topology and how we can design, modify, and upgrade Ethernet networks to perform as efficiently as possible. Properly Switched Networks Properly switched networks use the Cisco hierarchical switching model to place switches in[...]

  • Seite 35

    Switched Forwarding Switches route data based on the destination MAC address contained in the frame’s header. This approach allows switches to replace Layer 2 devices such as hubs and bridges. After a frame is received and the MAC address is read, the switch forwards data based on the switching mode the switch is using. This strategy tends to cre[...]

  • Seite 36

    Combining Switching Methods To resolve the problems associated with the switching methods discussed so far, a new method was developed. Some switches, such as the Cisco Catalyst 1900, 2820, and 3000 series, begin with either cut−through or FragmentFree switching. Then, as frames are received and forwarded, the switch also checks the frame’s CRC[...]

  • Seite 37

    Many types of physical media topologies can be applied to this concept. In this demonstration, we will utilize Ethernet 100BaseT. Ethernet 10BaseT and 100BaseT are most commonly found in the networks of today. We’ll make an upgrade to the network and alleviate our bottleneck on the physical link from the switch to each resource node or server. By[...]

  • Seite 38

    We call a switch a blocking switch when the switch bus or components cannot handle the theoretical maximum throughput of all the input ports combined. There is a lot of debate over whether every switch should be designed as a non−blocking switch; but for now this situation is only a dream, considering the current pricing of non−blocking switche[...]

  • Seite 39

    Switched Ethernet Innovations Around 1990, many vendors offered popular devices known as intelligent multiport bridges; the first known usage of the term switch was the Etherswitch, which Kalpana brought to the market in 1990. At the time, these devices were used mainly to connect multiple segments—they usually did very little to improve performa[...]

  • Seite 40

    backward compatible to most of the equipment in use at the time. Although the standards bodies debated the merits of each of the camps, the marketplace decided for them. Fast Ethernet is the overwhelming winner, so much so that even HP sells Fast Ethernet on almost all its products. Note In 1995, Cisco purchased both Kalpana and Grand Junction and [...]

  • Seite 41

    devices run the same IOS. Some use a graphical interface, some use a Set/Clear command−line interface, and some use a Cisco Command Line Interface (CLI). Cisco has acquired more devices than they have designed and built themselves. Therefore, Cisco has adapted the operating systems designed for each device they have acquired to use the protocols [...]

  • Seite 42

    Router(config)#interface e0/0.? <0−4294967295> Ethernet interface number Router(config)#interface e0/0.1 Router(config−subif)# Let’s take a look at the commands available in the User EXEC mode of a Cisco Catalyst 1912 EN switch: SeansSwitch>? Exec commands: enable Turn on privileged commands exit Exit from the EXEC help Description o[...]

  • Seite 43

    snmp−server Modify SNMP parameters spantree Spanning tree subsystem spantree−template Set bridge template parameter storm−control Configure broadcast storm control parameters switching−mode Sets the switching mode tacacs−server Modify TACACS query parameters tftp Configure TFTP uplink−fast Enable Uplink fast vlan VLAN configuration vlan[...]

  • Seite 44

    multiple physical topologies, restricting broadcasts, and providing network security. Using switches and routers together, you can integrate large networks and provide a high level of performance without sacrificing the benefits of either technology. Entering and Exiting Privileged EXEC Mode After the switch has gone through the power on self test [...]

  • Seite 45

    Switch(config−if)#interface e0.1 Switch(config−subif)# Tip You can abbreviate any command as much as you want, as long as it remains unique (no other command exists that matches your abbreviation). For instance, the command interface e0.1 can be abbreviated as int e0.1 . To exit to Global Configuration mode, use the exit command or press Ctrl+Z[...]

  • Seite 46

    Chapter 2: Basic Switch Configuration In Depth Throughout the last decade, Cisco has acquired some major switching vendors such as Kalpana and Crescendo. As a result, Cisco switches have a variety of command−line interfaces you need to be familiar with in order to set up and maintain the devices. Command−Line Interfaces The most common interfac[...]

  • Seite 47

    For security reasons, you should change the default password and add an enable password on the Crescendo and IOS CLI−based interface switches. In the next stage of the configuration, you should assign an IP address, subnet mask, and default route to the route processor for routing and management purposes. Once you have finished the preceding basi[...]

  • Seite 48

    Weighted fair queuing (WFQ)— Allows for multiple queues so that no one queue can starve another of all its bandwidth. WFQ is enabled by default on all serial interfaces that run at or below 2Mbps, except for those interfaces with Link Access Procedure, Balanced (LAPB), X.25, or Synchronous Data Link Control (SDLC) encapsulations. Most networks fa[...]

  • Seite 49

    The Distribution layer defines the boundaries for the network and provides packet manipulation of the network traffic. It aids in providing isolation from topology changes such as media translations, defining broadcast domains, QoS, security, managing the size of the routing table, aggregating network addresses, static route distribution, dynamic r[...]

  • Seite 50

    RMON provides support for the following groups of Token Ring extensions: MAC−Layer Statistics Group —A collection of statistics from the MAC sublayer of the Data Link layer, kept for each Token Ring interface. This group collects information such as the total number of MAC layer packets received and the number of times the port entered a beacon[...]

  • Seite 51

    Figure 2.2: The different types of console ports on the switches. The console port must be accessed through a PC or another device (such as a dumb terminal) to view the initial configuration. From the console port, you can configure other points of entry—such as the VTY line ports—to allow you to use Telnet to configure the switch from other po[...]

  • Seite 52

    7 7 8 8 Table 2.3: Rollover cable RJ−45−to−RJ−45 pinouts. RJ−45 RJ−45 1 8 2 7 3 6 4 5 5 4 6 3 7 2 8 1 Console Connectors Different console adapters connect different interfaces in order to connect to the console port. The following are the types of console connectors for each switch: Catalyst 1900, 2820, and 2900 XL series switches each[...]

  • Seite 53

    Pin Signal Input/Output 1 RTS Out 2 DTR Out 3 TXD Out 4 GND N/A 5 GND N/A 6 RXD In 7 DSR In 8 CTS In Table 2.5: The RJ−45−to−DB−9 AUX port pinouts by color. Color RJ−45 DB−9 Brown 1 6 Blue 2 7 Yellow 3 2 Green 4 5 Red 5 5 Black 6 3 Orange 7 4 White 8 8 Table 2.6 shows the connectors most often used for modem connections. Table 2.7 shows[...]

  • Seite 54

    Table 2.8: DB−25−to−DB−9 connector pinouts. DB−25 Signal DB−9 2 TXD 3 3 RXD 2 4 RTS 7 5 CTS 8 6 DSR 6 7 GND 5 8 DCD 1 20 DTR 4 Switch IOSs Three types of Cisco operating systems are in use: Set/Clear command interface —Found on models of the Catalyst 2926, 2926G, 2948G, 2980G, 4000, 5000, 5500, 6000, and 6500 series of switches. They [...]

  • Seite 55

    Privileged EXEC mode —The Privileged command set includes those commands contained in User EXEC mode, as well as the configure command, through which you can access the remaining command modes. Privileged EXEC mode also includes high−level testing commands, such as debug . • Global Configuration mode —Global Configuration mode commands appl[...]

  • Seite 56

    Setting the Login Passwords By default, Cisco switches have no passwords configured when they are shipped. On the Cisco IOS−based switches, different priority levels of authority are available for console access. You can define two levels on IOS−based switches: privilege level 1, which is equivalent to User EXEC mode; and privilege level 15, wh[...]

  • Seite 57

    The time−out value is now set to five minutes, using seconds. Tip You can use the lock command to lock an unused Telnet session. After you issue the lock command, the system will ask you to enter and verify an unlocking password. To configure a Set/Clear command−based switch to five minutes, use the following command: CAT5009(enable) set logout[...]

  • Seite 58

    Configuring Port Speed and Duplex To configure the port speed—whether 10Mbps or 100Mbps—use the following commands: CORIOLIS5500(config) interface fastethernet 2/3 CORIOLIS5500(config−int) speed 100 CORIOLIS5500(config−int) duplex full The auto command can be used when the port on the other side is manually set. Links should not be configur[...]

  • Seite 59

    Console> enable Enter password: Because you have not yet set a Privileged EXEC mode password, pressing Enter will put you into Privileged EXEC mode. The console will show the following prompt: 5. Console> (enable) You are now in Privileged EXEC mode. Warning Starting here, all configuration changes are executed and saved to memory immediately[...]

  • Seite 60

    Entering a Contact Name and Location Information Next, let’s set the contact name for the person or organization that is administering this switch. Use the following commands to set the switch contact and location: CORIOLIS5500(enable) set system contact Joe Snow CORIOLIS5500(enable) set system location Coriolis Wiring Closet Configuring System a[...]

  • Seite 61

    sc0: flags=63<UP,BROADCAST,RUNNING> vlan 1 inet 68.187.127.1 netmask 255.255.255.0 broadcast 68.187.127.1 Console> (enable) Configuring a Default Route and Gateway Data traffic not addressed to the local subnet or VLAN must be sent to a default route or destination. For redundancy purposes, a secondary default gateway can be configured if [...]

  • Seite 62

    SeansSwitch (enable) set port speed ? <mod/port> Module number and Port number(s) SeansSwitch (enable) set port speed 2/1 ? auto Set speed to auto <port_speed> Port speed (4, 10, 16, 100 or 1000) SeansSwitch (enable) set port speed 2/1−8 100 Ports 2/1−8 transmission speed set to 100Mbps. SeansSwitch (enable) To manually configure a [...]

  • Seite 63

    Configuring a Menu−Driven IOS The Catalyst 3000 series has a menu−driven switch interface, which allows you to use the arrow keys on your keyboard to select the different options used to configure the switch. As with the other two types of interfaces, you need to connect the switch to a dumb terminal or PC. This switch, however, supports a proc[...]

  • Seite 64

    Configuring the Console Port To configure the Console port, do the following: Choose Configuration|Serial Configuration. 1. As shown in Figure 2.5, you can configure four options: the Hardware Flow Control, the Software Flow Control, the Autobaud Upon Break feature, and the Console Baud Rate. Under normal circumstances, you will never change these [...]

  • Seite 65

    Figure 2.6: The menu−driven VLAN IP configuration screen. Related solutions: Found on page: Creating a Standard Access List 402 Creating an Extended Access List 403 Enabling Port Security 411 Configuring SNMP You can configure up to 10 community strings on the menu−driven switch IOS by following these steps: Enter the appropriate IP configurati[...]

  • Seite 66

    Configuring ROM ROM monitor is a ROM−based program that can be configured to execute upon the following conditions: Upon boot−up • Upon recycling the switch power • When a fatal exception error occurs • When the switch fails to find a valid system image • If the nonvolatile RAM (NVRAM) configuration is corrupt • If the configuration r[...]

  • Seite 67

    Configuring SNMP RMON works in conjunction with SNMP and requires a protocol analyzer or probe to use its full features. To use SNMP−based monitoring, you need to verify that SNMP is running on your IOS−based switch. Verify that SNMP is running, using the following command in User or EXEC mode: show snmp 1. Enable SNMP and allow read−only acc[...]

  • Seite 68

    read−write Administrators read−write−all Root Trap−Rec−Address Trap−Rec−Community ———————————————————————————— ———————————————————— 168.187.127.4 read−write 168.187.127.6 read−write−all Console> (enable) To verify that RMON is runn[...]

  • Seite 69

    Up arrow Recalls commands in the history buffer Down arrow Returns to more recent commands Ctrl+A Moves to the beginning of a line Ctrl+B Moves back one character Ctrl+D Deletes a character Ctrl+E Moves to the end of the command line Ctrl+F Moves forward one character Ctrl+K Deletes all characters to the end of the line Ctrl+L Redisplays the system[...]

  • Seite 70

    Chapter 3: WAN Switching In Depth Switches are not only used in LAN networks; they are also used extensively in wide area networks (WANs). Chapters 1 and 2 gave you an overview of LAN switching. Well, WAN switching is the same in some ways and completely different in others. In an Ethernet switching environment, the switch utilizes Carrier Sense Mu[...]

  • Seite 71

    Figure 3.1: A packet’s journey from a host to a WAN device. The WAN transmission is continuous and does not have to wait for acknowledgement or permission. Let’s take a look at how this process would work in a T1 line. T1 has 24 slots in each frame; each slot is 8 bits, and there is 1 framing bit: 24 slots x 8 bits + 1 framing bit = 193 bits T1[...]

  • Seite 72

    The capability of broadband to carry multiple signals enables it to have a higher transmission speed. Table 3.2 displays the various broadband transmissions, which require more expensive and specialized transmitters and receivers. Table 3.2: The different broadband transmission types and their bandwidth. Transmission Type Bit Rate DS2 6.312Mbps E2 [...]

  • Seite 73

    STS− n is an interleaving of multiple ( n ) STS−1s. The size of the payload and the overhead are multiplied by n . Figure 3.4 displays an STS diagram. Figure 3.4: The STS−1 framing and STS− n framing. The overhead and payload are proportionate to the n value, with the STS−1 frame as the base. You may wonder why we’re talking about synch[...]

  • Seite 74

    ATM frame user−network interface (UNI), or System Network Architecture (SNA). The MGX 8240 Private Line Service Gateway is designed to terminate private lease lines (T1, T3, or DS0). It has 16 slots with 1 reserved for a redundant control card. It can support up to 1,260 channelized T1s. It is designed for large Internet service providers (ISPs) [...]

  • Seite 75

    The BPX 8620 is a pure ATM broadband switch. It has a nonblocking 9.6Gbps architecture. The interface modules range from T3 to OC−12. Each trunk port can buffer up to 32,000 cells. The OC−12 interface module has two OC−12 ports. The OC−3 interface module has eight OC−3 ports. The BPX is commonly used in conjunction with multiple MGX switc[...]

  • Seite 76

    The system bus backplane contains multiple buses for connecting the modules. It has no active component. Different buses provide power to the modules, transfer of data, timing control, system commands, and other functionality. Cisco WAN Switch Network Topologies We’ve talked about the transmission media, the signal, and the equipment. Let’s put[...]

  • Seite 77

    nodes in the domain have limited contact with switches outside the domain. You will rarely see this design today, because the current switching software no longer supports it. Network Management In managing a wide area network, you have to understand the basic network management technology common to both LANs and WANs. You must understand IP addres[...]

  • Seite 78

    the network while highlighting any local problems. Connection Management —Provides a graphic interface to configure WAN switches. It provides templates to minimize the work in setting up many connections. All interface modules are supported, including VoIP/VoATM setups. • Performance and Accounting Data Management —Controls the collection of [...]

  • Seite 79

    Using the History Command You can display a list of the previous 12 commands by pressing the period (.) key; this command has a privilege level of 6. You can select which command to repeat by entering a number from 1 through 12. (Entering “1” repeats the most current command, “5” repeats the command five back in the list, and so on.) After [...]

  • Seite 80

    service, or StrataCom level. Displaying Other Switches To display a list of known switches, use the dspnds command. This command is privilege level 6. You should see only the one switch on the display until connectivity is established with other switches. You can add the optional parameter +n to display the switch number. Setting the Switch Name Yo[...]

  • Seite 81

    Accessing the MGX 8850 and 8220 The MGX 8850 has a control port, maintenance port, and LAN port. The control port is an EIA/TIA−232 Data Communications Equipment (DCE) interface. To access the control, you must use a terminal or a PC with a terminal emulation program. The maintenance port is an EIA/TIA−232 DCE interface that utilizes Serial Lin[...]

