Extreme Networks Summit1 manual
- Consulta online o descarga el manual de instrucciones
- 227 páginas
- 3.38 mb
Ir a la página of
manuales de instrucciones parecidos
-
Switch
Extreme Networks BlackDiamond 8800 Series
180 páginas 5.8 mb -
Switch
Extreme Networks 8800 Series
180 páginas 5.53 mb -
Switch
Extreme Networks 300-48
198 páginas 2.93 mb -
Switch
Extreme Networks Px Series
118 páginas 1.52 mb -
Switch
Extreme Networks 12802
160 páginas 5.9 mb -
Switch
Extreme Networks 15101
15 páginas 1.88 mb -
Switch
Extreme Networks 12804
160 páginas 5.9 mb -
Switch
Extreme Networks WiRanger
28 páginas 0.24 mb
Buen manual de instrucciones
Las leyes obligan al vendedor a entregarle al comprador, junto con el producto, el manual de instrucciones Extreme Networks Summit1. La falta del manual o facilitar información incorrecta al consumidor constituyen una base de reclamación por no estar de acuerdo el producto con el contrato. Según la ley, está permitido adjuntar un manual de otra forma que no sea en papel, lo cual últimamente es bastante común y los fabricantes nos facilitan un manual gráfico, su versión electrónica Extreme Networks Summit1 o vídeos de instrucciones para usuarios. La condición es que tenga una forma legible y entendible.
¿Qué es un manual de instrucciones?
El nombre proviene de la palabra latina “instructio”, es decir, ordenar. Por lo tanto, en un manual Extreme Networks Summit1 se puede encontrar la descripción de las etapas de actuación. El propósito de un manual es enseñar, facilitar el encendido o el uso de un dispositivo o la realización de acciones concretas. Un manual de instrucciones también es una fuente de información acerca de un objeto o un servicio, es una pista.
Desafortunadamente pocos usuarios destinan su tiempo a leer manuales Extreme Networks Summit1, sin embargo, un buen manual nos permite, no solo conocer una cantidad de funcionalidades adicionales del dispositivo comprado, sino también evitar la mayoría de fallos.
Entonces, ¿qué debe contener el manual de instrucciones perfecto?
Sobre todo, un manual de instrucciones Extreme Networks Summit1 debe contener:
- información acerca de las especificaciones técnicas del dispositivo Extreme Networks Summit1
- nombre de fabricante y año de fabricación del dispositivo Extreme Networks Summit1
- condiciones de uso, configuración y mantenimiento del dispositivo Extreme Networks Summit1
- marcas de seguridad y certificados que confirmen su concordancia con determinadas normativas
¿Por qué no leemos los manuales de instrucciones?
Normalmente es por la falta de tiempo y seguridad acerca de las funcionalidades determinadas de los dispositivos comprados. Desafortunadamente la conexión y el encendido de Extreme Networks Summit1 no es suficiente. El manual de instrucciones siempre contiene una serie de indicaciones acerca de determinadas funcionalidades, normas de seguridad, consejos de mantenimiento (incluso qué productos usar), fallos eventuales de Extreme Networks Summit1 y maneras de solucionar los problemas que puedan ocurrir durante su uso. Al final, en un manual se pueden encontrar los detalles de servicio técnico Extreme Networks en caso de que las soluciones propuestas no hayan funcionado. Actualmente gozan de éxito manuales de instrucciones en forma de animaciones interesantes o vídeo manuales que llegan al usuario mucho mejor que en forma de un folleto. Este tipo de manual ayuda a que el usuario vea el vídeo entero sin saltarse las especificaciones y las descripciones técnicas complicadas de Extreme Networks Summit1, como se suele hacer teniendo una versión en papel.
¿Por qué vale la pena leer los manuales de instrucciones?
Sobre todo es en ellos donde encontraremos las respuestas acerca de la construcción, las posibilidades del dispositivo Extreme Networks Summit1, el uso de determinados accesorios y una serie de informaciones que permiten aprovechar completamente sus funciones y comodidades.
Tras una compra exitosa de un equipo o un dispositivo, vale la pena dedicar un momento para familiarizarse con cada parte del manual Extreme Networks Summit1. Actualmente se preparan y traducen con dedicación, para que no solo sean comprensibles para los usuarios, sino que también cumplan su función básica de información y ayuda.
Índice de manuales de instrucciones
-
Página 1
Extreme Netw orks, Inc . 10460 Ban dley Drive Cuper tino , C alif ornia 95014 (888 ) 257-3000 http://www .e xtremenetw orks.com Summit Switch Installation and User Guide Published : J une 1 998 Part num ber: 100000-00 r e v .B Summit.bk : FR ONTMTR.FM Page i Thursday, June 18, 1998 9:27 AM[...]
-
Página 2
ii Copyright © Extreme Netw orks, Inc., 1998. All rights reserved. No part of this documentation may be r eproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without permission from Extreme Networks, Inc. Extrem e Networks, ExtremeW are, Summit, SummitLink, Extr emeW are V [...]
-
Página 3
iii Contents Introduction xvii T e rmin ology xviii Conventions xviii Related Publica tions xix 1S UMMIT O VERVIEW About the Sum mit Family of Switches 1-1 Summi t Switc h Models 1-2 Summ ary of Features 1-2 Port Co nnection s 1-3 Medi a T ypes and Distanc es 1-4 Full-Duplex 1- 5 Port Redundancy 1-5 Load Shar ing 1 -6 V irtual LANs (VLANs) 1-6 Span[...]
-
Página 4
iv Summit 48 Fr ont V iew 1-1 5 LEDs 1-16 Summ it Rear V iew 1-17 Power Socket 1-17 Serial Number 1-17 Consol e Port 1 -17 Redundant Power Supply Port 1-17 MAC Addr ess 1-18 Factory Defaults 1-18 2I NSTALLAT ION AND S ETUP Followin g Safety I nformati on 2-1 Determining the Switch Location 2-1 Medi a T yp es and Dista nces 2-2 Instal ling the Su mm[...]
-
Página 5
v Config uring Managem ent Access 3-8 Def ault Acco unts 3-9 Changing the Default Password 3-9 Cr eating a Man agement Accoun t 3-1 0 V i ewing Swit ch Accounts 3-1 0 Deleting a Switch Account 3 -1 1 Methods of Mana ging the Sum mit 3-1 1 Using the Cons ole Interface 3-1 1 Using T elnet 3-12 Connecting to Anoth er Host Using T elnet 3-12 Configurin[...]
-
Página 6
vi 4C ONFIGURING P ORTS Enabling and D isabling Po rts 4-1 Configuring Port Speed and Duplex Setting 4-2 T urning Off Autonegotiation for a Gigabit Ethernet Port 4-2 Port Commands 4-3 Load Shar ing 4-5 Configuring Lo ad Sharing 4-6 V erifying the Load S haring Co nfigurati on 4-8 Port-Mirroring 4-8 Port-Mirroring Comma nds 4-9 Port-Mirroring Exampl[...]
-
Página 7
vii VLAN Names 5-13 Default VLA N 5-14 Configuring VLA Ns on the S ummit 5-14 VLAN Config uration Example s 5-16 Displayin g VLAN Settin gs 5-17 Deleting V L ANs 5 -18 6S WITC H F ORWARDING D ATABASE (FDB) Overview of the FDB 6-1 FDB C ont ent s 6-1 FDB Entry T yp es 6-1 How FDB Entries Get Added 6-2 Associat ing a QoS Profile w ith an FDB Entry 6-[...]
-
Página 8
viii 8Q UALITY OF S ERVICE (Q O S) Overview of Qu ality of Service 8-1 Building Blocks 8-1 QoS Mo de 8-2 Default Q oS Profiles 8-2 T raffic Grouping s 8-3 Ingr ess T raff ic Gr oupings 8-3 Egress T raffic Groupings 8-5 Preceden ce 8-5 Prioritization 8 -6 Creating and Confi guring a Qo S Profile 8-6 Assignin g a QoS Profile 8-6 Port Queue Monitor 8-[...]
-
Página 9
ix Displayin g Router S ettings 9-17 Resetting and Disablin g Router Settin gs 9-18 10 R OUTING P ROTOCOLS Overview 10-1 RIP V ersus OSPF 10-2 Overview of RIP 1 0-3 Routing T able 10-3 Split H orizon 1 0-3 Poison R everse 10-3 T riggered Updates 10-4 Route Advertiseme nt of VLANs 10-4 RIP V ersion 1 versus RIP V e rsion 2 10-4 Overview of OSPF 10-5[...]
-
Página 10
x 11 IP M ULTICAST R OUTI NG Overview 1 1-1 DVMRP Overview 1 1-2 IGMP Overview 1 1-2 IGMP Sn ooping 1 1-2 Configurin g IP Multica sting Rou ting 1 1 -2 Config uration Exampl e 1 1-6 Config uration fo r IR1 1 1-7 Displayin g IP Mul ticast Rou ting Sett ings 1 1- 7 Deleting an d Resetting IP Multi cast Set tings 1 1- 8 12 S TATUS M ONITOR ING AND S T[...]
-
Página 11
xi 13 U SING E XTR EME W ARE V ISTA Enabling and D isabling W eb Access 13-1 Sett ing Up Y our Brows er 13-2 Accessing ExtremeW are V ista 13-3 Navigating ExtremeW ar e V ista 13-3 T ask Fram e 13- 4 Content Frame 1 3-4 Bro wser Contro ls 13-4 Statu s Messages 13 -5 Standalone Buttons 13-5 Saving Cha nges 13-5 Do a GE T When Co nfiguri ng a VLAN 13[...]
-
Página 12
xii CT RO UBLESHOOTING LEDs C-1 Using the Command-Lin e Interface C-2 VLANs C-4 STP C -5 I NDE X I NDE X OF C OMM ANDS Summit.bk : SUMM IT.TOC Page xii Thursday, June 18, 1998 9:27 AM[...]
-
Página 13
xiii Figures 1-1 Dual-h oming configurat ion 1-5 1-2 Network co nfigu ration usin g the Summ it famil y of switches 1-8 1-3 Summit1 fr ont view 1 -10 1-4 Summ it2 front view 1-1 1 1-5 Summit3 fr ont view 1 -12 1-6 Summit4 fr ont view 1 -13 1-7 Summit4/FX fro nt view 1-14 1-8 Summit48 fr ont view 1-15 1-9 Summit r ear view 1-17 2-1 Fitting the mount[...]
-
Página 14
xiv 10-3 V irtual lin k providing redundancy 10-7 10-4 RIP config uration exam ple 10-1 1 10-5 OSPF configurati on example 10-16 11 - 1 IP mu ltica st r outin g conf igurati on examp le 1 1-6 Summit.bk : SUMM IT.LOF Page xiv Thursday, June 18, 1998 9:27 AM[...]
