Ir para a página of
Manuais similares
-
Switch
Cisco Systems SR216
2 páginas 3 mb -
Switch
Cisco Systems ONS 15530
48 páginas 1.43 mb -
Switch
Cisco Systems 4948 Series
16 páginas 0.11 mb -
Switch
Cisco Systems EG005W
25 páginas 1.33 mb -
Switch
Cisco Systems 2950
674 páginas 18.88 mb -
Switch
Cisco Systems OL-7029-01
342 páginas 2.69 mb -
Switch
Cisco Systems 3650
94 páginas 10.72 mb -
Switch
Cisco Systems MDS 9020
22 páginas 0.39 mb
Bom manual de uso
As regras impõem ao revendedor a obrigação de fornecer ao comprador o manual com o produto Cisco Systems RJ-45-to-AUX. A falta de manual ou informações incorretas fornecidas ao consumidor são a base de uma queixa por não conformidade do produto com o contrato. De acordo com a lei, pode anexar o manual em uma outra forma de que em papel, o que é frequentemente utilizado, anexando uma forma gráfica ou manual electrónicoCisco Systems RJ-45-to-AUX vídeos instrutivos para os usuários. A condição é uma forma legível e compreensível.
O que é a instrução?
A palavra vem do latim "Instructio" ou instruir. Portanto, no manual Cisco Systems RJ-45-to-AUX você pode encontrar uma descrição das fases do processo. O objetivo do manual é instruir, facilitar o arranque, a utilização do equipamento ou a execução de determinadas tarefas. O manual é uma coleção de informações sobre o objeto / serviço, um guia.
Infelizmente, pequenos usuários tomam o tempo para ler o manual Cisco Systems RJ-45-to-AUX, e um bom manual não só permite conhecer uma série de funcionalidades adicionais do dispositivo, mas evita a formação da maioria das falhas.
Então, o que deve conter o manual perfeito?
Primeiro, o manual Cisco Systems RJ-45-to-AUX deve conte:
- dados técnicos do dispositivo Cisco Systems RJ-45-to-AUX
- nome do fabricante e ano de fabricação do dispositivo Cisco Systems RJ-45-to-AUX
- instruções de utilização, regulação e manutenção do dispositivo Cisco Systems RJ-45-to-AUX
- sinais de segurança e certificados que comprovam a conformidade com as normas pertinentes
Por que você não ler manuais?
Normalmente, isso é devido à falta de tempo e à certeza quanto à funcionalidade específica do dispositivo adquirido. Infelizmente, a mesma ligação e o arranque Cisco Systems RJ-45-to-AUX não são suficientes. O manual contém uma série de orientações sobre funcionalidades específicas, a segurança, os métodos de manutenção (mesmo sobre produtos que devem ser usados), possíveis defeitos Cisco Systems RJ-45-to-AUX e formas de resolver problemas comuns durante o uso. No final, no manual podemos encontrar as coordenadas do serviço Cisco Systems na ausência da eficácia das soluções propostas. Atualmente, muito apreciados são manuais na forma de animações interessantes e vídeos de instrução que de uma forma melhor do que o o folheto falam ao usuário. Este tipo de manual é a chance que o usuário percorrer todo o vídeo instrutivo, sem ignorar especificações e descrições técnicas complicadas Cisco Systems RJ-45-to-AUX, como para a versão papel.
Por que ler manuais?
Primeiro de tudo, contem a resposta sobre a construção, as possibilidades do dispositivo Cisco Systems RJ-45-to-AUX, uso dos acessórios individuais e uma gama de informações para desfrutar plenamente todos os recursos e facilidades.
Após a compra bem sucedida de um equipamento / dispositivo, é bom ter um momento para se familiarizar com cada parte do manual Cisco Systems RJ-45-to-AUX. Atualmente, são cuidadosamente preparados e traduzidos para sejam não só compreensíveis para os usuários, mas para cumprir a sua função básica de informação
Índice do manual
-
Página 1
[...]
-
Página 2
Table of Contents Cisco Switching Black Book ...............................................................................................................................1 Introduction .........................................................................................................................................................4 Overview[...]
-
Página 3
Table of Contents Chapter 2: Basic Switch Configuration The RJ−45−to−AUX Port Console Connector Pinouts ...................................................................36 Switch IOSs ...........................................................................................................................................38 The IOS Configur[...]
-
Página 4
Table of Contents Chapter 3: WAN Switching BPX 8600 Series Wide−Area Switches ..........................................................................................58 MGX 8800 Series Wide−Area Edge Switches...............................................................................59 WAN Switch Hardware Overview .........................[...]
-
Página 5
Table of Contents Chapter 4: LAN Switch Architectures LCP ..................................................................................................................................................75 SAGE ASIC ....................................................................................................................................7[...]
-
Página 6
Table of Contents Chapter 5: Virtual Local Area Networks .......................................................................................................88 In Depth .................................................................................................................................................88 The Flat Network of Yesterday [...]
-
Página 7
Table of Contents Chapter 6: InterVLAN and Basic Module Configuration ..........................................................................114 In Depth ...............................................................................................................................................114 Internal Route Processors ....................[...]
-
Página 8
Table of Contents Chapter 7: IP Multicast Time to Live ..................................................................................................................................147 Multicast at Layer 2 .............................................................................................................................147 IGMP Snoopi[...]
-
Página 9
Table of Contents Chapter 7: IP Multicast Configuring Packet−Based Suppression ..............................................................................................159 Disabling Multicast Suppression .........................................................................................................159 Chapter 8: WAN Cell Switching.[...]
-
Página 10
Table of Contents Chapter 9: LightStream Switches Verifying an ATM Interface Connection Status ..................................................................................190 Viewing the Configured Virtual Connections .....................................................................................191 Configuring the LECS ATM Address on a[...]
-
Página 11
Table of Contents Chapter 10: Layer 2 Redundant Links Verifying the Port Cost Configuration on Both a Set/Clear Command− and CLI−Based Interface ...217 Configuring the Port Priority on a Set/Clear Command−Based IOS ..................................................217 Configuring the Port Priority on a CLI−Based IOS.........................[...]
-
Página 12
Table of Contents Chapter 11: Multilayer Switching Assigning a VLAN ID ...................................................................................................................236 Adding an MLS Interface to a VTP Domain................................................................................236 Enabling MLS on an Individual Interfa[...]
-
Página 13
Table of Contents Chapter 12: Hot Standby Routing Protocol Enabling Interface Tracking ................................................................................................................252 Using the show standby Command.....................................................................................................252 Using the de[...]
-
Página 14
Table of Contents Chapter 15: The Standard Edition IOS [V] Virtual LAN ............................................................................................................................293 [R] Multicast Registration .............................................................................................................294 [F] Firmwar[...]
-
Página 15
Table of Contents Chapter 16: Switch Troubleshooting Using the show log Command on a Set/Clear Command−Based IOS ................................................336 Configuring SPAN for Port Monitoring on a Set/Clear Command−Based IOS .................................337 Configuring SPAN for VLAN Monitoring on a Set/Clear Command−Based IOS ..[...]
-
Página 16
Table of Contents Appendix E: Switch Features........................................................................................................................359 Access Layer Switches ........................................................................................................................359 Cisco Catalyst 1900 ...............[...]
-
Página 17
Cisco Switching Black Book Sean Odom Hanson Nottingham © 2001 The Coriolis Group. All rights reserved. This book may not be duplicated in any way without the express written consent of the publisher, except in the form of brief excerpts or quotations for the purposes of review. The information contained herein is for the personal use of the reader[...]
-
Página 18
Steve Sayre Acquisitions Editor Charlotte Carpentier Product Marketing Manager Tracy Rooney Project Editor Toni Zuccarini Ackley Technical Reviewer Deniss Suhanovs Production Coordinator Carla J. Schuder Cover Designer Jody Winkler Layout Designer April Nielsen Dear Reader: Coriolis Technology Press was founded to create a very elite group of books[...]
-
Página 19
Jeff Duntemann VP and Editorial Director This book is dedicated to all those who endeavor to turn dreams into realities. —Sean Odom To my wife, Sonia, and my daughter, Sabrina. —Hanson Nottingham About the Authors Sean Odom is a CCNP, MCSE, and CNX−Ethernet. He has been in the computer networking field for over 12 years and can be found instr[...]
-
Página 20
Introduction Overview For many years I have been a consultant for different companies and have written books on switch and router configurations and troubleshooting. During my years as a consultant I have had to either install, administer, or troubleshoot switching problems and configurations for switches without a good handbook. I have constantly [...]
-
Página 21
Words in brackets that are separated by bars are used when indicating that there are multiple choices of commands. For example, when configuring VTP you can enable the trunk port to choose one mode: on, off, desirable, or auto mode. This will be shown like this: [on|off|desirable|auto]. • Knowledge of what configuration mode you are in and how to[...]
-
Página 22
Chapter 1: Network Switching Fundamentals In Depth Although writing the first paragraph of a book is probably the least important part, it’s invariably the most difficult section to write. To get a good picture of the different parts of networking, readers need to know where networking began and the history behind the networks of today. You may h[...]
-
Página 23
Port switching —Takes place in the backplane of a shared hub. For instance, ports 1, 2, and 3 could be connected to backplane 1, whereas ports 4, 5, and 6 could be connected to backplane 2. This method is typically used to form a collapsed backbone and to provide some improvements in the network. • Cell switching —Uses Asynchronous Transfer M[...]
-
Página 24
Many different types of physical cable media have been introduced over the years, such as Token Ring, FDDI, and Ethernet. At one time, Token Ring was seen as a technically superior product and a viable alternative to Ethernet. Many networks still contain Token Ring, but very few new Token Ring installations are being implemented. One reason is that[...]
-
Página 25
Client/Server Network Model Peer−to−peer model networks evolved into the client/server model, in which the server shares applications and data storage with the clients in a somewhat more centralized network. This setup includes a little more security, provided by the operating system, and ease of administration for the multiple users trying to [...]
-
Página 26
After each frame transmission, all stations on the network contend equally for the next frame transmission. This competition allows access to the network channel in a fair manner. It also ensures that no single station can lock out the other stations from accessing the network. Access to the shared channel is determined by the Media Access Control [...]
-
Página 27
Six types of hubs are found in the network: Active hubs —Act as repeaters and eliminate attenuation by amplifying the signals they replicate to all the attached ports. • Backbone hubs —Collect other hubs into a single collection point. This type of design is also known as a multitiered design. In a typical setup, servers and other critical de[...]
-
Página 28
segment, it transmits the packet on that segment or port to that segment only. If the bridge does not know the destination segment, the bridge transmits a copy of the frame to all the interface ports in the source segment using a technique known as flooding . For each packet an interface receives, the bridge stores in its table the following inform[...]
-
Página 29
Routers Routers are devices that operate at Layer 3 of the OSI Model. Routers can be used to connect more than one Ethernet segment with or without bridging. Routers perform the same basic functions as bridges and also forward information and filter broadcasts between multiple segments. Figure 1.2 shows routers segmenting multiple network segments.[...]
-
Página 30
To improving network performance, switches must address three issues: They must stop unneeded traffic from crossing network segments. • They must allow multiple communication paths between segments. • They cannot introduce performance degradation. • Routers are also used to improve performance. Routers are typically attached to switches to co[...]
-
Página 31
designed the most efficient path to the destination. Single points of failure need to be analyzed, as well. As we stated earlier, every large−network user has suffered through his or her share of network outages and downtime. By analyzing all the possible points of failure, you can implement redundancy in the network and avoid many network outage[...]
-
Página 32
Although the nodes on each port are in their own collision domain, the broadcast domain consists of all of the ports assigned to a particular VLAN. Therefore, when a broadcast is sent from a node in VLAN 1, all the devices attached to ports assigned to VLAN 1 will receive that broadcast. The switch segments the users connected to other ports, there[...]
-
Página 33
bridged networks. To resolve the issue, your network administrator may even upgrade your PC to a faster CPU or more RAM. This allows your PC to generate more input/output (I/O), increasing the saturation on the network. In this type of environment, every data packet is sent to every machine, and each station has to process every frame on the networ[...]
