IBM 8260 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung IBM 8260 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von IBM 8260, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung IBM 8260 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung IBM 8260. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung IBM 8260 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts IBM 8260
- Den Namen des Produzenten und das Produktionsjahr des Geräts IBM 8260
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts IBM 8260
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von IBM 8260 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von IBM 8260 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service IBM finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von IBM 8260 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts IBM 8260, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von IBM 8260 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    International Technical Support Organization 8260 Multiprotocol Intelligent Switching Hub May 1995 GG24-4370-00[...]

  • Seite 2

    [...]

  • Seite 3

    International Technical Support Organization 8260 Multiprotocol Intelligent Switching Hub May 1995 GG24-4370-00 IBML[...]

  • Seite 4

    Take Not e! Before using this information and the product it supports, be sure to read the general information under “Special Notices” on page xv. First Edition (May 1995) This edition applies to the 8260 Multiprotocol Intelligent Switching Hub family. Order publications through your IBM representative or the IBM branch office serving your loca[...]

  • Seite 5

    Abstract This document describes the IBM 8260 Multiprotocol Intelligent Hub. It provides information about the 8260 architecture as well as how to install, configure and manage the 8260 Ethernet and token-ring media modules. This document was written for customers, systems engineers, network professionals and technical support personnel. Some knowl[...]

  • Seite 6

    iv 8260 Multiprotocol Intelligent Switching Hub[...]

  • Seite 7

    Contents Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii Special Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xvii How This Document is Organized .......................[...]

  • Seite 8

    4.4.1 Ethernet MAC Daughter Card (E-MAC) .................. 64 4.4.2 Token-Ring MAC Daughter Card (T-MAC) ................ 66 4 . 5 Managing 8260 Using DMM and 8250 xMM .................. 69 4.5.1 Managing 8260 with DMM .......................... 70 4.5.2 Managing 8260 with 8250 xMM ....................... 70 4 . 6 Overview of Management and Contro[...]

  • Seite 9

    8 . 4 Jitter Attenuator Daughter Card (JADC) ................... 141 8 . 5 Passive Port Technology ............................ 142 8 . 6 Active Port Technology ............................. 142 8.6.1 Per-Port Switching on the Active Modules ............... 143 8.6.2 Static Switch on the Per-Port Switching Modules ........... 145 8 . 7 Signal Flow [...]

  • Seite 10

    10.6.3 SHOW COUNTER Command for Ethernet Networks ......... 215 10.6.4 Collecting and Displaying RMON Groups Using E-MAC ....... 218 10.6.5 SHOW COUNTER Command for Token-Ring Networks ....... 222 10.6.6 Collecting and Displaying RMON Groups Using T-MAC ....... 230 1 0 . 7 Surrogate Functions Supported by T-MAC ................. 232 10.7.1 Using T-[...]

  • Seite 11

    Figures 1. I B M 8260 Model 0 1 7 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2 . Components o f the 8250 Adapter Kit . . . . . . . . . . . . . . . . . . . . . 5 3 . Enhanced TriChannel B us ............................ 14 4. 8260 S h u n t B u s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 5 . Backpl[...]

  • Seite 12

    5 2 . Installing 8260 Modules in an 8260 Not Managed by DMM ........ 83 5 3 . Installing 8250 Modules in an 8260 Managed by DMM ........... 84 5 4 . Installing 8250 Modules in an 8260 Not Managed by DMM ........ 85 5 5. Messages Received when a Power Failure Occurs ............. 86 5 6 . Using the SHOW HUB Command ........................ 87 5 7 . [...]

  • Seite 13

    106. Trunk Wrapping in Active Per-Port Switching Module .......... 169 107. Trunk Wrapping in Active Per-Port Switching Module .......... 169 108. Front View of 18-Port Active Per-Port Switching Module ......... 175 109. 18-Port Active Per-Port Switching Module Side View ........... 176 110. Onboard Lobe/Trunk Jumpers on 18-Port ................. 1[...]

  • Seite 14

    161. LMS IP Panel .................................. 279 162. LMS IP Port Address Table Panel ...................... 280 163. LMS IP System Parameters Panel ...................... 281 164. LMS IP Port Parameter Panel ........................ 283 165. LMS IP Forwarding Table Panel ....................... 284 166. LMS IP Net To Media Table ..........[...]

  • Seite 15

    Tables 1 . Components of the 8250 Adapter Kit for 8260 . . . . . . . . . . . . . . . . 6 2 . Ethernet Pins on the 8260 Backplane . . . . . . . . . . . . . . . . . . . . . 17 3. 8260 controller Module L E D Meaning . . . . . . . . . . . . . . . . . . . . . 31 4 . D M M Status LE D . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 [...]

  • Seite 16

    xiv 8260 Multiprotocol Intelligent Switching Hub[...]

  • Seite 17

    Special Notices This publication is intended to help both IBM Customers and IBM System Engineers to install and configure the IBM 8260 Multiprotocol Intelligent Switching Hub. It contains description of the 8260 architecture as well as information about how to install, configure and manage the the 8260 Ethernet and token-ring modules. The informati[...]

  • Seite 18

    The following terms in this publication, are trademarks of other companies: Windows is a trademark of Microsoft Corporation. PC Direct is a trademark of Ziff Communications Company and is used by IBM Corporation under license. UNIX is a registered trademark in the United States and other countries licensed exclusively through X/Open Company Limited[...]

  • Seite 19

    Preface This document is intended to assist customers and IBM system engineers to implement local area networks based on the IBM 8260 Multiprotocol Intelligent Switching Hub. It contains description of the 8260 architecture as well as information about how to install, configure and manage the the 8260 Ethernet and token-ring modules. How This Docum[...]

  • Seite 20

    This appendix provides information about the power requirements of the 8250 modules. Related Publications The publications listed in this section are considered particularly suitable for a more detailed discussion of the topics covered in this document. • IBM 8260/8250 PSPG ,GA33-0285 • IBM 8260 Installation Guide , SA33-0251 • 8260 TR Active[...]

  • Seite 21

    Acknowledgments The advisor for this project was: Mohammad Shabani International Technical Support Organization, Raleigh Center The authors of this document are: Mohammad Shabani International Technical Support Organization, Raleigh Center Nongyao Buranarachada IBM Thailand Mike Welsh IBM Australia This publication is the result of a residency cond[...]

  • Seite 22

    xx 8260 Multiprotocol Intelligent Switching Hub[...]

  • Seite 23

    Chapter 1. An Overview of the IBM 8260 Hub This chapter is an introduction to the IBM 8260 Multiprotocol Intelligent Switching Hub. It is intended to provide the reader with an overview of the following: • Hardware description • Backplane architecture • Fault-tolerant power subsystem • Intelligent cooling subsystem • Distributed managemen[...]

  • Seite 24

    • One power supply • One power supply bay cover • One AC power cord • Three fan units • One cable tray • One rack mount kit • One rubber feet kit • Six blank dual-slot filler plates • Three blank single-slot filler plates Additionally, you can order the following features to be included in your 8260: • Up to three additional pow[...]

  • Seite 25

    1.2 8260 Hardware Description There are three models of the 8260: • 8260-017 • 8260-010 • 8260-17A 1.2.1 IBM 8260 Model 017 The 8260 Model 017 is a 17-slot module which allows you to install any combination of 8260 and 8250 modules (except the 8250 Controller module) to set up token-ring, Ethernet and/or FDDI networks. Additionally, it can be[...]

  • Seite 26

    Figure 1. IBM 8260 Model 0 1 7 1.2.1.2 Payload Area The payload area provides the housing for 17 media and management modules. In addition to the 8260 module, you may install all the 8250 modules (except the Controller module) in an 8260. Once these modules are installed on the 8260, they will be connected to the backplane. Certain modules provide [...]

  • Seite 27

    • Right Boundary Adapter: This adapter is a full length adapter and occupies one slot. Installation of this adapter results in 16 slots remaining available in the 8260 for the installation of media and management modules. It i s recommended that you install this adapter in slot 17. The reason for this is that if an 8250 management module becomes [...]

  • Seite 28

    Table 1. Components of the 8250 Adapter Kit for 8260 Adapter kit Component 4- sl o t Feature 9- sl o t Feature 16-slot Feature Left Boundary Adapter 1 1 1 Right Boundary Adapter 1 1 1 Dual-Slot Top Filler 1 3 7 Single-Slot Top Filler 1 2 1 Dual-Slot Module Ejector Blocks 4 9 16 8250 Module Blank Faceplate 3 8 15 1.2.1.3 Fault-Tolerant Controller Mo[...]

  • Seite 29

    1.2.2 The Intelligent Cooling Subsystem The cooling subsystem consists of 3 fans, each of which cools a specific area of the hub. Each of the fans has a sensor to detect a slow or stopped condition and a temperature sensor to detect an over temperature condition. In conjunction with the Controller module and the DMM the hub environment can be monit[...]

  • Seite 30

    • Model 010 is shorter than the Model 017 (498 mm versus 673 mm), but has the same depth and width. • Power supplies in the Model 010 are housed on the left side of the chassis whereas in the Model 017 they are housed in the bottom section. The 8260 Model 010 shares with the Model 017 all of the following benefits: • Supports three fan units.[...]

  • Seite 31

    1.3.1.2 8260 Ethernet 20-Port 10Base-T Module The 8260 Ethernet 20-port 10Base-T module is single-slot module which provides 20 RJ-45 connectors for supporting 20 Ethernet ports. This module provides per-port switching capability. 1.3.1.3 8260 Ethernet 40-Port 10Base-T Module The 8260 Ethernet 40-port 10Base-T module is two-slot module which provid[...]

  • Seite 32

    1.3.2.2 8260 TR 18 Port Active Module Switching Module The 8260 TR 18 Port Active Module Switching module is a single-slot module which provides attachment of up to 18 workstations to one of the 10 token-ring segments on the ShuntBus using both STP and UTP cables. This module provides active re-timing and regeneration of the signal on every port. P[...]

  • Seite 33

    1.3.3.2 8260 Fault-Tolerant Controller module The 8260 Fault-Tolerant Controller Module synchronizes the operations of all installed media and management modules by providing clocking and timing to the 8260 Multiprotocol Intelligent Hub Backplane. The Controller module is also responsible for managing the power and cooling subsystems. 1.3.3.3 Ether[...]

  • Seite 34

    12 8260 Multiprotocol Intelligent Switching Hub[...]

  • Seite 35

    Chapter 2. Backplane Architecture The 8260 backplane consists of the following two buses: • Enhanced TriChannel • ShuntBus These two buses are standard features of all the 8260 models and are installed on every 8260 shipped to the customers. The following sections provide detailed information about the 8260 backplane and how the backplane buses[...]

  • Seite 36

    Figure 3. Enhanced TriChannel Bu s The number of pins available for user traffic on the ShuntBus is 72 pins. These pins are used to set up 2 dedicated Ethernet segments as well as 10 token-ring (or 4 FDDI) segments as shown in Figure 4 on page 15 . On the ShuntBus, 8 pins out of the 72 network traffic pins are dedicated to be used by two Ethernet s[...]

  • Seite 37

    Figure 4. 8260 ShuntBus 2.2 Ethernet Segments on the Backplane The 8260 allows you to set up a maximum of 6 Ethernet (ethernet_1 thru 6) segments on the Enhanced TriChannel and two Ethernet segments (ethernet_7 and 8) on the ShuntBus. ethernet_1 thru 3 can consist of 8250 and/or 8260 Ethernet modules, whereas ethernet_4 thru 8 can consist of 8260 E[...]

  • Seite 38

    SET MODULE {slot.sublsot} NETWORK {ethernet_n} or SET PORT {slot.port} NETWORK {ethernet_n} Before assigning the port or module to a network you may use the following management command to display the availability of the Ethernet segments on the Enhanced TriChannel and the ShuntBus: SHOW BACKPLANE_PATHS ETHERNET An example of the output from this c[...]

  • Seite 39

    segments ethernet_4, ethernet_5 and ethernet_6 on the Enhanced TriChannel and ethernet_7 and ethernet_8 on the ShuntBus. • Method 2: This method also uses 14 pins on the backplane to set up an Ethernet segment. In this method, each module attached to that Ethernet segment will use digital collision detection identical to that used in method 1. Th[...]

  • Seite 40

    The following is a brief description of the use of each of the pins in an Ethernet segment on the 8260 backplanes: • Data enable signal : When this signal is active, data on the backplane is valid and the modules should receive and process the data on the ′ Data in NRZ Format ′ pin. • Data in NRZ format : This signal is used to transmit dat[...]

  • Seite 41

    This pin is used to provide a means of detecting collisions of the segments using method 3. Analog collision detection is described in 2.2.2, “Analog Collision Detection” on page 1 9 . 2.2.1 Digital Collision Detection Collision detection on the backplane (for methods 1 and 2) is done by using slot-id information transmitted on the backplane. E[...]

  • Seite 42

    • Data-in • Clock-in • Data-out • Clock-out When you assign an 8250 token-ring module to one of the token-ring networks on the Enhanced TriChannel (tr_8250_1 through tr_8250_7) using the following command: SET MODULE {slot.sublsot} NETWORK {token_ring_n} The 8260 will automatically allocate one of the available token-ring paths to this modu[...]

  • Seite 43

    the token-ring paths marked as ″ available ″ are the parts of the Enhanced TriChannel that are not currently used by any type of network. On the ShuntBus, in addition to the two dedicated Ethernet segments, there are 10 token-ring segments. Unlike, the Enhanced TriChannel, there is no concept of token-ring paths on the ShuntBus. Instead, there [...]

  • Seite 44

    • Data B transmit • Clock receive • Data A receive • Data B receive The reasons for two signals for each of the transmit and receive signals is given in 8.2, “8260 Backplane Signalling for TR Segments” on page 1 34 . Note that regardless of the number of token-ring modules used in a segment, you always have the ability to set up 10 sepa[...]

  • Seite 45

    An example of the output from this command is shown in Figure 8 on page 2 3.   8260> show backplane_paths fddi Physical Path Logical Network --------------- --------------- FDDI_PATH_8250_1 in use FDDI_PATH_8250_2 in use FDDI_PATH_8250_3 in use FDDI_PATH_8250_4 in use FDDI_PATH_8250_5 in use FDDI_PATH_8250_6 in use FDDI_PATH_8250_7 in use [...]

  • Seite 46

    • Any module can plug into any slot and all allocation of modules to networks or channels, regardless of whether they are TriChannel or Shunt Bus, is done by electronic switching (via DIP switches on the modules or management module commands). Figure 9 shows the Enhanced TriChannel network allocation and how the mixing of various network types af[...]

