Ir para a página of
Manuais similares
-
Network Router
Cisco Systems 4033836
106 páginas 3.9 mb -
Network Router
Cisco Systems IPMUX-1E
217 páginas 3.45 mb -
Network Router
Cisco Systems AIRCAP3602ITK9
40 páginas 1.28 mb -
Network Router
Cisco Systems DL-2159-05
332 páginas 4.59 mb -
Network Router
Cisco Systems Cisco IOS XR
222 páginas 5.14 mb -
Network Router
Cisco Systems MWR 1941-DC
12 páginas 0.8 mb -
Network Router
Cisco Systems 12000
96 páginas 0.99 mb -
Network Router
Cisco Systems RE1000
15 páginas 6.4 mb
Bom manual de uso
As regras impõem ao revendedor a obrigação de fornecer ao comprador o manual com o produto Cisco Systems BC-109. A falta de manual ou informações incorretas fornecidas ao consumidor são a base de uma queixa por não conformidade do produto com o contrato. De acordo com a lei, pode anexar o manual em uma outra forma de que em papel, o que é frequentemente utilizado, anexando uma forma gráfica ou manual electrónicoCisco Systems BC-109 vídeos instrutivos para os usuários. A condição é uma forma legível e compreensível.
O que é a instrução?
A palavra vem do latim "Instructio" ou instruir. Portanto, no manual Cisco Systems BC-109 você pode encontrar uma descrição das fases do processo. O objetivo do manual é instruir, facilitar o arranque, a utilização do equipamento ou a execução de determinadas tarefas. O manual é uma coleção de informações sobre o objeto / serviço, um guia.
Infelizmente, pequenos usuários tomam o tempo para ler o manual Cisco Systems BC-109, e um bom manual não só permite conhecer uma série de funcionalidades adicionais do dispositivo, mas evita a formação da maioria das falhas.
Então, o que deve conter o manual perfeito?
Primeiro, o manual Cisco Systems BC-109 deve conte:
- dados técnicos do dispositivo Cisco Systems BC-109
- nome do fabricante e ano de fabricação do dispositivo Cisco Systems BC-109
- instruções de utilização, regulação e manutenção do dispositivo Cisco Systems BC-109
- sinais de segurança e certificados que comprovam a conformidade com as normas pertinentes
Por que você não ler manuais?
Normalmente, isso é devido à falta de tempo e à certeza quanto à funcionalidade específica do dispositivo adquirido. Infelizmente, a mesma ligação e o arranque Cisco Systems BC-109 não são suficientes. O manual contém uma série de orientações sobre funcionalidades específicas, a segurança, os métodos de manutenção (mesmo sobre produtos que devem ser usados), possíveis defeitos Cisco Systems BC-109 e formas de resolver problemas comuns durante o uso. No final, no manual podemos encontrar as coordenadas do serviço Cisco Systems na ausência da eficácia das soluções propostas. Atualmente, muito apreciados são manuais na forma de animações interessantes e vídeos de instrução que de uma forma melhor do que o o folheto falam ao usuário. Este tipo de manual é a chance que o usuário percorrer todo o vídeo instrutivo, sem ignorar especificações e descrições técnicas complicadas Cisco Systems BC-109, como para a versão papel.
Por que ler manuais?
Primeiro de tudo, contem a resposta sobre a construção, as possibilidades do dispositivo Cisco Systems BC-109, uso dos acessórios individuais e uma gama de informações para desfrutar plenamente todos os recursos e facilidades.
Após a compra bem sucedida de um equipamento / dispositivo, é bom ter um momento para se familiarizar com cada parte do manual Cisco Systems BC-109. Atualmente, são cuidadosamente preparados e traduzidos para sejam não só compreensíveis para os usuários, mas para cumprir a sua função básica de informação
Índice do manual
-
Página 1
Configuring Source-Route Bri dging BC-109 Configur ing Source-Route Br idging This chapter describes source-route bridging (SRB) co nfiguration tasks. F or a discussion of remote source-route bridging (RSRB) con figuration tasks, refer to the “Configuring Remote Source-Rou te Bridging” chapter in this publi cation. For a complete description of[...]