-
Página 34
Poorly designed and implemented switched networks can have awful effects. Let’s take a look at the effects of a flat area topology and how we can design, modify, and upgrade Ethernet networks to perform as efficiently as possible. Properly Switched Networks Properly switched networks use the Cisco hierarchical switching model to place switches in[...]
-
Página 35
Switched Forwarding Switches route data based on the destination MAC address contained in the frame’s header. This approach allows switches to replace Layer 2 devices such as hubs and bridges. After a frame is received and the MAC address is read, the switch forwards data based on the switching mode the switch is using. This strategy tends to cre[...]
-
Página 36
Combining Switching Methods To resolve the problems associated with the switching methods discussed so far, a new method was developed. Some switches, such as the Cisco Catalyst 1900, 2820, and 3000 series, begin with either cut−through or FragmentFree switching. Then, as frames are received and forwarded, the switch also checks the frame’s CRC[...]
-
Página 37
Many types of physical media topologies can be applied to this concept. In this demonstration, we will utilize Ethernet 100BaseT. Ethernet 10BaseT and 100BaseT are most commonly found in the networks of today. We’ll make an upgrade to the network and alleviate our bottleneck on the physical link from the switch to each resource node or server. By[...]
-
Página 38
We call a switch a blocking switch when the switch bus or components cannot handle the theoretical maximum throughput of all the input ports combined. There is a lot of debate over whether every switch should be designed as a non−blocking switch; but for now this situation is only a dream, considering the current pricing of non−blocking switche[...]
-
Página 39
Switched Ethernet Innovations Around 1990, many vendors offered popular devices known as intelligent multiport bridges; the first known usage of the term switch was the Etherswitch, which Kalpana brought to the market in 1990. At the time, these devices were used mainly to connect multiple segments—they usually did very little to improve performa[...]
-
Página 40
backward compatible to most of the equipment in use at the time. Although the standards bodies debated the merits of each of the camps, the marketplace decided for them. Fast Ethernet is the overwhelming winner, so much so that even HP sells Fast Ethernet on almost all its products. Note In 1995, Cisco purchased both Kalpana and Grand Junction and [...]
-
Página 41
devices run the same IOS. Some use a graphical interface, some use a Set/Clear command−line interface, and some use a Cisco Command Line Interface (CLI). Cisco has acquired more devices than they have designed and built themselves. Therefore, Cisco has adapted the operating systems designed for each device they have acquired to use the protocols [...]
-
Página 42
Router(config)#interface e0/0.? <0−4294967295> Ethernet interface number Router(config)#interface e0/0.1 Router(config−subif)# Let’s take a look at the commands available in the User EXEC mode of a Cisco Catalyst 1912 EN switch: SeansSwitch>? Exec commands: enable Turn on privileged commands exit Exit from the EXEC help Description o[...]
-
Página 43
snmp−server Modify SNMP parameters spantree Spanning tree subsystem spantree−template Set bridge template parameter storm−control Configure broadcast storm control parameters switching−mode Sets the switching mode tacacs−server Modify TACACS query parameters tftp Configure TFTP uplink−fast Enable Uplink fast vlan VLAN configuration vlan[...]
-
Página 44
multiple physical topologies, restricting broadcasts, and providing network security. Using switches and routers together, you can integrate large networks and provide a high level of performance without sacrificing the benefits of either technology. Entering and Exiting Privileged EXEC Mode After the switch has gone through the power on self test [...]
-
Página 45
Switch(config−if)#interface e0.1 Switch(config−subif)# Tip You can abbreviate any command as much as you want, as long as it remains unique (no other command exists that matches your abbreviation). For instance, the command interface e0.1 can be abbreviated as int e0.1 . To exit to Global Configuration mode, use the exit command or press Ctrl+Z[...]
-
Página 46
Chapter 2: Basic Switch Configuration In Depth Throughout the last decade, Cisco has acquired some major switching vendors such as Kalpana and Crescendo. As a result, Cisco switches have a variety of command−line interfaces you need to be familiar with in order to set up and maintain the devices. Command−Line Interfaces The most common interfac[...]
-
Página 47
For security reasons, you should change the default password and add an enable password on the Crescendo and IOS CLI−based interface switches. In the next stage of the configuration, you should assign an IP address, subnet mask, and default route to the route processor for routing and management purposes. Once you have finished the preceding basi[...]
-
Página 48
Weighted fair queuing (WFQ)— Allows for multiple queues so that no one queue can starve another of all its bandwidth. WFQ is enabled by default on all serial interfaces that run at or below 2Mbps, except for those interfaces with Link Access Procedure, Balanced (LAPB), X.25, or Synchronous Data Link Control (SDLC) encapsulations. Most networks fa[...]
-
Página 49
The Distribution layer defines the boundaries for the network and provides packet manipulation of the network traffic. It aids in providing isolation from topology changes such as media translations, defining broadcast domains, QoS, security, managing the size of the routing table, aggregating network addresses, static route distribution, dynamic r[...]
-
Página 50
RMON provides support for the following groups of Token Ring extensions: MAC−Layer Statistics Group —A collection of statistics from the MAC sublayer of the Data Link layer, kept for each Token Ring interface. This group collects information such as the total number of MAC layer packets received and the number of times the port entered a beacon[...]
-
Página 51
Figure 2.2: The different types of console ports on the switches. The console port must be accessed through a PC or another device (such as a dumb terminal) to view the initial configuration. From the console port, you can configure other points of entry—such as the VTY line ports—to allow you to use Telnet to configure the switch from other po[...]
-
Página 52
7 7 8 8 Table 2.3: Rollover cable RJ−45−to−RJ−45 pinouts. RJ−45 RJ−45 1 8 2 7 3 6 4 5 5 4 6 3 7 2 8 1 Console Connectors Different console adapters connect different interfaces in order to connect to the console port. The following are the types of console connectors for each switch: Catalyst 1900, 2820, and 2900 XL series switches each[...]
-
Página 53
Pin Signal Input/Output 1 RTS Out 2 DTR Out 3 TXD Out 4 GND N/A 5 GND N/A 6 RXD In 7 DSR In 8 CTS In Table 2.5: The RJ−45−to−DB−9 AUX port pinouts by color. Color RJ−45 DB−9 Brown 1 6 Blue 2 7 Yellow 3 2 Green 4 5 Red 5 5 Black 6 3 Orange 7 4 White 8 8 Table 2.6 shows the connectors most often used for modem connections. Table 2.7 shows[...]
-
Página 54
Table 2.8: DB−25−to−DB−9 connector pinouts. DB−25 Signal DB−9 2 TXD 3 3 RXD 2 4 RTS 7 5 CTS 8 6 DSR 6 7 GND 5 8 DCD 1 20 DTR 4 Switch IOSs Three types of Cisco operating systems are in use: Set/Clear command interface —Found on models of the Catalyst 2926, 2926G, 2948G, 2980G, 4000, 5000, 5500, 6000, and 6500 series of switches. They [...]
-
Página 55
Privileged EXEC mode —The Privileged command set includes those commands contained in User EXEC mode, as well as the configure command, through which you can access the remaining command modes. Privileged EXEC mode also includes high−level testing commands, such as debug . • Global Configuration mode —Global Configuration mode commands appl[...]
-
Página 56
Setting the Login Passwords By default, Cisco switches have no passwords configured when they are shipped. On the Cisco IOS−based switches, different priority levels of authority are available for console access. You can define two levels on IOS−based switches: privilege level 1, which is equivalent to User EXEC mode; and privilege level 15, wh[...]
-
Página 57
The time−out value is now set to five minutes, using seconds. Tip You can use the lock command to lock an unused Telnet session. After you issue the lock command, the system will ask you to enter and verify an unlocking password. To configure a Set/Clear command−based switch to five minutes, use the following command: CAT5009(enable) set logout[...]
-
Página 58
Configuring Port Speed and Duplex To configure the port speed—whether 10Mbps or 100Mbps—use the following commands: CORIOLIS5500(config) interface fastethernet 2/3 CORIOLIS5500(config−int) speed 100 CORIOLIS5500(config−int) duplex full The auto command can be used when the port on the other side is manually set. Links should not be configur[...]
-
Página 59
Console> enable Enter password: Because you have not yet set a Privileged EXEC mode password, pressing Enter will put you into Privileged EXEC mode. The console will show the following prompt: 5. Console> (enable) You are now in Privileged EXEC mode. Warning Starting here, all configuration changes are executed and saved to memory immediately[...]
-
Página 60
Entering a Contact Name and Location Information Next, let’s set the contact name for the person or organization that is administering this switch. Use the following commands to set the switch contact and location: CORIOLIS5500(enable) set system contact Joe Snow CORIOLIS5500(enable) set system location Coriolis Wiring Closet Configuring System a[...]
-
Página 61
sc0: flags=63<UP,BROADCAST,RUNNING> vlan 1 inet 68.187.127.1 netmask 255.255.255.0 broadcast 68.187.127.1 Console> (enable) Configuring a Default Route and Gateway Data traffic not addressed to the local subnet or VLAN must be sent to a default route or destination. For redundancy purposes, a secondary default gateway can be configured if [...]
-
Página 62
SeansSwitch (enable) set port speed ? <mod/port> Module number and Port number(s) SeansSwitch (enable) set port speed 2/1 ? auto Set speed to auto <port_speed> Port speed (4, 10, 16, 100 or 1000) SeansSwitch (enable) set port speed 2/1−8 100 Ports 2/1−8 transmission speed set to 100Mbps. SeansSwitch (enable) To manually configure a [...]
-
Página 63
Configuring a Menu−Driven IOS The Catalyst 3000 series has a menu−driven switch interface, which allows you to use the arrow keys on your keyboard to select the different options used to configure the switch. As with the other two types of interfaces, you need to connect the switch to a dumb terminal or PC. This switch, however, supports a proc[...]
-
Página 64
Configuring the Console Port To configure the Console port, do the following: Choose Configuration|Serial Configuration. 1. As shown in Figure 2.5, you can configure four options: the Hardware Flow Control, the Software Flow Control, the Autobaud Upon Break feature, and the Console Baud Rate. Under normal circumstances, you will never change these [...]
-
Página 65
Figure 2.6: The menu−driven VLAN IP configuration screen. Related solutions: Found on page: Creating a Standard Access List 402 Creating an Extended Access List 403 Enabling Port Security 411 Configuring SNMP You can configure up to 10 community strings on the menu−driven switch IOS by following these steps: Enter the appropriate IP configurati[...]
-
Página 66
Configuring ROM ROM monitor is a ROM−based program that can be configured to execute upon the following conditions: Upon boot−up • Upon recycling the switch power • When a fatal exception error occurs • When the switch fails to find a valid system image • If the nonvolatile RAM (NVRAM) configuration is corrupt • If the configuration r[...]
-
Página 67
Configuring SNMP RMON works in conjunction with SNMP and requires a protocol analyzer or probe to use its full features. To use SNMP−based monitoring, you need to verify that SNMP is running on your IOS−based switch. Verify that SNMP is running, using the following command in User or EXEC mode: show snmp 1. Enable SNMP and allow read−only acc[...]
-
Página 68
read−write Administrators read−write−all Root Trap−Rec−Address Trap−Rec−Community ———————————————————————————— ———————————————————— 168.187.127.4 read−write 168.187.127.6 read−write−all Console> (enable) To verify that RMON is runn[...]
-
Página 69
Up arrow Recalls commands in the history buffer Down arrow Returns to more recent commands Ctrl+A Moves to the beginning of a line Ctrl+B Moves back one character Ctrl+D Deletes a character Ctrl+E Moves to the end of the command line Ctrl+F Moves forward one character Ctrl+K Deletes all characters to the end of the line Ctrl+L Redisplays the system[...]
-
Página 70
Chapter 3: WAN Switching In Depth Switches are not only used in LAN networks; they are also used extensively in wide area networks (WANs). Chapters 1 and 2 gave you an overview of LAN switching. Well, WAN switching is the same in some ways and completely different in others. In an Ethernet switching environment, the switch utilizes Carrier Sense Mu[...]