  • Seite 47

    Using Figure 10 on page 25 you can see that if, for example, fddi_1 network on the ShuntBus is used, it eliminates token_ring_1, token_ring_2 and token_ring_3. Also, you can see that the use of Ethernet segments ethernet_7 and ethernet_8 have no affect on the availability of token-ring and FDDI segments. Figure 10. ShuntBus Backplane Network Alloca[...]

  • Seite 48

    Figure 11. The Backplane Relationship between TriChannel and ShuntBus 2.5.1 Management Buses It was mentioned earlier that 42 of the 96 pins on the TriChannel Backplane are reserved for non-data traffic. Included in these pins are the Management LAN (MLAN) and the Serial Control Interface (SCI). 2.5.1.1 The Management LAN (MLAN) The MLAN is a dedic[...]

  • Seite 49

    the MAC daughter card is accessed by the upper layer protocol stacks within the DMM (SNMP, Telnet) through the MLAN. The E-MAC can be installed on either the EC-DMM or the 8260 media modules. When installed on the 8260 media modules, E-MAC can collect statistics about all the Ethernet segments on the backplane, but will not be able to collect per-p[...]

  • Seite 50

    28 8260 Multiprotocol Intelligent Switching Hub[...]

  • Seite 51

    Chapter 3. 8260 Fault Tolerant Controller Module The 8260 Fault Tolerant controller module is a critical component of the 8260. One active controller module is always required in order to keep the 8260 hub operational and running. Unlike the 8250 controller module, the 8260 Fault Tolerant Controller module does not occupy any of the payload slots b[...]

  • Seite 52

    3.1.1 The Controller Module Front Panel Figure 13. Front View of th e Controller Module Figure 13 shows the front view of the controller module. Besides the hub reset and the LED test buttons, the controller module has 10 LEDs covering the 4 power supplies, 3 fans, active or standby mode and temperature on the front panel which indicate the state o[...]

  • Seite 53

    Hub Reset Button Pressing this button, which is active on the active controller module only, resets all installed modules including both active and standby controller modules. If you issue the reset hub command at the 8260 console, it will give you the same result as using the hub reset button. Note Prior to resetting a hub, ensure that you save al[...]

  • Seite 54

    3.1.2 Controller Module Fault Tolerance There are two dedicated slots, 18 and 19, provided for installing the controller module. Once installed, the controller does not need to be configured. Since the controller module is a critical component, it is recommended to have a second controller module installed in the hub for backup purposes. When two c[...]

  • Seite 55

    3.1.4 8260 Fault Tolerant Controller Module Considerations • Up to two controller modules can be installed in the 8260 hub. • Neither controller module occupies a payload slot. • When 2 modules are installed, one is active and the other is standby. • The hub reset button is only active on the active controller module. • The LED test butto[...]

  • Seite 56

    34 8260 Multiprotocol Intelligent Switching Hub[...]

  • Seite 57

    Chapter 4. 8260 Distributed Management Architecture This chapter will provide an in-depth look at the distributed management architecture of the 8260. The items we will cover are: • 8260 distributed management architecture • The Distributed Management Module (DMM) • Ethernet Carrier - Distributed Management Module (EC-DMM) • Ethernet Medium[...]

  • Seite 58

    These daughter cards provide the following two functions: • Interface to the backplane segments To be able to communicate with devices attached to any of the backplane segments, DMM requires an interface to that segment. The interface to the Ethernet segments on the backplane is provided to DMM via E-MAC, whereas T-MAC allows DMM to interface wit[...]

  • Seite 59

    Figure 14. Management Schematic The DMM (and daughter cards) provide management and control facilities in the following areas: − Configuration The DMM, networks, modules, and port settings can be configured through the DMM using DMM commands. The DMM can be used to configure 8250 as well as 8260 modules. − Statistics and fault reporting E-MAC a[...]

  • Seite 60

    In a Simple Network Management Protocol (SNMP) managed environment the DMM acts as the SNMP agent, responding to SNMP requests and generating SNMP traps. − Telnet support Using Telnet you can log in remotely to any DMM on the network and manage it from the remote station. You can also use Telnet from the terminal attached to the DMM to log in to [...]

  • Seite 61

    4 .2 The Distributed Management Module (DMM) The stand-alone DMM is a single-slot management module that has no facility for carrying daughter cards. The DMM has 1 module status LED, a 4-character display with a display control toggle button and 2 serial port connectors as shown in Figure 1 5. Figure 15. DMM Front Panel 4.2.1 Unpacking and Installi[...]

  • Seite 62

    Caution As always, great care should be taken when handling logic cards. The level of static electricity that can build up in the human body can be thousands of times greater than the very small switching voltage used in logic cards. An analogy would be connecting your Hi-Fi or TV set to 10,000 volts. It wouldn ′ t last long! Remove the card from[...]

  • Seite 63

    The LCD display and display control button are used to: • Display the current operating state of the module • Determine the network assignment of ports and 8260 modules in the hub • Display the version of the DMM microcode The LCD display normally shows the module operating state. To display the DMM microcode version, press the button until t[...]

  • Seite 64

    The lower port is the auxiliary port and can be jumpered for RS-232 or RS-423 operation. This port allows you to attach a terminal locally (or via modem) to DMM. Note: The default is RS-232. See Table 7 on page 42 for the pinout of the cables used for attaching terminals to the auxiliary port. Note You can attach terminals to both the console and a[...]

  • Seite 65

    proper modem operation. See 4.2.4.3, “Configuring Terminal Settings for DMM” on page 47 for description of Set Terminal Hangup command. 4.2.4 Configuring the DMM The following table is a quick reference to the tasks required to configure the DMM interface. Before your terminal and the DMM can communicate you must set up the terminal parameters [...]

  • Seite 66

    Once the terminal has been configured press the Enter key. If the terminal has been configured correctly the following message should be displayed: Table 10 (Page 2 of 2). DMM Terminal Def a ul ts a nd Options Parameter Factory Default Options Stop Bits 1 1 or 2   8260A Distributed Management Module (v2.10-H) Login:   Figure 17. DMM Log[...]

  • Seite 67

      8260A> set login password Enter current session password for user ″ system ″: Enter new password: Verify - re-enter password: User password changed. 8260A>   Figure 18. Changing Superuser Password Note: DMM passwords are case sensitive. You may define new login names with user, administrator and superuser authority. Figure 1[...]

  • Seite 68

      8260A> show login Login Table: Index Login Name Access Active Sessions ----- --------------- -------------- --------------- 1 system Super User 1 2 shabani Super User 0 3 admin1 Administrator 0 4 user1 User 0 5 “not used“ 6 “not used“ 7 “not used“ 8 “not used“ 9 “not used“ 10 “not used“ Active Login Sessions: Logi[...]

  • Seite 69

      Login: Login: system Password: A user with Super User or Administrator Access is already logged in. You are being logged in with User Access ... Welcome to user service on 8260A. 8260A> set login access super_user Super_user access granted. 8260A>   Figure 21. Forced Termination of Existing D M M Users In this example, we tried [...]

  • Seite 70

    Note: The baud rate specified in this command must match the settings of your terminal; otherwise, after issuing this command, the communication between the terminal and DMM will be lost. In that case, you must change the setting of your terminal before you can reestablish the communication. − Data_bits This parameter allows you to set the number[...]

  • Seite 71

    In this example, 9.67.46.3 is the address of the TCP/IP station attached to the DMM port. To use SLIP, you must also perform the following tasks: 1. Assign a n IP address to DM M for communication over the SLIP interface. The following example defines 9.67.46.1 as the address used by DMM over the SLIP interface: 8260> set ip ip_address 9.67.46.1[...]

  • Seite 72

    This option is very useful in identifying the DMM to which you are logged in. The default prompt is ″8260>″. It is recommended that you use the same ID for both the terminal prompt and the DMM device name. See 4.2.4.4, “ Configuring DMM Device” on page 50 for how to configure DMM device name. • Set Terminal Timeout This command is used[...]

  • Seite 73

    This command sets the clock to 3:45 p.m., Thursday, Jan 19th, 1995. The clock is driven by an internal battery which is designed to last for 10 years. • Set Device This command allows you to configure the following for DMM: − Device name This command allows you to configure a name for DMM. It is recommended that each DMM in the network be assig[...]

  • Seite 74

    The factory default is for the DMM to run through a full set of diagnostics each time it is rebooted. By using the following command you can make the DMM bypass the diagnostics and boot up faster: 8260A> set device diagnostics disable − MAC address order In general, Ethernet devices uses canonical address format, whereas token-ring devices use[...]

  • Seite 75

    You can configure DMM to force a mastership election when it is inserted into a hub. This option may be used to ensure that the DMM gets the opportunity to obtain the appropriate authority after it is removed and inserted back into the hub. The command to enable the forcing of mastership is as follows: 8260A> set device reset_mastership enable ?[...]

  • Seite 76

    Note that for your DMM to receive traps from the other stations, your DMM must be defined as a trap receiver in the community table of the other stations. After setting all the parameters for DMM you must ensure that you save them using the following command: 8260A> save device You can display the current device settings for DMM using the follow[...]

  • Seite 77

    For example, to assign a default gateway of 9.67.46.238 to the token_ring_10 segment on the ShuntBus, you must use the following command: 8260A> set ip default_gateway 9.67.46.238 token_ring_10 Note that DMM will use the IP address assigned to a segment to communicate through that segment. Therefore, if you have assigned IP addresses to more tha[...]

  • Seite 78

    3. After configuring the IP address(es) for DMM, you must assign an E-MAC or T-MAC to any backplane through which the DMM is going to communicate using IP. For information about how to assign E-MAC or T-MAC to a backplane segment, please refer to 4.4, “MAC Daughter Cards” on page 6 1 . 4.2.4.6 Configuring DMM SNMP Parameters The DMM acts as an [...]

  • Seite 79

      8260A> show community Index Community Name IP Address Access ----- -------------------- --------------- ------ 1 public ***.***.***.*** Read-Only 2 public 9.24.104.23 All 3 public 9.24.104.70 All 4 public 9.67.46.45 All 5 [empty] 6 [empty] 7 [empty] 8 [empty] 9 [empty] 10 [empty] 8260A>   Figure 30. Output from Show Community Co[...]

  • Seite 80

    8260A> set alert port_up_down {enable|disable|filter} If you enable this option, all the port up and port down traps will be sent to the local console. “disable,” prevents the traps from being displayed on the local console. “filter” allows DMM to check the ALERT_FILTER setting for each port for displaying/suppressing the port up and por[...]

  • Seite 81

    Figure 31. EC-DMM Front Panel 4.3.1 Installing the EC-DMM Remove the card from its shipping container and check it for damage. There are 2 jumper blocks that may need to be changed, JP8 and JP9. These jumpers are shown in Figure 32 on page 6 0 . These jumpers allow you to set the auxiliary DB-9 connector to RS-232 or RS-423. For the factory default[...]

  • Seite 82

    Figure 32. Jumpering for the EC-DMM DB-9 Ports Holding the DMM by the faceplate, slide it into the slot in the 8260. Like all 8260 modules it can be hot plugged. If the EC-DMM has been installed correctly and is functioning the status LED should come on. The LCD display should show diag then either rdy for the master module or stby for a backup mod[...]

  • Seite 83

    Ethernet media module in slot 2 will also turn on to indicate those ports have been assigned to Ethernet_1. If there were more media modules with ports assigned to Ethernet_1 their port LEDs would also turn on. Because Ethernet_2, 3 and 4 are not being used, the next time the button is pressed the LCD display will jump to ″ E5 ″, the DMM networ[...]

  • Seite 84

    daughter card to an isolated segment on a media module, the MAC daughter card must be installed on that media module. Note E-MACs installed on EC-DMM can collect detailed statistical information about all the ShuntBus and Enhanced TriChannel Ethernet segments. This statistical information includes network as well as module and port level informatio[...]

  • Seite 85

    3 . Th e stand-alone D M M is always considered to be on the first subslot of the slot in which the stand-alone DMM is installed. Note that a stand-alone DMM does not have the housing for a MAC daughter card. 4 . I n the case of an EC-DMM which does have the housing for 6 E-MACs, the EC-DMM module is always considered to be in subslot 1 of the slot[...]

  • Seite 86

    4.4.1 Ethernet MAC Daughter Card (E-MAC) E-MAC is a MAC daughter card which can be installed on an EC-DMM or Ethernet media modules. Figure 36 shows how you can install up to 6 E-MACs on a single EC-DMM. Figure 36. EC-DMM with Up to 6 EMACs In addition to the DMM with an interface to the network, E-MAC allows you to collect statistics about the Eth[...]

  • Seite 87

    2 . U se the following command to s et a n appropriate mode fo r the network interface on the E-MAC: 8260A> set module 2.2 interface {enable|disable|standby} The valid options for this command are: • Enable This option allows the network interface on the E-MAC to be activated automatically when attached to a backplane segments. An active E-MAC[...]

  • Seite 88

    In this example, the E-MAC is installed in the first subslot of the EC-DMM which is installed in slot 1 of the 8260. The output from this command is shown in Figure 38 on page 6 6 .   8260A> show module 2.2 verbose Slot Module Version Network General Information ----- --------------- ------- ------------- ------------------- 02.02 E-MAC v2[...]

  • Seite 89

    2 . I f yo u are planning to use LAAs within your network, use the following example to assign a locally administered address to T-MAC: 8260A> set module 6.2 locally_administered_address 40-00-00-82-60-a1 Note that assigning a locally administered address to T-MAC, does not result in the T-MAC using the assigned address automatically. You must u[...]

  • Seite 90

    T-MACs attached to the same segment and want one of them to act as a backup for the active T-MAC. 6. Assign t h e T-MAC to the desired segment using the following example: 8260A> set module 6.2 network token_ring_10 If you try to assign a T-MAC with enabled interface to a segment which already has an active T-MAC, your command will be rejected a[...]

  • Seite 91

      8260A> show module 6.2 verbose Slot Module Version Network General Information ----- --------------- ------- ------------- ------------------- 06.02 T-MAC v2.00 TOKEN_RING_10 T-MAC: Token Ring Network Monitor Card Boot Version: v2.00 IP Address: 9.67.46.235 Subnetwork Mask: ff.ff.ff.f0 Default Gateway: 9.67.46.238 Station Address: 10-00-[...]

  • Seite 92

    4.5.1 Managing 8260 with DMM The following is the summary of the capabilities of DMM when managing an 8260 which is populated with both 8260 and 8250 modules: 1. DMM can be used to fully configure the 8260 modules as well as the 8250. 2. DMM in conjunction with E-MAC c an be used to monitor the network, module and port-level statistics for the Ethe[...]