-
Página 15
xv Ta b l e s 1 Notice Icons xviii 2 T ext Conventions xviii 1-1 Summ it Switch P ort Configu ration s 1-3 1-2 Medi a T y pes an d Di stances 1-4 1-3 Summit LEDs 1-16 1-4 Summ it Factor y Defaults 1-18 2-1 Medi a T y pes an d Di stances 2-2 2-2 Console Co nnector Pi n-Outs 2-5 3-1 Command Synt ax Symbols 3-4 3-2 Line-Editing Keys 3-5 3-3 Common Com[...]
-
Página 16
xvi 4-9 Summ it V irtual Chassis Commands 4-1 2 5-1 GVRP Commands 5-10 5-2 VLAN Config uration Comma nds 5-14 5-3 VLAN Delete and Res et Commands 5-18 6-1 FDB Conf igurat ion Comma nds 6-3 6-2 Removing FDB Entry Commands 6-6 7-1 STP Con figuratio n Commands 7-6 7-2 STP Disable and Reset Commands 7-9 8-1 Defau lt QoS Profiles 8-3 8-2 802.1p V alues [...]
-
Página 17
S UMMIT S WITCH I NSTALLATION AND U SER G UID E XVII Pref ace This Prefa ce provides an overview of this guide, descr ibes gui de conventions, and lists other publications that may be useful. I NTRODUCTION This guide provides the requir ed informa tion to insta ll and configure the Summit Family of Gigabit Ethernet Switches. This guide is intended [...]
-
Página 18
XVIII S UMMIT S WITCH I NSTALLATI ON AND U SER G UIDE P REFACE T ERMINOLOG Y When featur es, functionality , or ope ration is specific to a particular model of the Summit family , th e model name is used (for example, Summit1 or Summit4). Explanations about featur es and operations tha t are the sam e among all members of the Summit famil y simply [...]
-
Página 19
S UMMIT S WITCH I NSTALLATION AND U SER G UID E XIX R ELATED P UBLICATIONS The command syntax is explained in Chapter 3 . R ELATED P UBLICATIONS The Summit documentatio n set incl udes the followin g: • Summit Q uick Ref erence Guide • Summit R elease Not es Y ou may f ind the fol lowin g W eb site of inte re st: • Extrem e Networks Home Page[...]
-
Página 20
XX S UMMIT S WITCH I NSTALLATI ON AND U SER G UIDE P REFACE Summit.bk : PR EFACE.FM Page xx Thursday, June 18, 1998 9:27 AM[...]
-
Página 21
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 1-1 1 Summit Ov er vie w This chapter describes the following: • Summit sw itch mo dels • Summ it feat ur es • How to use th e Summit f amily of sw itches in you r network conf iguration • Summ it front view s • Summ it rear view • Summit LEDs • Factory default settings A BOUT THE S UMMI[...]
-
Página 22
1-2 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE S UMMIT O VER VI E W S UMMIT S WITCH M ODELS The Summit family of swi tches is comp rised of six m odels, as follo ws: • Summ it1 • Summ it2 • Summ it3 • Summ it4 • Summ it4/F X • Summ it48 S UMMAR Y OF F E ATURES Summit sw itches support th e followi ng features: • Fully nonb locki[...]
-
Página 23
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 1-3 S UMMARY OF F EATURES • Distan ce V ector Multi cast Routi ng Pr otocol (D VMRP) • Console command line interfa ce (CLI) connection • T elnet CLI connection • Extrem eW are ™ Vi s t a ™ W eb-based management interface • Simp le Netw ork Mana gement Pr oto col (SNM P) sup port P OR T [...]
-
Página 24
1-4 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE S UMMIT O VER VI E W M ED IA T Y PES AND D ISTANCE S Ta b l e 1 - 2 describes the media types and distances for the differ ent types of Summit ports. *E XTREME N ETWORKS PROPRIETAR Y . C AN BE CONNE CTED TO 1000BASE-LX ON SINGLE - MODE FIBER USIN G A MAXIMUM DISTANCE OF 5,000 M ETERS . F or m ore[...]
-
Página 25
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 1-5 S UMMARY OF F EATURES F ULL -D UPLE X The Summit swi tch provides full-duplex support for all po rts. Full-duplex allo ws frames to be transmitted and r eceived simultaneously and, in eff ect, doubles the band width a vai lable on a l ink. A ll 10/ 1 00 Mbps port s on the Sum mit auton egoti ate f[...]
-
Página 26
1-6 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE S UMMIT O VER VI E W L OAD S HARING Load sharin g with Sum mit switches allows th e user to increase bandwidth and resilience between switches by us ing a group of ports to carry traffic in parallel between switches. The sh aring algo rithm allo ws the switch to use multipl e ports as a single lo[...]
-
Página 27
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 1-7 S UMMARY OF F EATURES The Summit supports up to 64 Sp anning T ree Domains (STPDs). F or m ore informati on on STP , refer to Chap ter 7 . Q UALITY OF S ER VICE (Q O S) The Summit has policy-ba sed Quality o f Service (QoS) fea tures that enable you to specify service levels for differ ent traffic[...]
-
Página 28
1-8 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE S UMMIT O VER VI E W N ETWORK C ONFIGURATION E XAMPLE As sh own in Figure 1-2 , the family of Summit switches offe r a unique end-to-end LAN system solution. From the de sktop, to the gigabit core, to the data cen ter/server farm, ther e are Summit switches with an optimized har dware co nfigurat[...]
-
Página 29
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 1-9 N ETWORK C ONFIGURATION E XAMPLE In the gigabi t core of the network, the S ummit1 a nd Summit2 a ct as aggregators o f Gigabit Ethernet links fr om the edge and data center switches, as well as Ethernet and Fast Ethernet links fr om legacy routers and hubs. In the cor e of the network, the Summit[...]
-
Página 30
1-10 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E S UMMIT O VER VI E W S UMMIT 1 F RONT V IE W Figure 1-3 show s the Summ it1 fr ont view . Figure 1-3: Summit1 fron t view The Summit1 has eight Gigabit Ethernet ports. Six of the ports use SC conn ectors and support 1000BASE-S X over multimode fiber -optic cable. Ports 1 and 8 use modular GBIC [...]
-
Página 31
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 1-11 S UMMIT 2 F RONT V IEW S UMMIT 2 F RONT V IE W Figure 1-4 show s the Summ it2 fr ont view . Figure 1-4: Summit2 fro nt view The Summit 2 has 16 autosens ing 10BA SE-T/10 0BASE-TX po rts and two G igabit Ethernet ports, one of which has a r edundant Gigabit Ethernet port. F or infor mation on supp[...]
-
Página 32
1-12 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E S UMMIT O VER VI E W S UMMIT 3 F RONT V IE W Figure 1-5 show s the Summ it3 fr ont view . Figure 1-5: Summit3 fron t view The Summit3 has 24 autosensing 10BAS E-T/100BASE-TX por ts, one Gigabit Ethernet port, and one r edundant G igabit Ethernet port. F or infor mation on suppor ted medi a type[...]
-
Página 33
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 1-13 S UMMIT 4 F RONT V IEW S UMMIT 4 F RONT V IE W Figure 1-6 show s the Summ it4 fr ont view . Figure 1-6: Summit4 fro nt view The Summit4 has 16 autosensing 10BASE-T/100 BASE-TX ports and 6 Gigabit Ethernet ports. The G igabit Ethernet ports use stand ard SC co nnectors and support 1000BASE-SX over[...]
-
Página 34
1-14 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E S UMMIT O VER VI E W S UMMIT 4/FX F RONT V IE W Figure 1-7 show s the Su mmit4 /FX fr ont v iew . Figure 1-7: Summit4/ F X front v iew The Summit 4/FX has 1 6 100BASE-F X ports and 6 Gi gabit Ethernet po rts. All port s use standar d SC connectors. The Gigabit Ethern et ports support 1000BASE-S[...]
-
Página 35
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 1-15 S UMMIT 48 F RONT V IEW S UMMIT 48 F RONT V IE W Figure 1-8 show s the Summ it48 fr o nt view . Figure 1-8: Summit48 front view The Summit48 has 48 autosensing 10BASE-T/ 100BASE-TX ports, 2 Gigabit Ethernet ports, and 2 r edundant Gigabit Ethernet ports. All the Gigabit Ethernet po rts use GBIC c[...]
-
Página 36
1-16 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E S UMMIT O VER VI E W LED S Ta b l e 1 - 3 describes the light emitting diode (LED) behavior on the Summit. Ta b l e 1 - 3 : Summit LEDs LED Color Indicates Power Green Yellow Th e Summit is po wered up. The Summ it is indicating a power, overh eat, or fan failu re. MGMT Green flas hing ■ Slow[...]
-
Página 37
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 1-17 S UMMIT R EAR V IEW S UMMIT R EAR V IEW Figure 1-9 shows the r ear view for the Summit switch. Figure 1-9: Summit r ear view P OWE R S OC KET The Summit autom atically adjusts to the s upply voltage. The pow er supply operates down to 90 V . Th e fus e is su itable f or bo th 1 1 0 V A C and 22 0[...]
-
Página 38
1-18 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E S UMMIT O VER VI E W In addition, when co nnected to a Sum mit RPS or Summit V irtual Chas sis, the Summ it switch can pr ovide status on power and fan o peration of the RPS thr ough SNMP , the command-line interface, a nd the W eb interface (power supply status only). The Summit RPS and Summit[...]
-
Página 39
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 1-19 F ACTOR Y D EFAU LTS RIP Disa bled for the switc h; enabled on each VLAN config ured with an IP a ddress. OSPF Disa bled for the switc h; enabled fo r each VLAN config ured with an IP a ddress. All VLANs belong to the backb one area. IP mul ticast rou ting Disabled. DVMRP Disa bled for the switc [...]
-
Página 40
1-20 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E S UMMIT O VER VI E W Summit.bk : 1OVRVW.FM Page 20 Thursday, J une 18, 1998 9:27 AM[...]
-
Página 41
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 2-1 2 Installation and Setup This chapter describes the following: • How to decide wher e to install the Summit • Gigabit Ethernet conf iguration rules • How to ins tall th e switch in a rack or f ree-standing • How to connect eq uipment to the cons ole port • How to check the in stallation [...]
-
Página 42
2-2 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE I NSTAL LATIO N AND S ETUP When deciding where to install the switch, ensure that: • The switch is access ible and cables can be co nnected easily . • W ater or moistur e cannot enter the case of the unit. • Air-flow ar ound the un it and through the vents in the si de of the case is no t r[...]
-
Página 43
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 2-3 I NSTA LLING THE S UMMIT F or m ore informati on on 10 00BASE- SX and 10 00BASE -LX link c haracter istics, refer to IEEE Draft P802 .3z/D4.2, T able 38-2 and T ab le 38 -6. I NSTALLING THE S UMMIT The Summit can be mounted in a rack, or placed fr ee-standing on a tabletop. R ACK M OUNTIN G The sw[...]