-
Página 2
Configure Source-Route Brid ging BC-110 Bridging and IBM N etworking Configuratio n Guide Configure Sour ce-Route Bridging Our implementation of source-route bridgi ng enables you to connect two or more T oken Ring networks using either T oken Ring or Fibe r Distrib uted Data Interface (FDDI) media. The Cisco IOS software offers the ability to en c[...]
-
Página 3
Configure a Multiport Bridge Using a Virtual Ring Configuring Source-Route Bri dging BC-111 A dual-port bridge is a limitation imposed by IBM T oken Ring chips; the chips can process only two ring numbers. If you hav e a router with two or more T oken Ring interfaces, you can work around the two-ring number limitation. Y ou can configure your route[...]
-
Página 4
Configure Source-Route Brid ging BC-112 Bridging and IBM N etworking Configuratio n Guide Figure 47 Multiport Bridge Using a Vir tual Ring T o take adv antage of this virtua l ring feature, each T oken Ring in terface on the router must be configured to belong to the same ring group. For information about configuring a multiport bridge using a virt[...]
-
Página 5
Configure SRB over FDDI Configuring Source-Route Bri dging BC-113 Enable SRB and Assign a Ring Group to an Interf ace After you have def ined a ring group, yo u must as sign that ring group to thos e interfaces you plan to include in that ring gro up. An interface can only be assigned to one ring group. T o enable any-to-any connecti vity among the[...]
-
Página 6
Configure Source-Route Brid ging BC-114 Bridging and IBM N etworking Configuratio n Guide Configure F ast-Swit ching SRB ov er FDDI Fast-Switching SRB o ver FDDI enhances performance. F or example, if you w ant to use access-lists, fast-switching SRB ov er FDDI provides fast performance and access-li st filters capability . T o configure fast-switc[...]
-
Página 7
Enable the Auto matic Spanning-Tree Function Configuring Source-Route Bri dging BC-115 Forw arding all-routes explorer pack ets is the defa ult. Howe ver , in complicated source-route bridging topologies, using this default can generate an exponentially large number of explorers that are trav ersing the network. The numb er of explorer packets beco[...]
-
Página 8
Configure Source-Route Brid ging BC-116 Bridging and IBM N etworking Configuratio n Guide T o create a bridge group that r uns an automatic spanning-tree fu nction compatibl e with the IB M SRB spanning-tree implementation, use the foll o wing command in global configuration mode: T o enable the automatic spanning -tree function for a specif ied gr[...]
-
Página 9
Configure Brid ging of Routed Protoc ols Configuring Source-Route Bri dging BC-117 Configure Bridging of Routed Pr otocols Source-route bridges use Media Access Control (M A C) information, specifically the information contained in the RIF , to bridge packets. A RIF co ntains a series of ring and bridge numbers that represent the possible paths the[...]
-
Página 10
Configure Bridging of Routed Protocol s BC-118 Bridging and IBM N etworking Configuratio n Guide • VINES • XNS Enable use of the RIF only on T o ken Ring interfaces on the route r . T o configure the Cisco IOS softwa re to append RI F information, use the follo wing command in interface conf iguration mode: For an example of ho w to configure t[...]
-
Página 11
Configure Tra nslation betw een SRB an d Transparent Bridging Environments Configuring Source-Route Bri dging BC-119 Configure T ranslation between SRB and T ransparent Bridging En vironments Source-route translati onal bridging (SR/TLB) is a Cisco IOS software feature that allows you to combine SRB and transparent bridging networks with out the ne[...]
-
Página 12
Configure Trans lation between SRB and Transparent Brid ging Environments BC-120 Bridging and IBM N etworking Configuratio n Guide Figure 50 Example of a Simple SR/T LB T opol ogy Note The Spanning-Tree Protocol messages used to pre vent loops in the transparent bridging domain are not passed between the SRB domain and the transparent bridging doma[...]