-
Página 71
Figure 3.1: A packet’s journey from a host to a WAN device. The WAN transmission is continuous and does not have to wait for acknowledgement or permission. Let’s take a look at how this process would work in a T1 line. T1 has 24 slots in each frame; each slot is 8 bits, and there is 1 framing bit: 24 slots x 8 bits + 1 framing bit = 193 bits T1[...]
-
Página 72
The capability of broadband to carry multiple signals enables it to have a higher transmission speed. Table 3.2 displays the various broadband transmissions, which require more expensive and specialized transmitters and receivers. Table 3.2: The different broadband transmission types and their bandwidth. Transmission Type Bit Rate DS2 6.312Mbps E2 [...]
-
Página 73
STS− n is an interleaving of multiple ( n ) STS−1s. The size of the payload and the overhead are multiplied by n . Figure 3.4 displays an STS diagram. Figure 3.4: The STS−1 framing and STS− n framing. The overhead and payload are proportionate to the n value, with the STS−1 frame as the base. You may wonder why we’re talking about synch[...]
-
Página 74
ATM frame user−network interface (UNI), or System Network Architecture (SNA). The MGX 8240 Private Line Service Gateway is designed to terminate private lease lines (T1, T3, or DS0). It has 16 slots with 1 reserved for a redundant control card. It can support up to 1,260 channelized T1s. It is designed for large Internet service providers (ISPs) [...]
-
Página 75
The BPX 8620 is a pure ATM broadband switch. It has a nonblocking 9.6Gbps architecture. The interface modules range from T3 to OC−12. Each trunk port can buffer up to 32,000 cells. The OC−12 interface module has two OC−12 ports. The OC−3 interface module has eight OC−3 ports. The BPX is commonly used in conjunction with multiple MGX switc[...]
-
Página 76
The system bus backplane contains multiple buses for connecting the modules. It has no active component. Different buses provide power to the modules, transfer of data, timing control, system commands, and other functionality. Cisco WAN Switch Network Topologies We’ve talked about the transmission media, the signal, and the equipment. Let’s put[...]
-
Página 77
nodes in the domain have limited contact with switches outside the domain. You will rarely see this design today, because the current switching software no longer supports it. Network Management In managing a wide area network, you have to understand the basic network management technology common to both LANs and WANs. You must understand IP addres[...]
-
Página 78
the network while highlighting any local problems. Connection Management —Provides a graphic interface to configure WAN switches. It provides templates to minimize the work in setting up many connections. All interface modules are supported, including VoIP/VoATM setups. • Performance and Accounting Data Management —Controls the collection of [...]
-
Página 79
Using the History Command You can display a list of the previous 12 commands by pressing the period (.) key; this command has a privilege level of 6. You can select which command to repeat by entering a number from 1 through 12. (Entering “1” repeats the most current command, “5” repeats the command five back in the list, and so on.) After [...]
-
Página 80
service, or StrataCom level. Displaying Other Switches To display a list of known switches, use the dspnds command. This command is privilege level 6. You should see only the one switch on the display until connectivity is established with other switches. You can add the optional parameter +n to display the switch number. Setting the Switch Name Yo[...]
-
Página 81
Accessing the MGX 8850 and 8220 The MGX 8850 has a control port, maintenance port, and LAN port. The control port is an EIA/TIA−232 Data Communications Equipment (DCE) interface. To access the control, you must use a terminal or a PC with a terminal emulation program. The maintenance port is an EIA/TIA−232 DCE interface that utilizes Serial Lin[...]
-
Página 82
Displaying a Summary of All Modules The command dspcds will display the summary information of all the modules. This is a level 6 command. The card number, card status, card type, switch name, date, time, time zone, and IP address are all displayed. The information is displayed one screen at a time. Press the Enter key to display a second screen, a[...]
-
Página 83
Configuring the IP Interface The command cnfifip is used to set the IP address, netmask, and broadcast address. Each parameter must be entered one at a time. The parameters are as follows: −if —The interface (26 for Ethernet, 28 for SLIP, or 37 for ATM) • −ip —The IP address • −msk —The network mask • −bc —The broadcast addres[...]
-
Página 84
Chapter 4: LAN Switch Architectures In Depth Knowing the internal architectures of networking devices can be a great asset when you’re working with Cisco switches. Knowing how the internal components work together, as well as how Application−Specific Integrated Circuits (ASICs) and CPUs are used, can give you an advantage in determining what Ci[...]
-
Página 85
Single BUS vs. Crossbar Matrix A single−BUS architecture is pretty simple: One BUS connects all the ports together. This setup creates a bandwidth problem called a blocking architecture , or what the networking industry likes to call over−subscription . Over−subscription is characterized as a condition in which the total bandwidth of all the [...]
-
Página 86
Synergy Advanced Multipurpose Bus Arbiter (SAMBA) ASIC • EARL ASIC The Encoded Address Recognition Logic (EARL) ASIC performs functions that are very similar to those of the Content Addressable Memory (CAM) table. Switches use this CAM to make filtering and forwarding decisions. The EARL ASIC connects directly to the data switching bus, allowing [...]
-
Página 87
This ASIC operates in either master or slave mode. In master mode, the ASIC allows ports access to the bus based on a priority level of normal, high, or critical. In slave mode, each port must post a request to each SAMBA ASIC, negotiate local port decisions, and arbitrate requests with the Supervisor Engine’s SAMBA ASIC. The Crescendo Processors[...]
-
Página 88
ARB The Arbiter (ARB) is located on each line module. It uses a two−tiered method of arbitration to assign queuing priorities and control data traffic through the switch. The arbiter controls the traffic coming to and from the line modules. In addition, a Central Bus Arbiter located on the Supervisor Engine module obtains permission to transmit f[...]
-
Página 89
through which all switched ports communicate. The AXIS bus is a partially asynchronous time division multiplexed bus used for switching packets between heterogeneous LAN modules. CEF ASIC The Cisco Express Forwarding (CEF) ASIC and Distributed Cisco Express Forwarding (dCEF) ASIC are Cisco’s newest ASICs, found in Cisco’s lines of routers and s[...]
-
Página 90
Per−destination load balancing —Enabled by default when you enable CEF. It allows multiple paths to be used for load sharing. Packets destined for a given destination or source host are guaranteed to take the same path, although multiple destinations are available. • Per−packet load balancing —Uses a round−robin approach to determine wh[...]
-
Página 91
Figure 4.3: Cisco Express Forwarding ASIC components. Note CEF supports Ethernet, Fiber Distributed Data Interface (FDDI), Point−to−Point Protocol (PPP), High−Level Data Link Control (HDLC), Asynchronous Transfer Mode (ATM)/AAL5snap, ATM/AAL5mux, ATM/AAL5nlpid, and tunnels. Phoenix ASIC The Phoenix ASIC is another ASIC used to handle high−s[...]
-
Página 92
connected to the QMAC ASIC. QMAC The QMAC uses four protocol handlers to support four Token Ring physical interfaces directly connected to the QTP ASIC. Together, these two ASICs provide support for early token release (ETR) and Token Ring Full Duplex (FDX) concentrator and adapter modes for dedicated Token Ring. Bridging Types In the early 1980s, [...]
-
Página 93
Source Route Transparent Bridging Source Route Transparent Bridging (SRT) is a combination of SRB and TB. SRT bridges make forwarding decisions based on either the Routing Information Field (RIF) for the destination or the MAC address in the frame. Some protocols attempt to establish a connection using a frame without using a RIF. These application[...]
-
Página 94
Switching Paths The switch is commonly referred to in marketing terms as a Layer 2 device. If you keep thinking that way, this section will confuse you. By definition, switching paths are logical paths that Layer 3 packets follow when they are switched through a Layer 3 device such as a router or internal route processor. These switching types allo[...]
-
Página 95
Autonomous Switching With autonomous switching, when a packet arrives on an interface, it is forwarded to the interface processor. The interface processor checks the silicon−switching cache; if the destination address is not contained in that cache, the autonomous cache is checked. The packet is encapsulated for autonomous switching and sent back[...]
-
Página 96
The first packet that’s copied to the NetFlow cache contains all security and routing information. If policy networking (such as an access list) is applied to an interface, the first packet is matched to the list criteria. If there is a match, the cache is flagged so that any other packets arriving with the flow can be switched without being comp[...]
-
Página 97
Booting the Supervisor Engine III from Flash To boot from a Flash device, use the following command: boot [device][image name] Note If you do not specify an image file name, the system defaults to the first valid file in the device. Remember that file names are case sensitive. Use the show flash command to view the Flash files. The device can be th[...]
-
Página 98
Enabling dCEF To enable dCEF operation, use the following command: ip cef distributed Disabling dCEF To disable dCEF operation, use the following command: no ip cef distributed Warning Never disable dCEF on a Cisco 12000 series. Disabling CEF on an Individual Interface When you enable or disable CEF or dCEF in Global Configuration mode, all support[...]
-
Página 99
show ip cef Viewing CEF Packet−Dropped Statistics To view the number of packets dropped from each line card, use the following command: show cef drop Viewing Non−CEF Path Packets To view what packets went to a path other than CEF, use the following command: show cef not−cef−switched Disabling Per−Destination Load Sharing If you want to us[...]
-
Página 100
Enabling Telnet Session Logging on a Set/Clear Command−Based IOS To enable session logging for a Telnet session, use the following command: set logging session enable Disabling Console Session Logging on a Set/Clear Command−Based IOS To disable session logging for a console session, use the following command: Catalyst5000> (enable) set loggi[...]
-
Página 101
You can use the logging timestamps in your system logging to help you keep track of when events happen. To enable the logging time stamp, use the following command in Privileged mode: Catalyst5000> (enable) set logging timestamp enable System logging messages timestamp will be enabled. Catalyst5000> (enable) Disabling the Logging Time Stamp o[...]
-
Página 102
Displaying the Logging Configuration Use the show logging command to display the current system message logging configuration. Use the no alias keyword to display the IP addresses instead of the host names of the configured syslog servers. This output shows how to display the current system message logging configuration: Catalyst5000> (enable) s[...]
-
Página 103
do not specify the number of messages, the default is to display the last 20 messages in the buffer ( −20 ). To display the first five messages in the buffer, use the following code: Catalyst5000> (enable) show logging buffer 5 2000 Aug 21 09:41:12 %SYS−5−MOD_OK:Module 1 is online 2000 Aug 21 09:41:14 %SYS−5−MOD_OK:Module 3 is online 2[...]
-
Página 104
Chapter 5: Virtual Local Area Networks In Depth Faced with the problems of a slow network, many network administrators make expensive mistakes. Several times, I have come across companies that have a fiber link to every desktop. In fact, an architectural firm I consulted for comes to mind. The company used hubs to deliver data to each desktop. When[...]
-
Página 105
the network. The processors in each node handle this task, which takes away from the processing power needed for other tasks and application—thus causing a slowdown that the users discover and complain about. Most network administrators pass off this slowness as a problem with the PCs, and the most vital PCs are rebuilt or replaced. When the comp[...]
-
Página 106
VLAN Basics Inter−Switch Link (ISL) protocol was designed to allow VLAN traffic to flow from one Cisco device to another. The protocol adds a header that uniquely identifies the source and destinations of the data as well as the VLAN the data is a member of. If data from one VLAN needs to be forwarded to another VLAN, it requires some type of Lay[...]
-
Página 107
processing). Broadcasts are used in each and every networking protocol. How often they occur depends upon the protocol, the applications running on the network, and how these network services are used. To avoid the older, chatty protocols, older applications have been rewritten to reduce their bandwidth needs even though bandwidth availability to d[...]
-
Página 108
This setup allows for a more secure network. In addition, network administrators now have more control over each port as well as the ability to deny the user based on the Layer 2 or Layer 3 address the user is using to access the port. Users no longer have the ability to just plug their workstation into any network port in the office and access net[...]
-
Página 109
VLAN Membership Policy Server (VMPS, discussed in the next section). In this situation, the administrator must have very defined goals, and network planning must be more detailed so as to not create bottlenecks in the WAN. Your goal in defining an end−to−end VLAN solution must be centered around the 20/80 Rule: Maintain 20 percent of the networ[...]