-
Página 44
2-4 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE I NSTAL LATIO N AND S ETUP 5 Repeat the thr ee previous steps for the o ther side of the switch. 6 Insert the switch into the 19 -inch rack and secure with suitable s crews (not pro vided). Ensure that ventilation holes are no t obstructed. 7 Connect the Summ it to the redundant power su pply (if[...]
-
Página 45
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 2-5 C ONNECTING E QUIP MENT TO THE C ONSOLE P OR T Appro priate cables are avai lable from your local supplier . In order to make your own cables, pin-outs for a DB-9 male con sole connector ar e described in Ta b l e 2 - 2 . Figure 2-2 shows the pin-outs for a 9 -pin to RS-232 25-pin null-modem ca bl[...]
-
Página 46
2-6 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE I NSTAL LATIO N AND S ETUP P OWE R I N G O N THE S WITCH T o turn on power to the switch, connect the AC power cable to the switch and then to the wall ou tlet, and turn the o n/off switch to the on posi tion. C HEC KING THE I NSTALLAT ION After turning on power to the Summit, the device performs[...]
-
Página 47
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 2-7 L OGGING I N FOR TH E F IRST T IME 4 At the password prompt, pr ess [Return]. The default name, admin, has no password assigned. When you have successfully logged on to t he switch, the co mmand-l ine prompt displays the nam e of the swi tch (for example, Su mmit1 ) in its prompt. 5 Assign an IP a[...]
-
Página 48
2-8 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE I NSTAL LATIO N AND S ETUP Summit.bk : 2INSTALL.FM Page 8 Thursday , June 18, 1998 9:27 AM[...]
-
Página 49
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 3-1 3 Accessing The Switch This chapter provides the follo wing required information to begi n managin g the Summ it: • Understanding the comman d syntax • Line-editing commands • Command hist ory substi tution • Configuring th e switch fo r managem ent • Switch ma nagement m ethod s • Con[...]
-
Página 50
3-2 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE A CCESSING T HE S WITCH U NDERSTANDING THE C OMMAND S YNTAX This section describes the steps to take when entering a command. Refer to the sections that follow for detailed information on using the command-line interface. T o use the command-line interface, follow these steps: 1 When entering a c[...]
-
Página 51
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 3-3 U NDERSTANDING THE C OMMAND S YNTA X A BBREVIATED S YNTAX Abbreviated syntax is th e shortest, most unambiguo us, allowa ble abbreviation of a command, parameter , or value. T ypically , this is the first thre e letters of the command. C OMMAND S HOR TCUTS All nam ed comp onents of the sw itch con[...]
-
Página 52
3-4 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE A CCESSING T HE S WITCH S YMBOL S Y ou may see a variety of symbols shown as part of the command syntax. These symbols explain how to enter the command, and you do no t type them as part of the command itself. Ta b l e 3 - 1 summariz es comman d syntax sym bols. Ta b l e 3 - 1 : Command Synt ax S[...]
-
Página 53
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 3-5 L INE -E DITING K EYS L INE -E DITING K EY S Ta b l e 3 - 2 describ es the line-editing keys available using the command-line interface. C OMMAND H ISTOR Y The Summit “r emembers” the last 49 commands you enter . Y o u can display a list of these commands by using the following command: histor[...]
-
Página 54
3-6 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE A CCESSING T HE S WITCH C OMM ON C OMMANDS Ta b l e 3 - 3 describes common commands used to manage the switch. Commands specific to a particular featur e are describe d in the other chapters of this guide. Ta b l e 3 - 3 : Common Comm ands Comm and Description crea te account [ad min | user] <[...]
-
Página 55
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 3-7 C OMMON C OMMANDS config t ime <date> <time> Config ures the sys tem date an d time. The format is as follows: mm/dd/yyyy hh:mm:ss The time uses a 24-hour c lock format. You cannot s et the yea r past 2023. config v lan <nam e> ipaddress <ip_address> {<ma sk>} Config [...]
-
Página 56
3-8 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE A CCESSING T HE S WITCH C ONFIGU R ING M ANAGEMENT A CCESS The Summit supports the follo wing two l evel levels of ma nagement: • User • Administrato r A user -level account has viewing access to all manageable parameters, with the exception of th e following: • User account databa se • S[...]
-
Página 57
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 3-9 C ONFIGUR ING M ANAGEMEN T A CCESS D EFAULT A CCOUNT S By default, the switch is configured w ith two accounts, as shown in Ta b l e 3 - 4 . C HANGING THE D EFAULT P ASSW ORD Default accoun ts do not have pa sswords assigned to t hem. Passwo rds must have a minimu m of 4 char acters and can h ave [...]
-
Página 58
3-10 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E A CCESSING T HE S WITCH 5 Re-enter the n ew password at the pr ompt. If you f orget your password while logge d out of th e command -line in terface , contac t your local te chnical suppor t represe ntative , who wi ll advise on your ne xt cour se of act ion. C REATI NG A M ANAGEMENT A CCOU NT [...]
-
Página 59
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 3-11 M ETHODS OF M ANAGING THE S UMM IT D ELETIN G A S WITCH A CCOUNT T o delete a switch account, you must have administrator privileges. Use the following command to delete an acco unt: delete account <username> M ETHODS OF M ANAGING THE S UMMIT Y ou can ma nage the Summ it using th e followin[...]
-
Página 60
3-12 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E A CCESSING T HE S WITCH U SING T ELNET Any works tation wi th a T elnet fa cility shou ld be able to co mmunic ate with the s witch over a TCP/ IP networ k. Up to eight a ctive T eln et sessions can a ccess the switch concurrently . The T elnet connection will time out af ter twenty minu tes of[...]
-
Página 61
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 3-13 U SING T ELNET The switch MAC address is found on th e rear label of the switch. Once this is done, the IP addr ess and subnetwork m ask for the switch will be downloaded automatically . Y ou can then start managing the switch without further configuration. Y ou can ena ble BOOTP on a per-VLAN ba[...]
-
Página 62
3-14 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E A CCESSING T HE S WITCH T o manually co nfigure the IP settings, perform th e following s teps: 1 Connect a terminal or workstation r unning terminal emulation software to th e console port. 2 At your terminal, press [Return] on e or more times until yo u see the login prompt. 3 At the login pr[...]
-
Página 63
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 3-15 U SING T ELNET 8 When you are finished using the faci lity , lo g out of the switch by typing logout D ISCONNEC TING A T EL NE T S ESSION The admin istrator-level a ccount ca n disconn ect a ma nageme nt sessio n that ha s been established by way of a T elnet co nnection. If this happens, the use[...]
-
Página 64
3-16 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E A CCESSING T HE S WITCH IP H OST C ONFIGURATION C OMMANDS Ta b l e 3 - 5 describes the commands that are used to configur e IP settings on the swi tch. Ta b l e 3 - 5 : IP Host Configu ration Com mands Comm and Description config iparp add <i paddress > <mac_addres s> Adds a pe rman[...]
-
Página 65
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 3-17 U SING E XTREME W ARE V ISTA U SING E XTREME W ARE V ISTA Extrem eW are ™ Vi s t a ™ is device-management software running in t he Summit that enables yo u to access th e switch o ver a TCP/IP netwo rk, using a standard W eb browser . Any pro perly configured standar d W eb br owser that supp[...]
-
Página 66
3-18 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E A CCESSING T HE S WITCH U SING SNMP Any Network Manager running the Simple Network Ma nagement Protocol (SNMP) can manage the switch, pr ovided the Management Information Base (MIB) is installed corr ectly on the management station. Each Network Manager pr ovides its own user interface to the m[...]
-
Página 67
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 3-19 U SING SNM P The IEEE Bri dge MIB dot1dTpP or tEntr y P or tInDiscards and d ot1dBa seP or tEntr y counter s are no t incr emented . C ONFIGURIN G SNMP S ETTINGS The following SNMP parameters can be configur ed on the switch: • Autho rized tra p receivers — An authorize d trap r eceiv er can [...]
-
Página 68
3-20 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E A CCESSING T HE S WITCH Ta b l e 3 - 7 describes SNMP configuration comma nds. Ta b l e 3 - 7 : SNMP Confi guration Com mands Comm and Description enabl e snmp acce ss Turns on SNMP support fo r the switch. enable s nmp trap Turns on SNMP trap supp ort. config snmp add <ipa ddress> {<m[...]
-
Página 69
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 3-21 U SING SNM P D ISPLAYING SNMP S ETTINGS T o display the SNMP s ettings conf igured on the Summit, en ter the followin g command : show management This comma nd displays the f ollowing informatio n: • Enable/disable state for telnet, SNMP , and W eb access • SNMP commu nity strings • Authori[...]
-
Página 70
3-22 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E A CCESSING T HE S WITCH C HEC KING B ASIC C ONNECTIVITY The Summit offers th e following two commands for checking basic connectivity: • ping • traceroute • mtrace P ING The ping command enables you to send Internet Control Message Pr otocol (ICMP) echo messages to a remote IP device. The[...]
-
Página 71
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 3-23 C HECKING B ASIC C ONNECTIVITY M TRACE The mtrace commands displays the multic ast path from a source to a receiver . The mtrace command syntax is mtrace <group> <source> {<ttl>} where the following is true: • group — Is the IP multicast group addr ess. • source —Is t he[...]
-
Página 72
3-24 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E A CCESSING T HE S WITCH Summit.bk : 3MGMT.FM Page 24 Thursday, June 18, 1998 9:27 AM[...]
-
Página 73
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 4-1 4 Configur ing P or ts Ports on the S ummit sw itch can be con figured in the following wa ys: • Enabling and disabling individual ports • Configuring the port speed (Fast Ethern et ports only) • Conf igur ing ha lf- o r full -dupl ex mod e • Creating load-sharin g groups on multiple po rt[...]
-
Página 74
4-2 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE C ONFIGUR ING P OR TS C ONFIGURING P OR T S PEED AND D UPLE X S ETTING By default, the Summit is configur ed to use autonegotiation to determine the port speed and duplex setting for each port. Y ou can select to manually configur e the duplex setting and the speed of 10/1 00 Mbps ports, and yo u[...]
-
Página 75
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 4-3 P OR T C OMMANDS P OR T C OMMANDS Ta b l e 4 - 1 describ es the port commands. Ta b l e 4 - 1 : P or t Command s Comm and Description enable l earning po rt <portlist> Enables MAC address lea rning on on e or more ports. The default setti ng is enabled . enable p ort <portlis t> Enable[...]
-
Página 76
4-4 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE C ONFIGUR ING P OR TS disabl e smartred undancy <port list> Disab les the smar t redundanc y feature. If the featur e is disable d, the switc h changes the active link only when the cu rrent active li nk beco mes inopera ble. show port {<portlis t>} collis ions Displ ays real-tim e co[...]
