Cisco Systems BC-109 manuel d'utilisation
- Voir en ligne ou télécharger le manuel d’utilisation
- 56 pages
- 0.47 mb
Aller à la page of
Les manuels d’utilisation similaires
-
Network Router
Cisco Systems 69561
18 pages 0.03 mb -
Network Router
Cisco Systems CCNA 2
239 pages 2.94 mb -
Network Router
Cisco Systems SB 106
64 pages 0.57 mb -
Network Router
Cisco Systems X3000
291 pages 18.47 mb -
Network Router
Cisco Systems 837
10 pages 0.34 mb -
Network Router
Cisco Systems 350
12 pages 0.39 mb -
Network Router
Cisco Systems 861WGNPK9RF
66 pages 2.45 mb -
Network Router
Cisco Systems 3.1
60 pages 0.66 mb
Un bon manuel d’utilisation
Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation Cisco Systems BC-109. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel Cisco Systems BC-109 ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.
Qu'est ce que le manuel d’utilisation?
Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation Cisco Systems BC-109 décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.
Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.
Donc, ce qui devrait contenir le manuel parfait?
Tout d'abord, le manuel d’utilisation Cisco Systems BC-109 devrait contenir:
- informations sur les caractéristiques techniques du dispositif Cisco Systems BC-109
- nom du fabricant et année de fabrication Cisco Systems BC-109
- instructions d'utilisation, de réglage et d’entretien de l'équipement Cisco Systems BC-109
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes
Pourquoi nous ne lisons pas les manuels d’utilisation?
Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage Cisco Systems BC-109 ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles Cisco Systems BC-109 et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service Cisco Systems en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées Cisco Systems BC-109, comme c’est le cas pour la version papier.
Pourquoi lire le manuel d’utilisation?
Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif Cisco Systems BC-109, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.
Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation Cisco Systems BC-109. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.
Table des matières du manuel d’utilisation
-
Page 1
Configuring Source-Route Bri dging BC-109 Configur ing Source-Route Br idging This chapter describes source-route bridging (SRB) co nfiguration tasks. F or a discussion of remote source-route bridging (RSRB) con figuration tasks, refer to the “Configuring Remote Source-Rou te Bridging” chapter in this publi cation. For a complete description of[...]
-
Page 2
Configure Source-Route Brid ging BC-110 Bridging and IBM N etworking Configuratio n Guide Configure Sour ce-Route Bridging Our implementation of source-route bridgi ng enables you to connect two or more T oken Ring networks using either T oken Ring or Fibe r Distrib uted Data Interface (FDDI) media. The Cisco IOS software offers the ability to en c[...]
-
Page 3
Configure a Multiport Bridge Using a Virtual Ring Configuring Source-Route Bri dging BC-111 A dual-port bridge is a limitation imposed by IBM T oken Ring chips; the chips can process only two ring numbers. If you hav e a router with two or more T oken Ring interfaces, you can work around the two-ring number limitation. Y ou can configure your route[...]
-
Page 4
Configure Source-Route Brid ging BC-112 Bridging and IBM N etworking Configuratio n Guide Figure 47 Multiport Bridge Using a Vir tual Ring T o take adv antage of this virtua l ring feature, each T oken Ring in terface on the router must be configured to belong to the same ring group. For information about configuring a multiport bridge using a virt[...]
-
Page 5
Configure SRB over FDDI Configuring Source-Route Bri dging BC-113 Enable SRB and Assign a Ring Group to an Interf ace After you have def ined a ring group, yo u must as sign that ring group to thos e interfaces you plan to include in that ring gro up. An interface can only be assigned to one ring group. T o enable any-to-any connecti vity among the[...]
-
Page 6
Configure Source-Route Brid ging BC-114 Bridging and IBM N etworking Configuratio n Guide Configure F ast-Swit ching SRB ov er FDDI Fast-Switching SRB o ver FDDI enhances performance. F or example, if you w ant to use access-lists, fast-switching SRB ov er FDDI provides fast performance and access-li st filters capability . T o configure fast-switc[...]
-
Page 7
Enable the Auto matic Spanning-Tree Function Configuring Source-Route Bri dging BC-115 Forw arding all-routes explorer pack ets is the defa ult. Howe ver , in complicated source-route bridging topologies, using this default can generate an exponentially large number of explorers that are trav ersing the network. The numb er of explorer packets beco[...]