  • Seite 82

    Displaying a Summary of All Modules The command dspcds will display the summary information of all the modules. This is a level 6 command. The card number, card status, card type, switch name, date, time, time zone, and IP address are all displayed. The information is displayed one screen at a time. Press the Enter key to display a second screen, a[...]

  • Seite 83

    Configuring the IP Interface The command cnfifip is used to set the IP address, netmask, and broadcast address. Each parameter must be entered one at a time. The parameters are as follows: −if —The interface (26 for Ethernet, 28 for SLIP, or 37 for ATM) • −ip —The IP address • −msk —The network mask • −bc —The broadcast addres[...]

  • Seite 84

    Chapter 4: LAN Switch Architectures In Depth Knowing the internal architectures of networking devices can be a great asset when you’re working with Cisco switches. Knowing how the internal components work together, as well as how Application−Specific Integrated Circuits (ASICs) and CPUs are used, can give you an advantage in determining what Ci[...]

  • Seite 85

    Single BUS vs. Crossbar Matrix A single−BUS architecture is pretty simple: One BUS connects all the ports together. This setup creates a bandwidth problem called a blocking architecture , or what the networking industry likes to call over−subscription . Over−subscription is characterized as a condition in which the total bandwidth of all the [...]

  • Seite 86

    Synergy Advanced Multipurpose Bus Arbiter (SAMBA) ASIC • EARL ASIC The Encoded Address Recognition Logic (EARL) ASIC performs functions that are very similar to those of the Content Addressable Memory (CAM) table. Switches use this CAM to make filtering and forwarding decisions. The EARL ASIC connects directly to the data switching bus, allowing [...]

  • Seite 87

    This ASIC operates in either master or slave mode. In master mode, the ASIC allows ports access to the bus based on a priority level of normal, high, or critical. In slave mode, each port must post a request to each SAMBA ASIC, negotiate local port decisions, and arbitrate requests with the Supervisor Engine’s SAMBA ASIC. The Crescendo Processors[...]

  • Seite 88

    ARB The Arbiter (ARB) is located on each line module. It uses a two−tiered method of arbitration to assign queuing priorities and control data traffic through the switch. The arbiter controls the traffic coming to and from the line modules. In addition, a Central Bus Arbiter located on the Supervisor Engine module obtains permission to transmit f[...]

  • Seite 89

    through which all switched ports communicate. The AXIS bus is a partially asynchronous time division multiplexed bus used for switching packets between heterogeneous LAN modules. CEF ASIC The Cisco Express Forwarding (CEF) ASIC and Distributed Cisco Express Forwarding (dCEF) ASIC are Cisco’s newest ASICs, found in Cisco’s lines of routers and s[...]

  • Seite 90

    Per−destination load balancing —Enabled by default when you enable CEF. It allows multiple paths to be used for load sharing. Packets destined for a given destination or source host are guaranteed to take the same path, although multiple destinations are available. • Per−packet load balancing —Uses a round−robin approach to determine wh[...]

  • Seite 91

    Figure 4.3: Cisco Express Forwarding ASIC components. Note CEF supports Ethernet, Fiber Distributed Data Interface (FDDI), Point−to−Point Protocol (PPP), High−Level Data Link Control (HDLC), Asynchronous Transfer Mode (ATM)/AAL5snap, ATM/AAL5mux, ATM/AAL5nlpid, and tunnels. Phoenix ASIC The Phoenix ASIC is another ASIC used to handle high−s[...]

  • Seite 92

    connected to the QMAC ASIC. QMAC The QMAC uses four protocol handlers to support four Token Ring physical interfaces directly connected to the QTP ASIC. Together, these two ASICs provide support for early token release (ETR) and Token Ring Full Duplex (FDX) concentrator and adapter modes for dedicated Token Ring. Bridging Types In the early 1980s, [...]

  • Seite 93

    Source Route Transparent Bridging Source Route Transparent Bridging (SRT) is a combination of SRB and TB. SRT bridges make forwarding decisions based on either the Routing Information Field (RIF) for the destination or the MAC address in the frame. Some protocols attempt to establish a connection using a frame without using a RIF. These application[...]

  • Seite 94

    Switching Paths The switch is commonly referred to in marketing terms as a Layer 2 device. If you keep thinking that way, this section will confuse you. By definition, switching paths are logical paths that Layer 3 packets follow when they are switched through a Layer 3 device such as a router or internal route processor. These switching types allo[...]

  • Seite 95

    Autonomous Switching With autonomous switching, when a packet arrives on an interface, it is forwarded to the interface processor. The interface processor checks the silicon−switching cache; if the destination address is not contained in that cache, the autonomous cache is checked. The packet is encapsulated for autonomous switching and sent back[...]

  • Seite 96

    The first packet that’s copied to the NetFlow cache contains all security and routing information. If policy networking (such as an access list) is applied to an interface, the first packet is matched to the list criteria. If there is a match, the cache is flagged so that any other packets arriving with the flow can be switched without being comp[...]

  • Seite 97

    Booting the Supervisor Engine III from Flash To boot from a Flash device, use the following command: boot [device][image name] Note If you do not specify an image file name, the system defaults to the first valid file in the device. Remember that file names are case sensitive. Use the show flash command to view the Flash files. The device can be th[...]

  • Seite 98

    Enabling dCEF To enable dCEF operation, use the following command: ip cef distributed Disabling dCEF To disable dCEF operation, use the following command: no ip cef distributed Warning Never disable dCEF on a Cisco 12000 series. Disabling CEF on an Individual Interface When you enable or disable CEF or dCEF in Global Configuration mode, all support[...]

  • Seite 99

    show ip cef Viewing CEF Packet−Dropped Statistics To view the number of packets dropped from each line card, use the following command: show cef drop Viewing Non−CEF Path Packets To view what packets went to a path other than CEF, use the following command: show cef not−cef−switched Disabling Per−Destination Load Sharing If you want to us[...]

  • Seite 100

    Enabling Telnet Session Logging on a Set/Clear Command−Based IOS To enable session logging for a Telnet session, use the following command: set logging session enable Disabling Console Session Logging on a Set/Clear Command−Based IOS To disable session logging for a console session, use the following command: Catalyst5000> (enable) set loggi[...]

  • Seite 101

    You can use the logging timestamps in your system logging to help you keep track of when events happen. To enable the logging time stamp, use the following command in Privileged mode: Catalyst5000> (enable) set logging timestamp enable System logging messages timestamp will be enabled. Catalyst5000> (enable) Disabling the Logging Time Stamp o[...]

  • Seite 102

    Displaying the Logging Configuration Use the show logging command to display the current system message logging configuration. Use the no alias keyword to display the IP addresses instead of the host names of the configured syslog servers. This output shows how to display the current system message logging configuration: Catalyst5000> (enable) s[...]

  • Seite 103

    do not specify the number of messages, the default is to display the last 20 messages in the buffer ( −20 ). To display the first five messages in the buffer, use the following code: Catalyst5000> (enable) show logging buffer 5 2000 Aug 21 09:41:12 %SYS−5−MOD_OK:Module 1 is online 2000 Aug 21 09:41:14 %SYS−5−MOD_OK:Module 3 is online 2[...]

  • Seite 104

    Chapter 5: Virtual Local Area Networks In Depth Faced with the problems of a slow network, many network administrators make expensive mistakes. Several times, I have come across companies that have a fiber link to every desktop. In fact, an architectural firm I consulted for comes to mind. The company used hubs to deliver data to each desktop. When[...]

  • Seite 105

    the network. The processors in each node handle this task, which takes away from the processing power needed for other tasks and application—thus causing a slowdown that the users discover and complain about. Most network administrators pass off this slowness as a problem with the PCs, and the most vital PCs are rebuilt or replaced. When the comp[...]

  • Seite 106

    VLAN Basics Inter−Switch Link (ISL) protocol was designed to allow VLAN traffic to flow from one Cisco device to another. The protocol adds a header that uniquely identifies the source and destinations of the data as well as the VLAN the data is a member of. If data from one VLAN needs to be forwarded to another VLAN, it requires some type of Lay[...]

  • Seite 107

    processing). Broadcasts are used in each and every networking protocol. How often they occur depends upon the protocol, the applications running on the network, and how these network services are used. To avoid the older, chatty protocols, older applications have been rewritten to reduce their bandwidth needs even though bandwidth availability to d[...]

  • Seite 108

    This setup allows for a more secure network. In addition, network administrators now have more control over each port as well as the ability to deny the user based on the Layer 2 or Layer 3 address the user is using to access the port. Users no longer have the ability to just plug their workstation into any network port in the office and access net[...]

  • Seite 109

    VLAN Membership Policy Server (VMPS, discussed in the next section). In this situation, the administrator must have very defined goals, and network planning must be more detailed so as to not create bottlenecks in the WAN. Your goal in defining an end−to−end VLAN solution must be centered around the 20/80 Rule: Maintain 20 percent of the networ[...]

  • Seite 110

    Cisco also recommends a one−to−one ratio between VLANs and subnets. This means that you must understand how users are broken up by subnets. If you have 1,000 users in a building and 100 users are in each subnet, then you should have 10 VLANs. VLAN Trunking There are two types of VLAN links: a trunk link and an access link. An access link is par[...]

  • Seite 111

    IEEE 802.10 • IEEE 802.1Q • Inter−Switch Link (ISL) • LAN Emulation (LANE) • IEEE 802.10 The IEEE 802.10 standard is used to send VLAN information over a Fiber Distributed Data Interface (FDDI) physical link. In this situation, ISL is disabled and IEEE 802.10 is used to forward the VLAN frames. The Clear Header on a FDDI frame contains a [...]

  • Seite 112

    Unlike ISL, IEEE 802.1Q is not a Cisco proprietary protocol. It can be used to carry the traffic of more than one subnet down a single cable, and it is compatible with devices that are not running the Cisco IOS. 802.1Q changes the frame header with a standard VLAN format, which allows multiple−vendor VLAN implemen−tations. For example, a Bay Ne[...]

  • Seite 113

    High bit of source address (HSA) —The 3−byte manufacturer’s portion of the SA field or vendor field of the source port’s MAC address. • 15−bit descriptor —Used to distinguish the frame from other VLANs or colors. 10 bits are used to indicate the source port. • Bridge Protocol Data Units (BPDU) bit —Used to indicate Spanning Tree P[...]

  • Seite 114

    VTP Versions VTP comes in two versions: version 1 and version 2. The primary differences between the two version are few, but they are significant enough to render the two versions incompatible. The two versions will not work together in the same network. Version 1 is the default on Cisco Catalyst switches and supports Ethernet media. Version 2 pro[...]

  • Seite 115

    the updater’s identity, the updater’s timestamp, and the MD5 digest field. Subset advertisement —Contains very detailed information about the network, including the version, code, sequence number, management domain name, configuration revision number, and VLAN information fields. • VTP advertisements can contain the following information: 8[...]

  • Seite 116

    Many network administrators make the mistake of using the clear config all command, believing that it will erase the current revision number. Doing so is a bad mistake on the network administrator’s part. This command doesn’t do what it says it does—it doesn’t really “clear all.” VTP has its own NVRAM, so the VTP information as well as [...]

  • Seite 117

    Server Mode Server mode, which is configured by default, allows you to create, modify, and delete VLANs for the management domain. Configuration changes are then sent to all other participating members of the VTP domain. At least one VTP server should exist in the VTP management domain. Two or more switches can be configured as servers for redundan[...]

  • Seite 118

    than a simple hub can achieve. This ability enables a switch to take the place of another device, called a repeater. A repeater is a device dedicated only to data regeneration. Repeaters allow data to be forwarded over greater distances, allowing the data to overcome regular data distance limitations for the type of physical media being used. By fi[...]

  • Seite 119

    Figure 5.4: An example of an external router routing interVLAN traffic. Configuring a Static VLAN on a Catalyst 5000 Series Switch The Cisco Catalyst 2900G series, 5000 family, and 6000 family of switches use the Cisco Set/Clear−based CLI. It is important to understand the difference between the Catalyst 5000 series VLAN configuration and the Ent[...]

  • Seite 120

    User Interface Menu [M] Menus [K] Command Line [I] IP Configuration Enter Selection: K Once a CLI session on the switch is open, you must create a VLAN number and name. The command used to do this is as follows: vlan [ vlan# ] name [ vlan name ] command To use this command, you must be in Global Configuration mode on the switch. To enter Global Con[...]

  • Seite 121

    Viewing the VLAN Configuration on a 1900 Series Now that we have created the VLANs we want, we can use the show vlan command to see the configured VLANs. Notice that all unconfigured ports on the switch are in VLAN 1. The command is used from the Privileged mode prompt, as follows: 1912#show vlan The results are shown here: VLAN Name Status Ports ?[...]

  • Seite 122

    (vlans = 1..1005 An example of vlans is 2−10,1005) (trunk_type = isl,dot1q,dot10,lane,negotiate) The different port negotiation types are described in Table 5.1, and the different trunk encapsulation types are described in Table 5.2. Table 5.1: Port negotiation syntaxes for configuring VLAN trunks. Variable Description auto This trunking mode is [...]

  • Seite 123

    Mapping VLANs to a Trunk Port In the last example, we assigned port 2/1 as a trunk port using ISL encapsulation. Notice that we did not specify the VLANs to trunk. By default, all VLANs would be trunked. You can assign only VLANs 1 through 200 to be trunked across this configured trunk link, as shown here: Console> (enable) set trunk 2/1 on 1−[...]

  • Seite 124

    To remove VLAN 2 from a trunked port use the following command: 1912(config−if)#no trunk−vlan 2 1912(config−if)# Note No command is available to clear more then one VLAN at a time on the 1900. Verifying a Trunk Link Configuration on a 5000 Series To verify your trunk ports on a Catalyst 5000 series, use the show trunk command as follows: Cons[...]

  • Seite 125

    5000> (enable) set vtp v2 enable This command will enable the version 2 function in the entire management domain. All devices in the management domain should be version2−capable before enabling. Do you want to continue (y/n) [n]? y VTP domain modified 5000> (enable) Configuring a VTP Domain on a Catalyst 1900 Switch The 1900EN series switch[...]

  • Seite 126

    Configuring VTP Pruning on a Catalyst 1900 Switch To configure the switch for VTP pruning, use the following command: 1912(config)# vtp pruning Configuring VTP on a Set/Clear CLI Switch Before you can configure a router or internal route processor for interVLAN routing, you must enable VTP, assign a mode, and configure a domain. You enable and conf[...]

  • Seite 127

    1900EN(config)#vtp domain Coriolis 1900EN(config)# To set a VTP domain password on a 1900EN to “pass1” use the following command: 1900EN(config)# vtp password pass1 1900EN(config)# Verifying the VTP Configuration on a Set/Clear CLI To verify the VTP domain information, use the command show vtp domain . This command will show you the domain name[...]

  • Seite 128

    Digest Errors 0 VTP Pruning Statistics: Port Join Received Join Transmitted Summary Adverts received with no pruning support ———— ————————————— ———————————————— ——————————————————————— A 0 0 0 B 0 0 0 1912# Configuring VTP Pruning on a Se[...]

  • Seite 129

    Specify an IP routing protocol such as Open Shortest Path First (OSPF), Routing Information Protocol (RIP), Internet Gateway Routing Protocol (IGRP), or Enhanced IGRP (EIGRP) and identify the network: Cisco7505(config)#router rip Cisco7505(config−router)#network 192.1.0.0 2. Create a subinterface on a physical interface in Interface Configuration[...]