-
Página 110
Cisco also recommends a one−to−one ratio between VLANs and subnets. This means that you must understand how users are broken up by subnets. If you have 1,000 users in a building and 100 users are in each subnet, then you should have 10 VLANs. VLAN Trunking There are two types of VLAN links: a trunk link and an access link. An access link is par[...]
-
Página 111
IEEE 802.10 • IEEE 802.1Q • Inter−Switch Link (ISL) • LAN Emulation (LANE) • IEEE 802.10 The IEEE 802.10 standard is used to send VLAN information over a Fiber Distributed Data Interface (FDDI) physical link. In this situation, ISL is disabled and IEEE 802.10 is used to forward the VLAN frames. The Clear Header on a FDDI frame contains a [...]
-
Página 112
Unlike ISL, IEEE 802.1Q is not a Cisco proprietary protocol. It can be used to carry the traffic of more than one subnet down a single cable, and it is compatible with devices that are not running the Cisco IOS. 802.1Q changes the frame header with a standard VLAN format, which allows multiple−vendor VLAN implemen−tations. For example, a Bay Ne[...]
-
Página 113
High bit of source address (HSA) —The 3−byte manufacturer’s portion of the SA field or vendor field of the source port’s MAC address. • 15−bit descriptor —Used to distinguish the frame from other VLANs or colors. 10 bits are used to indicate the source port. • Bridge Protocol Data Units (BPDU) bit —Used to indicate Spanning Tree P[...]
-
Página 114
VTP Versions VTP comes in two versions: version 1 and version 2. The primary differences between the two version are few, but they are significant enough to render the two versions incompatible. The two versions will not work together in the same network. Version 1 is the default on Cisco Catalyst switches and supports Ethernet media. Version 2 pro[...]
-
Página 115
the updater’s identity, the updater’s timestamp, and the MD5 digest field. Subset advertisement —Contains very detailed information about the network, including the version, code, sequence number, management domain name, configuration revision number, and VLAN information fields. • VTP advertisements can contain the following information: 8[...]
-
Página 116
Many network administrators make the mistake of using the clear config all command, believing that it will erase the current revision number. Doing so is a bad mistake on the network administrator’s part. This command doesn’t do what it says it does—it doesn’t really “clear all.” VTP has its own NVRAM, so the VTP information as well as [...]
-
Página 117
Server Mode Server mode, which is configured by default, allows you to create, modify, and delete VLANs for the management domain. Configuration changes are then sent to all other participating members of the VTP domain. At least one VTP server should exist in the VTP management domain. Two or more switches can be configured as servers for redundan[...]
-
Página 118
than a simple hub can achieve. This ability enables a switch to take the place of another device, called a repeater. A repeater is a device dedicated only to data regeneration. Repeaters allow data to be forwarded over greater distances, allowing the data to overcome regular data distance limitations for the type of physical media being used. By fi[...]
-
Página 119
Figure 5.4: An example of an external router routing interVLAN traffic. Configuring a Static VLAN on a Catalyst 5000 Series Switch The Cisco Catalyst 2900G series, 5000 family, and 6000 family of switches use the Cisco Set/Clear−based CLI. It is important to understand the difference between the Catalyst 5000 series VLAN configuration and the Ent[...]
-
Página 120
User Interface Menu [M] Menus [K] Command Line [I] IP Configuration Enter Selection: K Once a CLI session on the switch is open, you must create a VLAN number and name. The command used to do this is as follows: vlan [ vlan# ] name [ vlan name ] command To use this command, you must be in Global Configuration mode on the switch. To enter Global Con[...]
-
Página 121
Viewing the VLAN Configuration on a 1900 Series Now that we have created the VLANs we want, we can use the show vlan command to see the configured VLANs. Notice that all unconfigured ports on the switch are in VLAN 1. The command is used from the Privileged mode prompt, as follows: 1912#show vlan The results are shown here: VLAN Name Status Ports ?[...]
-
Página 122
(vlans = 1..1005 An example of vlans is 2−10,1005) (trunk_type = isl,dot1q,dot10,lane,negotiate) The different port negotiation types are described in Table 5.1, and the different trunk encapsulation types are described in Table 5.2. Table 5.1: Port negotiation syntaxes for configuring VLAN trunks. Variable Description auto This trunking mode is [...]
-
Página 123
Mapping VLANs to a Trunk Port In the last example, we assigned port 2/1 as a trunk port using ISL encapsulation. Notice that we did not specify the VLANs to trunk. By default, all VLANs would be trunked. You can assign only VLANs 1 through 200 to be trunked across this configured trunk link, as shown here: Console> (enable) set trunk 2/1 on 1−[...]
-
Página 124
To remove VLAN 2 from a trunked port use the following command: 1912(config−if)#no trunk−vlan 2 1912(config−if)# Note No command is available to clear more then one VLAN at a time on the 1900. Verifying a Trunk Link Configuration on a 5000 Series To verify your trunk ports on a Catalyst 5000 series, use the show trunk command as follows: Cons[...]
-
Página 125
5000> (enable) set vtp v2 enable This command will enable the version 2 function in the entire management domain. All devices in the management domain should be version2−capable before enabling. Do you want to continue (y/n) [n]? y VTP domain modified 5000> (enable) Configuring a VTP Domain on a Catalyst 1900 Switch The 1900EN series switch[...]
-
Página 126
Configuring VTP Pruning on a Catalyst 1900 Switch To configure the switch for VTP pruning, use the following command: 1912(config)# vtp pruning Configuring VTP on a Set/Clear CLI Switch Before you can configure a router or internal route processor for interVLAN routing, you must enable VTP, assign a mode, and configure a domain. You enable and conf[...]
-
Página 127
1900EN(config)#vtp domain Coriolis 1900EN(config)# To set a VTP domain password on a 1900EN to “pass1” use the following command: 1900EN(config)# vtp password pass1 1900EN(config)# Verifying the VTP Configuration on a Set/Clear CLI To verify the VTP domain information, use the command show vtp domain . This command will show you the domain name[...]
-
Página 128
Digest Errors 0 VTP Pruning Statistics: Port Join Received Join Transmitted Summary Adverts received with no pruning support ———— ————————————— ———————————————— ——————————————————————— A 0 0 0 B 0 0 0 1912# Configuring VTP Pruning on a Se[...]
-
Página 129
Specify an IP routing protocol such as Open Shortest Path First (OSPF), Routing Information Protocol (RIP), Internet Gateway Routing Protocol (IGRP), or Enhanced IGRP (EIGRP) and identify the network: Cisco7505(config)#router rip Cisco7505(config−router)#network 192.1.0.0 2. Create a subinterface on a physical interface in Interface Configuration[...]
-
Página 130
Chapter 6: InterVLAN and Basic Module Configuration In Depth One of the first things you will discover in this chapter is that switch is merely a marketing term. When we think of a switch, we think of a device that operates at Layer 2. Well, in this chapter we’ll walk through the process of configuring Cisco switch−swappable cards and modules, [...]
-
Página 131
The FIB maintains a copy of the forwarding information contained in the IP routing table based on the next−hop address. The routing table is updated if routing or topology changes are detected in the network. Those changes are then forwarded to the FIB, and the next−hop information is recomputed based on those changes. Cisco Express Forwarding [...]
-
Página 132
proprietary protocol transfers the FIB information to a NetFlow Feature Card (NFFC or NFFC II) on a Cisco Catalyst 5000 series, or to another forwarding board or module on the higher−speed Cisco distributed switches. There is little difference between using an external router and an internal route processor as your source of the FIB to route Laye[...]
-
Página 133
segments, networks, or the Internet. A few types of route processors are available for Catalyst switches. They include: NetFlow Feature Card and NetFlow Feature Card II • Route Switch Module • Route Switch Feature Card • Multilayer Switch Module • NetFlow Feature Card and NetFlow Feature Card II The NFFC and NFFC II are feature cards that w[...]
-
Página 134
NFFC also provides protocol filtering to allow segmentation by VLANs. It can provide per−port filtering of data in four different groups: Internet Protocol (IP) • Internetwork Packet Exchange (IPX) • AppleTalk, DECnet, and Banyan Vines • Other group • Tip By default, the IP group is on, but it can be turned off for the other groups listed[...]
-
Página 135
load−balance the channels. VLAN 0’s MAC address is the address assigned to the programmable ROM (PROM) on the line communication processor (LCP) located on the RSM. This MAC address can be used for diagnostic purposes and to identify the RSM’s slot number. All the other VLANs are assigned the base MAC address from the RSM PROM, which is prepr[...]
-
Página 136
EIGRP checks its topology table for a suitable new route to the destination. If a route exists in the table, EIGRP updates the routing table with the new route and purges the old route from the table. Unlike other routing protocols, EIGRP saves WAN−link bandwidth by sending routing updates only when routing information changes. It also takes into[...]
-
Página 137
Figure 6.1: The Catalyst Supervisor Engine I and II. Media Access Control Addressing and VLANs —Support for 16,000 active MAC addresses for up to 1,024 VLANs allocated dynamically between active ports. • Management —Support for Simple Network Management Protocol (SNMP) for statistical management. The SE also supports access and management thr[...]
-
Página 138
Figure 6.3: The Catalyst Supervisor Engine III G. Gigabit Interface Converter (GBIC) for use with multimode fiber (MMF) or single−mode fiber (SMF) interfaces using SC connectors • An MCF5102 processor • Using the Supervisor Engine If you installed the Supervisor Engine from another switch, it probably has been configured for other interfaces;[...]
-
Página 139
The auto syntax allows the port to autonegotiate the port speed. On an Ethernet or Fast Ethernet interface, use the command set port duplex mod_num/port_num {full|half|auto} to set the port duplex mode. Again, the auto syntax can be used to allow the port to autonegotiate the duplex mode. Port Security You can use port security to block a NIC on an[...]
-
Página 140
—— —————————————————————————————————————— ——— ——— ———— 1 00−40−0b−80−54−00 to 00−40−0b−80−57−fi 2.0 3.1.2 4.3(la) 2 00−40−0b−03−5d−58 to 00−40−0b−03−5d−6f 3.1 4.3(l) 4.3(la) 3 00−43−0d−91−45−66 to 00?[...]
-
Página 141
Router> Enter Global Configuration mode with the following commands: Router> enable Router# configure terminal Warning When you make changes in this mode, they must be saved to NVRAM. Otherwise, the next time you recycle the switch, the changes will be lost. The command to save changes is copy running−config startup−config . 3. Assign the[...]
-
Página 142
———— ——————————— ———————— ———— ————— —————— ————— —————— 2/3 FileServer1 connect 1 normal a−half a−100 10/100BaseTX Configuring a Default Gateway on a Catalyst 5000 Before IP management from another subnet or network can take place through Telnet, [...]
-
Página 143
Note The commands for configuring the RSM, RSFC, and MSM are the same. Viewing the RSM’s Running Configuration To view the RSM’s running configuration, use the show running−config command as shown here: Coriolis5000RSM# show running−config Building configuration… Current configuration: ! version 11.2 no service udp−small−servers no se[...]
-
Página 144
RSM1>enable RSM1#configure terminal Enter configuration commands, one per line. End with CNTL/Z. RSM1(config)#interface vlan 2 RSM1(config−if)# %LINEPROTO−5−UPDOWN: Line protocol on Interface Vlan2, changed state to down Assign IP addresses to the VLAN interfaces: 3. RSM1(config−if)#ip address 172.20.52.33 255.255.255.224 RSM1(config−i[...]
-
Página 145
Router# Viewing the RSM Configuration Just as on a router, you use the show running−config to view the running configuration: Coriolis5000RSM# show running−config Building configuration… Current configuration: ! version 11.2 no service udp−small−servers no service tcp−small−servers ! hostname Coriolis5000RSM ! enable book1234 ! ! inte[...]
-
Página 146
1 00−60−15−be−55−80 2/1 Total Matching CAM Entries Displayed = 7 Configuring Filtering on an Ethernet Interface To configure protocol filtering for IP only, follow these steps: To configure protocol filtering on the Ethernet, Fast Ethernet, or Gigabit Ethernet ports, you must first enable protocol filtering on the switch. To enable protoc[...]