-
Page 8
Configure Source-Route Brid ging BC-116 Bridging and IBM N etworking Configuratio n Guide T o create a bridge group that r uns an automatic spanning-tree fu nction compatibl e with the IB M SRB spanning-tree implementation, use the foll o wing command in global configuration mode: T o enable the automatic spanning -tree function for a specif ied gr[...]
-
Page 9
Configure Brid ging of Routed Protoc ols Configuring Source-Route Bri dging BC-117 Configure Bridging of Routed Pr otocols Source-route bridges use Media Access Control (M A C) information, specifically the information contained in the RIF , to bridge packets. A RIF co ntains a series of ring and bridge numbers that represent the possible paths the[...]
-
Page 10
Configure Bridging of Routed Protocol s BC-118 Bridging and IBM N etworking Configuratio n Guide • VINES • XNS Enable use of the RIF only on T o ken Ring interfaces on the route r . T o configure the Cisco IOS softwa re to append RI F information, use the follo wing command in interface conf iguration mode: For an example of ho w to configure t[...]
-
Page 11
Configure Tra nslation betw een SRB an d Transparent Bridging Environments Configuring Source-Route Bri dging BC-119 Configure T ranslation between SRB and T ransparent Bridging En vironments Source-route translati onal bridging (SR/TLB) is a Cisco IOS software feature that allows you to combine SRB and transparent bridging networks with out the ne[...]
-
Page 12
Configure Trans lation between SRB and Transparent Brid ging Environments BC-120 Bridging and IBM N etworking Configuratio n Guide Figure 50 Example of a Simple SR/T LB T opol ogy Note The Spanning-Tree Protocol messages used to pre vent loops in the transparent bridging domain are not passed between the SRB domain and the transparent bridging doma[...]
-
Page 13
Enable Bridging between Tran sparent Bridging and SRB Configuring Source-Route Bri dging BC-121 W e currently know that problems occur wi th the following protocols when bridged between T oken Ring and other media: Nov ell IPX, DECnet Phas e IV , AppleT alk, VINES, XNS, and IP . Further , problems can occur with the Novell IPX and XNS protocols whe[...]
-
Page 14
Configure Trans lation between SRB and Transparent Brid ging Environments BC-122 Bridging and IBM N etworking Configuratio n Guide Enab le T ok en Ring LLC2-to-Ether net Conv ersion The Cisco IOS software supports the following types of T oken Ring-to-Ethernet frame con versions using Logical Link Control, type 2 (LLC2) Protocol: • T oken Ring LL[...]
-
Page 15
Configure NetBIOS Support Configuring Source-Route Bri dging BC-123 Configure NetBIOS Suppor t NetBIOS is a nonroutable protocol that was originally designed to transmit messages between stations, typically IBM PCs, on a T oken Ring networ k. NetBIOS allows messages to be e xchanged between the stations using a name rather than a station address. E[...]
-
Page 16
Configure NetBIOS Support BC-124 Bridging and IBM N etworking Configuratio n Guide • Create Static Entries in the NetBIOS Name Cache • Specify Dead-T ime Interv als for NetBIOS Pack ets Enab le the Pro xy Explorers F eature on the Appropriate Interf ace In order to enable NetBIOS name caching on an in terface, the proxy explorer s feature must [...]
-
Page 17
Configure the NetBIOS Cache Name Length Configuring Source-Route Bri dging BC-125 Configure the NetBIOS Cache Name Length T o specify ho w many characters of the NetBIOS type name that the name cache will v alidate, enter the following command in global configuration mode: Enab le NetBIOS Pro xying The Cisco IOS software can act as a proxy and send[...]
-
Page 18
Configure LNM Support BC-126 Bridging and IBM N etworking Configuratio n Guide The Cisco IOS software also con verts pair s of FIND_N AME and NAME_RECOGNIZED pack ets recei ved from explorers, which tra v erse all rings, to specif ic route frames that are sent only between the two machines that need to see these packets. Y ou can specify a query-t [...]
-
Page 19
Configure LNM Support Configuring Source-Route Bri dging BC-127 Figure 51 LNM Linking to a Sour ce-Route Bridge on Each Local Ring If LNM requires info rmation about a stati on some where on a T oken Ring, it uses a proprietary IBM protocol to query to one of the source-route bridge s connected to that ring. If th e bridge can provide the requested[...]