-
Página 77
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 4-5 L OAD S HAR ING L OAD S HAR ING Load sharin g with Sum mit switches allows yo u to increase bandwidth and resilience between switches by using a gro up of ports to carry traff ic in parallel b etween switches. The sharin g algo rithm a llows the sw itch t o use mu ltipl e port s as a si ngle l ogi[...]
-
Página 78
4-6 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE C ONFIGUR ING P OR TS C ONFIGURIN G L OAD S HA RING T o set up the Sum mit to load sha re among ports, you must create a load-sharing g roup of ports. Load-sharing gr oups are def ined according to th e following rules: • Ports on the switch are divided into gr oups of two or four . • Ports i[...]
-
Página 79
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 4-7 L OAD S HAR ING T o define a lo ad-sharing g roup, you assign a group of ports to a single, logi cal port number . T o enable or disable a load-sharing group, use the following commands: enable sharing <master_port> grouping <portlist> disable sharing <master_port> The following [...]
-
Página 80
4-8 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE C ONFIGUR ING P OR TS Whe n using lo ad shar ing , you should alwa ys reference the m aster log ical por t of the load- shar ing group (por t 9 in the previous e xampl e) when co nfigur ing o r viewing VLAN s. VLAN s configu red to u se other p or ts in the loa d-shar ing gro up will hav e thos e[...]
-
Página 81
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 4-9 P OR T -M IRRO R ING P OR T -M IRRORING C OMMANDS Port-mirro ring commands are described in Ta b l e 4 - 7 . P OR T -M IRRORING E XAMPLE The following example selects port 3 as the mirro r port, and sends all traffic com ing into or out of the switch on port 1 to the mirr or port: enable mirroring[...]
-
Página 82
4-10 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E C ONFIGUR ING P OR TS S UMMIT V IR TUAL C HASSIS The Summit V irtual Chassis is an ultra-high performance, low-cost externa l backplane that connects up to eight stacked o r distributed Summ it switches in to one cohesive system. Features of the Summit V irtual Chassis include the fo llowing: ?[...]
-
Página 83
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 4-11 S UMMIT V IR TU AL C HASSIS E XTREME D ISCO VERY P RO T O C O L The Extr eme Discovery Protocol (EDP) is used to locate neighbor Extreme Networks switches conn ected to the Summit V irtual Chassi s. When running on a no rmal switch port, EDP is used to by the Summi t switches to exch ange topolo [...]
-
Página 84
4-12 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E C ONFIGUR ING P OR TS S UMMIT V IR TUAL C HASSIS C OMMANDS Ta b l e 4 - 9 lists comm ands that are used on the Summit sw itch to conn ect it to a S ummit V irtual Chassi s. C ONFIGURIN G THE S UMMIT FO R U SE R WITH THE S UM MIT V IR TU AL C HASSIS Y ou must configur e the Summit swit ch port(s[...]
-
Página 85
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 4-13 S UMMIT V IR TU AL C HASSIS VLAN S AND S UMMIT S WITCHES U SING THE V IR TUAL C HASS IS Summit sw itches exchang e informatio n using EDP across V irtua l Chassis links. The informatio n exchanged al lows th e switches t o automatica lly jo in VLANs . A VLAN i s automatically joined between Summi[...]
-
Página 86
4-14 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E C ONFIGUR ING P OR TS Summit.bk : 4POR TS.FM Page 14 Thursday, June 18, 1998 9:27 AM[...]
-
Página 87
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 5-1 5 Vir tual LANs (VLANs) Setting up V irtual Local Area Networks (VLANs ) on the Summit ea ses many time-cons uming task s of networ k administ ration whi le increasing efficiency in network operations. This chapter describes the concept of VLANs and explains how to implement VLANs on the Su mmit .[...]
-
Página 88
5-2 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE V IR TUA L LA N S (VLAN S ) • VLANs provide extra se curity . Devices within each VLAN can only communicate with member devices in th e same VLAN. If a device in VLAN Market ing must communicate with devices in VLAN Sales , the traffic must cr oss a routing device. • VLANs ease the cha nge an[...]
-
Página 89
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 5-3 T YPES OF VL AN S For example, in Figure 5-1 , ports 1 , 2, and 5 ar e part of VLAN Ma rketing ; ports 3, 4, and 6 ar e part of VLAN Sales ; and ports 7 and 8 ar e in VLAN Fin ance . Figure 5-1: Example of a por t-based VLA N Even though they a re physically connected to the sa me switch, for the [...]
-
Página 90
5-4 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE V IR TUA L LA N S (VLAN S ) Figure 5-2 illustrates a single VLA N that spa ns two sw itches. All po rts on both switches belong to VLAN Sales . The two switches are con nected using port 2 on Switch 1, a nd port 6 on Swi tch 2. Figure 5-2: Single po r t-based VLAN spanni ng two switches In a port[...]
-
Página 91
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 5-5 T YPES OF VL AN S Figure 5-3 illust rates two VLANs spanning tw o sw itches. On Switch 1 , ports 1-4 are part of VLAN Accoun ting ; ports 5 - 8 ar e part of VLAN Engineering . O n Sw itch 2, po rts 1 -4 ar e part of VLAN Acc ount ing ; po rts 5 - 8 are part of VLAN Engineering . VLAN Accounting sp[...]
-
Página 92
5-6 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE V IR TUA L LA N S (VLAN S ) U SES OF T AGG E D VLAN S T agging is most com monly used to create VLANs that spa n switches. The switch-to-switch connections are typically called trunks . Using tags, multi ple VLANs can span multi ple switch es using one or more trunks. In a port-bas ed VLAN, each [...]
-
Página 93
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 5-7 T YPES OF VL AN S Figure 5-4 illustrates th e physica l view of a netwo rk that uses tagged an d untagged traffic. Figure 5-4: Physical diagram of tagged and untagge d traffic Figure 5-5 shows a logi cal diag ram of th e same network. Figure 5-5: Logical diagram of tagged and untag ged traffic Swi[...]
-
Página 94
5-8 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE V IR TUA L LA N S (VLAN S ) In Figur e 5-4 and Figure 5-5 : • The trunk port on each switch carries traf fic for both VLAN Market ing an d VLA N Sales . • The trunk port on each sw itch is tagged. • The server connected to por t 1 on Switch 1 has a NIC that supports 802.1Q tagging. • The [...]
-
Página 95
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 5-9 T YPES OF VL AN S Figure 5-6 illustrates a network usin g GVRP . Figure 5-6: Network example using GV RP In Figure 5-6, Switch A is a m ember of VLAN Red . VLAN Red has th e VLANid 10. Po rt 1 and port 2 on S witch A are added to the VLAN as untagged. The configu ration for Sw itch A is a s follow[...]
-
Página 96
5-10 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E V IR TUA L LA N S (VLAN S ) VLANs that are automatically created using GV RP with the V L ANi d 10 are given names in th e follow ing format : gvrp vlan x xxx where xxxx is the VLANid (in decimal) that is discover ed by GVRP . These VLANs are not permanently stor ed in NVRAM, and you cannot add[...]
-
Página 97
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 5-11 T YPES OF VLA N S P RO T O C O L -B ASED VLAN S Proto col-based VLANs enable you to define a packet filter that the Summit uses as the matching criteria to determine if a particular packet belongs to a particular VLAN. Protocol-based VLANs are most often used in situation s where network segments[...]
-
Página 98
5-12 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E V IR TUA L LA N S (VLAN S ) P REDEFINED P ROT O C O L F ILTERS The following pr otocol filters are pr edefined on the Summit: • IP • IPX • NetBIOS • DECNet • IPX_ 8022 • IPX_SNAP • App leT alk D EFIN ING P ROT O C O L F ILTERS If necessary , you can define a customized pr otocol f[...]
-
Página 99
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 5-13 VLAN N AMES — snap — Ethertype inside an IEEE SNAP packet encapsulation. The values for snap ar e the same as the values for etype , described pr eviously . config protocol fred add llc feff config protocol fred add snap 9999 A maxi mum of sev en pr otocol filters, each con taining a maximum [...]
-
Página 100
5-14 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E V IR TUA L LA N S (VLAN S ) VLAN names are locally significa nt. That is, VLAN na mes used on o ne switch are only meaningful t o that swi tch. If another sw itch is conn ected to it, t he VLAN names ha ve no significa nce to the oth er switch. The exception t o this is wh en a switch is connec[...]
-
Página 101
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 5-15 C ONFIGURI NG VLAN S ON THE S UMM IT enabl e ig nore -st p vlan <na me> Enables a VLAN from using ST P port infor mat ion. Whe n ena ble d, all vir tual por ts associat ed with the VLAN are in STP forward ing mode. The d efault setting is disabl ed. config d ot1p ethert ype <ethertype &g[...]
-
Página 102
5-16 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E V IR TUA L LA N S (VLAN S ) VLAN C ONFIGURA TION E XAMPLES The following example cr eates a port-based VLAN named accounting , as signs the IP address 132.15.121 .1, and assig ns ports 1, 2 , 3, and 6 to i t: create vlan accounting config accounting ipaddress 132.15.121.1 config default delete [...]
-
Página 103
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 5-17 D ISPLAYING VLAN S ETTINGS D ISPLA YING VLAN S ETTINGS T o display VLAN settings , use the follo wing comm and: show vlan { <name> | all} Sample ou tput from this comm and is as f ollows: show vlan a ll VLAN Interface [1-fde] with name “net142” created by user Tagging: Untagged (Interna[...]
-
Página 104
5-18 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E V IR TUA L LA N S (VLAN S ) • T agged/untagged status for each port • How the ports w ere added to the VLAN (manually or by GVR P) T o display protocol informatio n, use the follow ing com mand: show protocol {<protocol> | all} This show com mand displays protocol inf ormation , inclu[...]
-
Página 105
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 6-1 6 Switch F orwarding Database (FDB) This chapter describes the contents of the switch forwar ding database (FDB), how the FDB works, and how to configur e the FDB. O VE R V I EW OF THE FD B The Summ it maintains a database of all media access control (MA C) addresses received on all of its ports. [...]
-
Página 106
6-2 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE S WITC H F ORWARDING D ATABASE (FDB) switch is reset or a po wer off/on cycle occurs. For mo re information about setting the aging time, refer to the sectio n “Configuring FDB Entries ,” later in this chapter . • Non-aging entr ies — If the aging time is set to zero, all a ging entries i[...]
-
Página 107
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 6-3 C ONFI GURING FDB E NTRIES A SSOCIATING A Q O S P ROFILE WITH AN FDB E NTR Y Y ou can associate a QoS pr ofile with a M AC address (and VLAN) o f a device that will be dynamically learned. The FDB tr eats the entry like a dynamic entry (it is learned, it can be aged out of the databa se, and so on[...]