  • Seite 93

    segment. If multiple 8250 networks need to be monitored simultaneously then each network requires its own 8250 xMM. 8 . Th e two previous points mean that the more monitoring required on 8250 networks the fewer payload slots are available for media modules. 9. ShuntBus based segments are not manageable by 8250 xMM. 4. 6 Overview of Management and C[...]

  • Seite 94

    72 8260 Multiprotocol Intelligent Switching Hub[...]

  • Seite 95

    Chapter 5. 8260 Intelligent Power Management Subsystem The 8260 provides extensive power management functions that allow you to take advantage of the modular load-sharing power supply system available on the 8260. This chapter provides detailed information about the power management subsystem of the 8260. 5. 1 Intelligent Power Management Subsystem[...]

  • Seite 96

    Figure 42. 8260 with 4 Power Supplies 5.2 Power Class Power class can be considered as a power priority which ranges from 1 to 10. 10 is the highest priority and 1 is the lowest priority. You may may set the power class for each 8260 module using the following management module command: SET POWER SLOT {slot} CLASS {1 to 10} In the event of failure [...]

  • Seite 97

    with slot 1 to 17. The Controller module will repeat this process for all other power classes in descending order of their priority until either all the modules are powered up or the available power supply is exhausted. Note: You cannot assign a power class to the 8250 modules and they do not take part in the power management. This means that the C[...]

  • Seite 98

      8260> show power slot all Power Management Information ---------------------------- Slot Power Information: Slot Class Admin Status Operating Status ---- ----- ------------ ---------------- 1 10 ENABLE ENABLED 2 3 ENABLE ENABLED 3 3 ENABLE ENABLED 5 3 ENABLE ENABLED 6 9 ENABLE ENABLED 7 3 ENABLE ENABLED 8 N/A ENABLE ENABLED 9 N/A ENABLE [...]

  • Seite 99

      Hub Information: Hub Type: 58G5801 Backplane Information: Backplane Type Revision -------------- -------- Load-Sharing Power Distribution Board 0 Enhanced TriChannel Backplane 0 Ring Backplane 0 Power Supply Information: Power Supply Status Model Number ------------ ------ ------------ 1 OKAY 6000PS 2 OKAY 6000PS 3 OKAY 6000PS 4 REMOVED Tem[...]

  • Seite 100

      8260> show power budget Power Management Information ---------------------------- Hub Power Budget : Voltage Type Voltage Level Watts Capacity Watts Available Watts Consumed ------------ ------------- -------------- --------------- -------- +5V 5.196 551.00 287.00 264.00 -5V -5.056 38.25 34.00 4.25 +12V 12.122 122.50 77.00 45.50 -12V -12[...]

  • Seite 101

    Note: If a power supply fails and there is still enough power in the hub to operate all the installed modules, the modules will continue their operation without any interruption. You can configure your 8260 to operate in non-fault-tolerant mode using the following DMM command: SET POWER MODE non_fault_tolerant The current power mode setting for you[...]

  • Seite 102

    In fault-tolerant mode the 8260 does not reserve any specific power supply in reserve; instead, the reserved power is reserved across all the installed power supplies as shown in Figure 4 9. This ensures that the failure of any one power supply has no impact on the operation of the hub and the installed modules. Table 14 (Page 2 of 2). Power Availa[...]

  • Seite 103

    5. 4 Managing Power in the 8260 The 8260 fault-tolerant Controller module provides extensive power management functions for the 8260 and all its installed modules. However, the capabilities of the Controller module are enhanced via the power management facilities offered by DMM. The following sections examine the impact of DMM on managing the 8260.[...]

  • Seite 104

      8260> 8260> show inventory HUB/ Hardware Slot Module Version Serial # Vendor Date ----- ---------------- -------- ---------------- ---------------- ------ HUB 58G5801 A H8048 ibm 940313 01.01 1 EC-DMM 1.0 B 1067067 IBM 940421 02.01 1 E24PS-6/8 A 1002683 ibm 940302 02.02 E-MAC D 1066450 IBM 940409 03.01 6706I-E XB2 XB26 Retix/Chip 0424[...]

  • Seite 105

    Figure 51. Installing 8260 Modules in an 8260 Managed b y D MM 5.4.2 Installing 8260 Module in an 8260 Not Managed by DMM When a new 8260 module is inserted in the hub and there is no DMM installed in the 8260, the process of powering up the module is identical to what was described above. However, since there is no DMM, you will not be able to dis[...]

  • Seite 106

    2. Th e 8250 module sends module type information to the Controller module. The Controller module has no information about how much power is consumed by the module at this stage. 3 . T h e Controller module forwards the module type o f the newly inserted 8250 module to DMM. 4 . D M M has a table which specifies the amount of power required by each [...]

  • Seite 107

    5.4.4 Installing 8250 Module in a Hub Not Managed by DMM When a new 8250 module is inserted in a hub which is not managed by DMM, the process of applying power to the newly installed module is the same as what was described above. However, since there is no DMM, the Controller module is unable to acquire the power requirements of the 8250 module an[...]

  • Seite 108

    • When the hub is in the fault-tolerant mode, the reserved power is reserved across all installed power supplies. It is not an individual power supply out of all installed power supplies. • Although a power class does not apply to the 8250 module, the controller will see the 8250 module having the highest power class, 10. • Due to a possible [...]

  • Seite 109

      8260> show hub Hub Information: Hub Type: 58G5801 Power Supply Information: Power Supply Status ------------ ------ 1 NORMAL 2 NORMAL 3 FAULTY 4 REMOVED Temperature Information: Probe Location Temperature ----- -------- ----------- 1 FAN_1 25 Degrees Celsius 2 FAN_2 25 Degrees Celsius 3 FAN_3 25 Degrees Celsius Fan Information: Fan Statu[...]

  • Seite 110

    system environment is changed and the power status has become non-fault tolerant due to a faulty power supply, as shown below.   Message received from this device on 15:47 Mon 23 May 94: Enterprise Specific trap: Environment Change Message Information: Power Supply Status (3): FAULTY 8260> Message received from this device on 15:47 Mon 23 [...]

  • Seite 111

    DMM and a 24 PPS Ethernet module) and a number of 8250 modules. Both 8260 modules have a power class of 3 assigned to them. Upon taking one power supply down, we found that since the remaining power was not enough to power all the existing modules, the modules with the lowest power priority (the DMM and 24 PPS modules) were powered down by the Cont[...]

  • Seite 112

    90 8260 Multiprotocol Intelligent Switching Hub[...]

  • Seite 113

    Chapter 6. 8260 Intelligent Cooling Subsystem This chapter provides you with information about the 8260 intelligent cooling subsystem. 6.1 Intelligent Cooling Subsystem The 8260 intelligent cooling subsystem is made up of a number of different components: • The fans and sensors • The DMM (Distributed Management Module) • The Controller module[...]

  • Seite 114

    Each of the three fan units cools an overlapped area in the hub covering 8 slots. The slots covered by each fan unit are: • Fan 1 - slots 1-8 • Fan 2 - slots 6-13 • Fan 3 - slots 10-17 These 3 areas have their own temperature sensors. Also, integrated into each fan unit is a sensor that detects a stopped or slow fan condition. The Controller [...]

  • Seite 115

    If a fan unit stops or the temperature in any of the three cooling zones rises above 60 C, the Controller module may, depending on a user configurable parameter (Overheat_Auto_Power_Down) use the SCI bus to power down some of the 8260 modules in the affected cooling zone in order to bring down the temperature to an acceptable level. The setting of [...]

  • Seite 116

    power class and slot position within the affected cooling zone as shown if Figure 63 on page 9 4 . Figure 63. 8260 Cooling Zones and Power Cl a s s e s • Modules are powered down until the 5 volt power supply consumption is reduced by 50 watts. • The temperature is allowed to stabilize for 15 minutes and if the temperature is still too high, al[...]

  • Seite 117

    Figure 64. Flow Char t fo r a n Overheat Condition Chapter 6. 8260 Intelligent Cooling Subsystem 95[...]

  • Seite 118

    96 8260 Multiprotocol Intelligent Switching Hub[...]

  • Seite 119

    Chapter 7. 8260 Ethernet Modules This chapter will describe the Ethernet modules for the 8260 multiprotocol intelligent switching hub. Each module will be described along with its features and the necessary steps required to configure these modules. Where necessary, examples will be given of where the module would be used. Currently, the available [...]

  • Seite 120

    to 16 times consecutively, after which the station reports a transmission error to the higher layer protocol. The probability of a collision occurring is directly proportional to the number of stations, frequency of transmissions, size of frames, and length of the LAN segment. Under the 802.3 specifications, no station can monopolize the network by[...]

  • Seite 121

    7.2 8260 Ethernet 24-Port 10Base-T Module The 8260 Ethernet 24-Port 10Base-T Module is a 24-port IEEE 802.3 repeater module that complies with the 10Base-T standard and supports backbone and to-the-desk connectivity over Unshielded Twisted Pair (UTP) cabling. This module provides two 50-pin Telco-type connectors. Each Telco-connector can be connect[...]

  • Seite 122

    types of modules. For example, you can set a 10Base-T port on an 8260 Ethernet 24-Port 10Base-T Module to be a redundant port for 1 10Base-FB on the 8260 Ethernet 10-Port 10Base-FB Module. • Auto-polarity detection You can enable/disable auto-polarity detection for each port on the module. When enabled, this feature will automatically detect if y[...]

  • Seite 123

    Figure 65. Front View of 24-Port 10Base-T Module Figure 65 shows the front view of the 8260 Ethernet 24-Port 10Base-T Module. As can be seen, the 8260 Ethernet 24-Port 10Base-T Module provides you with LED Indicators on the front panel that allow you to monitor the status of the module and the individual ports. Table 16 describes the meaning of the[...]

  • Seite 124

    Figure 66 shows the side view of the 8260 Ethernet 24-Port 10Base-T Module. A s can be seen, in addition to the 8 isolated segments and the mounting for the E-MAC, there is an 8-position DIP switch located on the module. These DIP switches are used in the absence of an installed management module in the 8260. However, if a management module is inst[...]

  • Seite 125

    Figure 67. 24-Port 10Base-T DIP Switches The DIP switches let you perform the following: • Use DIP switch positions 1 through 4 to assign all the ports on the module to one of the backplane segments or an isolated-1 segment. Note that when using DIP switches, all the ports will be assigned to the same segment, so you cannot do per-port switching [...]

  • Seite 126

    4.2.4.4, “ Configuring DMM Device” on page 5 0. By default, DIP switch 5 is set to NVRAM. 7. 3 10Base-T Module Usage Figure 68 provides an example of the usage of the 8260 Ethernet 24-Port 10Base-T Module. Figure 68. 24-Port 10Base-T Module U s a g e 7. 4 Configuring the 10Base-T Module To configure the 8260 Ethernet 24-Port 10Base-T Module you[...]

  • Seite 127

    Each port on the 8260 Ethernet 24-Port 10Base-T Module can be enabled/disabled independently from the other ports. You can use the following management module command to enable/disable a port: SET PORT {slot.port} MODE {enable|disable} • Set port redundancy The port redundancy feature allows you set redundancy between two ports. The two ports can[...]

  • Seite 128

    7.5 8260 Ethernet 20/40-Port 10Base-T Module The 8260 Ethernet 20-Port 10Base-T Module, a single-slot 20-port, and the 8260 Ethernet 40-Port 10Base-T Module, a two-slot 40-port are IEEE 802.3 repeater modules that comply with the 10Base-T standard and support backbone and to-the-desk connectivity over Unshielded Twisted Pair (UTP) as well as Shield[...]

  • Seite 129

    • Support for port redundancy You can set up redundancy between two links on the same module or two different modules. Note that port redundancy is supported between different types of modules. For example, you can set a 10Base-T port on an 8260 Ethernet 20-Port 10Base-T Module to be a redundant port for a port on an 8260 Ethernet 10-Port 10Base-[...]

  • Seite 130

    Figure 69. Front View of 20/40-Port 10Base-T Modules Table 19 describes the meaning of these LEDs: Table 19 (Page 1 of 2). 20/40-Port 10Base-T Module LE D Descriptions L E D Name Color State Description Module Sta tus Green On Module powered up OK Off No Power. Blinking Module failed self diagnostics Activity Yellow On Constant activity on the port[...]

  • Seite 131

    Figure 70 shows the side view of the 20/40-port 10Base-T modules. As can be seen, in addition to the 8 isolated segments and the mounting for two E-MACs, there is an 8-position DIP switch located on the module. These DIP switches are used in the absence of an installed management module in the 8260. However, if a management module is installed in y[...]

  • Seite 132

    Figure 71. 20/40-Port 10Base-T DIP Switches The DIP switches let you perform the following: • Use DIP switch positions 1 through 4 to assign all the ports on the module to one of the backplane segments or an isolated-1 segment. Note that when using DIP switches, all the ports will be assigned to the same segment, so you cannot do per-port switchi[...]

  • Seite 133

    setting) will be sent to the management module. The actions taken by the management module, upon receipt of this information are described in 4.2.4.4, “ Configuring DMM Device” on page 5 0. By default, DIP switch 5 is set to NVRAM. 7. 6 Configuring the 20/40-Port 10Base-T Modules To configure the 20/40-port 10Base-T modules you must do the foll[...]

  • Seite 134

    allows the port to receive signals compliant with 10Base-T standard. Lo w squelch level allows the port to receive weaker signals, enabling you to have longer distances, but increases the risk of losing packets due to the impulse noise. The maximum distances supported for UTP and STP cabling under different squelch settings are shown in Table 2 1. [...]

  • Seite 135

    7.7 8260 Ethernet 10-Port 10Base-FB Module The 8260 Ethernet 10-Port 10Base-FB Module is a 10-port module that complies with the 10Base-FB standard and supports backbone and to-the-desk connectivity over fiber optic cabling. To provide backbone connectivity, the 8260 Ethernet 10-Port 10Base-FB Module can be connected via a fiber cable to one of the[...]

  • Seite 136

    information about the Ethernet security card, please refer to 7.11, “8260 Ethernet Security Daughter Card” on page 1 2 1 . • Support for port redundancy You can set up redundancy between two links on the same module or two different modules. Note that port redundancy is supported between different types of modules. For example, you can set a [...]

  • Seite 137

    Figure 72. Front View of 10-Port 10Base-FB Module Figure 72 shows the front view of the 8260 Ethernet 10-Port 10Base-FB Module. As can be seen, the 8260 Ethernet 10-Port 10Base-FB Module provides you with LED indicators on the front panel that allow you to monitor the status of the module and the individual ports. Table 23 describes the meaning of [...]