-
Page 20
Configure LNM Support BC-128 Bridging and IBM N etworking Configuratio n Guide Figure 52 LAN Network Manager Monitorin g an d T ranslating Notice that the proprietary protocol LNM uses to communicate with the source-route bridge is an LLC2 connection. Although its protoco l cannot be routed, LNM can monitor or manage anything within the SRB netwo r[...]
-
Page 21
Configure LNM Software on th e Management Stations to Communicate with the Router Configuring Source-Route Bri dging BC-129 When SRB is enabled on the router, conf iguring the Cisco IOS software to perform the functions of an IBM Bridge for communication with LNM occu rs automatically . Theref ore, if SRB has been enabled, you do not need to perfor[...]
-
Page 22
Configure LNM Support BC-130 Bridging and IBM N etworking Configuratio n Guide The command can be used to terminate all LN M server input and reporting links. In normal circumstances, this command should not be necessary because it is a superset of the functions normally performed on indi vidual interfaces b y the no lnm r em and no lnm rps command[...]
-
Page 23
Apply a Password to an LNM Reporting Link Configuring Source-Route Bri dging BC-131 T o enable other LR Ms to change router parameters, use th e following command in interface configuration mode: Apply a P ass word to an LNM Repor ting Link Each reporting link has its o wn password that is us ed not only to prev ent unauthorized access from an LRM [...]
-
Page 24
Configure LNM Support BC-132 Bridging and IBM N etworking Configuratio n Guide Change an LNM Repor ting Inter val All stations on a T oken Ring notify the Ring Error Monitor (REM) when they detect errors on the ring. In order to prev ent excessi ve messages, er ror reports are not sent immediately , but are accumulated for a short interval and then[...]
-
Page 25
Secure the SRB Network Configuring Source-Route Bri dging BC-133 Secure the SRB Netw ork This section describes how to conf igure three features that are us ed primarily to provide network security: NetBIOS access filters, administrati ve filt ers, and access expressions that can be combined with administrative f ilters. In addi tion, these feat ur[...]
-
Page 26
Secure the SRB Network BC-134 Bridging and IBM N etworking Configuratio n Guide The NetBIOS station access list contains the station name to match, along with a permit or deny condition. Y ou must assign the name of the access list to a station or set of stations on the network. T o assign a station access list name, use the fo llowing command in g[...]
-
Page 27
Configure Admi nistrative Filte rs for Token Ring Traffic Configuring Source-Route Bri dging BC-135 Configure Administrativ e Fi lters f or T ok en Ring T raffic Source-route bridges normally f i lter frames according to the routi ng information contained in the frame. That is, a bridge will not forward a frame b ack to its originating network segm[...]
-
Page 28
Secure the SRB Network BC-136 Bridging and IBM N etworking Configuratio n Guide T o enable filtering on input or ou tput, use one of the follo wing co mmands in interface configuration mode: Y ou can filter SN AP-encapsulated packets on either input or output. The a ccess list you specify is the one you created that include s the protocol type code[...]
-
Page 29
Configure Access Expressions that Combine Administrative Filters Configuring Source-Route Bri dging BC-137 Configure Access Expressions that Co mbine Administrativ e Filters Y ou can use access expressions to combine access f ilters to establish co mple x conditions under which bridged frames can enter or lea ve an in terf ace. Using access express[...]
-
Page 30
Secure the SRB Network BC-138 Bridging and IBM N etworking Configuratio n Guide Configure Access Expressions T o configure an access e x pression perform the following tasks: • Design the access expression. • Configure the access lists used by the e xpression. • Configure the access e xpres sion into the router . When designing an access expr[...]
-
Page 31
Tune the SRB Network Configuring Source-Route Bri dging BC-139 The access lists defined in the pre vious section create the foll owing configuration: interface tokenring 0 access-expression in ~lsap(202) | dmac(701) ! access-list 202 permit 0x0404 0x0001 ! Permits SNA frames (command or response) access-list 202 permit 0x0004 0x0001 ! Permits SNA E[...]
-
Page 32
Tune the SRB N etwork BC-140 Bridging and IBM N etworking Configuratio n Guide Enab le or Disab le the Sour ce-Route F ast-Switching Cache Rather than processing packets at the process lev el, the fast-switching feat ure enables the Cisco IOS software to process pack ets at the interrupt lev el. Each packet is transferred from the input interface t[...]