-
Página 13
Enable Bridging between Tran sparent Bridging and SRB Configuring Source-Route Bri dging BC-121 W e currently know that problems occur wi th the following protocols when bridged between T oken Ring and other media: Nov ell IPX, DECnet Phas e IV , AppleT alk, VINES, XNS, and IP . Further , problems can occur with the Novell IPX and XNS protocols whe[...]
-
Página 14
Configure Trans lation between SRB and Transparent Brid ging Environments BC-122 Bridging and IBM N etworking Configuratio n Guide Enab le T ok en Ring LLC2-to-Ether net Conv ersion The Cisco IOS software supports the following types of T oken Ring-to-Ethernet frame con versions using Logical Link Control, type 2 (LLC2) Protocol: • T oken Ring LL[...]
-
Página 15
Configure NetBIOS Support Configuring Source-Route Bri dging BC-123 Configure NetBIOS Suppor t NetBIOS is a nonroutable protocol that was originally designed to transmit messages between stations, typically IBM PCs, on a T oken Ring networ k. NetBIOS allows messages to be e xchanged between the stations using a name rather than a station address. E[...]
-
Página 16
Configure NetBIOS Support BC-124 Bridging and IBM N etworking Configuratio n Guide • Create Static Entries in the NetBIOS Name Cache • Specify Dead-T ime Interv als for NetBIOS Pack ets Enab le the Pro xy Explorers F eature on the Appropriate Interf ace In order to enable NetBIOS name caching on an in terface, the proxy explorer s feature must [...]
-
Página 17
Configure the NetBIOS Cache Name Length Configuring Source-Route Bri dging BC-125 Configure the NetBIOS Cache Name Length T o specify ho w many characters of the NetBIOS type name that the name cache will v alidate, enter the following command in global configuration mode: Enab le NetBIOS Pro xying The Cisco IOS software can act as a proxy and send[...]
-
Página 18
Configure LNM Support BC-126 Bridging and IBM N etworking Configuratio n Guide The Cisco IOS software also con verts pair s of FIND_N AME and NAME_RECOGNIZED pack ets recei ved from explorers, which tra v erse all rings, to specif ic route frames that are sent only between the two machines that need to see these packets. Y ou can specify a query-t [...]
-
Página 19
Configure LNM Support Configuring Source-Route Bri dging BC-127 Figure 51 LNM Linking to a Sour ce-Route Bridge on Each Local Ring If LNM requires info rmation about a stati on some where on a T oken Ring, it uses a proprietary IBM protocol to query to one of the source-route bridge s connected to that ring. If th e bridge can provide the requested[...]
-
Página 20
Configure LNM Support BC-128 Bridging and IBM N etworking Configuratio n Guide Figure 52 LAN Network Manager Monitorin g an d T ranslating Notice that the proprietary protocol LNM uses to communicate with the source-route bridge is an LLC2 connection. Although its protoco l cannot be routed, LNM can monitor or manage anything within the SRB netwo r[...]
-
Página 21
Configure LNM Software on th e Management Stations to Communicate with the Router Configuring Source-Route Bri dging BC-129 When SRB is enabled on the router, conf iguring the Cisco IOS software to perform the functions of an IBM Bridge for communication with LNM occu rs automatically . Theref ore, if SRB has been enabled, you do not need to perfor[...]
-
Página 22
Configure LNM Support BC-130 Bridging and IBM N etworking Configuratio n Guide The command can be used to terminate all LN M server input and reporting links. In normal circumstances, this command should not be necessary because it is a superset of the functions normally performed on indi vidual interfaces b y the no lnm r em and no lnm rps command[...]
-
Página 23
Apply a Password to an LNM Reporting Link Configuring Source-Route Bri dging BC-131 T o enable other LR Ms to change router parameters, use th e following command in interface configuration mode: Apply a P ass word to an LNM Repor ting Link Each reporting link has its o wn password that is us ed not only to prev ent unauthorized access from an LRM [...]