-
Página 147
Port Single−Col Multi−Coll Late−Coll Excess−Col Carri−Sen Runts Giants ———— —————————— —————————— ————————— —————————— ———————— ——————— —————— 2/3 0 0 0 0 0 0 0 Last−Time−Cleared —————————?[...]
-
Página 148
Configure the password for Enable mode. Press Enter for the old password if none has ever been configured: Catalyst5000> (enable) set enablepass Enter old password: Enter new password: coriolis2 Retype new password: coriolis2 Password changed. Catalyst5000(enable) 4. Enter the IP address and the default gateway (router) for the switch on the Sup[...]
-
Página 149
Several other commands can be used to configure the Supervisor Engine. The following list shows some of them: set boot config−register ignore−config enable —Sets the switch to ignore the contents of the configuration on NVRAM at startup • set boot config−register 0xvalue [ module number ] —Sets the configuration register value • set b[...]
-
Página 150
Fw : 4.3(1) Sw : 5.5(2) DRAM FLASH NVRAM Module Total Used Free Total Used Free Total Used Free —————— ————— ———— ————— —————— ————— ————— ————— ———— ———— 1 32640K 20331K 12309K 8192K 5548K 2644K 512K 185K 327K Uptime is 2 days, 19 hours, 3 minutes Cat[...]
-
Página 151
Configuring Redundancy Using HSRP To configure HSRP on router interfaces, perform the following steps: Enter Interface Configuration mode and identify a standby group and an IP address: standby [group−number] ip [ip−address] 1. Identify the priority for the HSRP interface. The interface with the highest priority becomes active for that HSRP gro[...]
-
Página 152
RSM2(config−if)#standby 10 authentication Secret RSM2(config−if)#interface vlan20 RSM2(config−if)#ip address 172.16.20.2 255.255.255.0 RSM2(config−if)#no shutdown RSM2(config−if)#standby 20 ip 172.16.20.10 RSM2(config−if)#standby 20 preempt RSM2(config−if)#standby 20 timers 5 15 RSM2(config−if)#standby 20 authentication Covert RSM2([...]
-
Página 153
Chapter 7: IP Multicast In Depth Over time, our use of computers has moved from the local desktop to the local network. Most of this network traffic consists of using local network sources, such as printing and file transfers. As our personal computers become more powerful, the applications that we use now contain more audio and video components. W[...]
-
Página 154
Unicast • Multicast • Broadcast In its simplest form, broadcast traffic consists of packets that reach every point of the network. In a typical network, broadcasts are stopped at the router. You can set the router to forward broadcasts, but doing so is not very efficient—it creates a lot of traffic on the network and slows the end users’ ma[...]
-
Página 155
Figure 7.2: Unicast traffic flow. Multicast Multicast is a combination of broadcast and unicast. It sends one copy of the packet to many hosts that requested it, thereby using less bandwidth. It also saves bandwidth by not sending the packet to the portion of the network whose hosts didn’t request the transmission. Multicast accomplishes this tas[...]
-
Página 156
each other and with the server by multicast. When an individual driving a tank or a fighter enters a grid square, it joins the multicast group to receive that square’s simulation traffic. As the individual moves from square to square, the individual’s multicast group membership changes. IP multicasting uses Class D network addresses to route da[...]
-
Página 157
The X bits are not used. The remaining bits 000 1010 0000 1000 0000 0101 give you 0a:08:05. Put that result together with 01:00:5e: and you get 01:00:5e:0a:08:05. Here is another example, using the multicast address 224.127.15.10: 1110 0000 0111 1111 0000 1111 0000 1010 XXXX XXXX X111 1111 0000 1111 0000 1010 After removing the X portion, the secti[...]
-
Página 158
Address Destination .1 All systems in this subnet 224.0.0.2 All routers in this subnet .4 Distance Vector Multicast Routing Protocol .5 Open Shortest Path First (OSPF) routers .6 Open Shortest Path First (OSPF) designated routers .7 Routing Information Protocol 2 (RIP2) routers .8 Internet Gateway Routing Protocol (IGRP) routers .9 Dynamic Host Con[...]
-
Página 159
shortest path tree (SPT) because it uses the shortest path to reach the destination. This design functions very well in a one−to−many model, but it has drawbacks when used in a many−to−many model. For example, a live concert has only one source, so there will be only one distribution tree in the router for the multicast group. But in a vide[...]
-
Página 160
Distance Vector Multicast Routing Protocol DVMRP is based on RIP and is widely used. Just like RIP, it uses a distance vector (hops) and sends out periodic route updates. It’s different from RIP in that it is classless and has a hop limit of 32 rather than 16. When DVMRP is first implemented on a router, it sends a probe packet with its IP addres[...]
-
Página 161
receive the multicast traffic sends a PIM join message toward the root node (rendezvous point). As this join message travels up the tree, the multicast routers along the way forward the requested traffic back down the tree to the destination. To put it in a simple form, PIM−DM will send the multicast traffic everywhere until it is told not to. PI[...]
-
Página 162
responses, it will build a list of all the multicast groups for that interface. Any other router on the same subnet will also receive the responses and will have the same information. Note A host does not have to wait for a host membership query to send out a membership report. It could send an unsolicited membership report, a process sometimes mis[...]
-
Página 163
Time to Live Using the IP time to live (TTL) field is an important IGMP topic. The TTL field is a value in an IP packet that tells a network router whether the packet has been in the network too long and should be discarded. A multicast datagram with a TTL of 0 is allowed only on the same host. A TTL of 1 (the default value) is allowed only on the [...]
-
Página 164
This process looks simple. As a host joins the multicast group, its port number is added to the CAM table; as the host leaves, its port is removed from the CAM table. However, this entire process forgets about the switch’s processor. The switch must also receive the multicasts in order to receive the join and leave messages. If a steady stream of[...]
-
Página 165
GARP Multicast Registration Protocol Generic Attribute Registration Protocol (GARP) Multicast Registration Protocol (GMRP) prevents multicast flooding on the switch. This protocol provides a way for the host to communicate with the switch at the MAC level. It runs independently of the Layer 3 protocol. GMRP software must be running on both the host[...]
-
Página 166
Configuring the Rendezvous Point You can configure the rendezvous point (RP) manually or let it be auto−discovered. To configure the RP manually, you have to configure the routers that have either the sender of the multicast traffic or the receiver of the multicast traffic connected to its segment. The RP router can be any router on the network a[...]
-
Página 167
Changing the IGMP Host−Query Message Interval As mentioned earlier, the router sends IGMP host−query messages to the network to discover which multicast group is still active. You can modify the message interval setting to accommodate your network’s bandwidth/utilization (the default is 60 seconds): Router(config−if)# ip igmp query−interv[...]
-
Página 168
———— ———————— 2/14 * 3 3/1 1 Total Number of Entries = 2 ‘*’ − Configured The asterisk between the port and the VLAN number means the multicast router port was manually configured. Removing the Multicast Router Use the following command to remove the multicast router port: Coriolis> (enable) clear multicast router 2[...]
-
Página 169
Displaying IGMP Statistics To display IGMP statistics for all VLANs, use the show igmp multicast statistics command as shown here: Coriolis> (enable) show igmp statistics IGMP enabled IGMP fastleave disabled IGMP statistics for vlan1: Total valid pkts rcvd: 17564 Total invalid pkts recvd 0 General Queries recvd 235 Group Specific Queries recvd 0[...]
-
Página 170
Total Number of Entries = 1 To get more detail about the multicast groups, use this command: Coriolis> (enable) show multicast group [ vlan ] CGMP disable IGMP enable VLAN Dest MAC/Route Des Destination Ports or VCs / [Protocol Type] ———— —————————————————— ———————————————[...]
-
Página 171
valid igmp leaves received 0 valid igmp queries received 568 igmp gs queries transmitted 0 igmp leaves transmitted 0 failures to add GDA to EARL 0 topology notifications received 10 number of CGMP packets dropped 2456875 Configuring RGMP on the Switch RGMP is disabled by default. Use the following command to enable RGMP globally: Coriolis> (enab[...]
-
Página 172
To display the total number of RGMP groups, use the following command: Coriolis> (enable) show rgmp group count [ vlan ] Total Number of Entries = 2 Displaying RGMP−Capable Router Ports To display the ports to which RGMP routers are connected, use the following command: Coriolis> (enable) show multicast router rgmp PortVlan —————?[...]
-
Página 173
Disabling GMRP To disable GMRP globally, use the following command: Coriolis> (enable) set gmrp disable GMRP disabled. Enabling GMRP on Individual Ports You can enable GMRP on a per−port basis using this command: Coriolis> (enable) set port gmrp enable 2/1−12 GMRP enabled on ports 2/1−12. But don’t be fooled—the switch will let you [...]
-
Página 174
To configure Fixed mode, use the following command: Coriolis> (enable) set gmrp registration fixed 2/1 GMRP Registration is set fixed on port 2/1. To configure Forbidden mode, use the following command: Coriolis> (enable) set gmrp registration forbidden 2/1 GMRP Registration is set forbidden on port 2/1. Displaying the GMRP Configuration To d[...]
-
Página 175
GMRP and GARP are interchangeable for the set and show commands. GMRP is considered an alias of GARP. Configuring Bandwidth−Based Suppression Bandwidth−based suppression is a hardware−based suppression method. The threshold is set as a percentage of the port’s bandwidth. When the multicast/broadcast traffic exceeds the threshold within a on[...]
-
Página 176
Chapter 8: WAN Cell Switching In Depth WAN switching is defined as the process of forwarding data traffic across a wide area network. WAN switching uses cell relay technology to multiplex all network traffic across WAN trunk links without a predefined timeslot for each type of connection. Cell relay networks use small, fixed−length packets called[...]
-
Página 177
Scalability —ATM is highly flexible, accommodating a wide range of traffic types, traffic rates, and communications applications. • An ATM network includes two types of devices: ATM switches and ATM endpoints. One type of ATM interface, called a user−network interface (UNI), connects an ATM device to a switch; a second type, called a network?[...]
-
Página 178
ATM Protocols The protocols used in ATM have been specifically designed to support high−speed networks at speeds ranging up to gigabits per second (Gbps). Other physical LAN topologies, such as Gigabit Ethernet, provide high−speed networking and work very well in LANs. ATM, on the other hand, can handle network Gbps traffic in both LAN and WAN [...]
-
Página 179
the result by 2—and thus the data portion of the ATM cell contains 48 bytes. Figure 8.1: The ATM cell. The fixed size of the ATM cells provides some the following benefits: Efficient bandwidth use of the physical medium • Ability of applications to share the network more fairly • Accommodation for bursty applications • Effective recovery of[...]
-
Página 180
The ATM Cell Header The ATM cells can be found in one of two formats, depending on whether the endpoints are a UNI or an NNI connection. The two differ in one way: The NNI header does not contain a Generic Flow Control (GFC) field. The NNI header has a Virtual Path Identifier (VPI) that occupies the entire first 12 bits. A cell header for a UNI cel[...]
-
Página 181
ATM layer is responsible for establishing connections and passing cells through the ATM network. The ATM Adaptation layer translates the different types of network traffic. Four AALs are defined, but only three are actively in use: AAL1 —Used to transport timing−dependent traffic such as voice • AAL3/4 —Used by network service providers in [...]
-
Página 182
The ATM Adaptation Layer The ATM Adaptation Layer (AAL) provides the translation between the larger service data units of the upper layers of the OSI Reference Model and ATM cells. It works by receiving packets from the upper−level protocols and breaking them into 48−byte segments to be dumped into the payload of an ATM cell. The AAL has two su[...]
-
Página 183
Variable bit rate−real time (VBR−RT) —Typically used for connections that carry VBR traffic in which a fixed timing relationship exists between either VBR video or voice compression. • Variable bit rate−non real time (VBR−NRT) —Used to carry VBR traffic in which no timing relationship exists for data traffic where a guarantee of bandw[...]