-
Página 108
6-4 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE S WITC H F ORWARDING D ATABASE (FDB) FDB C ONFIGURATIO N E XAMPLES This example adds a permanent entry to the FDB: create fdbentry 00:E0:2B:12:34:56 vlan marketing port 4 The permanent entry has the following characteristics: • MAC addr ess is 00 E02B123456 . • VLAN name is market ing . • P[...]
-
Página 109
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 6-5 D ISPLAYING FDB E NT RIES D ISPLA YING FDB E NTRIES T o display FDB entries, use the co mmand show fdb {all | <mac_address> | vlan <name> | <portlist> | permanent | qos} where the following is true: • all — Displays all FDB entries. • mac_address — Displays the entry for [...]
-
Página 110
6-6 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE S WITC H F ORWARDING D ATABASE (FDB) • Entry method (shown in the field labeled Flags ): s — Static entry configur ed by the user d — Dynamic entry learned by the switch m — MAC addr ess entry i — MAC addr ess entry that is u sed for IP r outing • Port • Hash and P T AG entries (use[...]
-
Página 111
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 7-1 7 Spanning T ree Protocol (STP) Using the S panning T ree Pr otocol (STP) functionalit y of the Su mmit mak es your network more fault tolerant. The following sections explain mor e about STP and the STP featur es supported by the switch. STP is a par t of the 802.1D brid ge speci fication defined[...]
-
Página 112
7-2 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE S PANNI NG T REE P ROTOCOL (STP) A port can belong to on ly one STPD. If a port is a member of multiple VLANs, then all those VLANs must belong to the same ST PD. The key points to reme mber when configuring VLANs and STP are the following: • Each VLAN forms an inde pendent broad cast domain. ?[...]
-
Página 113
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 7-3 STP C ONFIGURATIONS T wo STPDs ar e defined: • STPD 1 contains VLANs Sales and Personnel. • STPD 2 contains VLANs Manufactur ing and Engineerin g. The VLAN Mark eting is a member of the default STPD, but not assigned to either STPD 1 or STPD2. Figure 7-1: Multiple Spanning T ree Do mains When [...]
-
Página 114
7-4 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE S PANNI NG T REE P ROTOCOL (STP) W ithin a single S TPD, you mus t be extra careful when con figuring your VLAN s. Figure 7-2 illustrates a network tha t has been inco rrectly set up using a sing le STPD s o that the STP configuration disables the ability of the switches to forward VLAN traf fic.[...]
-
Página 115
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 7-5 C ONFIGURI NG STP ON THE S UMMIT C ONFIGUR ING STP ON THE S UMMIT STP confi guration in volves th e followin g actions: • Create one or more STP domains u sing the fo llowing comm and: create stpd <stpd_name> STPD , VLAN, and QoS prof ile nam es must all b e uniqu e. F or e xamp le, a name[...]
-
Página 116
7-6 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE S PANNI NG T REE P ROTOCOL (STP) Ta b l e 7 - 1 shows the commands used to conf igure STP . Ta b l e 7 - 1 : STP Config uration Commands Comm and Description crea te stpd <stpd_ name> Creates an STPD. When crea ted, an STPD has the follo wing defaul t parameters: ■ Bridge pri ority — 32[...]
-
Página 117
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 7-7 C ONFIGURI NG STP ON THE S UMMIT C ONFIGURA TION E XAMPLE The following example cr eates and enables an STPD named Backbone_st . It assigns the Manufac turing VLAN to the STPD. It disables STP on ports 1 through 7, and port 12. create stpd backbone_st config stpd backbone_st add vlan manufacturing[...]
-
Página 118
7-8 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE S PANNI NG T REE P ROTOCOL (STP) D ISPLA YING STP S ETTINGS T o display STP settings for a ll ports, use the followi ng comma nd: show stpd { <stpd_name> | all} This comma nd displays the f ollowing informatio n: • STPD nam e • Bridge ID • STPD conf iguration inform ation Sample outpu[...]
-
Página 119
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 7-9 D ISABLING AN D R ESETTING ST P D ISABLING AND R ESETTING STP T o disable STP or return S TP settings to their defaults, use the commands listed in Ta b l e 7 - 2 . Ta b l e 7 - 2 : STP Disable and Res et Commands Comm and Description delete s tpd <stpd_ name> Removes an STPD. An STPD can on[...]
-
Página 120
7-10 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E S PANNI NG T REE P ROTOCOL (STP) Summit.bk : 7STP.FM P age 10 Thursday, June 18, 1998 9:27 AM[...]
-
Página 121
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 8-1 8 Quality of Ser v ice (QoS) This chapter describes the concept of Quality of Service (QoS) a nd explains how to implement QoS on the Summit. O VE R V I EW OF Q UALITY OF S ER VICE QoS is a featur e of the Summit that allows you to specify diff erent service levels for outboun d traffic. Q oS is a[...]
-
Página 122
8-2 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE Q UALIT Y OF S ERVICE (Q O S) QoS pro files are assigned to traffic classifications, independent of the QoS mode chosen, in or der to modify switch forwarding behavio r . Q O S M ODE Ther e are two modes of Q oS. Ingress mode, the def ault, can use a wide variety of traf fic classificatio ns, but[...]
-
Página 123
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 8-3 B UILDI NG B LOCKS — Medium — High A QoS profile d oes not alte r the behavior of the s witc h until it i s assigned to a tr affic cl assif ication . The details of the defa ult profiles are shown in T able 8-1. Y ou can modify the minimum and maximum bandwidth parameters of the default QoS pr[...]
-
Página 124
8-4 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE Q UALIT Y OF S ERVICE (Q O S) • Destination MAC addr ess — When making a permanent FDB entry , y ou can pr ovide a QoS pr ofile. Y ou can also pr ovide a QoS pr ofile that will be bound to a dynam ic FDB entry when the MA C address is learn ed. This is configured using the following command: [...]
-
Página 125
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 8-5 B UILDI NG B LOCKS E GRESS T R AFFIC G ROU PIN GS Egress traffic gr oupings include the follow ing: • IP destination addre ss — A specific QoS profile can be associated with an IP destination addr ess, or range of IP destina tion addresses specified using a subnet mask. The QoS parameters ar e[...]
-
Página 126
8-6 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE Q UALIT Y OF S ERVICE (Q O S) P RIORITIZ ATION Prioritizat ion is used wh en there is bandwidth contentio n for tran smissi on on a po rt. The four levels of priority ar e used as a mechanism for reso lving the contention between traffic gr oups. If traffic gr oups have the same priority , a “r[...]
-
Página 127
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 8-7 P OR T Q UEUE M ONITOR Y ou can a ssign a Qo S profile to an IP address by using the following command: config ipqos [add | delete] <ip_destination_address> qosprof ile <qosname> P OR T Q UEUE M ONITOR Ther e are four queues per physical port in the Summit. In ingr ess mode, the four Q[...]
-
Página 128
8-8 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE Q UALIT Y OF S ERVICE (Q O S) C ONFIGURING Q O S Ta b l e 8 - 4 describes the commands used to configure QoS. Ta b l e 8 - 4 : QoS Confi guration Commands Comm and Description enable p ace Enables recogn ition of the PAC E bit. Avail abl e in ingr ess m ode , only . crea te qosprofile < qosnam[...]
-
Página 129
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 8-9 C ONFI GURING Q O S S AMPLE I NGR ESS M OD E Q O S C ONFIG URATION The following ingr ess mode example modifies an existing QoS pr ofile and applies it to a VLAN traf fic grouping. The priority parameter , although requir ed, is ignor ed when configuring a default QoS profile in ing ress mode. con[...]
-
Página 130
8-10 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E Q UALIT Y OF S ERVICE (Q O S) D ISPLA Y ING Q O S I NF OR MATION T o display QoS information on the switch, use the following command: show qosprofile {<qosname> | all} Information displayed includes: • QoS profile nam e • Min imum ba ndwid th • Maxi mum ba ndwidt h • Priority •[...]
-
Página 131
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 9-1 9 IP Unicast Routing This chapter describes how to configur e IP routing on the Summit. It assumes that you are already familiar with IP unicast routing. If not, refer to the followin g public ations for add itional inf ormation: RFC 10 58 — Routing Information Protocol RFC 12 56 — ICMP Ro ute[...]
-
Página 132
9-2 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE IP U NICAST R OUTING R OUTER I NTERFACES The r outing software and har dware r outes IP traffic between r outer interfaces. A r outer interface is s imply a VLAN that has an IP address assigned to it. As you create VLAN s with IP addresses belongi ng to different IP subnets, you can also choose t[...]
-
Página 133
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 9-3 O VE R VI E W OF IP U NICAST R OUTING P OPULA TING THE R OUTING T ABLE The Summit ma intains an IP r outing table for both network routes and host r outes. The table is popula ted from the followin g sources: • Dynamically , by wa y of routing protocol packet s or ICMP redirects exchanged with o[...]
-
Página 134
9-4 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE IP U NICAST R OUTING A static route must be as sociated with a valid IP su bnet. An IP subnet is a ssociated with a single VLAN by its IP addr ess and subnet m ask. If the VLAN is subsequently deleted, the static route e ntries u sing that subnet must be deleted manually . M ULTIPL E R OUT ES Whe[...]
-
Página 135
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 9-5 O VE R VI E W OF IP U NICAST R OUTING Once configur ed, the Summit r esponds to ARP Requests on behalf of the device as long as the fol lowing con ditions are satisfied: • The valid IP ARP Request is received on a Summit r outer interface. • The tar get IP address matches the IP ad dress confi[...]
-
Página 136
9-6 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE IP U NICAST R OUTING The following rules apply wh en you are configuring IP multinet ting: • A maximum of one IP addr ess is associated with a router interface ( or VLAN). • Multiple VLANs must be us ed to implem ent IP multin etting. • A maximum of four subnets ar e allowed on one multinet[...]
-
Página 137
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 9-7 O VE R VI E W OF IP U NICAST R OUTING 8 Assign th e subnet to a physi cal port. config net21 add port 2 config net22 add port 2 9 Enable IP forwar ding on the subnets. enable ipforwarding 10 Enable IP multi netting. enable multinetting 11 If you are using RI P , disable RIP on th e dummy VLANs. co[...]
-
Página 138
9-8 S UMMIT S WIT CH I NSTALLA TION AND U SER G UIDE IP U NICAST R OUTING The following example conf igures the switch to have one multin etted segment (p ort 5) that con tains thr ee subnets (1 92.67.34.0, 1 92.67.35.0 , and 192.67.3 7.0). It also configur es a second multinetted segment consisting of two subnets (192.67.36.0 and 192.99.45.0) . Th[...]