-
Página 24
Configure LNM Support BC-132 Bridging and IBM N etworking Configuratio n Guide Change an LNM Repor ting Inter val All stations on a T oken Ring notify the Ring Error Monitor (REM) when they detect errors on the ring. In order to prev ent excessi ve messages, er ror reports are not sent immediately , but are accumulated for a short interval and then[...]
-
Página 25
Secure the SRB Network Configuring Source-Route Bri dging BC-133 Secure the SRB Netw ork This section describes how to conf igure three features that are us ed primarily to provide network security: NetBIOS access filters, administrati ve filt ers, and access expressions that can be combined with administrative f ilters. In addi tion, these feat ur[...]
-
Página 26
Secure the SRB Network BC-134 Bridging and IBM N etworking Configuratio n Guide The NetBIOS station access list contains the station name to match, along with a permit or deny condition. Y ou must assign the name of the access list to a station or set of stations on the network. T o assign a station access list name, use the fo llowing command in g[...]
-
Página 27
Configure Admi nistrative Filte rs for Token Ring Traffic Configuring Source-Route Bri dging BC-135 Configure Administrativ e Fi lters f or T ok en Ring T raffic Source-route bridges normally f i lter frames according to the routi ng information contained in the frame. That is, a bridge will not forward a frame b ack to its originating network segm[...]
-
Página 28
Secure the SRB Network BC-136 Bridging and IBM N etworking Configuratio n Guide T o enable filtering on input or ou tput, use one of the follo wing co mmands in interface configuration mode: Y ou can filter SN AP-encapsulated packets on either input or output. The a ccess list you specify is the one you created that include s the protocol type code[...]
-
Página 29
Configure Access Expressions that Combine Administrative Filters Configuring Source-Route Bri dging BC-137 Configure Access Expressions that Co mbine Administrativ e Filters Y ou can use access expressions to combine access f ilters to establish co mple x conditions under which bridged frames can enter or lea ve an in terf ace. Using access express[...]
-
Página 30
Secure the SRB Network BC-138 Bridging and IBM N etworking Configuratio n Guide Configure Access Expressions T o configure an access e x pression perform the following tasks: • Design the access expression. • Configure the access lists used by the e xpression. • Configure the access e xpres sion into the router . When designing an access expr[...]
-
Página 31
Tune the SRB Network Configuring Source-Route Bri dging BC-139 The access lists defined in the pre vious section create the foll owing configuration: interface tokenring 0 access-expression in ~lsap(202) | dmac(701) ! access-list 202 permit 0x0404 0x0001 ! Permits SNA frames (command or response) access-list 202 permit 0x0004 0x0001 ! Permits SNA E[...]
-
Página 32
Tune the SRB N etwork BC-140 Bridging and IBM N etworking Configuratio n Guide Enab le or Disab le the Sour ce-Route F ast-Switching Cache Rather than processing packets at the process lev el, the fast-switching feat ure enables the Cisco IOS software to process pack ets at the interrupt lev el. Each packet is transferred from the input interface t[...]
-
Página 33
Enable or Disable the SSE Configuring Source-Route Bri dging BC-141 Enab le or Disab le the SSE The Silicon Switch Engine (SSE) acts as a programmable cache to sp eed the switching of packets. T o enable or disable the SSE, use one of the fo llo wing commands in inte rface conf iguration mode: Estab lish the Connection Timeout Inter val It may be n[...]
-
Página 34
Tune the SRB N etwork BC-142 Bridging and IBM N etworking Configuratio n Guide Figure 54 Controlling Explor er Storms in Re dundant Network T opolog ies The source-bridge explor er -dup-AR E-f ilter command can be used to reduce explorer traf fic by filtering e x plorer frames. T o optimize explorer processin g, use one or more of the following com[...]