  • Seite 130

    Chapter 6: InterVLAN and Basic Module Configuration In Depth One of the first things you will discover in this chapter is that switch is merely a marketing term. When we think of a switch, we think of a device that operates at Layer 2. Well, in this chapter we’ll walk through the process of configuring Cisco switch−swappable cards and modules, [...]

  • Seite 131

    The FIB maintains a copy of the forwarding information contained in the IP routing table based on the next−hop address. The routing table is updated if routing or topology changes are detected in the network. Those changes are then forwarded to the FIB, and the next−hop information is recomputed based on those changes. Cisco Express Forwarding [...]

  • Seite 132

    proprietary protocol transfers the FIB information to a NetFlow Feature Card (NFFC or NFFC II) on a Cisco Catalyst 5000 series, or to another forwarding board or module on the higher−speed Cisco distributed switches. There is little difference between using an external router and an internal route processor as your source of the FIB to route Laye[...]

  • Seite 133

    segments, networks, or the Internet. A few types of route processors are available for Catalyst switches. They include: NetFlow Feature Card and NetFlow Feature Card II • Route Switch Module • Route Switch Feature Card • Multilayer Switch Module • NetFlow Feature Card and NetFlow Feature Card II The NFFC and NFFC II are feature cards that w[...]

  • Seite 134

    NFFC also provides protocol filtering to allow segmentation by VLANs. It can provide per−port filtering of data in four different groups: Internet Protocol (IP) • Internetwork Packet Exchange (IPX) • AppleTalk, DECnet, and Banyan Vines • Other group • Tip By default, the IP group is on, but it can be turned off for the other groups listed[...]

  • Seite 135

    load−balance the channels. VLAN 0’s MAC address is the address assigned to the programmable ROM (PROM) on the line communication processor (LCP) located on the RSM. This MAC address can be used for diagnostic purposes and to identify the RSM’s slot number. All the other VLANs are assigned the base MAC address from the RSM PROM, which is prepr[...]

  • Seite 136

    EIGRP checks its topology table for a suitable new route to the destination. If a route exists in the table, EIGRP updates the routing table with the new route and purges the old route from the table. Unlike other routing protocols, EIGRP saves WAN−link bandwidth by sending routing updates only when routing information changes. It also takes into[...]

  • Seite 137

    Figure 6.1: The Catalyst Supervisor Engine I and II. Media Access Control Addressing and VLANs —Support for 16,000 active MAC addresses for up to 1,024 VLANs allocated dynamically between active ports. • Management —Support for Simple Network Management Protocol (SNMP) for statistical management. The SE also supports access and management thr[...]

  • Seite 138

    Figure 6.3: The Catalyst Supervisor Engine III G. Gigabit Interface Converter (GBIC) for use with multimode fiber (MMF) or single−mode fiber (SMF) interfaces using SC connectors • An MCF5102 processor • Using the Supervisor Engine If you installed the Supervisor Engine from another switch, it probably has been configured for other interfaces;[...]

  • Seite 139

    The auto syntax allows the port to autonegotiate the port speed. On an Ethernet or Fast Ethernet interface, use the command set port duplex mod_num/port_num {full|half|auto} to set the port duplex mode. Again, the auto syntax can be used to allow the port to autonegotiate the duplex mode. Port Security You can use port security to block a NIC on an[...]

  • Seite 140

    —— —————————————————————————————————————— ——— ——— ———— 1 00−40−0b−80−54−00 to 00−40−0b−80−57−fi 2.0 3.1.2 4.3(la) 2 00−40−0b−03−5d−58 to 00−40−0b−03−5d−6f 3.1 4.3(l) 4.3(la) 3 00−43−0d−91−45−66 to 00?[...]

  • Seite 141

    Router> Enter Global Configuration mode with the following commands: Router> enable Router# configure terminal Warning When you make changes in this mode, they must be saved to NVRAM. Otherwise, the next time you recycle the switch, the changes will be lost. The command to save changes is copy running−config startup−config . 3. Assign the[...]

  • Seite 142

    ———— ——————————— ———————— ———— ————— —————— ————— —————— 2/3 FileServer1 connect 1 normal a−half a−100 10/100BaseTX Configuring a Default Gateway on a Catalyst 5000 Before IP management from another subnet or network can take place through Telnet, [...]

  • Seite 143

    Note The commands for configuring the RSM, RSFC, and MSM are the same. Viewing the RSM’s Running Configuration To view the RSM’s running configuration, use the show running−config command as shown here: Coriolis5000RSM# show running−config Building configuration… Current configuration: ! version 11.2 no service udp−small−servers no se[...]

  • Seite 144

    RSM1>enable RSM1#configure terminal Enter configuration commands, one per line. End with CNTL/Z. RSM1(config)#interface vlan 2 RSM1(config−if)# %LINEPROTO−5−UPDOWN: Line protocol on Interface Vlan2, changed state to down Assign IP addresses to the VLAN interfaces: 3. RSM1(config−if)#ip address 172.20.52.33 255.255.255.224 RSM1(config−i[...]

  • Seite 145

    Router# Viewing the RSM Configuration Just as on a router, you use the show running−config to view the running configuration: Coriolis5000RSM# show running−config Building configuration… Current configuration: ! version 11.2 no service udp−small−servers no service tcp−small−servers ! hostname Coriolis5000RSM ! enable book1234 ! ! inte[...]

  • Seite 146

    1 00−60−15−be−55−80 2/1 Total Matching CAM Entries Displayed = 7 Configuring Filtering on an Ethernet Interface To configure protocol filtering for IP only, follow these steps: To configure protocol filtering on the Ethernet, Fast Ethernet, or Gigabit Ethernet ports, you must first enable protocol filtering on the switch. To enable protoc[...]

  • Seite 147

    Port Single−Col Multi−Coll Late−Coll Excess−Col Carri−Sen Runts Giants ———— —————————— —————————— ————————— —————————— ———————— ——————— —————— 2/3 0 0 0 0 0 0 0 Last−Time−Cleared —————————?[...]

  • Seite 148

    Configure the password for Enable mode. Press Enter for the old password if none has ever been configured: Catalyst5000> (enable) set enablepass Enter old password: Enter new password: coriolis2 Retype new password: coriolis2 Password changed. Catalyst5000(enable) 4. Enter the IP address and the default gateway (router) for the switch on the Sup[...]

  • Seite 149

    Several other commands can be used to configure the Supervisor Engine. The following list shows some of them: set boot config−register ignore−config enable —Sets the switch to ignore the contents of the configuration on NVRAM at startup • set boot config−register 0xvalue [ module number ] —Sets the configuration register value • set b[...]

  • Seite 150

    Fw : 4.3(1) Sw : 5.5(2) DRAM FLASH NVRAM Module Total Used Free Total Used Free Total Used Free —————— ————— ———— ————— —————— ————— ————— ————— ———— ———— 1 32640K 20331K 12309K 8192K 5548K 2644K 512K 185K 327K Uptime is 2 days, 19 hours, 3 minutes Cat[...]

  • Seite 151

    Configuring Redundancy Using HSRP To configure HSRP on router interfaces, perform the following steps: Enter Interface Configuration mode and identify a standby group and an IP address: standby [group−number] ip [ip−address] 1. Identify the priority for the HSRP interface. The interface with the highest priority becomes active for that HSRP gro[...]

  • Seite 152

    RSM2(config−if)#standby 10 authentication Secret RSM2(config−if)#interface vlan20 RSM2(config−if)#ip address 172.16.20.2 255.255.255.0 RSM2(config−if)#no shutdown RSM2(config−if)#standby 20 ip 172.16.20.10 RSM2(config−if)#standby 20 preempt RSM2(config−if)#standby 20 timers 5 15 RSM2(config−if)#standby 20 authentication Covert RSM2([...]

  • Seite 153

    Chapter 7: IP Multicast In Depth Over time, our use of computers has moved from the local desktop to the local network. Most of this network traffic consists of using local network sources, such as printing and file transfers. As our personal computers become more powerful, the applications that we use now contain more audio and video components. W[...]

  • Seite 154

    Unicast • Multicast • Broadcast In its simplest form, broadcast traffic consists of packets that reach every point of the network. In a typical network, broadcasts are stopped at the router. You can set the router to forward broadcasts, but doing so is not very efficient—it creates a lot of traffic on the network and slows the end users’ ma[...]

  • Seite 155

    Figure 7.2: Unicast traffic flow. Multicast Multicast is a combination of broadcast and unicast. It sends one copy of the packet to many hosts that requested it, thereby using less bandwidth. It also saves bandwidth by not sending the packet to the portion of the network whose hosts didn’t request the transmission. Multicast accomplishes this tas[...]

  • Seite 156

    each other and with the server by multicast. When an individual driving a tank or a fighter enters a grid square, it joins the multicast group to receive that square’s simulation traffic. As the individual moves from square to square, the individual’s multicast group membership changes. IP multicasting uses Class D network addresses to route da[...]

  • Seite 157

    The X bits are not used. The remaining bits 000 1010 0000 1000 0000 0101 give you 0a:08:05. Put that result together with 01:00:5e: and you get 01:00:5e:0a:08:05. Here is another example, using the multicast address 224.127.15.10: 1110 0000 0111 1111 0000 1111 0000 1010 XXXX XXXX X111 1111 0000 1111 0000 1010 After removing the X portion, the secti[...]

  • Seite 158

    Address Destination .1 All systems in this subnet 224.0.0.2 All routers in this subnet .4 Distance Vector Multicast Routing Protocol .5 Open Shortest Path First (OSPF) routers .6 Open Shortest Path First (OSPF) designated routers .7 Routing Information Protocol 2 (RIP2) routers .8 Internet Gateway Routing Protocol (IGRP) routers .9 Dynamic Host Con[...]

  • Seite 159

    shortest path tree (SPT) because it uses the shortest path to reach the destination. This design functions very well in a one−to−many model, but it has drawbacks when used in a many−to−many model. For example, a live concert has only one source, so there will be only one distribution tree in the router for the multicast group. But in a vide[...]

  • Seite 160

    Distance Vector Multicast Routing Protocol DVMRP is based on RIP and is widely used. Just like RIP, it uses a distance vector (hops) and sends out periodic route updates. It’s different from RIP in that it is classless and has a hop limit of 32 rather than 16. When DVMRP is first implemented on a router, it sends a probe packet with its IP addres[...]

  • Seite 161

    receive the multicast traffic sends a PIM join message toward the root node (rendezvous point). As this join message travels up the tree, the multicast routers along the way forward the requested traffic back down the tree to the destination. To put it in a simple form, PIM−DM will send the multicast traffic everywhere until it is told not to. PI[...]

  • Seite 162

    responses, it will build a list of all the multicast groups for that interface. Any other router on the same subnet will also receive the responses and will have the same information. Note A host does not have to wait for a host membership query to send out a membership report. It could send an unsolicited membership report, a process sometimes mis[...]

  • Seite 163

    Time to Live Using the IP time to live (TTL) field is an important IGMP topic. The TTL field is a value in an IP packet that tells a network router whether the packet has been in the network too long and should be discarded. A multicast datagram with a TTL of 0 is allowed only on the same host. A TTL of 1 (the default value) is allowed only on the [...]

  • Seite 164

    This process looks simple. As a host joins the multicast group, its port number is added to the CAM table; as the host leaves, its port is removed from the CAM table. However, this entire process forgets about the switch’s processor. The switch must also receive the multicasts in order to receive the join and leave messages. If a steady stream of[...]

  • Seite 165

    GARP Multicast Registration Protocol Generic Attribute Registration Protocol (GARP) Multicast Registration Protocol (GMRP) prevents multicast flooding on the switch. This protocol provides a way for the host to communicate with the switch at the MAC level. It runs independently of the Layer 3 protocol. GMRP software must be running on both the host[...]

  • Seite 166

    Configuring the Rendezvous Point You can configure the rendezvous point (RP) manually or let it be auto−discovered. To configure the RP manually, you have to configure the routers that have either the sender of the multicast traffic or the receiver of the multicast traffic connected to its segment. The RP router can be any router on the network a[...]

  • Seite 167

    Changing the IGMP Host−Query Message Interval As mentioned earlier, the router sends IGMP host−query messages to the network to discover which multicast group is still active. You can modify the message interval setting to accommodate your network’s bandwidth/utilization (the default is 60 seconds): Router(config−if)# ip igmp query−interv[...]

  • Seite 168

    ———— ———————— 2/14 * 3 3/1 1 Total Number of Entries = 2 ‘*’ − Configured The asterisk between the port and the VLAN number means the multicast router port was manually configured. Removing the Multicast Router Use the following command to remove the multicast router port: Coriolis> (enable) clear multicast router 2[...]

  • Seite 169

    Displaying IGMP Statistics To display IGMP statistics for all VLANs, use the show igmp multicast statistics command as shown here: Coriolis> (enable) show igmp statistics IGMP enabled IGMP fastleave disabled IGMP statistics for vlan1: Total valid pkts rcvd: 17564 Total invalid pkts recvd 0 General Queries recvd 235 Group Specific Queries recvd 0[...]

  • Seite 170

    Total Number of Entries = 1 To get more detail about the multicast groups, use this command: Coriolis> (enable) show multicast group [ vlan ] CGMP disable IGMP enable VLAN Dest MAC/Route Des Destination Ports or VCs / [Protocol Type] ———— —————————————————— ———————————————[...]

  • Seite 171

    valid igmp leaves received 0 valid igmp queries received 568 igmp gs queries transmitted 0 igmp leaves transmitted 0 failures to add GDA to EARL 0 topology notifications received 10 number of CGMP packets dropped 2456875 Configuring RGMP on the Switch RGMP is disabled by default. Use the following command to enable RGMP globally: Coriolis> (enab[...]

  • Seite 172

    To display the total number of RGMP groups, use the following command: Coriolis> (enable) show rgmp group count [ vlan ] Total Number of Entries = 2 Displaying RGMP−Capable Router Ports To display the ports to which RGMP routers are connected, use the following command: Coriolis> (enable) show multicast router rgmp PortVlan —————?[...]

  • Seite 173

    Disabling GMRP To disable GMRP globally, use the following command: Coriolis> (enable) set gmrp disable GMRP disabled. Enabling GMRP on Individual Ports You can enable GMRP on a per−port basis using this command: Coriolis> (enable) set port gmrp enable 2/1−12 GMRP enabled on ports 2/1−12. But don’t be fooled—the switch will let you [...]

  • Seite 174

    To configure Fixed mode, use the following command: Coriolis> (enable) set gmrp registration fixed 2/1 GMRP Registration is set fixed on port 2/1. To configure Forbidden mode, use the following command: Coriolis> (enable) set gmrp registration forbidden 2/1 GMRP Registration is set forbidden on port 2/1. Displaying the GMRP Configuration To d[...]

  • Seite 175

    GMRP and GARP are interchangeable for the set and show commands. GMRP is considered an alias of GARP. Configuring Bandwidth−Based Suppression Bandwidth−based suppression is a hardware−based suppression method. The threshold is set as a percentage of the port’s bandwidth. When the multicast/broadcast traffic exceeds the threshold within a on[...]

  • Seite 176

    Chapter 8: WAN Cell Switching In Depth WAN switching is defined as the process of forwarding data traffic across a wide area network. WAN switching uses cell relay technology to multiplex all network traffic across WAN trunk links without a predefined timeslot for each type of connection. Cell relay networks use small, fixed−length packets called[...]