-
Página 139
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 9-9 C ONFIGUR ING IP U NICAST R OUTING C ONFIGURING IP U NICAST R OUT IN G This section descri bes the commands ass ociated with config uring IP unica st routing on the Summit. Con figuring routing involv es the fo llowing steps : • V erify the switch op erating m ode is set to iprouting by using th[...]
-
Página 140
9-10 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E IP U NICAST R OUTING V ERIFYING TH E IP U NICAS T R OUTIN G C ONFIGU RATION Use the show iproute command to display the current configuration of IP un icast ro uting for the switch, and for each VLAN. The show iproute command di splays the curren tly configured r outes, and includes how each ro[...]
-
Página 141
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 9-11 C ONFIGUR ING DHCP/BOOTP R ELA Y V ERIFYING THE DHCP/BOO TP R ELAY C ONFIG URATION T o verify the DHCP/BOOTP rela y configuration, use the following command: show ipconfig This command displays the configuration of the BOOTP r elay service, and the addr esses that are curr ently configured. Ta b [...]
-
Página 142
9-12 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E IP U NICAST R OUTING disabl e bootp vl an [<name> | al l] Disable s the gene ration and proc essing of BOOTP pa ckets. confi g ip arp a dd p roxy < ipa ddre ss> { <m ask>} {<mac_address>} {a lways} Config ures proxy ARP en tries. Up to 64 prox y ARP entries can be config[...]
-
Página 143
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 9-13 C ONFIGUR ING DHCP/BOOTP R ELA Y Ta b l e 9 - 2 describ es the commands used to configure the IP r oute table. Ta b l e 9 - 2 : Route T a b le Con figuration Co mmands Comm and Description enable i proute sharing Enables load sharing i f multiple rou tes to the same de sti nati on are ava ilab le[...]
-
Página 144
9-14 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E IP U NICAST R OUTING Ta b l e 9 - 3 describes the commands used to configure the ICMP protoco l. Ta b l e 9 - 3 : ICMP Config uration Commands Comm and Description enabl e ic mp r edire cts {vl an <n ame> | al l} Enabl es generation of ICM P redirect messag es on one or m ore VLANs. The d[...]
-
Página 145
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 9-15 R OUTING C ONFIGURATION E XAMPLE R OUTING C ONFIGUR ATION E XAMPLE Figure 9-2 illustrates a switch that ha s three VLANs defined as follows: • Finance — Protocol-sensitive VLAN u sing the IP protocol — Ports 1 and 3 have been assigned — IP addr ess 192.20 7.35.1 • Personne l — Protoco[...]
-
Página 146
9-16 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E IP U NICAST R OUTING Figure 9-2: Unicast rou ting confi guration example The stations conn ected to ports 1 through 4 genera te a combination of IP traf fic and NetBIOS traf fic. The IP traffic is filter ed by the pro tocol-sensitive VLANs. All other traf fic is directed to the VLAN MyCompany .[...]
-
Página 147
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 9-17 D ISPLAYING R OUTER S ET TINGS config Finance ipaddress 192.207.35.1 config Personnel ipaddress 192.207.36.1 enable ipforwarding enable rip D ISPLA Y ING R OUTER S ETTINGS T o display settings for vari ous IP routing components, use th e commands list ed in Ta b l e 9 - 4 . Ta b l e 9 - 4 : Route[...]
-
Página 148
9-18 S UMMIT S WITCH I NSTA LLATIO N AND U SER G UID E IP U NICAST R OUTING R ESETTING AND D ISABLING R OUTER S ETTINGS T o return r outer settin gs to their defaults an d disable routing functions, us e the commands list ed in Ta b l e 9 - 5 . show ipfd b {<ipaddre ss> <netmask> | vl an <name> | all} Displ ays the contents of the[...]
-
Página 149
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 10-1 10 Routing Protocols This chapter describes the IP unicast routing protoco ls available on the Summit. It assumes th at you are already familiar w ith IP unicas t routing. If not, refer to the following pu blications for addition al informa tion: RFC 1058 — Routing Information Protocol (RIP) RF[...]
-
Página 150
10-2 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E R OUTING P ROTOCO LS RIP V ERS US OSPF The distinction between RIP and OSPF lies in the fundamental dif fer ences between distance vector protocols and link state protocols. Using a dist ance vector pr otocol, each ro uter creates a unique routing table f rom summarized information obtained fro[...]
-
Página 151
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 10-3 O VER V I E W OF RIP O VE R VI EW OF RIP RIP is an Interior Gateway Protocol (IGP) first used in computer r outing in the ARP Anet as early as 1969. It is primarily intended for use in homogeneous networks of moderate size. T o determine the best pa th to a distant network, a router using RIP alw[...]
-
Página 152
10-4 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E R OUTING P ROTOCO LS T RIG G ERED U PDATES T riggered updates occur whenever a router changes the metric for a route, and it is req uired to send an update m essage im mediately , even if it is not yet time for a r egular update message to be sent. Thi s will generally result in faster converge[...]
-
Página 153
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 10-5 O VER VI EW OF OSP F O VE R V I EW OF OSPF OSPF is a lin k state protocol tha t distributes routing informa tion bet ween routers belonging to a single IP doma in, also k nown as an autonomous s ystem . In a lin k state routing protocol, each router maintains a data base describing th e topology [...]
-
Página 154
10-6 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E R OUTING P ROTOCO LS The thr ee types of routers defined by OS PF are as follows: • Internal Router (IR) An internal r outer has all of its interfaces within the same ar ea. • Are a Bord er Router (ABR) An ABR h as interfaces in multipl e areas. It is r espon sible for exchang ing Summ ary [...]
-
Página 155
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 10-7 O VER VI EW OF OSP F V IRTUAL L INKS In the situation when a new area is intr oduced that does have a direct ph ysical attachment to the backbone, a v irtual lin k is used. A virtual link provides a logical path between the ABR of th e disconnected area and the ABR of the backbone. A virtual link[...]
-
Página 156
10-8 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E R OUTING P ROTOCO LS C ONFIGUR ING RIP Ta b l e 1 0 - 1 describes the commands used to configur e RIP . T able 1 0-1: RIP Con figuration Co mmands Comm and Description enable r ip Enables RIP. The defaul t setting is d isabled. enable r ip aggregat ion Enables RIP aggregation of subnet inform a[...]
-
Página 157
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 10-9 C ONFIGUR ING RIP config r ip add {vla n <name> | all } Configures RIP o n an IP interface. If no VLAN is sp ecif ied, then all is assu med. When an IP interfac e is created, per i nterface RIP confi gur atio n is disa bled by de fa ult. config r ip delete [v lan <name> | all] Disa bl[...]
-
Página 158
10-10 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E R OUTING P ROTOCO LS RIP C ONFIGUR ATION E XA MPLE Figure 10-4 illustrates a switch th at has three VLANs defined as follows : • Finance — Protocol-sensitive VLAN u sing the IP protocol — Ports 1 and 3 have been assigned — IP addr ess 19 2.207.35.1 • Personne l — Protocol-sensitive[...]
-
Página 159
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 10-11 RIP C ONFIGURATION E XAMPLE Figure 10-4: RIP confi guration example The stations conn ected to ports 1 through 4 genera te a combination of IP traf fic and NetBIOS traf fic. The IP traffic is filter ed by the pro tocol-sensitive VLANs. All other traf fic is directed to the VLAN MyCo mpany . In t[...]
-
Página 160
10-12 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E R OUTING P ROTOCO LS config Finance ipaddress 192.207.35.1 config Personnel ipaddress 192.207.36.1 enable ipforwarding config rip add vlan all enable rip D ISPLA Y ING RIP S ETTINGS T o display settin gs for RIP , use the com mands listed in Ta b l e 1 0 - 2 . T able 1 0-2: RIP S how Commands [...]
-
Página 161
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 10-13 R ESETTING AND D ISABLING RIP R ESETTING AND D ISAB LING RIP T o return R IP settings to their defaults, or to disable RIP , use the commands listed in Ta b l e 1 0 - 3 . T able 1 0-3: RIP Res et and Dis ab le Co mmands Comm and Description config r ip delete [v lan <name> | all] Disa bles[...]
-
Página 162
10-14 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E R OUTING P ROTOCO LS C ONFIGUR ING OSPF Ta b l e 1 0 - 4 describes the commands used to configur e OSPF . T able 1 0-4: OS PF Config uration Commands Comm and Description create o spf area <areaid > Creates an OSPF area. By default, the OSPF area 0 .0.0.0 is cr eated. enabl e os pf Enabl[...]
-
Página 163
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 10-15 C ONFIGURI NG OSPF config o spf delete vi rtual-link <rou terid> <are aid > Remo ves a vi rtua l li nk. confi g os pf a rea < area id> norma l Configure s an OSFP are a as a normal a rea. The defau lt setting is normal . confi g os pf ar ea <ar eaid > stu b [s ummar y | n[...]
-
Página 164
10-16 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E R OUTING P ROTOCO LS OSPF C ONFIGUR ATION E XAMPLE Figure 10-5 shows an exa mple of an auto nomous sy stem usi ng OSPF routers. The details of this network fol low . Figure 10-5: OSPF co nfiguration e xamp le Are a 0 is the backbone area. It is located at the headquarters and has the following[...]
-
Página 165
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 10-17 OSP F C ONFIGURATION E XAMPLE Are a 5 is connected to the backbone are a by wa y of ABR1 and ABR2. It is loca ted in Chicago and ha s the follow ing characteris tics: • Network number 160.26 .x.x • 1 ident ified VLAN (Chi_160 _26_26) • 2 internal r outers • A virtual link from ABR1 to AB[...]
-
Página 166
10-18 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E R OUTING P ROTOCO LS config ospf area 0.0.0.6 stub nosummary stub-default-cost 10 config ospf vlan LA_161_48_2 area 0.0.0.6 config ospf vlan Chi_160_26_2 area 0.0.0.5 config ospf add virtual-link 160.26.25.1 0.0.0.5 config ospf add vlan all enable ospf C ONFIGURATIO N FO R IR1 The following is[...]
-
Página 167
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 10-19 R ESETTING AND D ISABLING OS PF S ETTINGS R ESETTING AND D ISABLING OSP F S ETTINGS T o return OSPF settings t o their defaults, use the com mands listed in Ta b l e 1 0 - 6 . T able 1 0-6: OS PF Reset and Dis able Commands Comm and Description confi g os pf d elet e [vl an <n ame> | al l][...]
-
Página 168
10-20 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E R OUTING P ROTOCO LS Summit.bk : 10PR OT.FM Page 20 Thursday, June 18, 1998 9:27 AM[...]
-
Página 169
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 11-1 11 IP Multicast Routing This chapter describes the components of IP multicast r outing, and how to configure IP multicast routing on th e Summit. F or mor e inf or mation on IP multicasting, refer to RFC 1112, RFC 1075, RFC 2236 , and othe r more rec ent Inter net draft documen ts. O VE R V I EW [...]