  • Seite 138

    Figure 73 shows the side view of the 8260 Ethernet 10-Port 10Base-FB Module. As can be seen, in addition to the 4 isolated segments and the mounting for the E-MAC, there is an 8-position DIP switch located on the module. These DIP switches are used in the absence of an installed management module in the 8260. However, if a management module is inst[...]

  • Seite 139

    Figure 74. 10-Port 10Base-FB DIP Switches The DIP switches let you perform the following: • Use DIP switch positions 1 through 4 to assign all the ports on the module to one of the backplane segments or isolated-1 segment. Note that when using DIP switches, all the ports will be assigned to the same segment, so in effect, you cannot do per-port s[...]

  • Seite 140

    By default, the module is shipped from the factory with the DIP switches set for Ethernet_1. • Use DIP switch position 5 to choose if the module is going to use the Non-Volatile RAM (ON position) or DIP switch settings (OFF position) for its configuration. Note that if there is a management module installed in the 8260, this DIP switch determines[...]

  • Seite 141

    Note Using DIP switches on the 8260 Ethernet 10-Port 10Base-FB Module, it is only possible to assign all the ports to the same network. This network can be one of the 8 Ethernet segments on the backplane, or isolated-1. • Enable/disable ports Each port on the 8260 Ethernet 10-Port 10Base-FB Module can be enabled/disabled independently from the ot[...]

  • Seite 142

    This command may be used to allow you to monitor the status of the crucial ports on your network while the alerts from the other ports are disabled. • Set optical power Each port on this module can be set to operate at high or normal power. When operating at high power mode, the fiber distance between the two modules and the module or the transce[...]

  • Seite 143

    7.11 8260 Ethernet Security Daughter Card The 8260 Ethernet Security Card (E-SEC) is a daughter card that allows you to provide security on any Ethernet network to which this card is attached. You can install this card on any Ethernet media module or the 8260 DMM with Ethernet Carrier (EC-DMM). Note Security features provided by this card are only [...]

  • Seite 144

    ports may have one of these two features enabled and finally the last group of ports which may have no security at all. Details of configuring security features are described in 7.11.2, “Configuring the Security Module” on page 1 2 4 . 7.11.1 Operation of Security Card When transmitting a packet, the 8260 Ethernet modules will use either method[...]

  • Seite 145

    station attached to that port. The transmission of the jammed packet will last the same length of time as the original data packet. Stations that receive a jammed packet will discard it because the CRC (Cyclic Redundancy Check) field of the packet is incorrect. To perform intrusion control, the E-SEC card must perform the following: 1. Determine t [...]

  • Seite 146

    The entire process of eavesdropping protection takes 32 bit-times from the time the E-SEC card receives the destination address field in the packet. 7.11.2 Configuring the Security Module To be able to use the security module you must perform the following steps: 1. Assign t h e security module to th e backplane segment on which you want t o use th[...]

  • Seite 147

    • Enable auto-learning for your Ethernet segment using the following example: 8260A> set security network ethernet_3 auto-learning enable • Although the port and network auto-learning is enabled, the E-SEC module will not auto-learn MAC addresses attached to each port until you enable the security mode for the segment using the following exa[...]

  • Seite 148

    wish the station shown in Figure 78 for this port to be able to access our network. The following command was used to delete this entry: 8260A> set security address_table address 10-00-5a-82-59-32 delete c. Once y o u a r e satisfied that the network address table contains all the desired entries, you can save this table on the non-volatile RAM [...]

  • Seite 149

    7 . Th e following actions can be performed by the E-SEC card in case of intruder detection: a. Report intrusions by logging information about the intrusion in the intruder table. To enable intruder reporting, you must issue the following command: 8260A> set security network ethernet_3 intruder_reporting enable Note: When you enable intruder rep[...]

  • Seite 150

    and port jamming is enabled. You can use the following example to enable the failsafe feature for each port: 8260A> set security port 2.15 failsafe enable 128 8260 Multiprotocol Intelligent Switching Hub[...]

  • Seite 151

    Chapter 8. 8260 Token-Ring Support The 8260 token-ring support has been enhanced, compared to the 8250, to provide the following features: • Active re-timing per port • Speed detection by media modules • Beacon recovery by media modules • Address-per-port mapping This chapter will cover these features as well as some token-ring architecture[...]

  • Seite 152

    8.1.2 Ring Administration The token-passing ring protocol provides relatively greater control and management at the medium access control (MAC) level than that provided by the CSMA/CD protocol. All ring administration functions are implemented in the token-ring adapters and the functions are carried out at the MAC level. 8.1.2.1 Active Monitor In e[...]

  • Seite 153

    ring purge process may be triggered after detecting the loss of a token, frame, or errors caused by adapter-insertion or adapter-removal operations. To purge the ring, the active monitor initiates a Ring Purge MAC frame broadcast and starts the Ring-purge timer. I f the Ring Purge MAC frame has not returned to the active monitor when the timer expi[...]

  • Seite 154

    8.1.4 Differential Manchester Coding The 802.5 standard specifies that Differential Manchester coding is used for transmitting data on the ring. With this encoding technique, every bit is comprised of a half-bit time signal at a low or high polarity and other half-bit time signal at the opposite polarity. The mid-bit transition is for clocking only[...]

  • Seite 155

    The other important point about the Differential Manchester coding is that it uses a higher baud rate (the number of state changes on the transmission media) than the actual data transfer bit rate on the ring, to provide the benefit described above. In fact, the baud rate on the token-ring is twice the data transfer bit rate. On a 4 Mbps token-ring[...]

  • Seite 156

    the signal passes from one station to another and ultimately can result in loss or corruption of data. This is a major reason for the limit on the maximum number of stations supported on a token-ring networks. Note that this limit varies depending on the speed of the ring and type of lobe cables used in attaching the workstations to the hub. Also, [...]

  • Seite 157

    Figure 81. Self-Shorting Relays on the ShuntBus Once a module is inserted into a slot in the 8260, the ShuntBus connector on the module breaks the shunt on the backplane. It is then the responsibility of the module to restore this connection by using a relay type function. When the module is not configured to connect to a backplane ring, the relay [...]

  • Seite 158

    Mbps operation is different for the two bit-rates. For 4 Mbps operation, the encoding is straightforward. One of the data-signal shunt pairs (Data_A) carries the Differential Manchester encoded bit stream, whereas there is no signal on the other pair (Data_B). The clock shunt pair carries a synchronous clock which is used to sample the Data_A signa[...]

  • Seite 159

    Figure 83. 8260 Backplane Signalling for 16 Mbps Operation Note that the 8260 backplane interface is completely digital , whereas the signals sent on the transmission media (lobe cables and the cabling between two hubs) is said to be analog . In this context an analog signal is one where there is no separate clock signal. A digital signal is one wh[...]

  • Seite 160

    signal as the signal is clocked at 8 MHz on both the backplane and the transmission media (lobe cables and inter-wiring closet cables). 8.3 Dual Phase Lock Loop The intent of the dual PLL design of the 8260 is to isolate lobes from each other so the lobe length or type of cable will not affect what can be achieved on any other lobe of a ring segmen[...]

  • Seite 161

    Figure 84. Components of Dual Phase Lock Loop The reduction in the jitter would allow you to have longer lobe distances and higher number of station per ring segment. More details about the number of supported stations and the lobe cable length are provided in 8.6, “Active Port Technology” on page 1 4 2 . The DPLL is used in all the 8260 token-[...]

  • Seite 162

    Figure 85. DPLL Implementation on Active Ports Note Since the jitter is removed from the signal before entering the backplane, the signal received from the backplane would only have a small amount of jitter accumulated on the backplane. The signal received from the backplane goes through the narrowband PLL before being transmitted out of the port. [...]

  • Seite 163

    8. 4 Jitter Attenuator Daughter Card (JADC) The JADC can be mounted on any 8260 token-ring module and contains a DPLL function. It must be installed on a module under the following circumstances: 1. Your 18-port active module is configured with ports 1 7 and 1 8 acting as RI/RO ports and these ports are connected to a non-8260 hub. 2 . Th e fiber p[...]

  • Seite 164

    wideband/wideband configuration when the port is in trunk mode. This is done to ensure that when the ring is reconfigured outside the module, a signal with a lot of accumulated jitter does not hit a wideband/narrowband configuration until it has gone through a JADC to remove the excessive jitter. So, the following is a summary of the differences be[...]

  • Seite 165

    Note Please note that it is incorrect to say that we support 250 stations at 4 Mbps. That is not necessarily true since there are some adapters on the market that implement the minimum elastic buffer required for each workstation adapter card. These cards, while not affected by the rate of change of accumulated jitter (which has always been the lim[...]

  • Seite 166

    backplane rings on the ShuntBus. This enables you to form multiple rings on a single module using this switch fabric. This is shown in Figure 87 on page 1 4 4 . Figure 87. Token-Ring Per-Port Switching The rings to which the various ports on a per-port switching module can attach may be a mixture of 4 and/or 16 Mbps segments. Therefore, a single ac[...]

  • Seite 167

    Note With the 18-port active per-port switching module the lobe ports can be distributed concurrently across a total of 11 segments which can be a mixture of backplane token-ring segments and isolated segments on the module. However, on the same per-port switching module you cannot allocate an isolated segment number which matches the number of a b[...]

  • Seite 168

    5. Participation i n neighbor notification By participating in the neighbor notification, the station learns the address of its Nearest Active Upstream Neighbor (NAUN). It also identifies itself to nearest active downstream neighbor. 6. Request initialization The station issues a Request Initialization MAC frame which will be sent to the Ring Param[...]

  • Seite 169

    SET PORT {slot.port} STATIC_SWITCH {enable|disable} If you try to switch a port with enabled static switch from one segment to another, you will get the an error message. This is shown in Figure 8 9.   8260> set port 6.1 static_switch enable Port 06.01 static switch set to ENABLED. 8260> 8260> show port 6.1 verbose Port Display for M[...]

  • Seite 170

    Figure 90. Port Switching with Source Routing Bridges 8.7 Signal Flow on the 8260 Token-Ring Modules On the module switching modules (active or passive), the signal flow is predefined on the module basis. That is, the signal which is received from the backplane is always passed to the first active port, then to the next active port, and finally fro[...]

  • Seite 171

    8.8 Speed Detection Speed detection on the 8260 token-ring media modules is achieved in one of two ways depending on the module type. 8.8.1 Speed Detection on Active Modules For the active modules, speed detection is accomplished by counting the number of transitions in the incoming data over a set period of time. If the rate of transition is less [...]

  • Seite 172

    • If the ″ A ″ and ″ C ″ bits are not set to B ′1′, the port which just inserted into the ring is assumed to be operating at the wrong speed. The Recovery ASIC will prevent that port from entering the ring and will also unwrap all the wrapped ports allowing the existing stations to resume their access to the ring. When an incorrect sp[...]

  • Seite 173

    8.9 Beacon Recovery 8.9.1 Introduction When a station detects a failure of token-claiming following a hard error, it transmits Beacon MAC frames with an all-station address to its ring, pacing them at a specified time interval known as ″ T(transmit_pacing) ″. This process will continue until the input signal is restored, or until this station r[...]

  • Seite 174

    To ensure that TRMM has an accurate ring map, you must issue the following command for each port that has a MAC-less station (such as token-ring tracing tools) attached to it: SET PORT {slot.port} STATION_TYPE mac_not_present 8250 token-ring modules are shipped from the factory, with ″ mac_present ″ as default, which must be used for normal sta[...]

  • Seite 175

    2. Isolate a n y n e w modules that have logical ports on the ring (logical is a port which cannot be disabled such as TRMM or bridge). 3 . I f the source or destination address in the packet is external to the hub, wait for up to 5 seconds to check if the beaconing can be disabled externally. 4 . I f the source or destination address in the packet[...]

  • Seite 176

    TRMM V3.0 allows you to enable/disable the beacon recovery function using the following command: SET DEVICE BEACON_RECOVERY {enable|disable} Note that this feature must be enabled during normal operation; however, you may disable this feature as a trouble shooting tool, to prevent the ring from recovering before the faulty device is isolated. TRMM [...]

  • Seite 177

    8.9.3 Beacon Recovery in the 8260 Beacon recovery in the 8260 has been improved by distributing the beacon recovery process to each of the 8260 token-ring media modules (both active and passive). This allows you to manage an 8260 consisting of multiple token-ring segments using a single DMM and protect multiple rings from beacon problems without th[...]

  • Seite 178

    Figure 94. Recovery ASIC in Per-Port Switching Module You can find out the MAC address of the Recovery ASIC on each module by using the following DMM command: SH MODULE {slot.subslot} VERBOSE Figure 95 showsDisplay the output from this command for a 20-port passive token-ring module.   8260> show module 5.1 verbose Slot Module Version Netw[...]

  • Seite 179

      8260> show module 6.1 verbose Slot Module Version Network General Information ----- --------------- ------- ------------- ------------------- 06.01 T18PSA v1.00 PER_PORT Trunk(s) are down T18PSA: Token Ring Active Port Switching Twisted Pair Module Boot Version: v1.00 Ring Speed Dip Setting: 16 MBPS Jitter Attenuator 1 Status: OKAY Non-V[...]

  • Seite 180

    Ring monitors are associated with each port and can be switched from upstream to downstream of that port. When the ring monitor detects a Beacon MAC frame on the ring, it calls in the Recovery ASIC to perform beacon recovery and isolate the faulty port (station). The following sections describe the beacon recovery procedures employed in the module [...]

  • Seite 181

    detect this and will issue Beacon MAC frames. These Beacon MAC frames will be repeated by each station (station ″ D ″ in this case) until they arrive in the DRA in module 1. Upon seeing these Beacon MAC frames, the URA on module 1 will issue Beacon Type 1 MAC frames. The Beacon Type 1 MAC frames will be repeated by every station on module 2 (in[...]

  • Seite 182

    Monitor is attached. Once the Recovery ASIC is inserted into that ring, the DRA will be placed downstream of the last port of the module on the beaconing ring. Also, the URA will be inserted into the backup path if ports 17 and 18 are configured as trunk ports. Similar to the beacon recovery on the module switching module, the DRA will start transm[...]

  • Seite 183

    Now, DRA in ″ TR Module 2 ″ starts tracking the stations that are involved in the neighbor notification process. The tracking will stop when the DRA in ″ TR Module 2 ″ encounters an AMP/SMP MAC frame with the A/C bit set to B ′0′, that is, AMP/SMP MAC frame issued by the NAUN to DRA. In this example, that would be the AMP/SMP MAC frame [...]