  • Seite 177

    Scalability —ATM is highly flexible, accommodating a wide range of traffic types, traffic rates, and communications applications. • An ATM network includes two types of devices: ATM switches and ATM endpoints. One type of ATM interface, called a user−network interface (UNI), connects an ATM device to a switch; a second type, called a network?[...]

  • Seite 178

    ATM Protocols The protocols used in ATM have been specifically designed to support high−speed networks at speeds ranging up to gigabits per second (Gbps). Other physical LAN topologies, such as Gigabit Ethernet, provide high−speed networking and work very well in LANs. ATM, on the other hand, can handle network Gbps traffic in both LAN and WAN [...]

  • Seite 179

    the result by 2—and thus the data portion of the ATM cell contains 48 bytes. Figure 8.1: The ATM cell. The fixed size of the ATM cells provides some the following benefits: Efficient bandwidth use of the physical medium • Ability of applications to share the network more fairly • Accommodation for bursty applications • Effective recovery of[...]

  • Seite 180

    The ATM Cell Header The ATM cells can be found in one of two formats, depending on whether the endpoints are a UNI or an NNI connection. The two differ in one way: The NNI header does not contain a Generic Flow Control (GFC) field. The NNI header has a Virtual Path Identifier (VPI) that occupies the entire first 12 bits. A cell header for a UNI cel[...]

  • Seite 181

    ATM layer is responsible for establishing connections and passing cells through the ATM network. The ATM Adaptation layer translates the different types of network traffic. Four AALs are defined, but only three are actively in use: AAL1 —Used to transport timing−dependent traffic such as voice • AAL3/4 —Used by network service providers in [...]

  • Seite 182

    The ATM Adaptation Layer The ATM Adaptation Layer (AAL) provides the translation between the larger service data units of the upper layers of the OSI Reference Model and ATM cells. It works by receiving packets from the upper−level protocols and breaking them into 48−byte segments to be dumped into the payload of an ATM cell. The AAL has two su[...]

  • Seite 183

    Variable bit rate−real time (VBR−RT) —Typically used for connections that carry VBR traffic in which a fixed timing relationship exists between either VBR video or voice compression. • Variable bit rate−non real time (VBR−NRT) —Used to carry VBR traffic in which no timing relationship exists for data traffic where a guarantee of bandw[...]

  • Seite 184

    changing the application itself or Layer 3 drivers. This approach allows backward compatibility with existing LANs, broadcast support, and connectionless delivery. LANE has some drawbacks, however: It prevents the use of ATM−specific benefits such as QoS and doesn’t have the ability to provide flexible bandwidth allocations. LANE is the primary[...]

  • Seite 185

    Broadcast and Unknown Server (BUS) —Sends broadcasts, sequences cells, controls unicast flooding, and distributes multicast packets. • Warning Notice that although LEC and LECS sound the same, they are completely different terms and components in LANE. LAN Emulation Client (LEC) The LEC resides in every ATM end system. It provides services to e[...]

  • Seite 186

    The ultimate goal of the LES is to arrange and control connections with a LEC. This connection is commonly known as a control direct ATM virtual channel connection (VCC) . After this connection is established, it will handle address resolution and registration responses. Note The LES establishes communication with the LECS and provides verification[...]

  • Seite 187

    Broadcast and Unknown Server (BUS) The BUS provides broadcasting support for an ELAN. The BUS distributes multicast data, sends or distributes unicast data, and connects the other LANE components. When the destination address of an Ethernet or Token Ring frame contains a local broadcast or a multicast address, the LEC forwards the traffic to the BU[...]

  • Seite 188

    The default ELAN name • The LEC address and corresponding LES • The ELAN name and corresponding LES • The ATM address prefix and corresponding LES • The ELAN type and corresponding LES • The ELAN name • The corresponding ATM address of a LANE server • A LANE client MAC address • A client MAC address with the corresponding ELAN name [...]

  • Seite 189

    In the ATM LANE communications process, when a client wants to join an ELAN, the client must build a table that links ATM addresses to Ethernet MAC addresses. Let’s take a close look at this process: The LEC first sends a LAN Emulation ARP (LE_ARP) message to the LES that is using a point−to−point configure direct VCC. This query is made to t[...]

  • Seite 190

    LE_ARP_REQUEST —Contains the broadcast MAC address 0xFFFFFFFF. This packet is sent on a control direct VCC to the LES to query for the ATM address of the BUS. • LE_ARP_RESPONSE —Sent in response to an LE_ARP_REQUEST; it contains the ATM address of the BUS. • LE_JOIN_RESPONSE —Contains the LANE client identifier (LECID) that is a unique id[...]

  • Seite 191

    Let’s step through the process. Suppose that you were working on an ELAN and you wanted to access a file stored on a server that was located on a physically separate LAN: You send the file request. Your LEC determines if it knows the ATM address of its LES. 1. If your LEC does not know this address, the client queries the LECS and asks for the AT[...]

  • Seite 192

    LANE Modules The following ATM LANE modules are available for the 5000 family of switches; the list also indicates the cable types that can connect to each. Tables 8.1 and 8.2 show the LED lights and functions on the LANE modules. These modules provide a connection between multiple ATM networks connecting through the ATM switch: Table 8.1: LANE mod[...]

  • Seite 193

    Supervisor Engine’s console port. Tip Even though the LANE module is configured through the Supervisor Engine, the Supervisor Engine maintains no configuration information regarding the LANE module. This information is stored on the LANE module itself. Segmentation and Reassembly In a frame−based network such as Ethernet, packets sent on the ph[...]

  • Seite 194

    After the destination node receives the LE_ARP response from the LES, the destination client responds to the source with its address information. The source sends a “flush” message to the BUS, which instructs the BUS to stop sending any unsent cells—the source will now establish a direct connection with the destination and send the remaining [...]

  • Seite 195

    LANE Server: 47.00817200000000E04BAAA006.00E04BAAA061.** LANE Bus: 47.00817200000000E04BAAA006.00E04BAAA062.** LANE Config Server: 47.00817200000000E04BAAA006.00E04BAAA063.00 note: ** is the subinterface number byte in hex Note The asterisks in this example indicate that the addresses are in hexadecimal. The ATM LANE module does not list these addr[...]

  • Seite 196

    ATM(config)#interface atm0.1 Map the LEC bus to the Ethernet ELAN named “default”: ATM(config−subif)#lane client ethernet default 3. Repeat Steps 2 and 3 for each LEC you want to configure on this LANE module. 4. Enter Interface Configuration mode for the ATM0 subinterface 2: ATM(config−subif)#interface atm0.2 5. Map the LEC bus to the Ethe[...]

  • Seite 197

    Configuring the LECS Prior to configuring the LECS, you will need to go to each LES and get its ATM address. This address can be gathered with the following command: ATM#show lane server LE Server ATM0.1 ELAN name: default Admin: up State: operational type: ethernet Max Frame Size: 1516 ATM address:47.00918100000000E04FACB401.00100DAACC41.01 LECS u[...]

  • Seite 198

    ATM(config−if)#lane config database ELAN2 ATM(config−if)#end Verifying the LECS Configuration Verify the proper setup with the following command: ATM#show lane config LE Config Server ATM0 config table: ELAN2 Admin: up State: operational LECS Mastership State: active master list of global LECS addresses (58 seconds to update): 47.00918100000000[...]

  • Seite 199

    Chapter 9: LightStream Switches In Depth The demand for high−speed network communications has skyrocketed in the past 20 to 30 years. In the early 1970s, 9.6Kbps was considered a high−speed network. Now that we have entered the next century, network speeds have surpassed 1Gbps with the introduction of 10Gbps technologies. This advancement has l[...]

  • Seite 200

    FDDI 100Mbps STS−3c/STM−1 155Mbps TAXI 4B/5B 100Mbps LightStream 1010 The LS1010, shown in Figure 9.2, is the most recent addition to the LightStream series of ATM switches used for multiservice applications. The switch has a five−slot, modular chassis with two fault−tolerant, load−sharing power supplies. The switch contains a central slo[...]

  • Seite 201

    UBR + MCR A unique Cisco class for best−effort data traffic delivery with a specified minimum bandwidth. This class is used in a LAN for high−end resource applications or in a WAN with an ATM for a guarantee of a certain amount of bandwidth (also called a committed information rate [CIR]). One of the great features of the LightStream 1010 switc[...]

  • Seite 202

    Neighborhood Discovery Function The neighborhood discovery function (NDF) can be used to provide a means for locating all the other nodes in the network and to simplify the network configuration process. This tool helps to eliminate the need to manually configure some of the attributes of interface modules inside the LS2020 switch. CDF enables the [...]

  • Seite 203

    algorithm to determine the path for any data that arrives and needs to be switched through the network. The routing algorithm calculates the minimum distance path through the network, verifies the availability of bandwidth, and then sets up a connection between the two ATM endpoints in the network. The routing algorithm can use metrics to determine[...]

  • Seite 204

    Default settings are in square brackets ’[]’ Would you like to enter the initial configuration dialog? [yes] From this prompt, you can enter the initial configuration dialog or decline and manually enter the configuration. This choice allows an administrator to use the Command Line Interface (CLI) on the LightStream switch. If you are not famil[...]

  • Seite 205

    The MPC Configuring an MPC on a router provides router−initiated and router−terminated shortcuts for non−NBMA networks. The MPC functionality involves the following: Data−plane and control−plane VCC management • Ingress/egress cache management • MPOA frame processing • MPOA protocol and flow detection • An MPC identifies packets s[...]

  • Seite 206

    CoriolisLS1010> enable Use the config terminal command to enter Global Configuration mode: CoriolisLS1010# config terminal 2. You must identify the route for traffic to take to the internal network (referred to as a static route ) using the ip route command, as shown here: CoriolisLS1010(config)# ip route 63.78.127.0 255.255.255.0 ethernet 0 3. [...]

  • Seite 207

    IF−Side: Network IF−type: NNI Uni−type: not applicable Uni−version: not applicable CoriolisLS1010# Viewing the Configured Virtual Connections To view the configured virtual connections, use the show atm vp command as shown here: CoriolisLS1010# show atm vp Interface VPI Type X−Interface X−VPI Status ATM3/0/2 2 PVP TUNNEL CoriolisLS1010#[...]

  • Seite 208

    control distribute: vcd 1452, 3 members, 196 packets proxy/ (ST: Init, Conn, Waiting, Adding, Joined, Operational, Reject, Term) lecid ST vcd pkts Hardware Addr ATM Address 1 O 1451 6 0060.705a.8f02 47.0091810000000060707B8A01.0060705A8B12.01 2 O 1455 10 00e0.d7b1.ba12 47.0091810000000060707B8A01.112233461176.02 3P O 1466 59 0090.a2fb.b430 47.00918[...]

  • Seite 209

    ——— ———————— ————————— —————————— —————— 2 EARL 1+ WS−F5511 0002278010 1.0 Mod SMT User−Data T−Notify CF−St ECM−St Bypass ——— ——————————————————— ———————— —————— ——————— ————[...]

  • Seite 210

    To identify an MPS with a specific name, use the following command: mpoa server config name mps−name 1. The ATM address that specifies the control ATM can be optionally identified using this command: atm−address atm−address 2. To specify the network ID, use the following command: network−id id 3. To identify a keepalive time value, use the [...]

  • Seite 211

    Use the lane client ethernet command followed by the name of the ELAN to configure a LANE client: 5. CoriolisLS1010(config−if)# lane client ethernet elan−name Powering on the LightStream 100 ATM Switch To power on the LightStream 100 ATM switch, use the following steps: Turn the power switch to the on position, which is depicted by a symbol tha[...]

  • Seite 212

    Recovering a Lost Password To recover a password, such as that used for the root account, look at the following example (the output is quite long, so unnecessary information has been omitted): Type ‘. to get a Test and Control System (TCS) hub prompt. user name:’. TCS HUB<> At the TCS hub prompt, use reset and connect to reset the NP card[...]

  • Seite 213

    NCR 53C710: Chip Revision: 0x2, IB: 0xec18e000 LynxOS/68040−MVME167 Version 2.1.0 Copyright 1992 Lynx Real−Time Systems Inc. All rights reserved. LynxOS release 2.1.0, level 1: NP−LynxOS #112: compiled Nov 08 1994 19:49:33 Single−user boot single−user$ Type ’. to get a TCS hub prompt: single−user$ ’. TCS HUB<> Reset the NP car[...]

  • Seite 214

    user name: coriolisuser password: This process changes the password and recovers any lost passwords. 198[...]

  • Seite 215

    Chapter 10: Layer 2 Redundant Links In Depth If your company has ever experienced a critical work stoppage due to a downed server or a network outage, you understand how critical it is to implement redundancy in your network. No matter what happens with an individual link in your network, the other links should take over using redundant links. The [...]

  • Seite 216

    Broadcast frames • Multicast frames • Unknown unicasts • Broadcast and Multicast Frames Broadcast and multicast frames are unique in that neither has a specified destination hardware address. The source address is also the hardware address of the device that sent the frame. In the case of broadcasts, the destination address shown in the heade[...]

  • Seite 217

    and Electronics Engineers (IEEE) a protocol similar to STP to become a networking standard. However, after the IEEE 802 committee revised it into what is now known as the IEEE 802.1D standard (Spanning Tree Protocol), the protocol differed just enough from DEC’s version that they were incompatible. Danger! Data Loops! Data loops can easily become[...]

  • Seite 218

    Figure 10.2: An example of a directed graph. STA assigns each switch in the network a unique identifier. This identifier is one of the switch’s MAC addresses, as well as an assigned priority (explained in more detail later in this chapter in “The Selection Process”). After STA assigns each switch this unique identifier, it then assigns each p[...]

  • Seite 219

    Figure 10.3: The root bridge calculating the path cost to switch D. The lowest calculated path is not always the most ideal path. For example, if multiple high−speed links to a destination exist, the links may total more than the cost of a very slow link, such as a modem. Even though the straight path has the fewest hops, it is much slower than u[...]

  • Seite 220

    Version —Contains 1 byte and the value of zero. • Message Type —Contains 1 byte and the value of zero. • Flag —Contains 1 byte; only the first 2 bits are used. The topology change (TC) bit signals that there has been a topology change. The topology change acknowledgment (TCA) bit is then set to acknowledge receipt of a configuration messa[...]

  • Seite 221

    Parent and Child Switches A switch’s diameter is a unit of measurement between the root switch and child switches. The root bridge counts as the first switch. Each subsequent child switch out from the root bridge is counted to yield the diameter number. A parent switch brings you one switch closer to the root bridge, and a child switch takes you [...]

  • Seite 222

    Secondary root bridge priority 16,384 Root bridge priority 8,192 The switches participating in STP (other than the root bridge) must form an association with the root bridge shortly after the root bridge has been elected. Each switch examines each BPDU as it arrives on each port. When a switch receives the same information on more than one port, it[...]

  • Seite 223

    Equal Cost Paths If two or more links have the same root path cost, such as two identical links running between two switches, STA has a problem choosing the designated port or a root path through the network using the lowest path cost. The bridge ID is used to determine the root bridge in the network and also the root port. By default, the priority[...]

  • Seite 224

    For example, the downtime caused by using the defaults would be the following: 2 * 15 + 20 = 50 seconds Now that you have learned about the timers and how BPDUs operate in the network, let’s take a closer look at how ports transition through different states before forwarding data. STP Port States Each port participating in STP transitions throug[...]