-
Página 170
11-2 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E IP M ULTICA ST R OUTING D VMRP O VERVIEW DVMRP is a distance vector protocol t hat is used to exchan ge routing and multi cast information betw een routers. Like RIP , DVMRP periodically sends the entire routing table to i ts neighb ors. DVMRP has a mechanism that allows it to prune and graft m[...]
-
Página 171
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 11-3 C ONFI GURING IP M ULTICASTI NG R OU TING • Enable DVMRP on the r outer , using the following command: enable dvmrp Ta b l e 1 1 - 1 describes the commands used to configure IP multicast routing. T able 1 1-1: IP Mu lticast R outing Co nfiguration Commands Comm and Description enable d vmrp Ena[...]
-
Página 172
11-4 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E IP M ULTICA ST R OUTING Ta b l e 1 1 - 2 describ es the command used to configur e the Internet Gateway Message Pr otocol (IGMP). confi g dvmrp timer <r oute _repo rt_i nter val > <rout e_replace ment_tim e> Configure s the global DVM RP timers. Speci fy the follo wing: ■ route_re[...]
-
Página 173
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 11-5 C ONFI GURING IP M ULTICASTI NG R OU TING confi g ig mp <qu ery_ inter val > <que ry_response _interval > <last_m ember_query _interval> Config ures the IGMP timers. Timers are based on RFC22 36. Specify th e following: ■ query_interval — The am ount of time, i n second s, t[...]
-
Página 174
11-6 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E IP M ULTICA ST R OUTING C ONFIGUR ATION E XAMPLE Figure 1 1-1 is used in Chapter 10 to describe the OSPF configuration on a Summit. Refer to Chapt er 10 for mor e informat ion about configuring O SPF . In this example, the switch labeled IR1 is configured for IP multicas t routing. Figure 11-1:[...]
-
Página 175
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 11-7 D ISPLAYING IP M ULTICA ST R OU TING S ETTINGS C ONFIGURA TION FO R IR1 The following is the configuration for the r outer labeled IR1: config vlan HQ_10_0_1 ipaddress 10.0.1.2 255.255.255.0 config vlan HQ_10_0_2 ipaddress 10.0.2.2 255.255.255.0 config ospf add vlan all enable ipforwarding enable[...]
-
Página 176
11-8 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E IP M ULTICA ST R OUTING D ELETING AND R ESETT ING IP M ULTICAST S ETT INGS T o return IP multicast routing settings to their defaults a nd disable IP mu lticast routing functions, use th e commands listed i n Ta b l e 1 1 - 4 . T able 1 1-4: IP Mu lticast Ro uting Rese t and Dis able Commands C[...]
-
Página 177
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 12-1 12 Status Monitor ing and Statistics This chapter describes how to view the curr ent operating status of the switch, how to display inform ation in the switch log , and how to take advan tage of the RM ON capabilities av ailable in the s witch. V iewin g statistics o n a regular basis a llows you[...]
-
Página 178
12-2 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E S TATUS M ONITORING AND S TATISTICS show conf ig Di splays the c urrent switch co nfiguratio n to the termina l. You can then c apture the o utput and store it as a fi le. show di ag Displa ys swi tch so ftwar e dia gnost ics. show dvmrp {vlan <n ame> | route | a ll} Di splays the DV MRP [...]
-
Página 179
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 12-3 S TATUS M ONITOR ING show ipm c cache {<grou p> {<src_ip address> <ma sk>}} | all} D isplays the IP m ulticast rou te table. Inf ormation displ ayed inc lud es t he fo llowi ng: ■ IP group ad dress ■ IP sour ce address a nd mask ■ Upstre am neighbor ■ Interface to upstre[...]
-
Página 180
12-4 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E S TATUS M ONITORING AND S TATISTICS show ma nagem ent Displ ays networ k managem ent configura tion and stat istics incl uding enable /disable states for Te lnet and SNMP , SNMP commun ity strings, a uthorized SNMP st ation list , SNMP trap rece iver list, and login stati sti cs. show memo ry D[...]
-
Página 181
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 12-5 S TATUS M ONITOR ING show port {<po rtl ist> } inf orm atio n Displays de tai led sys tem -re late d inf ormation, in cl udi ng the follo wing: ■ Port state ■ Link st ate ■ Auto neg otiat io n stat e ■ Link sp eed ■ Duple x mode ■ Load sh aring inform ation ■ EDP status ■ Su[...]
-
Página 182
12-6 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E S TATUS M ONITORING AND S TATISTICS show r ip stat {vlan <n ame> | all} Displa ys RIP -spec ific s tati stics. Stat isti cs inc lude t he follow ing per interfac e: ■ Packets transmitt ed ■ Packets rec eived ■ Bad pack ets received ■ Bad routes received ■ Numb er of RIP peers ?[...]
-
Página 183
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 12-7 P OR T S TATIS TICS P OR T S TATIST ICS The Summit provides a facility for view ing port stat istic inform ation. The s ummary information lists values for the curr ent counter against every port on the switch, and it is refr eshed appr oximately every two seconds. V alues are displayed to nine d[...]
-
Página 184
12-8 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E S TATUS M ONITORING AND S TATISTICS • Received Byte Count (RX Byte Count) — The tota l number of bytes th at were received by the po rt, including bad or lost frames. This number includes bytes contained in the Frame Check Sequen ce (FCS), but excludes bytes in the preamble. • Receive Bro[...]
-
Página 185
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 12-9 P ORT M ONITOR ING D ISPLAY K EYS The following port receive err or information is collected by the switch: • Receive Bad CRC Frames (RX CRC) — The total number of frames r eceived by the port that wer e of the corr ect length, but contained a bad FCS value. • Receive Ove rsize Frames (RX O[...]
-
Página 186
12-10 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E S TATUS M ONITORING AND S TATISTICS S WITCH L OGGING The Summit log tracks a ll configurati on and fault informa tion pertaini ng to the device. Each entry in the log contains the fo llowing information: • T imestamp — The timestamp reco rds the month and day of the event, along with the t[...]
-
Página 187
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 12-11 S WITCH L OG GING L OCAL L OGGING The switch ma intains 1,0 00 messages i n its int ernal log. Y ou can display a snapsh ot of the log at any time by usi ng the comm and show log {< priority>} {<subsystem>} where the following is true: • priority — Filters the log to display mess[...]
-
Página 188
12-12 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E S TATUS M ONITORING AND S TATISTICS R EMOTE L OGGING In addition to m aintaining an i nternal log, the Sum mit supports remote logging by way of the UNI X Syslog host faci lity . T o enab le remote logging, do t he following : • Configure the Syslog h ost to accept and lo g messages. • Ena[...]
-
Página 189
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 12-13 S WITCH L OG GING T able 1 2-5: Loggi ng C ommand s Comm and Description confi g lo g disp lay {<pri orit y>} { <subs yste m>} Conf igur es the real -tim e lo g disp lay. Opti ons includ e: ■ priority — Filt ers th e lo g to di spl ay messages with the sel ected priority or highe[...]
-
Página 190
12-14 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E S TATUS M ONITORING AND S TATISTICS RMON Using the R emote Mon itoring (RM ON) capabiliti es of the sw itch allows netw ork administrators to improve sw itch efficiency and r educe the load on the network. The following sections explain mor e about the RMON concept and the RMON featur es suppo[...]
-
Página 191
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 12-15 RMON A typical RM ON setup consis ts of the fol lowing two compon ents: • RMON pro be — An int elligent, remotely cont rolled device or software agent that continually co llects statisti cs about a LAN s egment or VLAN. The probe transfers the information to a management workstation on r equ[...]
-
Página 192
12-16 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E S TATUS M ONITORING AND S TATISTICS A LARMS The Alarms gr oup provides a versatile, general me chanism for setting threshold an d sampling intervals to generate events on any RMON variable. Both rising and falling thr esholds are supported, and thresholds can be o n the absolute value of a var[...]
-
Página 193
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 12-17 RMON E VENT A CTION S The actions that you can defin e for each alarm ar e shown in Ta b l e 1 2 - 6 . T o be notified of events us ing SNMP tra ps, you must co nfigure one or more trap receivers, a s described in Chapter 3 . T able 1 2-6: Event Actions Action High Thre shold No act ion Notify o[...]
-
Página 194
12-18 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E S TATUS M ONITORING AND S TATISTICS Summit.bk : 12STATUS.FM Page 18 Thursday, Ju ne 18, 1998 9:27 AM[...]
-
Página 195
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 13-1 13 Using ExtremeW are Vista ExtremeW a re V i sta is device-m anagement software running in t he Summit tha t allows you to access the switch over a TCP/IP netwo rk, using a sta ndard W eb browser . Any pro perly configured standar d W eb brow ser that supports frames (such as Netscape Navigator [...]
-
Página 196
13-2 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E U SING E XTREME W ARE V ISTA T o use ExtremeW are V ista, at least one VLAN on the switch must be assigned an IP addr ess. F or m ore informati on on as signing an IP addr ess, ref er to Chapter 3 . S ETTING U P Y OUR B RO WSER In general, the defau lt settings that come configured on your br o[...]
-
Página 197
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 13-3 A CCESSING E XTREME W ARE V ISTA A CCESSING E XTREME W ARE V ISTA T o access the default home page of the switch, enter the following URL in your bro wser: http://<ip_address> When you access the home page of the s witch, you ar e presented with the Login scr een. Enter your user name and p[...]
-
Página 198
13-4 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E U SING E XTREME W ARE V ISTA T AS K F RA ME The task frame ha s two sections. At the top of the task frame ar e the task tabs. Th ere ar e four task tabs , as follo ws: • Configuration • Stati sti cs • Support • Logout Below the task tab s are options. Options are specific to the ta sk [...]
-
Página 199
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 13-5 S AVIN G C HAN GES S TATUS M ESSAGES Status messages ar e displayed at the top of the content frame. T her e are four types of status mess ages, as follows : • Information —Displa ys informa tion th at is usefu l to know prio r to, or as a result of, changi ng con figuration option s. • W a[...]
-
Página 200
13-6 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E U SING E XTREME W ARE V ISTA • Click the Logout tab. If you attem pt to log ou t without sa ving your chan ges, ExtremeW are V ista prompts you to save y our changes. If you select Y es , the changes are saved to the selected configu ration area. T o change the selected conf iguration area, y[...]
-
Página 201
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 14-1 14 Softw are Upg rade and Boot Options This chapter describes the proced ure for upgrading the switch software image. This chapter also discusses how to save and loa d a primary an d secondary image and configuratio n file on the sw itch. D OW NLOADING A N EW I MAGE The image file contains the ex[...]