-
Página 35
Configure Proxy Explorers Configuring Source-Route Bri dging BC-143 Configure Pro xy Explorers Y ou can use the proxy explorers f eature to limit the amo unt of explorer traff ic propagatin g through the source-bridge network. T o configure proxy explorers, use the follo w ing command in interface conf iguration mode: The Cisco IOS software does no[...]
-
Página 36
Monitor and Maintain the SRB Network BC-144 Bridging and IBM N etworking Configuratio n Guide Repor t Spur ious F rame-Copied Errors An IBM 3174 cluster controller can be configur ed to report frame-copi ed errors to IBM LAN Network Manager software. These errors indicate that another host is responding to the MAC address of the 3174 cluster contro[...]
-
Página 37
SRB Configuration Examples Configuring Source-Route Bri dging BC-145 T o maintain th e SRB network, use any of the follo wing commands in privile ged EXEC mode: In addition to the EXEC-mode comman ds to maintain the SRB network, you can use the following command in global configuration mode: SRB Configuration Examples The following sections prov id[...]
-
Página 38
SRB Configuration Examples BC-146 Bridging and IBM N etworking Configuratio n Guide • NetBIOS Support with a Stat ic NetBIOS Cache Entry Example • LNM for a Simple Network Example • LNM for a More Complex Network Example • NetBIOS Access Filters Example • Filtering Bridged T oken Ring Pack ets to IBM Machines Example • Administrativ e A[...]
-
Página 39
SRB with Automatic Span ning-Tree Function Configuration Example Configuring Source-Route Bri dging BC-147 SRB with A utomatic Spanning-T ree Function Configuration Example The following e xample of a Cisco series 7000 router configuration illustrates how to enable the automatic spanning tree function on an SRB network: source-bridge ring-group 100[...]
-
Página 40
SRB Configuration Examples BC-148 Bridging and IBM N etworking Configuratio n Guide SRB and Routing Cer tain Protocols Example In the following configuration, IP , XNS, and IPX are routed, while all other protoco ls are bridged between rings. While not strictly necessary , the Novell IPX and XNS network numbers are set consistently with the IP subn[...]
-
Página 41
SRB with Multiple Virtu al Ring Groups Exampl e Configuring Source-Route Bri dging BC-149 The following is a sample conf i guration file: source-bridge ring-group 7 ! interface tokenring 0 source-bridge 1000 1 7 source-bridge spanning ! interface tokenring 1 source-bridge 1001 1 7 source-bridge spanning ! interface tokenring 2 source-bridge 1002 1 [...]
-
Página 42
SRB Configuration Examples BC-150 Bridging and IBM N etworking Configuratio n Guide Configuration f or Router B source-bridge ring-group 200 ! interface tokenring 0 source-bridge 3 1 200 source-bridge spanning ! interface tokenring 2 source-bridge 2 1 200 source-bridge spanning SRB ov er FDDI Conf iguration Examples The following e xamples sho w th[...]
-
Página 43
SRB over Frame Relay Configuration Example Configuring Source-Route Bri dging BC-151 SRB ov er F rame Rela y Configuration Example Figure 59 illustrates a network with the following characteristics: • V irtual Ring N umber of Router A = 100 • V irtual Ring Number of FRAD B = 200 • V irtual Ring Number of FRAD C = 300 • DLCI number for PVC b[...]
-
Página 44
SRB Configuration Examples BC-152 Bridging and IBM N etworking Configuratio n Guide Configuration of Router A source-bridge ring-group 100 ! interface Serial1 encapsulation frame-relay ! interface Serial1.1 point-to-point frame-relay interface-dlci 30 ietf source-bridge 200 1 100 conserve-ring source-bridge spanning ! interface Serial1.2 point-to-p[...]
-
Página 45
Adding a Static RIF Cache Entr y for a Two-Hop Path Example Configuring Source-Route Bri dging BC-153 Figure 60 Assigning a RIF t o a Source-Route Bridge The static RIF entry would be submitted to the router on the left as follows: rif 1000.5A12.3456 0630.0081.0090 Adding a Static RIF Cache Entr y for a T w o-Hop P ath Example In Figure 61, assu me[...]