  • Seite 225

    Per−VLAN Spanning Tree You can have many instances of STP running in your network. By running a different instance of STP on a per−VLAN basis, you can run some VLANs on ports that are blocked by another instance of STP running on another VLAN. In this way, you can set the priority of each port on a per−VLAN basis, allowing you to use the redu[...]

  • Seite 226

    the network. Thus, eight wires can be used to simulate one link able to handle up to 800Mbps and load balance data across those links, as shown in Figure 10.7. Figure 10.7: Eight equal−cost links between two switches, creating a bundle of eight channels acting as a single link. Let’s take a look at what occurs during a link failure in an EtherC[...]

  • Seite 227

    capability. The channel is then added to the spanning tree as a bridge port. Warning Dynamic VLAN ports can force a VLAN change; as a result, PAgP cannot be used to form a bundle on ports that are configured for dynamic VLANs. The VLANs must be static VLANs, meaning that the port on the switch must be assigned to a VLAN. PAgP also requires that all[...]

  • Seite 228

    The switch must have at least one blocked port. • The failure must be on the root port. • If a link fault occurs on the primary root link, UplinkFast transitions the blocked port to a forwarding state. UplinkFast changes the port so that it bypasses the listening and learning phases. This change occurs in three to four seconds, allowing converg[...]

  • Seite 229

    Enabling STP on a Set/Clear Command−Based Switch for All VLANs To enable STP on all VLANs, use the following command in Privileged mode: set spantree enable all Related solutions: Found on page: Configuring a Static VLAN on a Catalyst 5000 Series Switch 154 Configuring Multiple VLANs on a Catalyst 5000 Series Switch 154 Disabling STP on a Set/Cle[...]

  • Seite 230

    Bridge Max Age 20 Sec Hello Time 2 sec Forward Delay 15 sec Port vlan Port−State Cost Priority Fast−start Group−Method ———— ———— —————————— ———— ———————— —————————— ———————————— 5/1 2 forwarding 19 32 disabled 5/2 2 forwarding 19 32 disable[...]

  • Seite 231

    Viewing the STP Configuration on a Command Line Switch To view the configuration, you use the same command you use for the Set/Clear command−based switches. However, you will receive much different output. Use this command: show spantree The output should look similar to this on your console: VLAN1 is executing the IEEE compatible Spanning Tree P[...]

  • Seite 232

    secondary (optional) Used to designate the switch as a secondary root switch if the root bridge fails. The default priority of the secondary bridge is 16,384. n (optional) Specifies the VLAN. If you do not specify the VLAN, VLAN 1 is used. The valid value range is 1 through 1,005. dia n (optional) Specifies the diameter value discussed earlier in t[...]

  • Seite 233

    This example uses 100 as the port cost: spantree cost 100 Verifying the Port Cost Configuration on Both a Set/Clear Command− and CLI−Based Interface To verify the port cost on the port configured previously, use the following Privileged mode command: show spantree < module/port > The following command provides output on module 0, port 3: [...]

  • Seite 234

    Verifying the STP Port Priority on a Set/Clear Command−Based Switch To verify the proper port priority setting, use this command (only the module and port numbers are required): show spantree < module/port > The following command provides output on module 2, port 3: show spantree 2/3 Port Vlan Port−State Cost Priority Portfast Channel_id [...]

  • Seite 235

    Adjusting the MaxAge Timer on a Set/Clear Command−Based IOS To change the default MaxAge timer for a particular VLAN, use this Privileged mode command : spantree maxage < time value > < VLAN > In the following example, 5 refers to the MaxAge time and 1 refers to the VLAN: spantree maxage 5 1 Preparing to Enable EtherChannel When prepa[...]

  • Seite 236

    Channel 2/1−2,2/1−4 Broadcast suppression percentage(0−100) Flow control receive−(off,on),send−(off,on) Security yes Membership static,dynamic Fast start yes QOS scheduling rx−(none),tx−(none) CoS rewrite yes ToS rewrite IP−Precedence Rewrite yes UDLD yes AuxiliaryVlan 1..1000,untagged,dot1p,none SPAN source,destination Creating an [...]

  • Seite 237

    another port that is in the desirable or auto mode. Verifying the EtherChannel Configuration To verify the EtherChannel configuration on a Set/Clear command−based switch, use this command: catalyst5000> (enable) show port channel ? info Show port channel information statistics Show port channel statistics <mod> Module number <mod/port[...]

  • Seite 238

    group ———— ———— —————————————————————————————— ————————————— ———————— 10 2/1 10 2/2 10 2/3 10 2/4 Configuring EtherChannel on an IOS−Based Switch To configure EtherChannel on an IOS command−based switch such as the 1900EN series[...]

  • Seite 239

    catalyst5000> (enable) show interface sl0: flags=51<UP,POINTOPOINT,RUNNING> slip 0.0.0.0 dest 0.0.0.0 sc0: flags=63<UP,BROADCAST,RUNNING> vlan 1 inet 208.44.88.4 netmask 255.255.255.192 broadcast 208.44.88.63 catalyst5000> (enable) Enabling PortFast on a Set/Clear Command−Based Switch To enable PortFast on a Set/Clear command−[...]

  • Seite 240

    Disabling PortFast on a CLI−Based IOS Switch To disable PortFast on a Cisco IOS command−based switch, use this Interface Configuration mode command: no spantree start−forwarding Verifying the PortFast Configuration To verify the PortFast configuration on a Set/Clear command−based switch, enter the following Privileged mode command: show spa[...]

  • Seite 241

    You must clear the port and bridge costs modified by UplinkFast using the clear spantree uplinkfast command shown below: catalyst5000> (enable) clear spantree uplinkfast This command will cause all portcosts, portvlancosts, and the bridge priority on all vlans to be set to default. Do you want to continue (y/n) [n]? y VLANs 1−1005 bridge prior[...]

  • Seite 242

    Viewing the UplinkFast Configuration on an IOS−Based Switch To view the UplinkFast configuration on an IOS command−based switch, enter the following Privileged mode command: show uplink−fast Viewing UplinkFast Statistics on an IOS−Based Switch To view UplinkFast statistics, use this Privileged mode command: show uplink−fast statistics Ena[...]

  • Seite 243

    Chapter 11: Multilayer Switching In Depth Earlier in this book, I told you that switches were Layer 2 devices and routers were Layer 3 devices, which fit nicely into those well−known seven layers. You know the seven—the Open System Interconnection (OSI) Reference Model layers. Oh, did I forget to mention the Multilayer Switching Engine, multila[...]

  • Seite 244

    manner. This method is similar to sending a piece of mail: You put it in the mailbox, but you have no guarantee that it will arrive—just the likelihood it will reach its destination. Using other protocols, including those at Layer 2 and Layer 4, the network traffic is made up of a series of end−to−end conversations also known as flows . These[...]

  • Seite 245

    Figure 11.1 shows the three MLS components contained in a single switch chassis, such as that of a Cisco Catalyst 5000 or 6000 family switch. Figure 11.1: The MLS components using an internal route processor in an MLS switch. The Cisco 5000 and 6000 families of switches can use multiple internal route processors, such as the following: NetFlow Feat[...]

  • Seite 246

    MLS Flows When a flow process begins, the MLS−RP starts sending out multicast hello messages every 15 seconds to all switches in the network that accept MLS−RP messages. These messages inform each switch that the MLS−RP (router or internal route processor) is available to provide routing information to the MLS switches, allowing them to cache[...]

  • Seite 247

    go through the router. The MLS−SE rewrites the packets to look as if they had been forwarded by a router. Note The MLS cache size can grow to a maximum of 128K. When the cache on the MLS−SE grows larger than 32K, it is likely that flows in the network will not be switched by the MLS−SE and forwarded to a router. When the conversation between [...]

  • Seite 248

    Figure 11.5: An MLS switch and two MLS routers. IP Access Lists and MLS Interaction When any interface has an inbound access list applied, the interface where the access list is applied cannot be used for MLS. However, you can apply an output access list on an interface, and it will not affect MLS. When MLS is enabled, standard and extended access [...]

  • Seite 249

    You may become confused when trying to troubleshoot MLS because the commands you need to watch out for are not directly related to MLS. Remember this basic rule: Any command that involves the router examining each packet to perform an action will disable MLS on an interface. Let’s take a look at some of these commands and the effect each command [...]

  • Seite 250

    VTP domains • Management interfaces • Tip On the Catalyst 2926G−L3, 4908G−L3, or 2948G−L3 switch, at least one MLS−RP must be configured. Multiple MLS−RPs can be configured in a single line; up to 16 MLS−RPs can participate in MLS. MLS Cache The MLS cache is used to maintain the flow information for all active flows. The size of the[...]

  • Seite 251

    MLS Cache Fast Aging Time The processing of the MLS cache entries can cause performance problems on your switch. To keep this situation under control, it’s good practice to monitor the IP cache and make sure it remains well under the maximum size of 128K. Doing so will prevent cache entries from being dropped continuously. You can keep the size o[...]

  • Seite 252

    Let’s examine each of these tasks, as well as how to disable each of these features in case they are no longer needed on an interface. Related Solutions: Found on page: Configuring a Hostname on an RSM 187 Enabling MLSP on an MLS−RP for IP To enable the MLSP that runs between the MLS−SE and the MLS−RP, enter the following command in Global [...]

  • Seite 253

    Router(config) interface fastethernet 1/1 To assign a VTP domain of coriolis to the interface, use the following command: 2. Router(config) mls rp vtp−domain coriolis Warning This step must be performed prior to using any of the other MLS interface commands on the MLS interface. If this command is not used first, the interface will be placed in a[...]

  • Seite 254

    Re−enabling MLS on a Catalyst 5000 To re−enable MLS on a Catalyst 5000, use the following command: CAT5000(enable) set mls enable Disabling MLS on a Catalyst 6000 To disable MLS on a Catalyst 6000, use the following command: CAT6000(config) no mls ip Disabling MLS on a Catalyst 5000 To disable MLS on a Catalyst 5000, use the following command: [...]

  • Seite 255

    Configuring Long Aging on the Catalyst 6000 To configure the long aging time on the Catalyst 6000, use the following command: mls aging long < seconds> An example of using the mls aging long command is as follows: mls aging long 64 Disabling Long Aging on the Catalyst 6000 To disable the long aging time on the Catalyst 6000, use the following[...]

  • Seite 256

    Monitoring and Viewing the MLS Configuration Commands on each MLS−SE and MLS−RP to monitor and view the configurations of each device are different. Let’s take a look at the following commands: Viewing the MLS aging configuration on a Catalyst 6000 • Displaying the IP MLS configuration • Viewing MLS−RPs • Viewing MLS−RP specifics ?[...]

  • Seite 257

    MLS−RP IP MLS−RP ID Xtag MLS−RP MAC−Vlans —————————— ———————————— ———— —————————————————————— 38.187.128.254 0000808dca20 2 00−00−80−08−dc−ca 1−20 Displaying MLS VTP Domain Information To display the MLS VTP domain information, enter [...]

  • Seite 258

    38.187.128.254 0000808dade0 2 00−00−80−8c−dc−a2 1 38.187.127.254 0000808a22b2 3 00−00−80−8c−dc−a6 2 Viewing MLS Statistics on the Catalyst 6000 On the Catalyst 6000, you can get information similar to that provided by the previous command by entering the following: CAT6000> (enable) show mls ip Total Active MLS entries = 0 To[...]

  • Seite 259

    Chapter 12: Hot Standby Routing Protocol In Depth Dynamic environments are constantly growing. I happen to work in one and I see the demand for 99.99 percent reliability increasing every day. However, even in a worldwide Enterprise network, high availability solutions are not prepared for various network failures. Here’s an example: I manage a fe[...]

  • Seite 260

    The next sections look at some ways that administrators and engineers have devised to overcome problems related to assigning default gateways, along with the benefits and difficulties in using each technique. Routing Information Protocol Once solution designed to inject Layer 3 routing redundancy allows nodes utilizing IP to use Routing Information[...]

  • Seite 261

    The Solution HSRP is a Cisco proprietary protocol developed for redundancy. It defines a group of routers working as one virtual router. It enables host interfaces to continue communicating outside the local segment even if a host interface’s default route fails or the link is down. Basically, HSRP is a group of routers working together as a unit[...]

  • Seite 262

    Active route processor • Standby route processor • Virtual route processor • All other route processors fall into the “other route processor” category. Warning By increasing the number of standby groups on a route processor, you decrease the route processor’s performance and increase latency. You’ll increase the number of standby grou[...]

  • Seite 263

    Each standby group contains an IP address and a well−known MAC address assigned to the group. The IP address for the standby group is within the range of IP addresses belonging to the subnet or VLAN to which the route processor is providing services. The IP address cannot be assigned to any other device in the network except the standby group int[...]

  • Seite 264

    to the route processor. Learn state —The route processor transitions to this state and remains in this state until it receives a hello message from the current active router. The hello message allows the route processor to learn the virtual IP address of the current virtual router. • Listen state —In this state, the route processor has learne[...]

  • Seite 265

    standby group. If a route processor fails, it automatically decrements its priority on that interface and stops transmitting hello messages out the interface. The standby route processor assumes the active router role when no hello messages are detected for the specified holdtime period. Opening a Session on an Internal Route Processor To configure[...]

  • Seite 266

    Assigning an HSRP Interface Priority You should increase the priority of the interface in the HSRP group that you would like to be active by default. Always remember that the interface with the highest priority becomes the active route processor for the HSRP group. To specify the priority for the HSRP interface, using the following command: standby[...]

  • Seite 267

    Removing the HSRP Hello and Hold Timers To remove the manual timer settings and return the settings to the default values for HSRP group 3, use the following command: no standby 3 timers Configuring a Clear−Text Password for HSRP Authentication You can specify a clear−text password for the HSRP authentication string for the interface. All inter[...]

  • Seite 268

    You selected and entered the VLAN interface you want to have configured (vlan200). 1. You configured the HSRP group and entered the virtual default gateway IP address on that interface. 2. You set the priority accordingly, allowing one route processor to be active and the other to be standby. 3. You enabled preempt on both routers and you are not a[...]

  • Seite 269

    Tip To get a brief output of all the configured interfaces, you can use the show standby brief command. Using the debug Command By enabling the debug command, it will list the changes in real−time for the HSRP group you specified. This includes the sending and receiving packets through the HSRP. To enable debugging of your HSRP group you need to [...]

  • Seite 270

    Chapter 13: Policy Networking In Depth Behind all switching implementations and configurations lies an area that, if left unattended, can render you and your network defenseless: access security policies. In this chapter, we will discuss the need for and creation of access security policies; we will also focus on how to implement these policies. Se[...]

  • Seite 271

    Figure 13.1: A short list of various switches overlapping into different areas of the policy layers. Core Layer Policies By implementing security policies at the Core layer, also known as the backbone, you increase the elapsed amount of time between when a device requests access to a network and when it is allowed to transmit because of the amount [...]

  • Seite 272

    Managing Hypertext Transfer Protocol (HTTP) access • Access Lists An access list is a list of conditions that control access to the switch, router, or route processor. IP, AppleTalk, and Internetwork Packet Exchange (IPX) access lists are like gatekeepers that control access from or to different segments of the network. After you build an access [...]

  • Seite 273

    access list string as an example: access−list 2 permit 193.5.5.10 0.0.0.255 log Tip An octet is the 8−bit value between each dotted decimal in an IP address. For the IP address of 193.5.5.10 the first octet is 193 and the fourth octet is 10. It is always important to remember which octet you want to mask. The 0.0.0 of the wildcard address means[...]