-
Página 184
changing the application itself or Layer 3 drivers. This approach allows backward compatibility with existing LANs, broadcast support, and connectionless delivery. LANE has some drawbacks, however: It prevents the use of ATM−specific benefits such as QoS and doesn’t have the ability to provide flexible bandwidth allocations. LANE is the primary[...]
-
Página 185
Broadcast and Unknown Server (BUS) —Sends broadcasts, sequences cells, controls unicast flooding, and distributes multicast packets. • Warning Notice that although LEC and LECS sound the same, they are completely different terms and components in LANE. LAN Emulation Client (LEC) The LEC resides in every ATM end system. It provides services to e[...]
-
Página 186
The ultimate goal of the LES is to arrange and control connections with a LEC. This connection is commonly known as a control direct ATM virtual channel connection (VCC) . After this connection is established, it will handle address resolution and registration responses. Note The LES establishes communication with the LECS and provides verification[...]
-
Página 187
Broadcast and Unknown Server (BUS) The BUS provides broadcasting support for an ELAN. The BUS distributes multicast data, sends or distributes unicast data, and connects the other LANE components. When the destination address of an Ethernet or Token Ring frame contains a local broadcast or a multicast address, the LEC forwards the traffic to the BU[...]
-
Página 188
The default ELAN name • The LEC address and corresponding LES • The ELAN name and corresponding LES • The ATM address prefix and corresponding LES • The ELAN type and corresponding LES • The ELAN name • The corresponding ATM address of a LANE server • A LANE client MAC address • A client MAC address with the corresponding ELAN name [...]
-
Página 189
In the ATM LANE communications process, when a client wants to join an ELAN, the client must build a table that links ATM addresses to Ethernet MAC addresses. Let’s take a close look at this process: The LEC first sends a LAN Emulation ARP (LE_ARP) message to the LES that is using a point−to−point configure direct VCC. This query is made to t[...]
-
Página 190
LE_ARP_REQUEST —Contains the broadcast MAC address 0xFFFFFFFF. This packet is sent on a control direct VCC to the LES to query for the ATM address of the BUS. • LE_ARP_RESPONSE —Sent in response to an LE_ARP_REQUEST; it contains the ATM address of the BUS. • LE_JOIN_RESPONSE —Contains the LANE client identifier (LECID) that is a unique id[...]
-
Página 191
Let’s step through the process. Suppose that you were working on an ELAN and you wanted to access a file stored on a server that was located on a physically separate LAN: You send the file request. Your LEC determines if it knows the ATM address of its LES. 1. If your LEC does not know this address, the client queries the LECS and asks for the AT[...]
-
Página 192
LANE Modules The following ATM LANE modules are available for the 5000 family of switches; the list also indicates the cable types that can connect to each. Tables 8.1 and 8.2 show the LED lights and functions on the LANE modules. These modules provide a connection between multiple ATM networks connecting through the ATM switch: Table 8.1: LANE mod[...]
-
Página 193
Supervisor Engine’s console port. Tip Even though the LANE module is configured through the Supervisor Engine, the Supervisor Engine maintains no configuration information regarding the LANE module. This information is stored on the LANE module itself. Segmentation and Reassembly In a frame−based network such as Ethernet, packets sent on the ph[...]
-
Página 194
After the destination node receives the LE_ARP response from the LES, the destination client responds to the source with its address information. The source sends a “flush” message to the BUS, which instructs the BUS to stop sending any unsent cells—the source will now establish a direct connection with the destination and send the remaining [...]
-
Página 195
LANE Server: 47.00817200000000E04BAAA006.00E04BAAA061.** LANE Bus: 47.00817200000000E04BAAA006.00E04BAAA062.** LANE Config Server: 47.00817200000000E04BAAA006.00E04BAAA063.00 note: ** is the subinterface number byte in hex Note The asterisks in this example indicate that the addresses are in hexadecimal. The ATM LANE module does not list these addr[...]
-
Página 196
ATM(config)#interface atm0.1 Map the LEC bus to the Ethernet ELAN named “default”: ATM(config−subif)#lane client ethernet default 3. Repeat Steps 2 and 3 for each LEC you want to configure on this LANE module. 4. Enter Interface Configuration mode for the ATM0 subinterface 2: ATM(config−subif)#interface atm0.2 5. Map the LEC bus to the Ethe[...]
-
Página 197
Configuring the LECS Prior to configuring the LECS, you will need to go to each LES and get its ATM address. This address can be gathered with the following command: ATM#show lane server LE Server ATM0.1 ELAN name: default Admin: up State: operational type: ethernet Max Frame Size: 1516 ATM address:47.00918100000000E04FACB401.00100DAACC41.01 LECS u[...]
-
Página 198
ATM(config−if)#lane config database ELAN2 ATM(config−if)#end Verifying the LECS Configuration Verify the proper setup with the following command: ATM#show lane config LE Config Server ATM0 config table: ELAN2 Admin: up State: operational LECS Mastership State: active master list of global LECS addresses (58 seconds to update): 47.00918100000000[...]
-
Página 199
Chapter 9: LightStream Switches In Depth The demand for high−speed network communications has skyrocketed in the past 20 to 30 years. In the early 1970s, 9.6Kbps was considered a high−speed network. Now that we have entered the next century, network speeds have surpassed 1Gbps with the introduction of 10Gbps technologies. This advancement has l[...]
-
Página 200
FDDI 100Mbps STS−3c/STM−1 155Mbps TAXI 4B/5B 100Mbps LightStream 1010 The LS1010, shown in Figure 9.2, is the most recent addition to the LightStream series of ATM switches used for multiservice applications. The switch has a five−slot, modular chassis with two fault−tolerant, load−sharing power supplies. The switch contains a central slo[...]
-
Página 201
UBR + MCR A unique Cisco class for best−effort data traffic delivery with a specified minimum bandwidth. This class is used in a LAN for high−end resource applications or in a WAN with an ATM for a guarantee of a certain amount of bandwidth (also called a committed information rate [CIR]). One of the great features of the LightStream 1010 switc[...]
-
Página 202
Neighborhood Discovery Function The neighborhood discovery function (NDF) can be used to provide a means for locating all the other nodes in the network and to simplify the network configuration process. This tool helps to eliminate the need to manually configure some of the attributes of interface modules inside the LS2020 switch. CDF enables the [...]
-
Página 203
algorithm to determine the path for any data that arrives and needs to be switched through the network. The routing algorithm calculates the minimum distance path through the network, verifies the availability of bandwidth, and then sets up a connection between the two ATM endpoints in the network. The routing algorithm can use metrics to determine[...]
-
Página 204
Default settings are in square brackets ’[]’ Would you like to enter the initial configuration dialog? [yes] From this prompt, you can enter the initial configuration dialog or decline and manually enter the configuration. This choice allows an administrator to use the Command Line Interface (CLI) on the LightStream switch. If you are not famil[...]
-
Página 205
The MPC Configuring an MPC on a router provides router−initiated and router−terminated shortcuts for non−NBMA networks. The MPC functionality involves the following: Data−plane and control−plane VCC management • Ingress/egress cache management • MPOA frame processing • MPOA protocol and flow detection • An MPC identifies packets s[...]
-
Página 206
CoriolisLS1010> enable Use the config terminal command to enter Global Configuration mode: CoriolisLS1010# config terminal 2. You must identify the route for traffic to take to the internal network (referred to as a static route ) using the ip route command, as shown here: CoriolisLS1010(config)# ip route 63.78.127.0 255.255.255.0 ethernet 0 3. [...]
-
Página 207
IF−Side: Network IF−type: NNI Uni−type: not applicable Uni−version: not applicable CoriolisLS1010# Viewing the Configured Virtual Connections To view the configured virtual connections, use the show atm vp command as shown here: CoriolisLS1010# show atm vp Interface VPI Type X−Interface X−VPI Status ATM3/0/2 2 PVP TUNNEL CoriolisLS1010#[...]
-
Página 208
control distribute: vcd 1452, 3 members, 196 packets proxy/ (ST: Init, Conn, Waiting, Adding, Joined, Operational, Reject, Term) lecid ST vcd pkts Hardware Addr ATM Address 1 O 1451 6 0060.705a.8f02 47.0091810000000060707B8A01.0060705A8B12.01 2 O 1455 10 00e0.d7b1.ba12 47.0091810000000060707B8A01.112233461176.02 3P O 1466 59 0090.a2fb.b430 47.00918[...]
-
Página 209
——— ———————— ————————— —————————— —————— 2 EARL 1+ WS−F5511 0002278010 1.0 Mod SMT User−Data T−Notify CF−St ECM−St Bypass ——— ——————————————————— ———————— —————— ——————— ————[...]
-
Página 210
To identify an MPS with a specific name, use the following command: mpoa server config name mps−name 1. The ATM address that specifies the control ATM can be optionally identified using this command: atm−address atm−address 2. To specify the network ID, use the following command: network−id id 3. To identify a keepalive time value, use the [...]
-
Página 211
Use the lane client ethernet command followed by the name of the ELAN to configure a LANE client: 5. CoriolisLS1010(config−if)# lane client ethernet elan−name Powering on the LightStream 100 ATM Switch To power on the LightStream 100 ATM switch, use the following steps: Turn the power switch to the on position, which is depicted by a symbol tha[...]
-
Página 212
Recovering a Lost Password To recover a password, such as that used for the root account, look at the following example (the output is quite long, so unnecessary information has been omitted): Type ‘. to get a Test and Control System (TCS) hub prompt. user name:’. TCS HUB<> At the TCS hub prompt, use reset and connect to reset the NP card[...]
-
Página 213
NCR 53C710: Chip Revision: 0x2, IB: 0xec18e000 LynxOS/68040−MVME167 Version 2.1.0 Copyright 1992 Lynx Real−Time Systems Inc. All rights reserved. LynxOS release 2.1.0, level 1: NP−LynxOS #112: compiled Nov 08 1994 19:49:33 Single−user boot single−user$ Type ’. to get a TCS hub prompt: single−user$ ’. TCS HUB<> Reset the NP car[...]
-
Página 214
user name: coriolisuser password: This process changes the password and recovers any lost passwords. 198[...]
-
Página 215
Chapter 10: Layer 2 Redundant Links In Depth If your company has ever experienced a critical work stoppage due to a downed server or a network outage, you understand how critical it is to implement redundancy in your network. No matter what happens with an individual link in your network, the other links should take over using redundant links. The [...]
-
Página 216
Broadcast frames • Multicast frames • Unknown unicasts • Broadcast and Multicast Frames Broadcast and multicast frames are unique in that neither has a specified destination hardware address. The source address is also the hardware address of the device that sent the frame. In the case of broadcasts, the destination address shown in the heade[...]
-
Página 217
and Electronics Engineers (IEEE) a protocol similar to STP to become a networking standard. However, after the IEEE 802 committee revised it into what is now known as the IEEE 802.1D standard (Spanning Tree Protocol), the protocol differed just enough from DEC’s version that they were incompatible. Danger! Data Loops! Data loops can easily become[...]
-
Página 218
Figure 10.2: An example of a directed graph. STA assigns each switch in the network a unique identifier. This identifier is one of the switch’s MAC addresses, as well as an assigned priority (explained in more detail later in this chapter in “The Selection Process”). After STA assigns each switch this unique identifier, it then assigns each p[...]
-
Página 219
Figure 10.3: The root bridge calculating the path cost to switch D. The lowest calculated path is not always the most ideal path. For example, if multiple high−speed links to a destination exist, the links may total more than the cost of a very slow link, such as a modem. Even though the straight path has the fewest hops, it is much slower than u[...]
-
Página 220
Version —Contains 1 byte and the value of zero. • Message Type —Contains 1 byte and the value of zero. • Flag —Contains 1 byte; only the first 2 bits are used. The topology change (TC) bit signals that there has been a topology change. The topology change acknowledgment (TCA) bit is then set to acknowledge receipt of a configuration messa[...]
-
Página 221
Parent and Child Switches A switch’s diameter is a unit of measurement between the root switch and child switches. The root bridge counts as the first switch. Each subsequent child switch out from the root bridge is counted to yield the diameter number. A parent switch brings you one switch closer to the root bridge, and a child switch takes you [...]