-
Page 33
Enable or Disable the SSE Configuring Source-Route Bri dging BC-141 Enab le or Disab le the SSE The Silicon Switch Engine (SSE) acts as a programmable cache to sp eed the switching of packets. T o enable or disable the SSE, use one of the fo llo wing commands in inte rface conf iguration mode: Estab lish the Connection Timeout Inter val It may be n[...]
-
Page 34
Tune the SRB N etwork BC-142 Bridging and IBM N etworking Configuratio n Guide Figure 54 Controlling Explor er Storms in Re dundant Network T opolog ies The source-bridge explor er -dup-AR E-f ilter command can be used to reduce explorer traf fic by filtering e x plorer frames. T o optimize explorer processin g, use one or more of the following com[...]
-
Page 35
Configure Proxy Explorers Configuring Source-Route Bri dging BC-143 Configure Pro xy Explorers Y ou can use the proxy explorers f eature to limit the amo unt of explorer traff ic propagatin g through the source-bridge network. T o configure proxy explorers, use the follo w ing command in interface conf iguration mode: The Cisco IOS software does no[...]
-
Page 36
Monitor and Maintain the SRB Network BC-144 Bridging and IBM N etworking Configuratio n Guide Repor t Spur ious F rame-Copied Errors An IBM 3174 cluster controller can be configur ed to report frame-copi ed errors to IBM LAN Network Manager software. These errors indicate that another host is responding to the MAC address of the 3174 cluster contro[...]
-
Page 37
SRB Configuration Examples Configuring Source-Route Bri dging BC-145 T o maintain th e SRB network, use any of the follo wing commands in privile ged EXEC mode: In addition to the EXEC-mode comman ds to maintain the SRB network, you can use the following command in global configuration mode: SRB Configuration Examples The following sections prov id[...]
-
Page 38
SRB Configuration Examples BC-146 Bridging and IBM N etworking Configuratio n Guide • NetBIOS Support with a Stat ic NetBIOS Cache Entry Example • LNM for a Simple Network Example • LNM for a More Complex Network Example • NetBIOS Access Filters Example • Filtering Bridged T oken Ring Pack ets to IBM Machines Example • Administrativ e A[...]
-
Page 39
SRB with Automatic Span ning-Tree Function Configuration Example Configuring Source-Route Bri dging BC-147 SRB with A utomatic Spanning-T ree Function Configuration Example The following e xample of a Cisco series 7000 router configuration illustrates how to enable the automatic spanning tree function on an SRB network: source-bridge ring-group 100[...]
-
Page 40
SRB Configuration Examples BC-148 Bridging and IBM N etworking Configuratio n Guide SRB and Routing Cer tain Protocols Example In the following configuration, IP , XNS, and IPX are routed, while all other protoco ls are bridged between rings. While not strictly necessary , the Novell IPX and XNS network numbers are set consistently with the IP subn[...]
-
Page 41
SRB with Multiple Virtu al Ring Groups Exampl e Configuring Source-Route Bri dging BC-149 The following is a sample conf i guration file: source-bridge ring-group 7 ! interface tokenring 0 source-bridge 1000 1 7 source-bridge spanning ! interface tokenring 1 source-bridge 1001 1 7 source-bridge spanning ! interface tokenring 2 source-bridge 1002 1 [...]
-
Page 42
SRB Configuration Examples BC-150 Bridging and IBM N etworking Configuratio n Guide Configuration f or Router B source-bridge ring-group 200 ! interface tokenring 0 source-bridge 3 1 200 source-bridge spanning ! interface tokenring 2 source-bridge 2 1 200 source-bridge spanning SRB ov er FDDI Conf iguration Examples The following e xamples sho w th[...]
-
Page 43
SRB over Frame Relay Configuration Example Configuring Source-Route Bri dging BC-151 SRB ov er F rame Rela y Configuration Example Figure 59 illustrates a network with the following characteristics: • V irtual Ring N umber of Router A = 100 • V irtual Ring Number of FRAD B = 200 • V irtual Ring Number of FRAD C = 300 • DLCI number for PVC b[...]
-
Page 44
SRB Configuration Examples BC-152 Bridging and IBM N etworking Configuratio n Guide Configuration of Router A source-bridge ring-group 100 ! interface Serial1 encapsulation frame-relay ! interface Serial1.1 point-to-point frame-relay interface-dlci 30 ietf source-bridge 200 1 100 conserve-ring source-bridge spanning ! interface Serial1.2 point-to-p[...]