  • Seite 274

    Item Network 1 Network 2 Network 3 Network 16 32 48 First Host 17 33 49 Last Host 30 46 62 Broadcast Address 31 47 63 Subnetting using variable length subnet masks (VLSM) seems pretty easy, doesn’t it? The type of access list defined is identified by the number you assign to the access list. Table 13.3 identifies the types of access lists that ca[...]

  • Seite 275

    operator —This syntax element compares source or destination ports. Possible syntaxes include lt (less than), gt (greater than), eq (equal), neq (not equal), and range (inclusive range). • log —This syntax enables logging of information about packets that match access list entries. • Warning The log command is optional and logs information [...]

  • Seite 276

    access−class —Applies the access list to an interface for security purposes. This command identifies users of specified VTY lines. By default, five VTY lines come in to your Cisco Internetwork Operating System (IOS) or router. Because you do not know which one you will be using when you Telnet into your switch or router, you must apply the same[...]

  • Seite 277

    Next, you must specify a routing protocol: in this case, Enhanced Interior Gateway Routing Protocol (EIGRP). To do so, use the following command: router eigrp 2 The last step is to apply the configured access list. Use the distribute−list command to interface g0/0 to filter outbound traffic from network 192.129.0.0: distribute−list 2 out g0/0 S[...]

  • Seite 278

    Privilege level 0 is a special level that allows the user to use a more specific defined set of commands. As an example, you could allow a certain user to use only the show arp command. This command is useful when a third party is using a sniffer on your network and needs to match a MAC address to an IP address and vice versa. Configuring Banner Me[...]

  • Seite 279

    After you enable port security on any switch port, any static or dynamic CAM entries associated with the port are cleared, and any currently configured permanent CAM entries are treated as secure MAC addresses. • Not all Cisco switches support port security. Check Cisco Connection Online (CCO) at http://www.cisco.com/ to see if your hardware and [...]

  • Seite 280

    HSNRSM(config)# access−list 100 deny tcp any any eq 20 HSNRSM(config)# access−list 100 deny tcp any any eq 21 Because the access list has an implied “deny all” at the end, you need to apply a rule that any other traffic can pass through. The ip indicates that all IP protocols are being identified: 3. HSNRSM(config)# access−list 100 permit[...]

  • Seite 281

    host A single destination host lt Match only packets with a lower port number neq Match only packets not on a given port number range Match only packets in the range of port numbers Now do the same for the destination address identifying the destination of 172.15.10.0: CoriolisRSM1(config)# access−list 199 deny tcp 172.16.10.0 0.0.0.255 172.15.10[...]

  • Seite 282

    CoriolisRSM1(config)#access−list 199 permit ip any ? A.B.C.D Destination address any Any destination host host A single destination host Just as in Step 7, we need to identify the destination addresses to permit: 8. CoriolisRSM1(config)#access−list 199 permit ip any any CoriolisRSM1(config)# You’re not quite done yet. Even though you just cre[...]

  • Seite 283

    Configuring a Telnet Session Time−Out Value To lower the chances for vulnerability when an administrator walks away from a logged−in Telnet session, you can configure and apply a time−out condition to unused VTY sessions. Here’s how: HSNRSM (config)# line vty 0 4 HSNRSM (config−line)# exec−timeout 5 0 We just set the timeout value to fi[...]

  • Seite 284

    To configure the time−out value to five minutes on the console port of an IOS−based route processor or router, use the following command: HSNRSM (config)# line console 0 HSNRSM (config−line)# exec−timeout 5 To configure the time−out value to five minutes on the VTY port of an IOS−based route processor or router, use the following comman[...]

  • Seite 285

    Syntax Description aaa Allows authentication, authorization, and accounting (AAA) to be used for authentication enable Allows the enable password method; the default method of HTTP server user authentication local Allows the local user database on the Cisco router, route processor, or access server to be used for authentication tacacs Allows the Te[...]

  • Seite 286

    ———— —————————— —————————— —————————— —————————— ———————— 3/3 0 0 0 0 0 Port Single−Col Multi−Coll Late−Coll Excess−Col Carri−Sen Runts Giants ———— —————————— —————————— ——————[...]

  • Seite 287

    Dynamic Addresses Count: 5 Secure Addresses (User−defined) Count: 0 Static Addresses (User−defined) Count: 0 System Self Addresses Count: 12 Total MAC addresses: 8 Non−static Address Table: Destination Address Address Type VLAN Destination Port ————————— —————— —— —————————— 00−15−20?[...]

  • Seite 288

    Chapter 14: Web Management In Depth Imagine having to manage all the com closets throughout your enterprise without the use of a remote management tool. It’s a scary thought. What if you were in San Francisco and you needed to reconfigure a switch in Atlanta? Yes, Telnet would work, but Cisco also has a Web−based client management tool that is [...]

  • Seite 289

    IE is not supported on Solaris, and Netscape 4.6 is not supported at all. However, you can try to access the switch through your browser to determine whether your browser version is supported. If your browser is not supported, the switch will display an error message, and the session will not complete. Tip IE 5.0 will automatically refresh with the[...]

  • Seite 290

    and want to retype an entry, click on Cancel to undo your first entry. Note Again, keep in mind that if you are using IE5, you must use the Refresh button in your browser after each configuration change to see the updates. Otherwise, you risk making a mistake down the line. The CVSM default home page also has a real−time display of your switch. A[...]

  • Seite 291

    Chapter 2, which explains how to configure the CLI for an IP address and a Level 15 password in order to use the CVSM. The last section of the Immediate Solutions section will walk you through the CVSM Web Management screens on the 1900 series switch, looking at each screen individually and identifying the configuration changes that can be made fro[...]

  • Seite 292

    New setting ===> 1024 We have now changed the HTTP port to 1024. You should use a numbering scheme that your department or organization believes to be the best. • Related solutions: Found on page: Configuring an IP Address and Netmask 57 Configuring Network Settings on the 1900 and 2820 Series 456 Connecting to the Web Management Console Now t[...]

  • Seite 293

    Figure 14.2: This page allows you the ability to configure port speeds, view statistics, name the ports, and manage various switch modules if they have been inserted into the switch. ADDRESS —The Address Table Management page. This page manages the Dynamic Address Table, the Permanent Unicast Address and Port Security Table, and the Multicast Add[...]

  • Seite 294

    Figure 14.4: This page allows you to configure the SNMP properties, such as the community settings, and identify the IP address for the trap messages to be sent to. STP —The Spanning Tree Management page. This management page allows you to enable or disable STP on the specific switch ports, modify various Spanning Tree parameters, and configure S[...]

  • Seite 295

    Figure 14.6: The CDP Management page allows you to choose which ports you want defined for CDP. SPAN —The SPAN Configuration and Port Monitoring page. Here you have the option of selecting the port to which you want to send the captured frames and the ports to be monitored. See Figure 14.7. • Figure 14.7: This page allows you to configure which[...]

  • Seite 296

    Figure 14.8: This page allows you to manage the console and firmware upgrades. Note Prior to a TFTP upgrade a dialog box will appear and say something like, “When you use this page to upgrade the switch, it may not respond for up to one minute. During this time do not unplug the switch. This behavior is normal .” Once you click on OK, another d[...]

  • Seite 297

    Figure 14.10: On this page you can control and manage broadcast storms and overall IP configuration of the switch. CGMP —The CGMP Management page. By default, CGMP is enabled. This page allows you to configure the use of CGMP to dynamically discover end−user stations participating in multicast applications. In short, CGMP directs the packet to [...]

  • Seite 298

    Click on the ports you want to monitor in the Ports Not Monitored window. Click on the Add button to move them to the Ports Monitored Window. 2. Select the port you wish to monitor from by choosing from the pull−down menu next to Select Monitoring Port. This port will usually be one of the trunk ports. 3. Related solution: Found on page: Enabling[...]

  • Seite 299

    Chapter 15: The Standard Edition IOS In Depth The Cisco 1900 and 2820 switches come with two unique IOSs: Standard Edition and Enterprise Edition. The Standard Edition is a character−based IOS, and the Enterprise Edition is similar to the IOS on higher−end routers. The Cisco 3000 series is the only series of switches that comes with a unique IO[...]

  • Seite 300

    [P] Port Configuration [A] Port Addressing [D] Port Statistics Detail [M] Monitor [V] Virtual LAN [R] Multicast Registration [F] Firmware [I] RS−232 Interface [U] Usage Summaries [H] Help [K] Command Line [X] Exit Management Console Enter Selection: The following sections describe the Main Menu options. By typing the letter associated with each c[...]

  • Seite 301

    The password is case−insensitive and can contain any character with a legal keyboard representation. [E] Modify secret password —The Management Console secret password can help prevent unauthorized access. This password is stored in encrypted form and thus provides enhanced security. When specifying a secret password, use a minimum of 1 charact[...]

  • Seite 302

    [R] Reset system —This option recycles the power on the switch. • [F] Reset to factory defaults —This option clears all configuration settings back to the factory defaults. • Warning If you apply the [F] option, all manual configuration settings will be lost. [B] Broadcast storm control —This option launches the Broadcast Storm menu, whic[...]

  • Seite 303

    [V] Management VLAN —Allows you to set the VLAN in which you will configure your switch. Cisco recommends that you choose a VLAN other than 1 because all ports are in VLAN1 by default. On the Standard Edition of the IOS software, the available VLANs are 1 through 4. The Enterprise Edition has 64 available VLANs. • [X] Exit to previous menu—Ex[...]

  • Seite 304

    SNMP Default Trap Messages By default, the Cisco Catalyst 1900 and Catalyst 2820 series switches send certain trap messages. Trap messages are sent by default in response to the following events: Port security violations • Power recycling (powering on and off) • Logon authentication failures • STP port changes • STP bridge assignments • B[...]

  • Seite 305

    Enter Selection: The following list shows the commands from the CDP Configuration/Status menu: [H] Hold Time (secs) —Indicates how long a CDP multicast will remain in the CDP table. The valid entries are from 5 to 255 seconds, and the default is 180 seconds. • [T] Transmission Interval (secs) —Defines the interval in which the switch will sen[...]

  • Seite 306

    Syntax Port A1 Port 25 B1 Port 26 AUI The AUI port 1 through 24 An individual port on the switch The Port Configuration menu is as follows: Catalyst 2820 − Port 24 Configuration ————————————————————Settings———————————————— [D] Description/name of port Port To Hanson’s PC [S[...]

  • Seite 307

    [N] Next port —This option is used to forward to the next configurable port. • [G] Goto port —This option is used to configure any identified port. • [P] Previous port —This option is used to configure the previous configurable port. • [X] Exit to Main Menu —This option returns you to the Main Menu. • Let’s take a look at the opti[...]

  • Seite 308

    [A] Port Addressing The Port Addressing menu allows you to set up security and to add static MAC addresses to a port. When entering this option, you must first identify a port to configure, as listed in Table 15.2. Table 15.2: The available configurable ports on a Catalyst 2820 from the Port Addressing menu. Syntax Port A Port 25 AUI The AUI port 1[...]

  • Seite 309

    [C] Configure port —Provides a shortcut to the Port Configuration menu. • [V] View port statistics —Displays individual port statistics. • [N] Next port —Forwards to the next configurable port. • [G] Goto port —Configures any identified port. • [P] Previous port —Configures the previous configurable port. • [X] Exit to Main Menu[...]

  • Seite 310

    Catalyst 2820 − Virtual LAN Configuration VLAN Name Member Ports ——−− ———————————— ———————————— 1 VLAN 1 1−24, AUI, A, B ——————————————Action————————————— [C] Configure VLAN [X] Exit to Main Menu Enter Selection: This menu only gives tw[...]

  • Seite 311

    Catalyst 1900 − Firmware Configuration ——————————————————System Information—————————————————— FLASH: 1024K bytes V9.00.00 Standard Edition Upgrade status: No upgrade currently in progress. ——————————————————Settings————————?[...]

  • Seite 312

    The following list explains the options available from the RS−232 Interface Configuration menu: [B] Baud rate —Lets you enter the baud rate. The possible settings are 2400, 9600, 19200, 38400, or 57600 for the console port. The default baud rate is 9600. • [D] Data bits —Allows the configuration of data bits for the console port. The possib[...]

  • Seite 313

    Errors: Errors: FCS errors 0 Late collisions 0 Alignment errors 0 Excessive deferrals 0 Giant frames 0 Jabber errors 0 Address violations 0 Other transmit errors 0 Select [A] Port addressing, [C] Configure port, [N] Next port, [P] Previous port, [G] Goto port, [R] Reset port statistics, or [X] Exit to Main Menu: [A] Port Addressing Report —This o[...]

  • Seite 314

    Receive Forward Transmit —————————————————————————————— 1 : 0 0 0 2 : 0 0 0 3 : 9352 9352 90514 4 : 0 0 0 5 : 0 0 0 6 : 3678 3677 81423 7 : 0 0 0 8 : 0 0 0 9 : 0 0 0 10 : 0 0 0 11 : 0 0 0 12 : 0 0 0 AUI: 0 0 82461 A : 0 0 0 B : 0 0 0 Select [R] Reset all statistics, or [X] Exit to previous[...]

  • Seite 315

    The following list describes the three menu options: [M] Menus —Displays the switch’s Main Menu. ♦ [I] IP Address —Available at log−on if the switch does not have a password configured. ♦ [P] Console Password —Allows you to enter an unencrypted privileged−level password to the switch management interface. This option is available at[...]

  • Seite 316

    [X] Exit to previous menu Enter Selection: This menu allows you to control the propagation of broadcasts to each port. The following list gives a brief description of each setting: [A] Action upon exceeding broadcast threshold —Indicates what action will be taken in the event that the broadcast number threshold is exceeded. There are two settings[...]

  • Seite 317

    Catalyst 1900 − Network Management (SNMP) READ Configuration ——————————————————————— Settings ————————————————— [1] First READ community string [2] Second READ community string [3] Third READ community string [4] Fourth READ community string [X] Exit to previous menu [...]

  • Seite 318

    [D] Fourth WRITE manager name or IP address [X] Exit to previous menu At this point you can select option [1] and configure the WRITE community string and change the default community string from “private” to “techwrite,” as we did in the following: Catalyst 1900 − Network Management (SNMP) WRITE Configuration —————————?[...]

  • Seite 319

    We now want to bind the IP address of our SNMP management station to the trap community string. To do this, enter the new community string, and select [1]. Then select [A] to enter the IP address. The following will appear on your screen: Enter Trap Manager community string (32 characters max): Current setting ===> New setting ===> Techtraps [...]

  • Seite 320

    ——————————— Actions ——————————————————————————————————— [A] Add ports to capture list [D] Delete ports from capture list [X] Exit to Main Menu Enter Selection: A This command adds ports to the capture list. Actual monitoring takes place only if all of the fo[...]

  • Seite 321

    [P] VTP Statistics [X] Exit to Main Menu Select [V], and accept the default setting of Server. Because the change we want to make is to add a server, we will take the defaults: VTP mode may be set to [C]lient, [S]erver or [T]ransparent: Current setting ===> Server New setting ===> Server 2. Select [A] to add an Ethernet VLAN to the switch. Yo[...]

  • Seite 322

    You should now see the Trunk A Configuration menu The next step is to enable trunking. To do so, select [T] from the menu, as shown here: Catalyst 1900 − Trunk A Configuration Menu Trunking status: Off Encapsulation type: Unknown —————————————————————— Information —————————————[...]