-
Página 46
SRB Configuration Examples BC-154 Bridging and IBM N etworking Configuratio n Guide Assume that the following configuration for SRB and transparent bridging existed before you wanted to enable SR/TLB: interface tokenring 0 source-bridge 1 1 2 ! interface tokenring 1 source-bridge 2 1 1 ! interface ethernet 0 bridge-group 1 ! interface ethernet 0 br[...]
-
Página 47
SR/TLB with Access Filtering Example Configuring Source-Route Bri dging BC-155 Once you have determined the ring number and t he bridge number , you can add the source-bridge transparent command to the f ile, including these two va lues as parameters for the command. The following partial configuration includes this source-bridge transparent entry:[...]
-
Página 48
SRB Configuration Examples BC-156 Bridging and IBM N etworking Configuratio n Guide The command for the T oken Ring interface specif ies that the access list 701 be applied on the source address of frames going out to the T oken Ring, a nd the command for the Ethe rnet interface specifies that this access list be applied on the source address frame[...]
-
Página 49
LNM for a Simple Network Example Configuring Source-Route Bri dging BC-157 LNM f or a Simple Network Example Figure 65 shows a router with two T oken Rings configured as a local source-route bridge. Figure 65 Router with T wo T oken Rings Co nfigured as a Local Sour ce-Route Bridge The associated configuration f ile follows: interface tokenring 0 s[...]
-
Página 50
SRB Configuration Examples BC-158 Bridging and IBM N etworking Configuratio n Guide LNM f or a More Comple x Network Example Figure 66 shows a router with three T oken Rings configured as a multiport bridge, thus employing the concept of the virtual ri ng. Figure 66 Router with T hree T oken Ring s Configured as a Multiport Bridg e The associated c[...]
-
Página 51
NetBIOS Access Filters Example Configuring Source-Route Bri dging BC-159 The show lnm config command displays the logical configuration of this bridge, including all the pertinent information for configuring this router into LNM: Wayfarer# show lnm config Bridge(s) currently configured: From ring 001, address 0000.0028.abcd Across bridge 001 To rin[...]
-
Página 52
SRB Configuration Examples BC-160 Bridging and IBM N etworking Configuratio n Guide Access lists are scanned in order . In the foll owing e xample, the first list denies all entries beginning with the letters ABC, including one named ABCD . This voids the second command, because the entry permitting a name with ABCD com es after the entry denying i[...]
-
Página 53
Administrative Access Fi lters—Filtering SNAP Fr ames on Output Example Configuring Source-Route Bri dging BC-161 Administrativ e Access Filters—Filter i ng SNAP F rames on Output Example Figure 68 shows a router connecting four T oken Rings. Figure 68 Router Filtering SNAP Fra mes on Output The follo wing example allo ws only AppleT alk Phas e[...]
-
Página 54
SRB Configuration Examples BC-162 Bridging and IBM N etworking Configuratio n Guide access-list 203 permit 0xE0E0 0x0101 access-list 203 deny 0x0000 0xFFFF Note that it is not necessary to check for an LSAP of 0xAAAA when f ilt ering SN AP-encapsulated AppleT alk packets, because for source-route bri dging, the use of type f ilters implies SN AP en[...]
-
Página 55
Access Filters Example Configuring Source-Route Bri dging BC-163 Access Filters Example Figure 69 shows two routers connecting two T oken Rings to an FDDI backbone. Figure 69 Network Configuration Using NetBI OS Access Filters Suppose you want to pe rmit the IBM 3174 cluster controll ers to access the FEP at address 0110.2222.3333 , and also want t[...]
-
Página 56
SRB Configuration Examples BC-164 Bridging and IBM N etworking Configuratio n Guide A utonomous Switching Example The following e xample enables use of autonomous switching between two ciscoBus T oken Ring interfaces in the same router . Frames entering T oken Ring interf aces 0 or 1 will be autonomously switched to the other interface. ! global co[...]