  • Seite 184

    device on that port and therefore, the Recovery ASIC will be able to build the address-to-port map by listening to neighbor notification process as described above. Figure 99. Address-to-port Mapping on Module Switching Modules for Fan-Out Attached Devices Now, let ′ s assume that a second station (station ″ C ″) attaches to the fan-out devic[...]

  • Seite 185

      8260> show ring_map token_ring logical token_ring_1 Token Ring Logical Map for Network TOKEN_RING_1 MAC Address Slot Port ----------------- ----- ---- 02-00-00-c0-cc-1c 05.01 1 02-00-00-c0-cc-0a 05.01 2 02-00-00-e0-9c-10 05.01 2 08-00-8f-40-01-a6 05.01 3 8260>   Figure 100. Address-to-Port Ma p Display fo r Fan-Out Attached Devi[...]

  • Seite 186

      8260> show ring_map token_ring logical token_ring_1 Token Ring Logical Map for Network TOKEN_RING_1 MAC Address Slot Port ----------------- ----- ---- 02-00-00-c0-cc-1c 05.01 1 02-00-00-c0-cc-0a 05.01 2 02-00-00-e0-9c-10 05.01 2 08-00-8f-40-01-a6 05.01 3 00-00-00-00-00-00 05.01 4 8260>   Figure 101. Address-to-Port Ma p Display [...]

  • Seite 187

    2 . A n AMP/SMP M AC frame with the A/C bit se t B ′0′ is seen. This indicates that there is only one station attached to this port and the address of that station is one which is seen in the AMP/SMP MAC frame with the A/C bit set to B ′0′. In this case, the AMP/SMP MAC frame sent by the upstream station is copied by the station attached to[...]

  • Seite 188

      8260> show ring_map token_ring logical token_ring_2 Token Ring Logical Map for Network TOKEN_RING_2 MAC Address Slot Port ----------------- ----- ---- 02-00-00-e0-9c-10 06.01 1 02-00-00-c0-cc-68 06.01 7 00-00-00-00-00-00 06.01 10 08-00-8f-d0-90-fa 06.02 N/A 02-00-00-66-88-8d 06.01 15 8260>   Figure 103. Address-to-Port Ma p Disp[...]

  • Seite 189

    As illustrated in Figure 104 on page 167, the dual-ring topology consists of two counter-rotating rings that provide interconnection for both dual-ring and single-ring stations. One of the rings is designated as the primary ring and the other ring is designated as the secondary ring . Fi gu re 10 4. Du al -R in g Topology Normally, the primary ring[...]

  • Seite 190

    Figure 105. Wrapback i n Dual-Ring Topology 8.12.1 Trunk Wrapping on the Active Per-Port Switching Modules The 18-port active per-port switching module and the 10-port dual fiber repeater module conform to the 802.5C dual-ring reconfiguration practice. When, during the beacon recovery process, it is determined that the fault domain is between RI an[...]

  • Seite 191

    Figure 106. Trunk Wrapping in Active Per-Port Switching Module 8.12.2 Trunk Wrapping on the Active Module-Switching Modules When, during the beacon recovery process, it is determined that the fault domain is between RI and RO, the following process takes place: 1 . DR A and URA a re inserted on the primary path. 2. RI/RO trunk is treated like a sin[...]

  • Seite 192

    Note On the 18-port active module switching module, the URA cannot be switched to the backup path. This means that the operation of this module is not IEEE 802.5C conformant. 8.12.3 Merge Manager The function of the Merge Manager is to periodically check RI and RO trunks to see if the cause of the beacon has been resolved and the trunks can be unwr[...]

  • Seite 193

    Because these modules do not have switching capabilities, the URA cannot be switched onto the faulty segment. In order to execute the unwrapping tests, the module must wrap the backplane and wrap all the lobe ports. This allows the URA to be on a segment isolated with the trunk under the test. Obviously, this is disruptive to the stations on the mo[...]

  • Seite 194

    172 8260 Multiprotocol Intelligent Switching Hub[...]

  • Seite 195

    Chapter 9. 8260 Token-Ring Modules This chapter will describe the token-ring modules for the 8260 multiprotocol intelligent switching hub. Each module will be described along with its features and the necessary steps required to configure these modules. Currently, the available 8260 token-ring modules are: • 18-port Active Per Port Switching Modu[...]

  • Seite 196

    Once the ring speed for the network is set, each port, trunk or module assigned to that network will assume the speed of the network. • Enable support for splitters and fan-out devices If you are planning to attach passive modules to a segment and there are splitters and fan-out devices attached to the ports of the passive module, you must issue [...]

  • Seite 197

    • When ports 17 and 18 are configured as RI/RO ports, they are fully compliant with the IEEE 802.5C (dual-ring recovery) standard. • Support for installation of one T-MAC. • Support for installation of one Jitter Attenuator daughter card. Figure 108. Front View of 18-Port Active Per-Port Switching Module Figure 108 shows the front view of the[...]

  • Seite 198

    Figure 109 shows the side view of the 18-port active per-port switching module. As can be seen, in addition to the 11 isolated segments and the mounting for one T-MAC, there is an 8-position DIP switch located on the module. These DIP switches are used in the absence of an installed management module in the 8260. However, if a management module is [...]

  • Seite 199

    The DIP switches let you perform the following: • Use DIP switch positions 1 through 4 to assign all the ports on the module to one of the backplane segments or isolated-1 segment. Note that when using DIP switches, all the ports will be assigned to the same segment, so you cannot do per-port switching when using DIP switches for configuring your[...]

  • Seite 200

    Active Per-Port Switching Module Figure 110. Onboard Lobe/Trunk Jumpers on 18-Port Note that setting the jumpers to the left selects RI/RO and setting the jumpers to the right selects lobe ports. 2 . S e t beacon threshold for the module. When a beaconing condition is detected on a port, the port is wrapped by the recovery ASIC. The port is unwrapp[...]

  • Seite 201

    Use the following command to assign each port on the module to one of the backplane segments on the ShuntBus or isolated segments on the module: SET PORT {slot.port} NETWORK {network} 5. Assign RI/RO ports to network segments. If you have configured ports 17 and 18 as RI/RO trunks, you can assign them to a network using the following command: SET T[...]

  • Seite 202

    required. If a trunk fault appears which disrupts phantom drive, the trunk will wrap immediately. The module never goes to beacon recovery because the problem is corrected before that happens. If, for any reason, phantom is not disturbed by the fault, beacon recovery is initiated as in No. 1 above. To set the compatibility mode for a trunk, you can[...]

  • Seite 203

    passive module refer to 8.9.4, “Beacon Recovery on the Module Switching Modules” on page 1 5 8 . • Support for address-to-port mapping using the Recovery ASIC. • Support for fan-out devices and splitters for attaching up to 8 stations to each port. Note that fan-out device or splitter is required to provide a phantom signal; therefore, an 8[...]

  • Seite 204

    Figure 111. Front View of 20-Port Passive Module Figure 111 shows the front view of the 20-port passive module. As can be seen, this module provides LED indicators on the front panel that allow you to monitor the status of the module and the individual ports. Table 30 describes the meaning of these LEDs: Table 30 (Page 1 of 2). 20-Port Passive Modu[...]

  • Seite 205

    Figure 112 shows the side view of the 20-port passive module. As can be seen, in addition to the 11 isolated segments and the mounting for one T-MAC, there is an 8-position DIP switch located on the module. These DIP switches are used in the absence of an installed management module in the 8260. However, if a management module is installed in your [...]

  • Seite 206

    The number of times that a phantom transition is allowed to cause a port to unwrap is determined by the bcn_threshold parameter which can be set for each module using the following command: SET MODULE {slot.port} BCN_THRESHOLD {0-255} Once the threshold is exceeded, the port or trunk remains wrapped until the user disables and re-enables the port. [...]

  • Seite 207

    9. 6 8260 Dual Fiber Repeater Module This is a single slot module that supports 10 active lobe ports and two sets of fully repeated fiber RI/RO trunk ports. This is a per-port switching module, which means that any of the lobe ports or and trunk port sets can be assigned to any of the backplane segments. The main features of this module are: • 10[...]

  • Seite 208

    Figure 113. Front View of Dual Fiber Repeater Module Figure 113 shows the front view of the dual fiber repeater module. As can be seen, this module provides LED indicators on the front panel that allow you to monitor the status of the module and the individual ports. Table 28 on page 1 76 describes the meaning of these LEDs: Table 31 (Page 1 of 2).[...]

  • Seite 209

    Figure 114 shows the side view of the dual fiber repeater module. As can be seen, in addition to the 11 isolated segments and the mounting for one T-MAC, there is an 8-position DIP switch located on the module. These DIP switches are used in the absence of an installed management module in the 8260. However, if a management module is installed in y[...]

  • Seite 210

    9.6.1 Configuring the Dual Fiber Repeater Module To configure this module you must do the following: 1 . S e t beacon threshold for the module. When a beaconing condition is detected on a lobe port, the port is wrapped by the Recovery ASIC. The port is unwrapped when a transition of phantom is detected or when the port disabled and then re-enabled [...]

  • Seite 211

    Trunk ports can be enabled/disabled using the following command: SET TRUNK {slot} RING_IN.n MODE {enable|disable} or SET TRUNK {slot} RING_OUT.n MODE {enable|disable} 7. Enable/disable p orts . Each port can be enabled/disabled using the following command: SET PORT {slot.port} mode {enable|disable} Chapter 9. 8260 Token-Ring Modules 189[...]

  • Seite 212

    190 8260 Multiprotocol Intelligent Switching Hub[...]

  • Seite 213

    Chapter 10. 8260 RMON Support This chapter is intended to provide an understanding of the Remote Network Monitoring (RMON) concepts and to describe what facilities are provided by RMON to help you manage your Ethernet and token-ring LANs. These concepts are common to all RMON products though their implementation may differ. 10.1 RMON Overview The c[...]

  • Seite 214

    generation. Information provided by RMON can be used for identifying sources of network problems, for fine-tuning network performance, and planning for network expansion. RMON uses SNMP for communication between the network management station and RMON agents. Unlike SNMP devices, RMON keeps polling traffic overhead to a minimum as the RMON probes a[...]

  • Seite 215

    Figure 116. An Example of RMON Implementation 10.1.2 RMON Manager The network management station, also known as the RMON manager, works in conjunction with the RMON agents to provide a central point for managing and consolidating information gathered by the RMON agents. To minimize network overhead, the RMON manager does not continuously poll the a[...]

  • Seite 216

    baseline network characteristics, quickly spotting potential trouble spots and resolving them before major crises occur. 10.2 RMON Goals To ensure that RMON can function effectively and efficiently in a distributed environment, its framework was designed with the following goals: • Offline operation • Preemptive monitoring • Problem detection[...]

  • Seite 217

    10.2.5 Multiple Managers The RMON framework permits the RMON agents to be managed by multiple network management stations concurrently. This is useful for implementing disaster recovery, and allowing different units or functions in the organization to access information provided by the RMON agents. For instance, the network planning group may want [...]

  • Seite 218

    Table 32. MIB Structure fo r RFC 1271 - RMON M I B fo r Ethernet Group Description Statistics The Statistics group provides an overview of the current segment network activity at any given moment. It collects segment statistics like octets, packets, collisions, broadcast, various error counters and packet size. History The History group records per[...]

  • Seite 219

    memory and disk space to the RMON application. I f you are running RMON subset on a bridge or router, you might want to consider offloading the task to an external monitoring device. Octets The number of octets of data (including those in bad packets) received on the network (including the FCS octets but excluding the framing bits). The term ″ oc[...]

  • Seite 220

    Fragments Fragments are similar to CRC Align Error packets with the exception that each fragmented packet is less than 64 octets in length. This can indicate a high collision rate. Collisions The number of collisions detected on the network. Collisions are common phenomena on Ethernet segments. Excessive collisions are detrimental to network perfor[...]

  • Seite 221

    The History Control table stores configuration entries containing the interface information, polling period, number of buckets requested, and number of buckets granted. The number of buckets requested represents the number of times the operator wants to collect and store the samples. The probe will respond with the number of buckets granted based o[...]

  • Seite 222

    10.4.1.4 Host Group The Host group creates and maintains a host table for the segment monitored. The Host MIB is very useful as it contains information and cumulative statistics for every discovered host such as: • Host MAC address • Good packets/octets received/transmitted • Error packets transmitted • Broadcast packets transmitted • Mul[...]

  • Seite 223

    The Destination-Source table captures similar information but indexes it from a receiver-oriented perspective. 10.4.1.7 Filter Group The Filter group allows packets that are of particular interest to be captured using arbitrary filter expressions. These packets are then directed into channels that can be turned on or off to control the packet flow.[...]

  • Seite 224

    Table 33. MIB Structure fo r RFC 1513 - Token-Ring Extensions to the RMON M IB Group Description Token-ring Statistics Token-ring MAC-layer Statistics This group collects ring error statistics and ring utilization from the MAC layer. It samples MAC data and provides information like MAC octets, MAC packets, beacon packets, line errors, burst errors[...]

  • Seite 225

    Here is a list of MAC statistics available under this group and their respective descriptions: Drop Event The number of events in which MAC packets were dropped by the probe due to unavailability of resources on the probe itself. It doesn ′ t represent the number of packets dropped but the number of times this condition was detected. If the drop [...]

  • Seite 226

    • Recovery mode set • Streaming signal (not Claim Token MAC frame) • Streaming signal, Claim Token MAC frame or intermediate detection of hard error Beacon Time Keeps track of the amount of time that the ring has been in the beaconing state. Beacon Packet Refers to the total number of Beacon MAC frames detected by the probe. Claim Token Event[...]

  • Seite 227

    total number of burst errors reported in the Soft Error Report MAC frame. ACErrors This error is flagged when a frame is copied by an adapter to which it was not addressed. Address Copied Errors or ACErrors will increment the error counter only for the nearest upstream neighbor of the station reporting the error. This statistic is found in the tota[...]

  • Seite 228

    Frequency Error Occurs when a ring station detects a frequency error. A new station inserting into the ring can cause downstream stations to be ″ off frequency ″. This condition seems to happen more on 16 Mbps than 4 Mbps rings. This statistic is found in the total number of Frequency errors reported in the Soft Error Report MAC frame. Token Er[...]

  • Seite 229

    or hub, you might want to consider offloading the task to an external monitoring device. Octets The total number of octets of data in good frames received on the network in non-MAC packets (including the FCS octets but excluding the framing bits ). An octet represents an integral collection of eight bits of information. Packets The total number of [...]

  • Seite 230

    10.5.1.2 History Group The token-ring History groups capture historical information about network utilization and error statistics for the token-ring network. They provide a means of correlating the data collected by the Statistics group over time. They record statistical samples according to a user-specified frequency and duration and store them f[...]