  • Seite 323

    Assigning a Static VLAN to an Interface on a 1900EN Series 156 Configuring Spanning Tree Protocol To configure Spanning Tree Protocol, start from the Main Menu and do the following: Select option [N], Network Management. 1. From the Network Management menu, select option [B]: Catalyst 1900 − Network Management [I] IP Configuration [S] SNMP Manage[...]

  • Seite 324

    This command disables the Spanning Tree Protocol for a list of VLANs. You may disable the Spanning Tree Protocol for a list of VLAN numbers. VLAN numbers range from 1 to 1005. VLAN numbers should be separated by commas or spaces. A VLAN number range may also be specified. Example: 1, 2, 10−20 Enter VLAN numbers: 1 Notice here we selected the mana[...]

  • Seite 325

    Chapter 16: Switch Troubleshooting In Depth Switch troubleshooting includes both hardware and software. The switch hardware can be anything from a Supervisor Engine to a module, card, chassis, or even a power supply. The software can be the individual module software or the IOS. In this chapter, we will focus on troubleshooting both the Command Lin[...]

  • Seite 326

    Port Number LED Test 1 Ports (loopback) 2 Ethernet address PROM 3 CAM (MAC address) table 4 RS−232 console port 5 Realtime clock 6 CAM memory (SRAM) 7 Timer interrupt 8 Port control status 9 Flag memory (DRAM) 10 Buffer memory (DRAM) 11 Forwarding engine memory (SRAM) 12 Forwarding engine CPU 16/26 ECU memory (DRAM) Tip If the light turns green, [...]

  • Seite 327

    The active LED indicates the following: Orange —The Supervisor Engine is in standby. • Green —The Supervisor Engine is operating correctly. • Other LEDs are on the individual line modules, as shown in Figure 16.2. These LEDs indicate the status of each module. A green link light indicates a good established link. An orange or amber link lig[...]

  • Seite 328

    This problem is addressed by Cisco with the use of Switched Port Analyzer (SPAN). SPAN allows the switch to copy all the packets that are sent to nodes connected to the switch ports and direct them to another port. In essence, the designated switch port becomes a mirror of the monitored port or ports. Cable Problems When a cable problem surfaces, i[...]

  • Seite 329

    Figure 16.3: A screen capture from CiscoView. User Tracking —Used in the creation and management of dynamic VLANs. Cisco switches permit VLAN assignments based on dynamic VLAN assignments. This means the Media Access Control (MAC) address is used to assign the port to a specific VLAN. User Tracking defines these dynamic VLANs and maintains the wh[...]

  • Seite 330

    show cam • show cdp neighbors • show config • show flash • show interface • show log • show mac • show port • show spantree • show system • show test • show version • show vtp domain controller • show cam The show cam command displays a switch’s transparent bridging table (also known as the Content Addressable Memory [CA[...]

  • Seite 331

    show flash Cisco switches operate with software that is very similar to the Cisco IOS on routers. This software is stored and may be upgraded in flash stored on the Supervisor module. The show flash command reports the space required for the installed software and the version of the code, including the file names, software version numbers, and file[...]

  • Seite 332

    show system Using the show system command, you can obtain a component status summary regarding the switch components. This information includes the system status, current traffic percentage, peak percentage, status of the fans, power supplies, and modem; uptime, and system identification configuration. There is no comparable command on the 1900EN s[...]

  • Seite 333

    set system contact Sean Odom/Gina Galbraith ! #snmp set snmp community read−only public set snmp community read−write private set snmp community read−write−all all set snmp rmon disable set snmp trap enable module set snmp trap enable chassis set snmp trap enable bridge set snmp trap enable repeater set snmp trap enable vtp set snmp trap en[...]

  • Seite 334

    set vlan 1003 name Token−Ring−default type trcrf mtu 1500 said 101003 state active parent 0 ring 0x0 mode srb aremaxhop 7 stemaxhop 7 ! #spantree ! #uplinkfast groups set spantree uplinkfast disable ! #vlan 1 set spantree enable 1 set spantree fwddelay 15 1 set spantree hello 2 1 set spantree maxage 20 1 set spantree priority 32768 1 ! #vlan 2 [...]

  • Seite 335

    set logging level snmp 2 default set logging level spantree 2 default set logging level sys 5 default set logging level tac 2 default set logging level tcp 2 default set logging level telnet 2 default set logging level tftp 2 default set logging level vtp 2 default set logging level vmps 2 default set logging level kernel 2 default set logging leve[...]

  • Seite 336

    set port membership 2/1−24 static set cdp enable 2/1−24 set cdp interval 2/1−24 60 set spantree portfast 2/1−24 disable set spantree portcost 2/11 10 set spantree portcost 2/12 10 set spantree portcost 2/17 10 set spantree portcost 2/18 10 set spantree portcost 2/19 100 set spantree portcost 2/21 10 set spantree portcost 2/1−10,2/13−16,[...]

  • Seite 337

    1912EN# Viewing the Software Version on a Set/Clear Command−Based IOS Module To view the software version of a module on a Set/Clear command−based IOS, use the show version command. This command will not work on internal route processor modules, however. Let’s look at the command and an example of its output: show version <slot number> [...]

  • Seite 338

    epld 3.1 30 72920 06/14/99 19:33:06 lcp atm 3.1 12−15 23747 06/14/99 11:16:06 lcp tr 3.1 12−15 28737 06/14/99 11:17:19 lcp c5ip 3.1 12−15 23723 06/14/99 11:26:40 lcp 64k 3.1 12−15 57100 06/14/99 11:28:15 atm/fddi 3.1 12−15 24502 06/14/99 11:47:07 lcp 360 3.1(212) 12−15 120648 06/14/99 01:32:33 mcp 3.1 12−15 26278 06/14/99 11:50:41 Cat[...]

  • Seite 339

    —————————————— . . . Channel Status : Ports 1 2 —————————————— . . Note There is no comparable command on the 1900EN series switches. Testing External Module Hardware on a Set/Clear Command−Based Switch The Catalyst 5002 I am using has a Supervisor Engine in Slot 1. Slot 2 has a 10/100 Ether[...]

  • Seite 340

    Viewing the VTP Domain Configuration on a Set/Clear IOS The show vtp domain command can be used to obtain the VTP domain configuration on a Set/Clear command−based IOS switch. Let’s take a look at the command and an example of the output associated with it: Catalyst5002> (enable) show vtp domain Domain Name Domain Index VTP Version Local Mod[...]

  • Seite 341

    Protocols Configured: Address: Received: Transmitted: IP 68.127.187.10 95563219847 81294682 Virtual LAN ID: 2 (Inter Switch Link Encapsulation) vLAN Trunk Interface: FastEthernet1/0.2 Protocols Configured: Address: Received: Transmitted: IP 68.127.186.1 855147 854281 Catalyst5002> Viewing the VLAN Configuration on a CLI−Based IOS To view the V[...]

  • Seite 342

    Catalyst5002> (enable) show spantree VLAN 1 Spanning tree enabled Spanning tree type ieee Designated Root 00−00−80−0c−a1−b3 Designated Root Priority 32768 Designated Root Cost 0 Designated Root Port 1/0 Root Max Age 20 sec Hello Time 2 sec Forward Delay 15 sec Bridge ID MAC ADDR 00−00−80−0c−a1−b3 Bridge ID Priority 32768 Brid[...]

  • Seite 343

    Port Ethernet 0/1 of VLAN2 is Forwarding Port path cost 100, Port priority 128 Designated root has priority 32768, address 0000.0C00.4BD0 Designated bridge has priority 32768, address 0000.0C00.4BD0 Designated port is Ethernet 0/7, path cost 0 Timers: message age 20, forward delay 15, hold 1 Port Ethernet 0/2 of VLAN2 is Forwarding Port path cost 1[...]

  • Seite 344

    Port path cost 100, Port priority 128 Designated root has priority 32768, address 0000.0C00.4BD0 Designated bridge has priority 32768, address 0030.8054.6C00 Designated port is Ethernet 0/12, path cost 100 Timers: message age 20, forward delay 15, hold 1 Port Ethernet 0/25 of VLAN1 is Forwarding Port path cost 100, Port priority 128 Designated root[...]

  • Seite 345

    1912EN#show mac Number of permanent addresses : 5 Number of restricted static addresses : 0 Number of dynamic addresses : 1 Address Dest Interface Type Source Interface List ——————————————————————————————————————————————————————————?[...]

  • Seite 346

    1912EN#show cdp neighbors Capability Codes: R − Router, T − Trans Bridge, B − Source Route Bridge S − Switch, P − Repeater, H − Host, I − IGMP DeviceID IP Addr Local Port Capability Platform Remote Port 1005 68.127.187.254 Et0/1 R cisco 1000 Ethernet0 1912EN# Viewing Individual Port CAM Tables on a CLI−Based IOS The show mac interfa[...]

  • Seite 347

    MAC Dely−Exced MTU−Exced In−Dcrd Lrn−Dcrd In−Lost Out−Lost 1/1 0 0 0 0 0 0 1/2 0 0 0 0 0 0 2/1 0 0 0 0 0 0 2/2 0 0 0 0 0 0 2/3 0 0 0 0 0 0 2/4 0 0 0 0 0 0 2/5 0 0 0 0 0 0 2/6 0 0 0 0 0 0 2/7 0 0 0 0 0 0 2/8 0 0 0 0 0 0 2/9 0 0 0 0 0 0 2/10 0 0 0 0 0 0 2/11 0 0 0 0 0 0 2/12 0 0 0 0 0 0 Port Rcv−Unicast Rcv−Multicast Rcv−Broadcast 1[...]

  • Seite 348

    Last−Time−Cleared —————————————————————————— Sat Sep 23 2000, 11:29:11 Viewing Port Statistics on a CLI−Based IOS To view the port statistics on a CLI−based IOS, use the show usage command. Let’s take a look at the command, the options available, and an example of its output: 1912EN#show[...]

  • Seite 349

    Using the Port Configuration on a Set/Clear Command−Based IOS The show port command can be used on a Set/Clear command−based IOS switch to view the port configuration. Let’s take a look at the command, its optional syntaxes, and an example of its output: show port [module/port] show port [module] Catalyst5002> (enable) show port 2/1 Port N[...]

  • Seite 350

    Ethernet 0/9, Ethernet 0/10, Ethernet 0/11, Ethernet 0/12 Ethernet 0/25, FastEthernet 0/26, FastEthernet 0/27 1912EN#show port monitor Port monitoring state: Enabled Monitor port: None Ports being monitored: Ethernet 0/1 1912EN#show port system Switching mode: FragmentFree Use of store and forward for multicast: Enabled Network port: Ethernet 0/8 H[...]

  • Seite 351

    1 default Enabled 5−12, AUI, A, B 2 Engineering Enabled 1−2 3 Admins Enabled 3−4 1002 fddi−default Suspended 1003 token−ring−defau Suspended 1004 fddinet−default Suspended 1005 trnet−default Suspended ———————————————————————————————————— VLAN Type SAID MTU Paren[...]

  • Seite 352

    Receive Statistics Transmit Statistics —————————————————————————————————— ————————————————————————————————— Total good frames 2504 Total frames 11745 Total octets 242467 Total octets 875657 Broadcast/multicast frames[...]

  • Seite 353

    sp+B0: 10001030 10001030 10000BD0 10000AD0 sp+C0: 10000B28 10001030 10001030 10001030 sp+D0: 10001030 10001030 10001030 10001030 sp+E0: 10001030 10001030 10001030 10001030 sp+F0: 10001030 10001030 10001030 493798E4 D0: 00000000, D1: 00000004, D2: 00000030, D3: 00005C05 D4: 11000000, D5: 11000000, D6: 10FF0008, D7: 11000000 A0: 68000000, A1: 0000000[...]

  • Seite 354

    Press and hold down the Mode button, as shown in Figure 16.5, while cycling the power on the switch. Figure 16.5: The Mode button on a 1900 Series switch. 2. Proceed through the following options: 3. ——————————————————————————————————————————————————[...]

  • Seite 355

    [C] Continue with standard system start up [U] Upgrade operation firmware (XMODEM) [S] System debug interface Enter Selection: Use the [U] Upgrade Operation Firmware (XMODEM) option to upgrade the firmware (you must be using X−Modem compatible software on the network node attached to the switch): Enter Selection: U The XMODEM protocol will be use[...]

  • Seite 356

    [T] Toggle byte/word display Word [V] Value for output 0000H (0) ————————————————Actions———————————————— [I] Input [O] Output [X] Exit to Previous Menu Enter Selection: Here is an example of the output from the [M] Memory (CPU) I/O option: Enter Selection: M Diagnostic Console − Memo[...]

  • Seite 357

    Appendix A: Study Resources Glossary Books McDysan, David E. and Darren L. Spohn, ATM Theory and Application , McGraw−Hill: New York, 1998. ISBN: 0−07045−346−2. This book is a great resource on Asynchronous Transfer Mode (ATM) and LAN Emulation (LANE). Odom, Sean and Douglas Hammond, CCNP Switching Exam Prep , The Coriolis Group: Scottsdale[...]

  • Seite 358

    Online Resources Multiple documents are available on the Web, but the best place for information is the Cisco Web site. Cisco is one of the best companies at providing documentation on its products. You can find the Cisco Web site at http://www.cisco.com/ . Asynchronous Transfer Mode ATM fundamentals information on an 8500 Series switch — www.cis[...]

  • Seite 359

    Quality of Service Quality of Service Overview — www.cisco.com/univercd/cc/td/doc/product/software/ios121/121cgcr/qos_c/qcdintro.htm • Configuring Quality of Service on a Cisco Catalyst 6000 — www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/sw_5_4/config/qos.htm • Configuring IOS Quality of Service on the Catalyst 6000 Family — www.c[...]

  • Seite 360

    Internet Engineering Task Force (IETF) —This organization is responsible for the TCP/IP, Simple Network Management Protocol (SNMP), and Internet standards. A lot of its work relates to upgrading and enlarging the TCP/IP protocol suite and networks utilizing that protocol. The IETF Web site can be found at http://www.ietf.org/ . • National Commi[...]

  • Seite 361

    Appendix B: Basic IOS CLI−to−Set/Clear Commands Overview Many features are supported by the Set/Clear−based switches, which include the Catalyst 5000 and 6000 families of switches. Most basic commands on a Command Line Interface (CLI)−based IOS can be mapped to commands that provide similar functionality on the Set/Clear−based CLI. Table [...]

  • Seite 362

    configuration show vlan Shows the VLAN configuration show vlan show vtp Shows the VLAN Trunking Protocol (VTP) configuration show vtp domain spantree <vlan−list> Configures STP set spantree enable <mod/number> hello <hellotime> spantree cost <cost−value> Configures the port cost set spantree portcost <mod/number cost&[...]

  • Seite 363

    Appendix C: The Cisco Consultant Overview On the side, I run a small consulting company. When I tell people that I am a Cisco consultant, they usually reply, “Oh”; or, they ask how well Cisco’s stock is currently doing. Consulting means that you work from one project to another on a freelance basis. Usually, if you’re the consultant for a C[...]

  • Seite 364

    Make sure you are on time for your first appointment with the customer. Turn off your cellular phone (let voice mail be useful for once) and put your pager on vibrate. You want to project to the customer that he or she is the most important person in the world at that moment. No one wants to buy something from someone who frustrates them by answeri[...]

  • Seite 365

    (briefly, this term refers to the fact that buying equipment correctly up front will be significantly cheaper than upgrading individual components later when it becomes necessary). Customers may not want to invest more money than they have to in the short term, but sometimes they will—and you wind up making a much bigger sale. Occasionally, your [...]