-
Página 222
Secondary root bridge priority 16,384 Root bridge priority 8,192 The switches participating in STP (other than the root bridge) must form an association with the root bridge shortly after the root bridge has been elected. Each switch examines each BPDU as it arrives on each port. When a switch receives the same information on more than one port, it[...]
-
Página 223
Equal Cost Paths If two or more links have the same root path cost, such as two identical links running between two switches, STA has a problem choosing the designated port or a root path through the network using the lowest path cost. The bridge ID is used to determine the root bridge in the network and also the root port. By default, the priority[...]
-
Página 224
For example, the downtime caused by using the defaults would be the following: 2 * 15 + 20 = 50 seconds Now that you have learned about the timers and how BPDUs operate in the network, let’s take a closer look at how ports transition through different states before forwarding data. STP Port States Each port participating in STP transitions throug[...]
-
Página 225
Per−VLAN Spanning Tree You can have many instances of STP running in your network. By running a different instance of STP on a per−VLAN basis, you can run some VLANs on ports that are blocked by another instance of STP running on another VLAN. In this way, you can set the priority of each port on a per−VLAN basis, allowing you to use the redu[...]
-
Página 226
the network. Thus, eight wires can be used to simulate one link able to handle up to 800Mbps and load balance data across those links, as shown in Figure 10.7. Figure 10.7: Eight equal−cost links between two switches, creating a bundle of eight channels acting as a single link. Let’s take a look at what occurs during a link failure in an EtherC[...]
-
Página 227
capability. The channel is then added to the spanning tree as a bridge port. Warning Dynamic VLAN ports can force a VLAN change; as a result, PAgP cannot be used to form a bundle on ports that are configured for dynamic VLANs. The VLANs must be static VLANs, meaning that the port on the switch must be assigned to a VLAN. PAgP also requires that all[...]
-
Página 228
The switch must have at least one blocked port. • The failure must be on the root port. • If a link fault occurs on the primary root link, UplinkFast transitions the blocked port to a forwarding state. UplinkFast changes the port so that it bypasses the listening and learning phases. This change occurs in three to four seconds, allowing converg[...]
-
Página 229
Enabling STP on a Set/Clear Command−Based Switch for All VLANs To enable STP on all VLANs, use the following command in Privileged mode: set spantree enable all Related solutions: Found on page: Configuring a Static VLAN on a Catalyst 5000 Series Switch 154 Configuring Multiple VLANs on a Catalyst 5000 Series Switch 154 Disabling STP on a Set/Cle[...]
-
Página 230
Bridge Max Age 20 Sec Hello Time 2 sec Forward Delay 15 sec Port vlan Port−State Cost Priority Fast−start Group−Method ———— ———— —————————— ———— ———————— —————————— ———————————— 5/1 2 forwarding 19 32 disabled 5/2 2 forwarding 19 32 disable[...]
-
Página 231
Viewing the STP Configuration on a Command Line Switch To view the configuration, you use the same command you use for the Set/Clear command−based switches. However, you will receive much different output. Use this command: show spantree The output should look similar to this on your console: VLAN1 is executing the IEEE compatible Spanning Tree P[...]
-
Página 232
secondary (optional) Used to designate the switch as a secondary root switch if the root bridge fails. The default priority of the secondary bridge is 16,384. n (optional) Specifies the VLAN. If you do not specify the VLAN, VLAN 1 is used. The valid value range is 1 through 1,005. dia n (optional) Specifies the diameter value discussed earlier in t[...]
-
Página 233
This example uses 100 as the port cost: spantree cost 100 Verifying the Port Cost Configuration on Both a Set/Clear Command− and CLI−Based Interface To verify the port cost on the port configured previously, use the following Privileged mode command: show spantree < module/port > The following command provides output on module 0, port 3: [...]
-
Página 234
Verifying the STP Port Priority on a Set/Clear Command−Based Switch To verify the proper port priority setting, use this command (only the module and port numbers are required): show spantree < module/port > The following command provides output on module 2, port 3: show spantree 2/3 Port Vlan Port−State Cost Priority Portfast Channel_id [...]
-
Página 235
Adjusting the MaxAge Timer on a Set/Clear Command−Based IOS To change the default MaxAge timer for a particular VLAN, use this Privileged mode command : spantree maxage < time value > < VLAN > In the following example, 5 refers to the MaxAge time and 1 refers to the VLAN: spantree maxage 5 1 Preparing to Enable EtherChannel When prepa[...]
-
Página 236
Channel 2/1−2,2/1−4 Broadcast suppression percentage(0−100) Flow control receive−(off,on),send−(off,on) Security yes Membership static,dynamic Fast start yes QOS scheduling rx−(none),tx−(none) CoS rewrite yes ToS rewrite IP−Precedence Rewrite yes UDLD yes AuxiliaryVlan 1..1000,untagged,dot1p,none SPAN source,destination Creating an [...]
-
Página 237
another port that is in the desirable or auto mode. Verifying the EtherChannel Configuration To verify the EtherChannel configuration on a Set/Clear command−based switch, use this command: catalyst5000> (enable) show port channel ? info Show port channel information statistics Show port channel statistics <mod> Module number <mod/port[...]
-
Página 238
group ———— ———— —————————————————————————————— ————————————— ———————— 10 2/1 10 2/2 10 2/3 10 2/4 Configuring EtherChannel on an IOS−Based Switch To configure EtherChannel on an IOS command−based switch such as the 1900EN series[...]
-
Página 239
catalyst5000> (enable) show interface sl0: flags=51<UP,POINTOPOINT,RUNNING> slip 0.0.0.0 dest 0.0.0.0 sc0: flags=63<UP,BROADCAST,RUNNING> vlan 1 inet 208.44.88.4 netmask 255.255.255.192 broadcast 208.44.88.63 catalyst5000> (enable) Enabling PortFast on a Set/Clear Command−Based Switch To enable PortFast on a Set/Clear command−[...]
-
Página 240
Disabling PortFast on a CLI−Based IOS Switch To disable PortFast on a Cisco IOS command−based switch, use this Interface Configuration mode command: no spantree start−forwarding Verifying the PortFast Configuration To verify the PortFast configuration on a Set/Clear command−based switch, enter the following Privileged mode command: show spa[...]
-
Página 241
You must clear the port and bridge costs modified by UplinkFast using the clear spantree uplinkfast command shown below: catalyst5000> (enable) clear spantree uplinkfast This command will cause all portcosts, portvlancosts, and the bridge priority on all vlans to be set to default. Do you want to continue (y/n) [n]? y VLANs 1−1005 bridge prior[...]
-
Página 242
Viewing the UplinkFast Configuration on an IOS−Based Switch To view the UplinkFast configuration on an IOS command−based switch, enter the following Privileged mode command: show uplink−fast Viewing UplinkFast Statistics on an IOS−Based Switch To view UplinkFast statistics, use this Privileged mode command: show uplink−fast statistics Ena[...]
-
Página 243
Chapter 11: Multilayer Switching In Depth Earlier in this book, I told you that switches were Layer 2 devices and routers were Layer 3 devices, which fit nicely into those well−known seven layers. You know the seven—the Open System Interconnection (OSI) Reference Model layers. Oh, did I forget to mention the Multilayer Switching Engine, multila[...]
-
Página 244
manner. This method is similar to sending a piece of mail: You put it in the mailbox, but you have no guarantee that it will arrive—just the likelihood it will reach its destination. Using other protocols, including those at Layer 2 and Layer 4, the network traffic is made up of a series of end−to−end conversations also known as flows . These[...]
-
Página 245
Figure 11.1 shows the three MLS components contained in a single switch chassis, such as that of a Cisco Catalyst 5000 or 6000 family switch. Figure 11.1: The MLS components using an internal route processor in an MLS switch. The Cisco 5000 and 6000 families of switches can use multiple internal route processors, such as the following: NetFlow Feat[...]
-
Página 246
MLS Flows When a flow process begins, the MLS−RP starts sending out multicast hello messages every 15 seconds to all switches in the network that accept MLS−RP messages. These messages inform each switch that the MLS−RP (router or internal route processor) is available to provide routing information to the MLS switches, allowing them to cache[...]
-
Página 247
go through the router. The MLS−SE rewrites the packets to look as if they had been forwarded by a router. Note The MLS cache size can grow to a maximum of 128K. When the cache on the MLS−SE grows larger than 32K, it is likely that flows in the network will not be switched by the MLS−SE and forwarded to a router. When the conversation between [...]
-
Página 248
Figure 11.5: An MLS switch and two MLS routers. IP Access Lists and MLS Interaction When any interface has an inbound access list applied, the interface where the access list is applied cannot be used for MLS. However, you can apply an output access list on an interface, and it will not affect MLS. When MLS is enabled, standard and extended access [...]
-
Página 249
You may become confused when trying to troubleshoot MLS because the commands you need to watch out for are not directly related to MLS. Remember this basic rule: Any command that involves the router examining each packet to perform an action will disable MLS on an interface. Let’s take a look at some of these commands and the effect each command [...]
-
Página 250
VTP domains • Management interfaces • Tip On the Catalyst 2926G−L3, 4908G−L3, or 2948G−L3 switch, at least one MLS−RP must be configured. Multiple MLS−RPs can be configured in a single line; up to 16 MLS−RPs can participate in MLS. MLS Cache The MLS cache is used to maintain the flow information for all active flows. The size of the[...]
-
Página 251
MLS Cache Fast Aging Time The processing of the MLS cache entries can cause performance problems on your switch. To keep this situation under control, it’s good practice to monitor the IP cache and make sure it remains well under the maximum size of 128K. Doing so will prevent cache entries from being dropped continuously. You can keep the size o[...]
-
Página 252
Let’s examine each of these tasks, as well as how to disable each of these features in case they are no longer needed on an interface. Related Solutions: Found on page: Configuring a Hostname on an RSM 187 Enabling MLSP on an MLS−RP for IP To enable the MLSP that runs between the MLS−SE and the MLS−RP, enter the following command in Global [...]
-
Página 253
Router(config) interface fastethernet 1/1 To assign a VTP domain of coriolis to the interface, use the following command: 2. Router(config) mls rp vtp−domain coriolis Warning This step must be performed prior to using any of the other MLS interface commands on the MLS interface. If this command is not used first, the interface will be placed in a[...]
-
Página 254
Re−enabling MLS on a Catalyst 5000 To re−enable MLS on a Catalyst 5000, use the following command: CAT5000(enable) set mls enable Disabling MLS on a Catalyst 6000 To disable MLS on a Catalyst 6000, use the following command: CAT6000(config) no mls ip Disabling MLS on a Catalyst 5000 To disable MLS on a Catalyst 5000, use the following command: [...]
-
Página 255
Configuring Long Aging on the Catalyst 6000 To configure the long aging time on the Catalyst 6000, use the following command: mls aging long < seconds> An example of using the mls aging long command is as follows: mls aging long 64 Disabling Long Aging on the Catalyst 6000 To disable the long aging time on the Catalyst 6000, use the following[...]
-
Página 256
Monitoring and Viewing the MLS Configuration Commands on each MLS−SE and MLS−RP to monitor and view the configurations of each device are different. Let’s take a look at the following commands: Viewing the MLS aging configuration on a Catalyst 6000 • Displaying the IP MLS configuration • Viewing MLS−RPs • Viewing MLS−RP specifics ?[...]
-
Página 257
MLS−RP IP MLS−RP ID Xtag MLS−RP MAC−Vlans —————————— ———————————— ———— —————————————————————— 38.187.128.254 0000808dca20 2 00−00−80−08−dc−ca 1−20 Displaying MLS VTP Domain Information To display the MLS VTP domain information, enter [...]
-
Página 258
38.187.128.254 0000808dade0 2 00−00−80−8c−dc−a2 1 38.187.127.254 0000808a22b2 3 00−00−80−8c−dc−a6 2 Viewing MLS Statistics on the Catalyst 6000 On the Catalyst 6000, you can get information similar to that provided by the previous command by entering the following: CAT6000> (enable) show mls ip Total Active MLS entries = 0 To[...]