-
Página 202
14-2 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E S OFTWARE U PGRADE AND B OOT O PTIONS • Download the new ima ge to the Sum mit using th e command download image [xmodem | <ipaddress> <filename>] {primary | secondary} where the following is true: xmodem — Indicates that you will be using XMODEM over the serial port. ipaddress [...]
-
Página 203
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 14-3 S AVIN G C ONFIGURATION C HANGES S AV I N G C ONFIGURATION C HANGES The configuration is the customized set of parameters that you have se lected to run on the switch. As yo u make config uration cha nges, the n ew setting s are stor ed in run-tim e memory . Settings that are stor ed in run-time [...]
-
Página 204
14-4 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E S OFTWARE U PGRADE AND B OOT O PTIONS U SING TFTP TO U PLOAD THE C ONFIGURATION Y ou can upload the curr ent configuration to a TF TP server on your netw ork. The uploaded ASCII file r etains the command-line interface format. This allows you to do the follow ing: • Modify the configuration u[...]
-
Página 205
S UMMIT S WITCH I NSTALLATION AND U SER G UID E 14-5 B OO T O PTION C OM MANDS B OOT O PTION C OMMANDS Ta b l e 1 4 - 1 lists th e commands as sociated w ith Summ it boot optio ns. T able 1 4-1: Boot Option Com mands Comm and Description show confi g Displ ays the current switch conf iguration to the termina l. You can then c apture the o utput and[...]
-
Página 206
14-6 S UMMIT S WITCH I NSTAL LATIO N AND U SER G UID E S OFTWARE U PGRADE AND B OOT O PTIONS Summit.bk : 14BOOT.FM Page 6 Thursday, June 18, 1998 9:27 AM[...]
-
Página 207
S UMMIT S WITCH I NSTALLATION AND U SER G UID E A-1 A Saf ety Inf or mation I MPOR TANT S AF ETY I NF OR MATION Pleas e read the following saf ety i nf or mation thorou ghly before instal ling the Summi t s witch . • Installat ion and removal of the unit mu st be carried out by qualifi ed personnel only . • T o reduce the risk of fire or electr[...]
-
Página 208
A-2 S UMMI T S WITCH I NS TALLA TION AND U SER G UIDE S AF ETY I NFORMATION • This unit operates under Safety Extra Low V oltage (SEL V) conditions accor ding to IEC 950. The con ditions are only main tained if th e equipment to w hich it is connected also operates unde r SEL V conditions. • The appliance coupler (the con nector to the unit and[...]
-
Página 209
S UMMIT S WITCH I NSTALLATION AND U SER G UID E A-3 I MPORTANT S AF ETY I NFORMA TION F USE • Disconnect power fr om the unit before o pening the fuse holder cover . The unit automat ically adjus ts to the s upply voltag e. The fuse is suit able for both 1 10V A .C. and 220- 240V A.C. operation . T o change the fuse, r elease the fuse holder by g[...]
-
Página 210
A-4 S UMMI T S WITCH I NS TALLA TION AND U SER G UIDE S AF ETY I NFORMATION L ITHIUM B ATTERY • Replace the lithium battery with the same or equivalent type, as r ecommended by the manufacturer . There is a danger o f e xplos ion if th e batter y is incorrectly replac ed. • Dispose of used batteries according to the manufacture r ’s instructi[...]
-
Página 211
S UMMIT S WITCH I NSTALLATION AND U SER G UID E B-1 B T echnical Specifications Ph ysical Dimensions He igh t: 3. 5 in ches x W idt h: 17 .32 inc hes x Dept h: 17 .32 inch es Weight: 10 kg En vir onmental Req uirements Operatin g Temperature 0 to 40° C Stora ge T emper atur e -10 to 70 ° C Operatin g Humidity 10% to 95% relative h umidity, non co[...]
-
Página 212
B-2 S UMMI T S WITCH I NS TALLA TION AND U SER G UIDE T ECHNICAL S PEC IFICATIONS Heat Dissipation 118W maxi mum (3 41.2 BTU/hr ma ximum) P ower Supp ly AC Line F requency 47Hz to 63Hz Input Volta ge Options 90VAC to 264VAC , auto-ranging Current Ra ting 100-120/2 00-240 VAC 3.0/ 1.5 A Standar ds Supported SNMP SNMP protoco l (RFC 1157) MIB-II (RFC[...]
-
Página 213
S UMMIT S WITCH I NSTALLATION AND U SER G UID E C-1 C T roub leshooting If you encounter problems when using the switch, this appendix ma y be helpful. If you have a problem not lis ted here or in the release notes, contact yo ur local techni cal support repr esentative. LED S Power LED does not light: Check that the power cable is firmly connected[...]
-
Página 214
C-2 S UMMIT S WITCH I NS TAL LATIO N AND U SER G UIDE T ROUBL ESHOOTING Both sides if the gigabit link must be enabled or disabled. It the two are d iffer ent, typically th e side with auto negotiation dis abled will ha ve the link LED list, and the side with autonegotiation enabled will not list. The default configuration for a gigabit port is aut[...]
-
Página 215
S UMMIT S WITCH I NSTALLATION AND U SER G UID E C-3 U SING THE C OMMAND -L INE I NT ER F AC E T raps are not received by the SNMP Network Mana ger: Check that the SNMP Network Manager's IP addr ess and community string are corr ectly configured, and that the IP addr ess of the T rap Receiver is configured pro perly on the s witch. The SNMP Net[...]
-
Página 216
C-4 S UMMIT S WITCH I NS TAL LATIO N AND U SER G UIDE T ROUBL ESHOOTING Y ou f orget your password and cannot log in: If you are not an adm inistrator , an other user havin g administ rator access level ca n log in, delete your user name, and cr eate a new user name for you, with a new passwor d. Alternatively , another user having administrator ac[...]
-
Página 217
S UMMIT S WITCH I NSTALLATION AND U SER G UID E C-5 U SING THE C OMMAND -L INE I NT ER F AC E VLAN names : Ther e ar e res trictio ns on VLAN na mes. They ca nnot cont ain whi te spaces and c annot start with a numeric value unless you use quotation marks aroun d the name. If a name contains white spaces, starts with a numeric, or co ntains non-alp[...]
-
Página 218
C-6 S UMMIT S WITCH I NS TAL LATIO N AND U SER G UIDE T ROUBL ESHOOTING The switch keeps aging out endsta tion entries in th e switch Forwarding Data base (FDB ): Reduce the number o f topolo gy changes by disabling STP on those sw itches that do not use redundant paths. Specify that the endstation entries ar e static or permanent. Summit.bk : CTR [...]
-
Página 219
Inde x A access lev els 3-8 acco unts, c rea ting 3-10 admin account 3 -9 aging entries 6-1 ala rm acti ons 12-17 Alarms , RMON 12 -16 area 0, OSPF 10 -6 areas, OSP F 10-5 autone goti ation 4 -2 B backbone ar ea, OSPF 10-6 blackhole en tries 6-2 boot option commands (table) 14-5 BOOTP rel ay , config uring 9-10 BOOTP , using 3-12 bridg e prior ity [...]
-
Página 220
ii - Index DVMRP configuring 11- 3 descr ip tion 11- 2 dyn amic ent rie s 6- 1 dynamic routes 9-3 E EDP commands 4-12 connected to SummitLink por t 4-11 description 4-1 1 enab ling a port 4-1 err ors, port 12 -8 Events, RM ON 12-16 Extr eme Discovery Pr otocol See EDP Extr emeW are V ista access ing 1 3-3 br owser contr ols 13-4 br owser setup 13-2[...]
-
Página 221
Index - iii IP unicast routing BOOTP r elay 9-10 config uration ex amples 9-15 configuring 9-9 defa ult ga teway 9-1 desc ri pti on 1-7 DHCP relay 9-10 disa bl ing 9- 18 enablin g 9-9 multinett ing, description 9-5 multinetting, example 9-7 prox y ARP 9-4 re set and disable comma nds (table) 9-18 re setting 9-18 ro uter inte rfaces 9-2 router show [...]
-
Página 222
iv - Index P PA C E 8 - 4 passwor ds default 3-9 for gettin g 3-10 path cost 7-5 permanen t entries 6-2 ping command 3-22 poison revers e 1 0 -3 port autone goti ation 4 -2 commands (table) 4-3 configuring 4-1 connections 1-3 console 1-17 dup lex 4 -2 enablin g and disabl ing 4-1 err ors,viewing 1 2-8 load-s haring gr oups 4-6 master port 4-6 monit[...]
-
Página 223
Index - v RMON alarm act ions 12-17 Alarms group 12 -16 Even ts g rou p 12- 16 featur es supported 12-15 Histor y group 12-15 probe 12-15 Stat istics gr oup 12-15 ro uter inte rfaces 9-2 router t ypes, OSPF 10-6 Routing Informa tion Protocol. See RIP routing ta ble, populating 9-3 rou ti ng. See IP unic ast r outi ng S safety inf ormation Eng lish [...]
-
Página 224
vi - Index T taggi n g, VLAN 5-5 Te l n e t disa bl ing 3- 15 disconn ecting a session 3-15 loggi ng 12-11 using 3-12 TF TP serv er 14- 1 using 14-4 tracero ute command 3-22 traf fic grouping s, QoS 8-3 transm it errors 12-8 trigger ed updates 10-4 trunks 5- 6 U upgra din g the imag e 1 4-1 uploading th e configuration 14-4 users access lev els 3-8[...]
-
Página 225
Inde x of Commands C clear counter s 12-14 clear fdb 6-6 clear igmp snooping 11-8 clear ip arp 3-16, 9-12, 9 -18 clear ipfdb 9 -12, 9- 18 clear ipmc cache 11-8 clear log 12-14 clear sessi on 3-7, 3-15 config accoun t 3-6 config banner 3-6 conf ig bootpr elay a dd 9-11 conf ig bootpr elay del ete 9-1 1 config devicemode 3-6 config dot 1q ethertype 5[...]
-
Página 226
ii-Index of Comm ands conf ig snmp add tr aprec eiver 3- 20 config snmp community 3-20 config snmp dele te 3-20 config snmp dele te trapr eceiver 3-20 config snm p syscontact 3- 20 config snm p syslocation 3-20 conf ig snmp sysname 3-20 config st pd add vlan 7-6 config st pd forwar ddelay 7-6 config stpd hellotime 7-6 config st pd maxage 7-6 config[...]
-
Página 227
Index of Commands-ii i enable rip poisonr everse 10-8 enable rip splith orizon 10-8 enable ri p triggerupdate 10-8 enab le sharing 4-3 enable smartr edundancy 4-3 enable sn mp access 3-20 enable snmp t rap 3-20 enable stpd 7-6 enable stpd port 7-6 enable summitlink port 4-12 enable sy slog 12-13 enab le telnet 3-15 enable we b 3-17, 13- 1 H histo r[...]