  • Seite 366

    Contracting When you first go into business as a consultant, you should have a contract that is created by an attorney and authorized by your insurance carrier. Once you have the contract in a word−processing document form that outlines your liabilities and those of the customer, you can modify the contract to suit each individual customer. The i[...]

  • Seite 367

    would only be there a week or so. The first day the contractor showed up, we gave him the initial payment for his work. He did a great day of work, removing the old flooring, vents, cabinets, toilet, and other fixtures. He said he would be back the next day to work some more—but the next day came and went, and he failed to show up. I called him, [...]

  • Seite 368

    Failing to Take Responsibility If you realize that you failed to contract an item, you should absorb the cost if it is small. No one feels more nickeled and dimed than a person who has hired a consultant, when the consultant says he forgot to add a cable and will be charging another $10 five times. You can absorb small costs into the 10 percent pad[...]

  • Seite 369

    Appendix D: Cisco 1912EN and Catalyst 5000 Configuration Practice Lab Today Joe Snow, our imaginary consultant, has received a Catalyst 1912EN switch, a Catalyst 5000 with a Supervisor Engine III, and a 24−port 10/100 Ethernet module. Joe has taken both the switches out of the box and has assembled all the devices into a rack. At present, neither[...]

  • Seite 370

    Mod MAC−Address(es) Hw Fw Sw —— ————————————————————————————————————— ———— ——————— —————————————————— 1 00−50−bd−a0−b0−00 to 00−50−bd−a0−b3−ff 2.0 3.1.2 5.5(2) 2 00−50−0f−b7−ff−50 to[...]

  • Seite 371

    Figure D.1: The sample configuration. Possible Solution More than one solution exists to any problem; however, here is the suggested solution to configuring the Cisco Catalyst 1912EN, the Cisco Catalyst 5000, and the Cisco 2620 trunked interface. The 1912 Basic Configuration To configure the Cisco Catalyst 1912EN, follow these steps: Access the Cis[...]

  • Seite 372

    1912EN(config)# enable password level ? <1−15> Level number 1912EN(config)# enable password level 1 coriolis1 1912EN(config)# enable password level 15 coriolis2 1912EN (config)# enable secret coriolispass Enter Interface Configuration mode to configure the Fast Ethernet 0/27 port on the 1912EN. Enter the switch’s IP address and the defaul[...]

  • Seite 373

    1912EN(config)#vtp domain Coriolis 1912EN(config)#vtp domain server 1912EN(config)# exit Note The configuration on the 1912EN is saved automatically, so you do not need to save the configuration. The Catalyst 5000 Basic Configuration To configure the Cisco Catalyst 5000 10/100 Ethernet module and Supervisor Engine, follow these steps: Access the Ci[...]

  • Seite 374

    Port(s) 2/24 trunk mode set to on. Port(s) 2/24 trunk type set to isl. 2000 Oct 19 12:32:46 %DTP−5−TRUNKPORTON:Port 2/24 Enable this switch to be a VTP client for the Coriolis VTP domain. By doing this step you will propagate VLAN information to and from the 1912EN switch: Catalyst5000> (enable) set vtp domain ? Usage: set vtp [domain <na[...]

  • Seite 375

    Appendix E: Switch Features This appendix is dedicated to helping you determine which switch needs to be placed in your network. If the wrong switch is placed in each point in your network the load can cause severe problems, including bottlenecks or load failures. We will break down the switches into the layers in which Cisco feels they should resi[...]

  • Seite 376

    Cisco Catalyst 2820 For an environment that needs high−speed links to the wiring closet for 20 or so users, the Catalyst 2820 is an ideal solution. This switch is perfect for smaller wiring closets where it is not economical to purchase a high−end solution such as a Cisco Catalyst 5000 series switch. The Catalyst 2820 series switch architecture[...]

  • Seite 377

    Table E.3: The models and features available for the standard version of each Cisco Catalyst 2900 XL series switch. Feature 2908 XL 2912 MFXL 2916 XL 2924 MXL 2924 CXL 10/100 ports 8 0 16 24 22 100BaseFX ports 0 12 0 0 2 Expansion slots 0 2 0 2 0 Enterprise Edition Yes Yes Yes Yes Yes Standard Edition Yes No Yes Yes Yes Backplane 3.2Gbps 3.2Gbps 3.[...]

  • Seite 378

    Expansion slots 0 0 2 0 Enterprise Edition Yes Yes Yes Yes Standard Edition No No No No Backplane 1.2Gbps 1.2Gbps 1.2Gbps 24Gbps Flash 4MB 8MB 12MB 0 RAM 20MB 32MB 64MB NA Modularity No No Yes NA Forwarding rate 1 million pps 1 million pps 1 million pps 18 million pps Max VLANs 1,024 1,024 1,024 N/A Cisco Catalyst 3000 The Cisco Catalyst 3000 has a[...]

  • Seite 379

    Gigabit Ethernet ports for GBIC Ethernet aggregation. It also has built−in support for Voice Over IP telephony, in addition to built−in support for up to 250 port−based VLANs and ISL VTP. In addition, the 3500 series supports many of the features of the 1900 and 2900 series, such as DNS and DHCP. The series is offered in both Standard and Ent[...]

  • Seite 380

    Key Features and Benefits The Catalyst 3900 has the following features: Twenty shielded Token Ring ports for 150−ohm shielded twisted pair (STP) or 100−ohm unshielded twisted pair (UTP) connectivity • FlexSlot accommodating two expansion modules or one double−wide module for future expansion • Nine−pin EIA/TIA−232 interface for local [...]

  • Seite 381

    Catalyst 4000 series • Catalyst 5000 series • Catalyst 6000 series • Cisco Catalyst 4000 Series The Catalyst 4000 series provides very fast and intelligent Layer 2 switching services using a 24Gbps switching fabric. It is used in Ethernet networks utilizing 10−, 100−, and 100Mbps switching. Let’s take a look at the features of each of t[...]

  • Seite 382

    configuration across all switches Support for all advanced switching features of the Cisco IOS software • Support for advanced multicasting with CGMP • The Catalyst 5000 series of switches uses an architecture based on Supervisor Engines I, II, and III. The Supervisor Engine provides network management and uplink ports. The Supervisor Engine II[...]

  • Seite 383

    switching in distribution and server−aggregation environments. The Catalyst 6000 family complements the Catalyst 5000 series and 8500 series switches. The Catalyst 6000 family is capable of scaling bandwidth from T1 to OC−192 in the WAN/MAN, and from Ethernet to 10 Gigabit Ethernet in the LAN. The Catalyst 6000 series uses a Cisco IOS software [...]

  • Seite 384

    Catalyst 8400 series • Catalyst 8500 series • BPX 8600 series • MGX 8800 series • Catalyst 12000 series • Note Cisco considers the Catalyst 5500 and the Catalyst 6500 series switches as versatile Distribution and Core layer switches. Cisco Catalyst 8400 Series The Catalyst 8400 series wide−area switches provide the backbone services to [...]

  • Seite 385

    Low−Delay, Code−Excited Linear Prediction (LD−CELP) at 16Kbps • Conjugate−Structured, Algebraic Code−Excited Linear Prediction (CS−ACELP) at 8Kbps • The IGX voice interfaces also support the VAD silence suppression technique, which sends cells on the trunk only when there is something to send. With most voice connections consisting [...]

  • Seite 386

    Table E.12: The key features of the Cisco Catalyst 8510 and 8540. Feature 8510 8540 Modular slots 5 13 Forwarding rate 6 million pps 24 million pps Backplane 10Gbps 40Gbps BPX 8600 Series The BPX 8600 series provides a scalable set of solutions delivering ATM, Frame Relay, SNA, voice, and circuit emulation services, plus Voice Over IP, IP−based V[...]

  • Seite 387

    MGX 8800 Series The Cisco MGX 8800 series wide−area edge switches integrate Cisco IOS software IP capabilities and carrier−class ATM in a single platform. The MGX 8850 switch enables delivery of differentiated services while scaling from DS0 to OC−48c/STM−16 speeds. The MGX platform provides a cost− effective edge infrastructure for volum[...]

  • Seite 388

    The MGX 8800 RPM also supports MPLS. It can act as a label edge router or label switch router. It also supports MPLS−VPNs via mulitprotocol BGP extentions, VPN route−target extended BGP community attributes, MPLS forwarding across backbone, and multiple routing/forwarding instances on the provider edge router. As mentioned earlier, the Route Pr[...]

  • Seite 389

    512K configuration nonvolitile RAM (NVRAM) • 8MB boot flash • Two PC Card Type II software upgrades • Ethernet (RJ−45 and MII connectors) for network management access • Local console and modem ports (DB−25/EIA/TIA−232c) • The GRP provides the following key functions: Processes interior gateway protocols (IGPs) such as Intermediate [...]

  • Seite 390

    then forwards the frame out all the ports. American National Standards Institute (ANSI) The organization that publishes standards for communications, programming languages, and networking. ANDing The process of comparing the bits of an IP address with the bits in a subnet mask to determine how a packet will be handled. anycast address An address us[...]

  • Seite 391

    B backbone A high−capacity infrastructure system that provides optimal transport on a LAN. Typically in a LAN, the data running from router to router, switch to switch, or switch to router is transported through a faster physical topology than the rest of the local area or virtual LAN devices. The physical cable is called the backbone. BackboneFa[...]

  • Seite 392

    device or Layer 2 device that can filter broadcasts. On a switched network using VLANs, the broadcast domain is all the ports or collision domains that belong to the same VLAN. broadcast storm Occurs when broadcasts throughout the LAN become so numerous that they use up all the available bandwidth, thus grinding the network to a halt. brouter A dev[...]

  • Seite 393

    support CDP. Cisco Express Forwarding (CEF) Used in the CEF ASIC (CEFA) and Distributed Cisco Express Forwarding (dCEF) ASIC, Cisco’s newest ASICs. These ASICs, which are used in Cisco’s high−end devices, are the most functional and efficient ASICs in the Cisco product line. They use a CEF search engine, which makes IP prefix−based switchin[...]

  • Seite 394

    A feature of the SAMBA ASIC used to cause the EARL to make forwarding decisions. It also ensures that a tagged frame that comes from a particular VLAN does not exit through a port belonging to another VLAN. CBL also assists in placing ports in one of four different modes for Spanning−Tree Protocol: blocking, learning, listening, or forwarding. co[...]

  • Seite 395

    Data Service Unit (DSU) A component that formats and controls data for transmission over digital lines. It is used in conjunction with a Channel Service Unit (CSU). Data Terminal Equipment (DTE) A device at the user end of a user−network interface that serves as a data source, a destination, or both. These devices include computers, protocol tran[...]

  • Seite 396

    dumb terminal An end−user station that can access another computer or switch but cannot provide any processing at the local level. Dynamic Host Configuration Protocol (DHCP) A protocol that provides an IP address to requesting nodes on the network. Dynamic ISL A protocol that performs trunking negotiation. It also verifies that two connected port[...]

  • Seite 397

    A connection used on the Catalyst 5000 family of switches. It allows as many as seven Ethernet links to be bundled and load−balanced frame by frame to provide up to 800Mbps of bandwidth. It can utilize half−duplex or full−duplex links. Fast Ethernet IEEE 802.3 specification for data transfers of up to 100Mbps. fault tolerance A theoretical co[...]

  • Seite 398

    A Data Link layer switching protocol used across multiple virtual circuits of a common carrier, giving the end user the appearance of a dedicated line. frame tagging A VLAN implementation method used to add VLAN information to data frames. As a frame enters the switch, it is tagged with VLAN information. It retains this information through the swit[...]

  • Seite 399

    hub A hardware device that connects multiple independent nodes. Also known as a concentrator or multiport repeater . Hypertext Transfer Protocol (HTTP) A protocol used by Web browsers to transfer pages and files from a remote node to your computer. IEEE See Institute of Electrical and Electronics Engineers . IEEE 802.1 Standard that defines the OSI[...]

  • Seite 400

    Standard for inserting a frame tag VLAN identifier in the frame header. As a frame enters the switching fabric, it is tagged with additional information regarding the VLAN properties. The tag remains in the frame as it is forwarded between switches and is removed prior to exiting the access link to the destination interface. This process is complet[...]

  • Seite 401

    internetwork A group of networks that are connected by routers or other connectivity devices so that the networks function as one network. Internetwork Operating System (IOS) Cisco’s proprietary operating system, used in its routers and switches. Internetwork Packet Exchange (IPX) The Network−layer protocol generally used by Novell’s NetWare [...]

  • Seite 402

    A broadcast on the local network, looking for the IP address of the destination host. local service Service where the device supplying the service resides on the same subnet as the device requesting the service. Local Target Logic (LTL) A feature of some line modules that assists the EARL in making forwarding decisions. local VLAN Beneficial for ne[...]

  • Seite 403

    microwaves Very short radio waves used to transmit data over 890MHz. modem A device used to modulate and demodulate the signals that pass through it. It converts the direct current pulses of the serial digital code from the controller into the analog signal that is compatible with the telephone network. multicast A single packet transmission from o[...]

  • Seite 404

    A protocol that allows all network equipment to synchronize the date and time on the private or internetwork environment. network−to−network interface (NNI) An interface that provides connectivity between two ATM switches. non−blocking A condition in which the fabric contains more bandwidth than the sum total of all the ports’ bandwidth com[...]

  • Seite 405

    is the common modem connection used for Internet dial−up. Point−To−Point Tunneling Protocol (PPTP) A protocol that encapsulates private network data in IP packets. These packets are transmitted over synchronous and asynchronous circuits to hide the underlying routing and switching infrastructure of the Internet from both senders and receivers[...]

  • Seite 406

    customers, which remains analog. Q−R Quality of Service (QoS) A guarantee of a particular level of service for a connection. QoS uses queuing and other methods to guarantee that bandwidth is available for a certain protocol, application, or address. QoS is important for implementing applications such as voice and video. queuing Uses buffering and[...]

  • Seite 407

    Route Switch Module (RSM) Cisco’s first multiprotocol multilayer switch module, which utilizes the full support of the Cisco IOS for performing Layer 3 routing from a slot internally on a Layer 2 switch. This module provides for interVLAN connectivity. Routing Information Field (RIF) A field on Source Route Bridge Token Ring frames that contains [...]

  • Seite 408

    the same community. Simple Network Management Protocol (SNMP) trap An SNMP protocol utility that sends out an alarm in an identified community notifying members of the community that some network activity differs from the established threshold, as defined by the administrator. Simple Server Redundancy Protocol (SSRP) A Cisco protocol that provides [...]

  • Seite 409

    A 12−digit number that is used to uniquely identify each device on an IPX network. storage area network A subnetwork of storage devices, usually found on high−speed networks and shared by all servers on the network. store−and−forward A fast packet−switching method that produces a higher latency than other switching methods. The switch wai[...]

  • Seite 410

    An organization that develops standards with the EIA (Electronics Industries Association) for telecommunications technologies. Telnet Standard terminal−emulation protocol in the TCP/IP protocol stack. It is used to perform terminal emulation over TCP/IP via remote terminal connections, enabling users to log in to remote systems and use resources [...]

  • Seite 411

    U−X unicast A frame in which the destination MAC address specifies the single destination computer. Unicast can be summarized as direct network traffic between two individual nodes. unshielded twisted−pair (UTP) A type of cable that uses multiple twisted pairs of copper wire in a casing that does not provide much protection from EMI. The most c[...]