  • Seite 231

    • Line Errors • Internal Errors • Burst Errors • Address Copied Errors • Abort Errors • Lost Frame Errors • Congestion Errors • Frame Copied Errors • Frequency Errors • Token Errors • Soft Error Reports • Ring Poll Events • Active Stations All of the above statistics are also sampled by the token-ring MAC-layer Statistics [...]

  • Seite 232

    • Number of active stations on the ring • Current status of the ring with the following possible ring states: − Normal operation − Ring Purge state − Claim Token state − Beacon Frame Streaming state − Beacon Bit Streaming state − Beacon Ring Signal Loss state − Set Recovery Mode state • Address of the last beacon sender • Addr[...]

  • Seite 233

    10.5.1.5 Ring Station Configuration Group The token-ring Ring Station Config group provides the capability to actively manage and query the configuration of each token-ring node in the local ring. The RMON probe can initiate the removal of a station from the ring by sending a Remove Station MAC frame. It keeps the following configuration parameters[...]

  • Seite 234

    source routing bridges. Transparent bridges do not use this field. One-Hop Frames Contains the total number of frames received whose route had one hop, were not all-routes broadcast frames, and whose source or destination address were on this ring. Two-Hop Frames Contains the total number of frames received whose route had two hops, were not all-ro[...]

  • Seite 235

    following command to display the status of the DMM network interfaces via T-MACs and E-MACs installed in your hub: 8260A> show interface Figure 117 shows an example of the output from this command:   8260A> show interface Admin Oper MAC Idx Network Type Stat Stat Address Slot General Information --- ------------- ---- ----- ----- ------[...]

  • Seite 236

    • Host • History • Alarm • Event • Matrix • Statistics • TopN-hosts 10.6.2 Monitoring Functions Supported by T-MAC T-MAC V2.0 provides the following functions: • Support for standard RMON MIBs: − RFC 1271 media independent - Host group − RFC 1513 token-ring specific - MAC Layer Statistics group - Promiscuous Statistics group - R[...]

  • Seite 237

    Note The statistics that are collected using the DMM commands described in the next sections are NOT all RMON statistics. The non-RMON statistics are identified. 10.6.3 SHOW COUNTER Command for Ethernet Networks This DMM command allows you to display the following information for the segments to which the DMM has an interface via an E-MAC: 1. Displ[...]

  • Seite 238

      8260A> 8260A> show counter interface ethernet_1 Interface Statistics for ETHERNET_1 ----------------------------------------------------------------------------- Received Octets 939978 Received Unicast Packets 8488 Received Non-Unicast Packets 992 Received Discards 0 Received Errors 0 Received Unknown Protocols 0 Transmitted Octets 25[...]

  • Seite 239

      8260A> 8260A> show counter repeater ethernet_1 module 2 Repeater Statistics for Module 2 on ETHERNET_1 ----------------------------------------------------------------------------- Readable Frames 0 Readable Octets 0 Runts 0 FCS Errors 0 Late Events 0 Short Events 0 Frame Too Longs 0 Very Long Events 0 Alignment Errors 0 Collisions 0 [...]

  • Seite 240

      8260A> 8260A> show counter rmon hosts ethernet_1 all RMON Hosts Table for Host Address 00-00-c9-01-01-0b on Port 2.4 ----------------------------------------------------------------------------- Received Packets 136 Received Octets 8704 Transmitted Packets 190 Transmitted Octets 13132 Transmitted Errors 0 Transmitted Broadcast Packets[...]

  • Seite 241

    • Statistics • TopN-hosts To be able to collect and view the above information, you must perform the following steps: 1. Use t h e ″ SHOW INTERFACE ″ command to determine th e interface index for each E-MAC installed in your hub. 2. Enable t h e E-MAC interface if not enabled already. You can do this using the following command for the E-MA[...]

  • Seite 242

    SET RMON ALARM ETHERNET {stat_type}.{interface} RISING {threshold} FALLING {threshold} {event} {time} {trigger} {alarm type} The following is a summary of the parameters that can be specified for the Stat_type: − BroadcastPackets − Collisions − CRCAlignErrors − Fragments − Jabbers − MulticastPackets − Octets − OversizePackets − Pa[...]

  • Seite 243

    The format of the command to display the contents of the control table for the statistics group is slightly different. In this case, you must use the following command: SHOW RMON statistics ETHERNET CONTROL ALL The following example allows you to determine all the interfaces on which the RMON host group is enabled.   8260A> show rmon host [...]

  • Seite 244

      8260A> show rmon host data 1 all by_creation_order RMON Host display for Interface 3 : Creation Order : 1 Host Address : 10-00-5A-D4-B0-8C Input Packets : 2954 Output Packets : 2954 Input Octets : 301308 Output Octets : 301308 Output Errors : 0 Output Packets (Broadcast) : 0 Output Packets (Multicast) : 0 Creation Order : 2 Host Address [...]

  • Seite 245

      8260A> 8260A> show counter token_ring token_ring_7 Token Ring Statistics for TOKEN_RING_7 ----------------------------------------------------------------------------- Ring Status: No Problems Detected Ring State: Opened Ring Open Status: Ring Open Ring Speed: 4 MBPS Upstream Station: 40-00-00-03-33-38 Functional Addr.: c0-00-00-00-00[...]

  • Seite 246

      8260A> show counter interface token_ring_7 Interface Statistics for TOKEN_RING_7 ----------------------------------------------------------------------------- Received Octets 6082132 Received Unicast Packets 19226 Received Non-Unicast Packets 93810 Received Discards 0 Received Errors 1 Received Unknown Protocols 0 Transmitted Octets 3222[...]

  • Seite 247

      8260A> show counter rmon hosts token_ring_7 all RMON Hosts Table for Host Address 40-00-00-03-33-38 on Port 6.9 ----------------------------------------------------------------------------- Received Packets 0 Received Octets 0 Transmitted Packets 203 Transmitted Octets 11108 Transmitted Errors 1 Transmitted Broadcast Packets 202 Transmit[...]

  • Seite 248

      8260A> show counter rmon ring_station token_ring_7 ring RMON Token Ring Station Control Statistics for Network TOKEN_RING_7 ----------------------------------------------------------------------------- Active Stations: 2 Table Size: 2 Ring State: Normal operation Last Beacon Sender: 00-00-00-00-00-00 Last Beacon NAUN: 00-00-00-00-00-00 A[...]

  • Seite 249

      8260A> 8260A> show counter rmon ring_station token_ring_7 all RMON Token Ring Station Statistics for Network TOKEN_RING_7 ----------------------------------------------------------------------------- Station Mac Address: 40-00-00-03-33-38 Station Status: Active Last Enter Time: 1483081 Last Exit Time: 0 Last NAUN: 10-00-f1-0b-58-00 --[...]

  • Seite 250

    SHOW COUNTER RMON TR_MAC_LAYER {network} An example of the output displayed for this command is shown in Figure 129.   8260A> 8260A> show counter rmon tr_mac_layer token_ring_7 RMON Token Ring Mac-Layer Statistics for Network TOKEN_RING_7 ----------------------------------------------------------------------------- Drop Events: 0 Beacon[...]

  • Seite 251

      8260A> 8260A> show counter rmon tr_promiscuous token_ring_7 RMON Token Ring Promiscuous Statistics for Network TOKEN_RING_7 ----------------------------------------------------------------------------- Data Octets: 27092 Data Packets: 472 DATA PACKETS DATA PACKETSckets: 23 Broadcast Packets: 472 Multicast Packets: 02 18 to 63 Octets: [...]

  • Seite 252

      8260A> show counter rmon tr_source_routing token_ring_7 RMON Token Ring Source Routing Statistics for Network TOKEN_RING_7 ----------------------------------------------------------------------------- In Frames: 0 Out Frames: 0 Through Frames: 1013 In Octets: 0 Out Octets: 0 Through Octets: 93748 All Rt Brcst Frms: 7477 Single Rt Brcst F[...]

  • Seite 253

    3. Enable t h e collection of RMON information by T-MAC, using the following command: SET MODULE {slot.subslot} RMON_GROUP enable This command enables the collection of RMON information by T-MAC. You must, also, enable the collection of individual RMON groups using the commands described in the next step. 4 . U se the following commands to enable t[...]

  • Seite 254

      8260A> 8260A> show module 8.2 verbose Slot Module Version Network General Information ----- --------------- ------- ------------- ------------------- 08.02 T-MAC v2.00 TOKEN_RING_7 T-MAC: Token Ring Network Monitor Card Boot Version: v2.00 IP Address: 9.67.46.195 Subnetwork Mask: ff.ff.ff.f0 Default Gateway: 0.0.0.0 Station Address: 1[...]

  • Seite 255

    parameters, and remove stations on its ring. It also collects and forwards configuration reports generated by stations on its ring to the LAN manager. Traditionally, CRS and REM functions are implemented in the bridges. However, the 8260 T-MAC implements the CRS and REM functions, which provides you with the following functions: • Collect soft er[...]

  • Seite 256

      8260A> show tr_surrogate 8.2 surr_status Surrogate Status Data for Network TOKEN_RING_7 ------------------------------------------------------------------------ Surrogate Admin Status: ENABLED Port Mac Address: 10-00-f1-0b-58-00 Ring Segment: 0000 Ring Utilization: 0.0% REM Admin Status: ENABLED REM Oper Status: Active CRS Admin Status: [...]

  • Seite 257

      8260A> show tr_surrogate 8.2 rem_status Ring Error Monitor Status Data for Network TOKEN_RING_7 ----------------------------------------------------------------------------- REM Traps: DISABLED Weight Exceeded Traps: DISABLED PreWeight Exceeded Traps: DISABLED Receiver Congestion Traps: DISABLED NonIso Threshold Exceeded Traps: DISABLED [...]

  • Seite 258

    An example of the output from this command is shown in Figure 136 on page 236.   8260A> show tr_surrogate 8.2 crs_station all Configuration Report Server Ring Station Data for MAC address 10-00-f1-0b-58-00 of Network TOKEN_RING_7 ----------------------------------------------------------------------------- Station Status: Active Mfg. Adapt[...]

  • Seite 259

    SHOW TR_SURROGATE {slot.subslot} REM_SOFT_ERROR • Threshold exceeded conditions SHOW TR_SURROGATE {slot.subslot} REM_THRESHOLD_EXCD 10.8 DOT5_Group Support by T-MAC DOT5_Group support by T-MAC allows you to perform the statistics collection tasks defined in the IEEE 802.5 token-ring Management Information Base (MIB). These functions allow the T-M[...]

  • Seite 260

    The definitions for the terminology used within the above table are: • Analyzes = interprets the data that is collected • Provides = sends solicited information on data collected • Reports = sends unsolicited information on data collected Table 35 (Page 2 of 2). Functions Performed by T-MAC V2.0 Function RMON CRS REM DOT5 Reports Beaconing co[...]

  • Seite 261

    Chapter 11. 8260 Multiprotocol Interconnect Module This chapter provides an overview of the routing and bridging functions provided by the Multiprotocol Interconnect module as well as discussing the steps required to configure the module to perform these functions. In this document, we have assumed that the reader is familiar with routing and bridg[...]

  • Seite 262

    Note: DECnet Phase IV routing is not supported on token-ring ports. The Multiprotocol Interconnect module uses a 32-bit RISC processor (80960FA) for high performance, allowing you to forward up to 45,000 packets per second when bridging and up to 30,000 packets per second when routing IP. The performance of the module will vary depending on the num[...]

  • Seite 263

    Figure 137 on page 241 shows the front view of the 1-slot and 2-slot Multiprotocol Interconnect modules. Figure 137. Front View of th e Multiprotocol Interconnect Modules There are a number of activity and status LED displays on the front panel of the Multiprotocol Interconnect module which are used to show the information provided in Table 36 o n [...]

  • Seite 264

    Table 36. Interconnect Module L E D Description L E D Name Color State Description Module Sta tus Green On Power is on, software functioning Off Power is off or complete failure Blinking Power is on but diagnostics failure Network Activity Yellow On Continuous activity on the port Off No activity on this port Blinking Normal activity on this port N[...]

  • Seite 265

    It is expected that the customer will buy the Multiprotocol Interconnect module pre-configured with I/O cards, including proper programming for EEPROM, and will leave the I/O card configuration, as is, for extended periods of time. It i s when the user decides to alter the I/O configuration that the information in the EEPROM needs to be changed to [...]

  • Seite 266

    Do you want to enter this into module x.y ′ s EEPROM (Y/N): 8. Enter Y in response to t he above prompt. 9. Remove t h e module from the 8260 a n d install the I/O card. 1 0 . Return DMM to normal operation using the following command: BOOT 1 1 . Install the module in the 8260. Now the module will report accurate power requirements of the entire [...]

  • Seite 267

    11.4 Routing Functions The Multiprotocol Interconnect module supports the following routing protocols: • IP • IPX • DECnet Phase IV 11.4.1 IP Routing Support When acting as an IP router, the Multiprotocol Interconnect module provides support for: • Directed broadcast • ICMP • Proxy ARP • Ethernet or 802.3 (not both) encapsulation on L[...]

  • Seite 268

    • Supports authentication between routers. • Importation of RIP routes and static routes to an OSPF domain may be enabled or disabled. • Filters may be configured to import or discard specific RIP and static routes to OSPF. • Supports hop count to OSPF metric conversion when importing RIP and static routes. • Does not support non-broadcas[...]

  • Seite 269

    command to assign ports 1 thru 6 to the desired Ethernet segments on the ShuntBus or Enhanced TriChannel. SET PORT {slot.port} NETWORK {ethernet_n|isolated} Note that ports 7 and 8 are not assigned to any segment on the backplane; therefore, the above command is not required for these ports. 11.6 Local Management System (LMS) When you connect to th[...]

  • Seite 270

    • Configuration Menu This option allows you to alter configuration parameters and monitor statistics about the Multiprotocol Interconnect module. • Status Menu This option allows you to review the statistics and configuration information without changing any values. • Enable/Disable Write Access When you first access the LMS, you automaticall[...]

  • Seite 271

      * Help Screen Module: BladeRunner Time: 13:07 5 Jan 95 control-C: Cancel input, cancel a popup menu, or exit a screen control-J: Go to the screen jump table control-K: Go to this help screen control-L: Refresh the screen display control-P, control-T: Go to the top of the menu hierarchy control-W: Toggle write access for this session control[...]