-
Page 45
Adding a Static RIF Cache Entr y for a Two-Hop Path Example Configuring Source-Route Bri dging BC-153 Figure 60 Assigning a RIF t o a Source-Route Bridge The static RIF entry would be submitted to the router on the left as follows: rif 1000.5A12.3456 0630.0081.0090 Adding a Static RIF Cache Entr y for a T w o-Hop P ath Example In Figure 61, assu me[...]
-
Page 46
SRB Configuration Examples BC-154 Bridging and IBM N etworking Configuratio n Guide Assume that the following configuration for SRB and transparent bridging existed before you wanted to enable SR/TLB: interface tokenring 0 source-bridge 1 1 2 ! interface tokenring 1 source-bridge 2 1 1 ! interface ethernet 0 bridge-group 1 ! interface ethernet 0 br[...]
-
Page 47
SR/TLB with Access Filtering Example Configuring Source-Route Bri dging BC-155 Once you have determined the ring number and t he bridge number , you can add the source-bridge transparent command to the f ile, including these two va lues as parameters for the command. The following partial configuration includes this source-bridge transparent entry:[...]
-
Page 48
SRB Configuration Examples BC-156 Bridging and IBM N etworking Configuratio n Guide The command for the T oken Ring interface specif ies that the access list 701 be applied on the source address of frames going out to the T oken Ring, a nd the command for the Ethe rnet interface specifies that this access list be applied on the source address frame[...]
-
Page 49
LNM for a Simple Network Example Configuring Source-Route Bri dging BC-157 LNM f or a Simple Network Example Figure 65 shows a router with two T oken Rings configured as a local source-route bridge. Figure 65 Router with T wo T oken Rings Co nfigured as a Local Sour ce-Route Bridge The associated configuration f ile follows: interface tokenring 0 s[...]
-
Page 50
SRB Configuration Examples BC-158 Bridging and IBM N etworking Configuratio n Guide LNM f or a More Comple x Network Example Figure 66 shows a router with three T oken Rings configured as a multiport bridge, thus employing the concept of the virtual ri ng. Figure 66 Router with T hree T oken Ring s Configured as a Multiport Bridg e The associated c[...]
-
Page 51
NetBIOS Access Filters Example Configuring Source-Route Bri dging BC-159 The show lnm config command displays the logical configuration of this bridge, including all the pertinent information for configuring this router into LNM: Wayfarer# show lnm config Bridge(s) currently configured: From ring 001, address 0000.0028.abcd Across bridge 001 To rin[...]
-
Page 52
SRB Configuration Examples BC-160 Bridging and IBM N etworking Configuratio n Guide Access lists are scanned in order . In the foll owing e xample, the first list denies all entries beginning with the letters ABC, including one named ABCD . This voids the second command, because the entry permitting a name with ABCD com es after the entry denying i[...]
-
Page 53
Administrative Access Fi lters—Filtering SNAP Fr ames on Output Example Configuring Source-Route Bri dging BC-161 Administrativ e Access Filters—Filter i ng SNAP F rames on Output Example Figure 68 shows a router connecting four T oken Rings. Figure 68 Router Filtering SNAP Fra mes on Output The follo wing example allo ws only AppleT alk Phas e[...]
-
Page 54
SRB Configuration Examples BC-162 Bridging and IBM N etworking Configuratio n Guide access-list 203 permit 0xE0E0 0x0101 access-list 203 deny 0x0000 0xFFFF Note that it is not necessary to check for an LSAP of 0xAAAA when f ilt ering SN AP-encapsulated AppleT alk packets, because for source-route bri dging, the use of type f ilters implies SN AP en[...]
-
Page 55
Access Filters Example Configuring Source-Route Bri dging BC-163 Access Filters Example Figure 69 shows two routers connecting two T oken Rings to an FDDI backbone. Figure 69 Network Configuration Using NetBI OS Access Filters Suppose you want to pe rmit the IBM 3174 cluster controll ers to access the FEP at address 0110.2222.3333 , and also want t[...]
-
Page 56
SRB Configuration Examples BC-164 Bridging and IBM N etworking Configuratio n Guide A utonomous Switching Example The following e xample enables use of autonomous switching between two ciscoBus T oken Ring interfaces in the same router . Frames entering T oken Ring interf aces 0 or 1 will be autonomously switched to the other interface. ! global co[...]