  • Seite 272

      Config * Jump Table - Config screens Module: BladeRunner Time: 14:25 5 Jan 95 System Download Trap Dest. Table Physical Port List Phy. Port Protocol Phy. Port Interface Logical Port Logical Port MLink Bridging System Bridging Port STP System STP Port Filtering Database Custom Filter Test Custom Filter Stmt. Src. Routing System Conversion Sy[...]

  • Seite 273

    • Dot5 Group • Frame Relay Group • IP Forward Group • OSPF Group • PPPF Group • Retix Private MIB extensions The following SNMP traps will be sent by the SNMP agent to the SNMP managers which have been defined as a trap receiver . • coldStart • linkUp • Enterprise specific traps: − frDCLiStatusChange − newRoot • Retix Enterp[...]

  • Seite 274

      Config * Configuration Menu Module: BladeRunner Time: 14:24 5 Jan 95 System Menu Ports Menu Bridge Menu Protocols Menu Exit System parameters Menu   Figure 141. LMS Configuration Panel The following sections will describe the required steps for configuring these features. 11.8.1 Configuring System Wide Parameters The system wide param[...]

  • Seite 275

    − Warmstart : All the configuration settings are read from the FLASH memory, resulting in the restoration of the last saved configuration information. Note that all the statistics tables will be cleared during to a Warmstart . The Menu Bar options of the Systems Parameters screen allow you to perform the following: • Reset Unit This enables you[...]

  • Seite 276

    To add an entry to this table, you must select Add Entry from the Menu Bar options of the panel shown in Figure 143 on page 2 5 4 . You will then be prompted (via a pop-up menu) to enter the IP address and the community name of the SNMP manager. After entering this information you must select (on the pop-up menu) Set Entry to add this entry to the [...]

  • Seite 277

    Note If you select Start BOOTP Download and do not specify the TFTP server IP address and TFTP filename in the above panel, the Multiprotocol Interconnect module will use BOOTP to locate a BOOTP server in the network in order to get this information to perform the download operation. To perform download from a PC attached to the Multiprotocol Inter[...]

  • Seite 278

      Config * Ports Menu Module: BladeRunner Time: 15:30 5 Jan Physical Port List Physical Port Protocol Parameters Physical Port Interface Parameters Logical Port Parameters Logical Port Multilink Parameters Exit Return to the previous screen   Figure 145. LMS Port Menu Panel The parameters shown in this panel are each applicable to certa[...]

  • Seite 279

    applicable to the LAN ports and will not be discussed any further in this book. 11.8.2.1 Configuring Physical Port Parameters The Physical Port List panel displays information about the physical ports currently installed on your module. An example of this panel is shown in Figure 146.   Config * Physical Port List Module: BladeRunner System P[...]

  • Seite 280

      Config * Physical Port List Module: BladeRunner System Page 2 Time: 15:49 5 Jan 95 Port ID Name Connection Card Type Protocol 7 PHYSICAL PORT FRONT PANEL 1 tokenRing tokenRing 8 PHYSICAL PORT FRONT PANEL 2 tokenRing tokenRing Prev Page Next Page Exit   Figure 147. LMS Physical Ports List for Token-Ring I/O Cards Using the Physical Por[...]

  • Seite 281

      Config * Physical Port Protocol Parameters Module: BladeRunner Phy. Port: 7 PHYSICAL PORT Time: 15:56 5 Jan 95 Link Protocol: tokenRing Commands: noOp Ring Speed: fourMegabits Act Mon Part: false Funct MAC Addr Mask: C00000000000 Search Port Prev Port Next Port Exit Return to the previous screen   Figure 148. LMS Physical Port Protoco[...]

  • Seite 282

    11.8.2.3 Configuring Logical Port Parameters This panel allows you to configure parameters for Ethernet, token-ring and WAN logical ports. An example of this panel for an Ethernet port is shown in Figure 149.   Config * Logical Port Parameters Module: BladeRunner Log. Port: 1 LOGICAL PORT Time: 16:08 5 Jan 95 Attached Physical Port Channel: 1[...]

  • Seite 283

    • Encapsulation This is a read-only parameter and shows the type of encapsulation used on the physical port to which this logical port is attached. In the case of a token-ring port, this field will show tokenRing . • Attach Port and Detach Port These parameters are used to attach/detach logical ports to/from WAN physical ports. They are not app[...]

  • Seite 284

    The following sections describe the procedures used to configure the Multiprotocol Interconnect module to perform one of the following: • Transparent bridging for Ethernet and/or token-ring • Source-route transparent bridging for token-ring • Translational bridging between token-ring and Ethernet 11.8.4.1 Configuring for Transparent Bridging [...]

  • Seite 285

    − Time-To-Delete (in seconds) For information on this parameter, refer to 11.8.5, “Filtering for Bridging Functions” on page 2 7 0 . − Time-To-Forget (in seconds) For information on this parameter, refer to 11.8.5, “Filtering for Bridging Functions” on page 2 7 0 . • You must ignore the following parameter as it does not apply to LAN [...]

  • Seite 286

    If security mode is disabled , and the destination address is known, the packet is forwarded on the appropriate port. If the address is not known, the packet is sent (flooded) on all the other ports. For more information, refer to 11.8.5, “Filtering for Bridging Functions” on page 270. • Custom Filtering This option allows you to enable or di[...]

  • Seite 287

      Config * STP System Parameters Module: BladeRunner System Time: 17:06 5 Jan 95 STP Facility: Enabled STP Version: draft STP Domain Address: 0180C2000000 Reset Delay Time: 120 Bridge Priority: 8000 Bridge Hello Time: 400 Bridge Max Age Time: 1200 Bridge Forward Delay Time: 800 Exit Version of the Spanning Tree Protocol   Figure 153. LM[...]

  • Seite 288

    If two bridges have the same bridge priority, the one with the lowest MAC address has higher priority. • Bridge Max Age Time Specifies the max value for the age field (in hundredths of a second) in the Hello BPDU before it is discarded by the Multiprotocol Interconnect module. This value will only be used (by all the bridges in the spanning tree [...]

  • Seite 289

    • Path Cost Mode This parameter is used by the spanning tree protocol to determine how the value of the path cost is configured. The following values can be specified for this parameter: − Manual : In this case the path cost will be taken from the Manual Port Path Cost parameter. − High : The path cost will be determined by the 1000/LineSpeed[...]

  • Seite 290

      Config * Source Routing Port ParametersModule: BladeRunner Log. Port: 8 LOGICAL PORT Time: 17:33 5 Jan 95 Security Mode: Disabled Source Address Filtering: Disabled Custom Filtering: Disabled Hop Count: Local Segment: Disabled * Port STE SpanMode: autoSpanMode Largest Frame: mtu4472Bytes Search Port Prev Port Next Port Exit Return to the pr[...]

  • Seite 291

    5. Configure t h e S T P Port Parameters for each token-ring port performing source-route transparent bridging, as described in 11.8.4.1, “Configuring for Transparent Bridging” on page 2 6 2 . 6. Optionally, y o u m a y configure the security and filtering parameters as described in 11.8.5, “Filtering for Bridging Functions” on page 2 70 . [...]

  • Seite 292

    This parameter allows you to enable/disable SNAP conversion between token-ring and Ethernet frames. When enabled, the Ethernet network is treated as an 802.3 network. When disabled, the Ethernet network is treated as an Ethernet V2 network. Note that the implication of this parameter is that the Ethernet ports can be either Ethernet V2 or 802.3 but[...]

  • Seite 293

      Config * Filtering Database Module: BladeRunner System Page 1 Time: 14:27 6 Jan 95 MAC Address Disposition Scope MAC Address Disposition Scope #0000B528023E 1 all %090077000002 %0180C2000000 #08005A1326EB 2 all %08008F4001A0 %08008F4001A1 %08008F4001A2 %08008F4001A3 %08008F4001A4 %08008F4001A5 %08008F4001A6 %08008F4001A7 %090077000001 + Unl[...]

  • Seite 294

    − Permanent($) These are manually entered addresses which are stored in the FLASH memory. − Static (*) These are entries that have been entered manually. They cannot be aged-out of the filtering database, but will be lost during a module Reset . Usually the manually entered addresses are permanent and are retained in the FLASH memory which resu[...]

  • Seite 295

    To do this, each address in the database has an age assigned to it. When the address is learned, the age is set to zero. At subsequent time intervals this address is incremented. There are two system-wide timers which govern the length of the time the learned entries will be kept in the filtering database: • Time-to-Forget If an address is alread[...]

  • Seite 296

    11.8.6 Destination Address Filtering Destination address filtering allows you to use the contents of the filtering database to forward or discard frames. Destination address filtering is always performed by the Multiprotocol Interconnect module. However, certain configurable parameters as described below will affect the operation of the destination[...]

  • Seite 297

    Filter Test Table . Note that there is only one of these tables in each Multiprotocol Interconnect module and it contains all the test that are to be performed by the Multiprotocol Interconnect module, regardless of the ports on which these tests are performed. To define the tests, select Custom Filter Test Table from the Bridge Menu . An example o[...]

  • Seite 298

    This field defines the bits in the received frame, starting at the specified offset , that should be tested against the contents of the value field. Only the bits which have a value of B ′1′ in the mask will be tested. • Logical Operator The following operators can be used for testing: − Equal − Not_equal − Less_than − Greater_than ?[...]

  • Seite 299

      Config * Custom Filter Statement Table Module: BladeRunner Log. Port: 1 LOGICAL PORT Page 1 Time: 14:10 9 Jan 95 Statement ID Test Name Action on Success Action on Failure 1 Frame Type Test Stmt 2 Discard 2 ″″ Discard Discard 3 ″″ Discard Discard 4 ″″ Discard Discard 5 ″″ Discard Discard 6 ″″ Discard Discard 7 ″″ Dis[...]

  • Seite 300

    − Fwd Prio #: Forward the frame at the specified priority (#). # can be 0 t o 7 . Priority 0 is the highest priority. − Stmt #: Specifies another statement ID from the Custom Filter Statement Table, so that another test may be applied to the frame. # can be 1 to 16. An example of the use of priority is to check for the frame size and assign hig[...]

  • Seite 301

    The following sections describe the procedures used to configure the Multiprotocol Interconnect module to perform one of the following: • IP routing • IPX routing • DECnet Phase IV routing 11.8.8 Configuring for IP Routing The Multiprotocol Interconnect module allows you to use RIP, OSPF, and static routes when used as an IP router. To config[...]

  • Seite 302

      Config * IP Port Address Table Module: BladeRunner System Page 1 Time: 15:35 9 Jan 95 Port IP Address IP Subnet Mask 1 9.67.46.11 255.255.255.240 1 9.67.46.44 255.255.255.240 2 9.67.46.17 255.255.255.240 Add Entry Prev Page Next Page Exit Return to the previous screen   Figure 162. LMS IP Port Address Table Panel This table allows you[...]

  • Seite 303

    An example of the IP System Parameters panel is shown in Figure 163 on page 281.   Config * IP System Parameters Module: BladeRunner System Time: 15:43 9 Jan 95 IP Routing: Enabled RIP: Enabled Router ID: 9.67.46.44 IP Security: Disabled ARP Timeout: 1500 Reassembly Timeout: 10 Proxy ARP: Disabled Source Quench: Disabled Redirect: Disabled IC[...]

  • Seite 304

    This parameter specifies the length of time that the module may wait for all the fragments of a fragmented IP message to be received for reassembly. If they are not received within the specified time, the datagram is discarded. Note that datagram reassembly takes place at the destination of a datagram only. • Proxy ARP If the module receives an A[...]

  • Seite 305

      Config * IP Port Parameters Module: BladeRunner Log. Port: 1 LOGICAL PORT Time: 15:55 9 Jan 95 IP Port Routing: Enabled Disposition: discard RIP: Enabled * IP Mtu: 1492 RIP Path Cost: 1 LAN Encapsulation: ethernet Broadcast Form: ones Forward Broadcast: Enabled Security Access List 1: 0 Security Access List 2: 0 Search Port Prev Port Next P[...]

  • Seite 306

    that the Multiprotocol Interconnect module recognizes both types of broadcasts on the received frames regardless of the setting of this parameter. • Forward Broadcast This parameter specifies if this port will forward directed broadcast messages. Directed broadcasts have all 1 ′ s in the hostid portion of their address. • Security Access List[...]

  • Seite 307

    • Next Hop This is the IP address of the node that is the next stop for a packet en route to its destination address. The next hop must be directly connected to the interface for which this route is defined. • Mask This is the subnet mask associated with the destination address entry. • Type This field indicates whether the destination addres[...]

  • Seite 308

      Config * IP Net To Media Table Module: BladeRunner System Page 1 Time: 10:50 11 Jan 95 Port Network Address Media Address Type 1 9.67.46.13 400000000001 static 1 9.67.46.33 10005A7903C7 dynamic 1 9.67.46.34 10005A7903E1 dynamic 1 9.67.46.40 0000B528023E dynamic 1 9.67.46.41 08008F3003EF dynamic 1 9.67.46.46 08005A13396F dynamic Add Entry Se[...]

  • Seite 309

    Also a BOOTP client can request the code image file to be downloaded from the TFTP server. To configure the Multiprotocol Interconnect module as a Boothelper you must select Boothelper Parameter from the Protocols Menu . An example of the Boothelper Parameters panel is shown in Figure 1 6 7 .   Config * Boothelper Parameters Module: BladeRunn[...]

  • Seite 310

    11.8.8.1 Configuring for OSPF To configure the Multiprotocol Interconnect module to use OSPF, you must select OSPF from the Protocols Menu . The resulting panel is shown in Figure 1 6 8.   Config * OSPF Menu Module: BladeRunner Time: 11:11 11 Jan 95 OSPF System Parameters OSPF Area Table OSPF Area Default Metric Table OSPF Address Range Table[...]

  • Seite 311

      Config * OSPF System Parameters Module: BladeRunner System Time: 17:39 11 Jan 95 Area Border Router: false Router ID: 9.67.46.44 TOS Support: true Admin Status: Enabled AS Boundary Router: true Import Rip Routes: Enabled Import Static Routes: Enabled Default Action on No Match for RIP Routes: import Default Action on No Match for Static Rou[...]

  • Seite 312

    This parameter determines if the RIP filter table will be used for importing routes found by RIP. RIP filter table is discussed later in this section. • Import Static Routes This parameter determines if the static route filter table will be used for importing static routes. Static route filter table is discussed later in this section. • Default[...]

  • Seite 313

    can only be modified. There will be one entry in this table for each IP address assigned to the Multiprotocol Interconnect module ′ s ports. To modify the parameters on this panel, you must select the Modify Entry option. A pop-up menu will be displayed which allows you to change the following parameters for each IP interface: • IP Address This[...]

  • Seite 314

    This parameter specifies the number of seconds between the Hello Packets that the router sends on the interface. This interval must be the same for all the routers attached to the same network. • RtdDeadInt If a router ′ s neighbor does not see a Hello packet within this period, it will declare the router down. The Dead Interval should be some [...]

  • Seite 315

      Config * OSPF Area Table Module: BladeRunner System Page 1 Time: 17:41 11 Jan 95 Area ID AuthType Import AS SPF Brdr AS Brdr Area Chksum Extern LSA Runs Routers Routers LSAs Sum 0.0.0.0 1 true 10 0 1 3 025393 Add Entry Prev Page Next Page Exit Return to the previous screen   Figure 171. LMS OSPF Area Table Panel This table contains in[...]

  • Seite 316

    This parameter is read-only and contains 32-bit unsigned sum of the Link-state-advertisement ′ s link-state checksum contained in this area ′ s link-state database. This sum can be used to determine if there has been a change in a router ′ s link-state database and to compare the link-state database of two routers. Note: Area 0.0.0.0, by defi[...]

  • Seite 317

    from the OSPF Menu . The resulting panel is shown in Figure 173 on page 295.   Config * OSPF Address Range Table Module: BladeRunner System Page 1 Time: 12:04 11 Jan 95 Area ID Range Net Range Mask 0.0.0.0 9.67.46.0 255.255.255.000 Add Entry Prev Page Next Page Exit Return to the previous screen   Figure 173. LMS OSPF Area Address Range[...]

  • Seite 318

      Config * OSPF Interface Metric Table Module: BladeRunner System Page 1 Time: 17:44 11 Jan 95 IP Address Port TOS Metric 9.67.46.17 0 0 10 9.67.46.44 0 0 10 9.67.46.94 0 0 10 Add Entry Prev Page Next Page Exit Return to the previous screen   Figure 174. LMS OSPF Interface Metric Table This panel allows you to specify the following para[...]

  • Seite 319

      Config * OSPF Virtual Interface Table Module: BladeRunner System Page 1 Time: 17:44 11 Jan 95 Area ID Neighbor TransDelay RetransInt HelloInt RtrDeadInt Add Entry Prev Page Next Page Exit Return to the previous screen   Figure 175. LMS OSPF Virtual Interface Table Panel The following parameters can be specified for each entry: • Are[...]

  • Seite 320

    8. Define t h e other OSPF routers which are neighbors to th e Multiprotocol Interconnect module. To s o so, select OSPF Neighbors from the OSPF Menu panel. An example of the resulting panel is shown in Figure 176 on page 298.   Config * OSPF Neighbor Table Module: BladeRunner System Page 1 Time: 17:45 11 Jan 95 IP Address Port Router ID Opti[...]

  • Seite 321

    This field is read-only and shows the current length of the retransmission queue. 9 . Y o u ma y define the filters for importing R I P discovered routes by selecting OSPF RIP Filter Table from the OSPF Menu . An example of the resulting panel is shown Figure 1 7 7 .   Config * OSPF Rip Filter Table Module: BladeRunner System Page 1 Time: 17:[...]

  • Seite 322

      Config * OSPF Rip Convert Table Module: BladeRunner System Page 1 Time: 17:46 11 Jan 95 IP Address IP Mask Hop Count Metric 9.67.46.0 255.255.255.240 1 10 9.67.46.0 255.255.255.240 2 20 9.67.46.0 255.255.255.240 3 30 9.67.46.0 255.255.255.240 4 40 9.67.46.0 255.255.255.240 5 50 9.67.46.0 255.255.255.240 6 60 9.67.46.0 255.255.255.240 7 70 9[...]

  • Seite 323

      Config * OSPF Rip Default Convert TablModule: BladeRunner System Page 1 Time: 17:47 11 Jan 95 Hop Count Metric 11 0 22 0 33 0 44 0 55 0 66 0 77 0 88 0 99 0 10 100 Modify Entry Prev Page Next Page Exit Return to the previous screen   Figure 179. LMS OSPF Default RIP Convert Table Panel The following parameters can be viewed/modified fo[...]

  • Seite 324

      Config * OSPF Static Filter Table Module: BladeRunner System Page 1 Time: 17:47 11 Jan 95 IP Address IP Mask TOS Action Add Entry Prev Page Next Page Exit Return to the previous screen   Figure 180. LMS OSPF Static Filter Table Panel This panel allows you to define the following parameters for each filter entry: • IP Address This pa[...]

  • Seite 325

      Config * OSPF Static Convert Table Module: BladeRunner System Page 1 Time: 17:48 11 Jan 95 IP Address IP Mask TOS Hop Metric Modify Entry Prev Page Next Page Exit Return to the previous screen   Figure 181. LMS Configuration Panel This panel allows you to enter the following parameters for each entry: • IP Address This parameter spe[...]

  • Seite 326

      Config * OSPF Static Default Convert TablModule: BladeRunner System Page 1 Time: 17:49 11 Jan 95 TOS Hop Count Metric 01 1 0 02 2 0 03 3 0 04 4 0 05 5 0 06 6 0 07 7 0 08 8 0 09 9 0 0 10 100 Modify Entry Prev Page Next Page Exit Return to the previous screen   Figure 182. LMS OSPF Default Static Convert Table Panel The following parame[...]

  • Seite 327

      Config * IP Security Table Module: BladeRunner List: 1 Page 1 Time: 12:02 18 Jan 95 ID Source Source Destination Destination Action Prot Address Mask Address Mask 1 9.67.46.41 255.255.255.240 9.67.46.46 255.255.255.240 pass ip Add Entry Search List Prev List Next List Prev Page Next Page Exit Return to the previous screen   Figure 183[...]

  • Seite 328

    • Source Address This is the source address of the IP datagram against which the source address of the IP datagram currently being processed is compared. A value of 0.0.0.0 serves as a wildcard, indicating all IP addresses. • Source Mask This is the address mask which is logically ANDed with the source address in the table and the source addres[...]

  • Seite 329

      Config * IP Security Access List Module: BladeRunner Page 1 Time: 12:07 18 Jan 95 List Transmit Action on Receive Action on ICMP No. Check No Match (Tx) Check No Match (Rx) Generation 1 Enabled pass Enabled pass Enabled 2 Disabled pass Disabled pass Disabled 3 Disabled pass Disabled pass Disabled 4 Disabled pass Disabled pass Disabled 5 Dis[...]

  • Seite 330

    • ICMP Generation This field specifies whether an ICMP Destination Unreachable message is forwarded to the source address on any IP datagram that is discarded because of security checks. Note: There is only one IP security access list per Multiprotocol Interconnect module. IP security access list may contain up to 32 entries. 3. Enable IP securit[...]

  • Seite 331

    4. Configure t h e system-wide I P X parameters by selecting IPX System Parameters from the IPX Menu . An example of the resulting panel is shown in Figure 186 on page 30 9 .   Config * IPX System Parameters Module: BladeRunner System Time: 10:52 13 Jan 95 IPX Routing: Enabled IPX Security: Disabled Internet Bcast Handling: Enabled Exit Retur[...]

  • Seite 332

      Config * IPX Port Parameters Module: BladeRunner Log. Port: 1 LOGICAL PORT Time: 11:00 13 Jan 95 IPX Port Routing: Enabled Host Number: 08008F4001A0 Disposition: discard Network Number: 00000001 Interface Delay: 1 Encapsulation: ieee802.3 RIP Timer: 30 SAP Timer: 60 Security Access List 1: 0 Security Access List 2: 0 Search Port Prev Port N[...]

  • Seite 333

    • Interface Delay This is the estimated time taken for an IPX packet containing 576 bytes of data to traverse the hop between the interface and the associated link. This parameter is displayed in milliseconds and is used to determine the best route to a destination address. If there are more than one route with different interface delay, the one [...]

  • Seite 334

    Allows you to display information about the physical ports currently installed on your module. • Physical Port Protocol Statistics Displays different statistical information for each port, depending on the type of the interface and the link protocol configured for the port. • Physical Interface Statistics This screen is applicable to the WAN po[...]

  • Seite 335

    Displays information about various link state advertisements sent and received by the Multiprotocol Interconnect module. • OSPF Link State Database Table Displays the link state database in the Multiprotocol Interconnect module. This information includes the area and the router identifier from which the link-state advertisements were received. ?[...]

  • Seite 336

    314 8260 Multiprotocol Intelligent Switching Hub[...]

  • Seite 337

    Appendix A. Power Requirements for 8250/8260 Modules A.1 Power Requirements for 8250 Ethernet Modules Table 41. Power Requirements for 8250 Ethernet Modules Module Feature Code Type Description # of Slots Used Power Consumption (watts by voltage type) +5 +12 -12 -5 -2 10BASE-T 3800E Ethernet 8 ports 8-pin UTP STP One 10 0 0 0 0 10BASE-T 3801E Ether[...]

  • Seite 338

    A.2 Power Requirements for 8250 Token-Ring Modules Table 42. Power Requirements for 8250 Token-Ring Modules Module Feature Code Type Description # of Slots Used Power Consumption (watts by voltage type) +5 +12 -12 -5 -2 MAU 3820T Token Ring 8 ports 8-pin RI/RO One 7000 0 Twisted Pair Media 3821T Token Ring 2 0 ports 8-pin Two 12 0 0 0 0 Fiber Repea[...]

  • Seite 339

    A.4 Power Requirements for 8250 Internetworking Modules Table 44. Power Requirements for 8250 FDDI Modules Module Feature Code Type Description # of Slots Used Power Consumption (watts by voltage type) +5 +12 -12 -5 -2 Ethernet Bridge 3828EB Ethernet 2 ports Two 20 7.5 .25 0 0 Token Ring Bridge 3883TB Token Ring 2 ports S R bridge One 14 0 0 0 0 To[...]

  • Seite 340

    318 8260 Multiprotocol Intelligent Switching Hub[...]

  • Seite 341

    Index Numerics 18-Port Active Module Switching Module 18 0 Configuration 18 0 18-Port Active Per-Port Switching Module 174 address-to-port-mapping 17 4 automatic speed detection 17 4 backplane segments 17 4 beacon recovey 17 4 cabling 174 configuration 17 7 DIP switches 176 DIP switches meaning 177 DPLL 174 fan-out device support 174 front view 17 [...]

  • Seite 342

    Address-to-Port-Mapping (continued) support for MAC-less stations 163, 166 Alarm Group 1 9 9 analog collision detection 19 Statistics Collection 19 applying power 8250 modules 84, 85 8260 modules 82 ATM Control Point and Switch module 2 auxiliary port pinout 42 RS-232 support 40 RS-423 support 40 B Backplane Signalling for TR Segments 134 Beacon Bi[...]

  • Seite 343

    Distributed Management Module (DMM) 10, 38 DMM front panel 39 DMM alert_filter 57 DMM alerts 57 authentication 5 7 change 5 7 hello 5 7 DMM Command DMM community table 56 DMM Configuration changing password 44 Clear Community 57 Clear IP 55 configuring terminal settings 47 configuring users 44 defining new Superuser 45 displaying current users 45, [...]

  • Seite 344

    E-MAC Configuration (continued) Set Module Monitor_Contention 67 Set Module Network 65, 68 Show Module 65, 68 E-MAC Monitoring Functions 213 RFC 1271 2 13 RMON MIB 213 Eavesdropping Protection 12 3 EC-DMM 58 front panel 58 installetion 59 jumpers 59 LCD display 60 LED description 60 Enhanced TriChannel 3, 1 3 supported LAN segments 13 Error Abort 2[...]

  • Seite 345

    Ethernet 24-Port 10BASE-T Module (continued) Security Card support 99 side view 10 2 simultaneous segments 99 Telco-type connector 99 usage 1 04 UTP backbone 99 Ethernet 40-Port 10Base-T module 9 Ethernet LAN Overview 97 802.3 97 Broadcast 9 8 Collision 97 CRC or Cyclic Redundancy Checksum 98 CSMA/CD 97 Direct addressing 98 Ethernet V2 97 Frame Che[...]

  • Seite 346

    Intelligent Power Management (continued) Vital Product Data (VPD) 29 Intelligent Power Subsystem 6 Intrusion protection 12 2 diasbling ports 121 jamming ports 12 1 reporting intruders 12 1 IP Addressing for DMM 38 IPX J Jitter Attenuator Daughter Card 10 Jitter Attenuator Daughter Card (JADC) 140, 141 DPLL 141 L LAN Segments on the Backplane 13 Lob[...]

  • Seite 347

    Multiprotocol Interconnect Module (continued) processor 2 4 0 programming power requirements 24 3 RIP implementation 24 5 Router Engine Module (REM) 240 routing functions 24 4 SNMP support 240, 250 software download 24 0 source address filtering 27 4 source route transparent bridging 24 4 translational bridging 24 4 transparent bridging 24 4 N neig[...]

  • Seite 348

    RMON Support (continued) using T-MAC 230 S Security Address Table autolearning 12 1 entries 12 1 manual procedure 12 1 size 121 Serial Control Interface (SCI) 27 Serial Line Interface (SLIP) default gateway 49 IP address 49 IP subnet mask 49 Short History SHOW COUNTER Command for Ethernet segments 215 for token-ring segments 22 2 ShuntBus 1 4 LAN s[...]

  • Seite 349

    Token-Ring Network Parameters (continued) ring speed 173 splitter support 17 4 token-ring path 19 token-ring pins on the Enhanced TriChannel 19 clock-in 19 clock-out 19 data-in 19 data-out 19 token-ring pins on the ShuntBus 21 clock receive 21 clock transmit 21 data A transmit 21 data B transmit 21 token-ring segments on the backplane 19 Token-Ring[...]

  • Seite 350

    [...]

  • Seite 351

    ITSO Technical Bulletin Evaluation RED000 International Technical Support Organization 8260 Multiprotocol Intelligent Switching Hub May 1995 Publication No. GG24-4370-00 Your feedback is very important to help us maintain the quality of ITSO Bulletins. Please fill out this questionnaire and return it using one of the following methods: • Mail it [...]

  • Seite 352

    Cut or Fold Along Line Cut or Fold Along Line ITSO Technical Bulletin Evaluation RED000 GG24-4370-00 IBML  Fold and Tape Please do not staple Fold and Tape NO POSTAGE NECESSARY IF MAILED IN THE UNITED STATES BUSINESS REPLY MAIL FIRST-CLASS MAIL PERMIT NO. 40 ARMONK, NEW YORK POSTAGE WILL BE PAID BY ADDRESSEE IBM International Technical Support O[...]

  • Seite 353

    [...]

  • Seite 354

    IBML  Printed in U.S.A. GG24-4370-00[...]