-
Página 259
Chapter 12: Hot Standby Routing Protocol In Depth Dynamic environments are constantly growing. I happen to work in one and I see the demand for 99.99 percent reliability increasing every day. However, even in a worldwide Enterprise network, high availability solutions are not prepared for various network failures. Here’s an example: I manage a fe[...]
-
Página 260
The next sections look at some ways that administrators and engineers have devised to overcome problems related to assigning default gateways, along with the benefits and difficulties in using each technique. Routing Information Protocol Once solution designed to inject Layer 3 routing redundancy allows nodes utilizing IP to use Routing Information[...]
-
Página 261
The Solution HSRP is a Cisco proprietary protocol developed for redundancy. It defines a group of routers working as one virtual router. It enables host interfaces to continue communicating outside the local segment even if a host interface’s default route fails or the link is down. Basically, HSRP is a group of routers working together as a unit[...]
-
Página 262
Active route processor • Standby route processor • Virtual route processor • All other route processors fall into the “other route processor” category. Warning By increasing the number of standby groups on a route processor, you decrease the route processor’s performance and increase latency. You’ll increase the number of standby grou[...]
-
Página 263
Each standby group contains an IP address and a well−known MAC address assigned to the group. The IP address for the standby group is within the range of IP addresses belonging to the subnet or VLAN to which the route processor is providing services. The IP address cannot be assigned to any other device in the network except the standby group int[...]
-
Página 264
to the route processor. Learn state —The route processor transitions to this state and remains in this state until it receives a hello message from the current active router. The hello message allows the route processor to learn the virtual IP address of the current virtual router. • Listen state —In this state, the route processor has learne[...]
-
Página 265
standby group. If a route processor fails, it automatically decrements its priority on that interface and stops transmitting hello messages out the interface. The standby route processor assumes the active router role when no hello messages are detected for the specified holdtime period. Opening a Session on an Internal Route Processor To configure[...]
-
Página 266
Assigning an HSRP Interface Priority You should increase the priority of the interface in the HSRP group that you would like to be active by default. Always remember that the interface with the highest priority becomes the active route processor for the HSRP group. To specify the priority for the HSRP interface, using the following command: standby[...]
-
Página 267
Removing the HSRP Hello and Hold Timers To remove the manual timer settings and return the settings to the default values for HSRP group 3, use the following command: no standby 3 timers Configuring a Clear−Text Password for HSRP Authentication You can specify a clear−text password for the HSRP authentication string for the interface. All inter[...]
-
Página 268
You selected and entered the VLAN interface you want to have configured (vlan200). 1. You configured the HSRP group and entered the virtual default gateway IP address on that interface. 2. You set the priority accordingly, allowing one route processor to be active and the other to be standby. 3. You enabled preempt on both routers and you are not a[...]
-
Página 269
Tip To get a brief output of all the configured interfaces, you can use the show standby brief command. Using the debug Command By enabling the debug command, it will list the changes in real−time for the HSRP group you specified. This includes the sending and receiving packets through the HSRP. To enable debugging of your HSRP group you need to [...]
-
Página 270
Chapter 13: Policy Networking In Depth Behind all switching implementations and configurations lies an area that, if left unattended, can render you and your network defenseless: access security policies. In this chapter, we will discuss the need for and creation of access security policies; we will also focus on how to implement these policies. Se[...]
-
Página 271
Figure 13.1: A short list of various switches overlapping into different areas of the policy layers. Core Layer Policies By implementing security policies at the Core layer, also known as the backbone, you increase the elapsed amount of time between when a device requests access to a network and when it is allowed to transmit because of the amount [...]
-
Página 272
Managing Hypertext Transfer Protocol (HTTP) access • Access Lists An access list is a list of conditions that control access to the switch, router, or route processor. IP, AppleTalk, and Internetwork Packet Exchange (IPX) access lists are like gatekeepers that control access from or to different segments of the network. After you build an access [...]
-
Página 273
access list string as an example: access−list 2 permit 193.5.5.10 0.0.0.255 log Tip An octet is the 8−bit value between each dotted decimal in an IP address. For the IP address of 193.5.5.10 the first octet is 193 and the fourth octet is 10. It is always important to remember which octet you want to mask. The 0.0.0 of the wildcard address means[...]
-
Página 274
Item Network 1 Network 2 Network 3 Network 16 32 48 First Host 17 33 49 Last Host 30 46 62 Broadcast Address 31 47 63 Subnetting using variable length subnet masks (VLSM) seems pretty easy, doesn’t it? The type of access list defined is identified by the number you assign to the access list. Table 13.3 identifies the types of access lists that ca[...]
-
Página 275
operator —This syntax element compares source or destination ports. Possible syntaxes include lt (less than), gt (greater than), eq (equal), neq (not equal), and range (inclusive range). • log —This syntax enables logging of information about packets that match access list entries. • Warning The log command is optional and logs information [...]
-
Página 276
access−class —Applies the access list to an interface for security purposes. This command identifies users of specified VTY lines. By default, five VTY lines come in to your Cisco Internetwork Operating System (IOS) or router. Because you do not know which one you will be using when you Telnet into your switch or router, you must apply the same[...]
-
Página 277
Next, you must specify a routing protocol: in this case, Enhanced Interior Gateway Routing Protocol (EIGRP). To do so, use the following command: router eigrp 2 The last step is to apply the configured access list. Use the distribute−list command to interface g0/0 to filter outbound traffic from network 192.129.0.0: distribute−list 2 out g0/0 S[...]
-
Página 278
Privilege level 0 is a special level that allows the user to use a more specific defined set of commands. As an example, you could allow a certain user to use only the show arp command. This command is useful when a third party is using a sniffer on your network and needs to match a MAC address to an IP address and vice versa. Configuring Banner Me[...]
-
Página 279
After you enable port security on any switch port, any static or dynamic CAM entries associated with the port are cleared, and any currently configured permanent CAM entries are treated as secure MAC addresses. • Not all Cisco switches support port security. Check Cisco Connection Online (CCO) at http://www.cisco.com/ to see if your hardware and [...]
-
Página 280
HSNRSM(config)# access−list 100 deny tcp any any eq 20 HSNRSM(config)# access−list 100 deny tcp any any eq 21 Because the access list has an implied “deny all” at the end, you need to apply a rule that any other traffic can pass through. The ip indicates that all IP protocols are being identified: 3. HSNRSM(config)# access−list 100 permit[...]
-
Página 281
host A single destination host lt Match only packets with a lower port number neq Match only packets not on a given port number range Match only packets in the range of port numbers Now do the same for the destination address identifying the destination of 172.15.10.0: CoriolisRSM1(config)# access−list 199 deny tcp 172.16.10.0 0.0.0.255 172.15.10[...]
-
Página 282
CoriolisRSM1(config)#access−list 199 permit ip any ? A.B.C.D Destination address any Any destination host host A single destination host Just as in Step 7, we need to identify the destination addresses to permit: 8. CoriolisRSM1(config)#access−list 199 permit ip any any CoriolisRSM1(config)# You’re not quite done yet. Even though you just cre[...]
-
Página 283
Configuring a Telnet Session Time−Out Value To lower the chances for vulnerability when an administrator walks away from a logged−in Telnet session, you can configure and apply a time−out condition to unused VTY sessions. Here’s how: HSNRSM (config)# line vty 0 4 HSNRSM (config−line)# exec−timeout 5 0 We just set the timeout value to fi[...]
-
Página 284
To configure the time−out value to five minutes on the console port of an IOS−based route processor or router, use the following command: HSNRSM (config)# line console 0 HSNRSM (config−line)# exec−timeout 5 To configure the time−out value to five minutes on the VTY port of an IOS−based route processor or router, use the following comman[...]
-
Página 285
Syntax Description aaa Allows authentication, authorization, and accounting (AAA) to be used for authentication enable Allows the enable password method; the default method of HTTP server user authentication local Allows the local user database on the Cisco router, route processor, or access server to be used for authentication tacacs Allows the Te[...]
-
Página 286
———— —————————— —————————— —————————— —————————— ———————— 3/3 0 0 0 0 0 Port Single−Col Multi−Coll Late−Coll Excess−Col Carri−Sen Runts Giants ———— —————————— —————————— ——————[...]
-
Página 287
Dynamic Addresses Count: 5 Secure Addresses (User−defined) Count: 0 Static Addresses (User−defined) Count: 0 System Self Addresses Count: 12 Total MAC addresses: 8 Non−static Address Table: Destination Address Address Type VLAN Destination Port ————————— —————— —— —————————— 00−15−20?[...]
-
Página 288
Chapter 14: Web Management In Depth Imagine having to manage all the com closets throughout your enterprise without the use of a remote management tool. It’s a scary thought. What if you were in San Francisco and you needed to reconfigure a switch in Atlanta? Yes, Telnet would work, but Cisco also has a Web−based client management tool that is [...]
-
Página 289
IE is not supported on Solaris, and Netscape 4.6 is not supported at all. However, you can try to access the switch through your browser to determine whether your browser version is supported. If your browser is not supported, the switch will display an error message, and the session will not complete. Tip IE 5.0 will automatically refresh with the[...]
-
Página 290
and want to retype an entry, click on Cancel to undo your first entry. Note Again, keep in mind that if you are using IE5, you must use the Refresh button in your browser after each configuration change to see the updates. Otherwise, you risk making a mistake down the line. The CVSM default home page also has a real−time display of your switch. A[...]
-
Página 291
Chapter 2, which explains how to configure the CLI for an IP address and a Level 15 password in order to use the CVSM. The last section of the Immediate Solutions section will walk you through the CVSM Web Management screens on the 1900 series switch, looking at each screen individually and identifying the configuration changes that can be made fro[...]
-
Página 292
New setting ===> 1024 We have now changed the HTTP port to 1024. You should use a numbering scheme that your department or organization believes to be the best. • Related solutions: Found on page: Configuring an IP Address and Netmask 57 Configuring Network Settings on the 1900 and 2820 Series 456 Connecting to the Web Management Console Now t[...]
-
Página 293
Figure 14.2: This page allows you the ability to configure port speeds, view statistics, name the ports, and manage various switch modules if they have been inserted into the switch. ADDRESS —The Address Table Management page. This page manages the Dynamic Address Table, the Permanent Unicast Address and Port Security Table, and the Multicast Add[...]
-
Página 294
Figure 14.4: This page allows you to configure the SNMP properties, such as the community settings, and identify the IP address for the trap messages to be sent to. STP —The Spanning Tree Management page. This management page allows you to enable or disable STP on the specific switch ports, modify various Spanning Tree parameters, and configure S[...]
-
Página 295
Figure 14.6: The CDP Management page allows you to choose which ports you want defined for CDP. SPAN —The SPAN Configuration and Port Monitoring page. Here you have the option of selecting the port to which you want to send the captured frames and the ports to be monitored. See Figure 14.7. • Figure 14.7: This page allows you to configure which[...]
-
Página 296
Figure 14.8: This page allows you to manage the console and firmware upgrades. Note Prior to a TFTP upgrade a dialog box will appear and say something like, “When you use this page to upgrade the switch, it may not respond for up to one minute. During this time do not unplug the switch. This behavior is normal .” Once you click on OK, another d[...]
-
Página 297
Figure 14.10: On this page you can control and manage broadcast storms and overall IP configuration of the switch. CGMP —The CGMP Management page. By default, CGMP is enabled. This page allows you to configure the use of CGMP to dynamically discover end−user stations participating in multicast applications. In short, CGMP directs the packet to [...]
-
Página 298
Click on the ports you want to monitor in the Ports Not Monitored window. Click on the Add button to move them to the Ports Monitored Window. 2. Select the port you wish to monitor from by choosing from the pull−down menu next to Select Monitoring Port. This port will usually be one of the trunk ports. 3. Related solution: Found on page: Enabling[...]
-
Página 299
Chapter 15: The Standard Edition IOS In Depth The Cisco 1900 and 2820 switches come with two unique IOSs: Standard Edition and Enterprise Edition. The Standard Edition is a character−based IOS, and the Enterprise Edition is similar to the IOS on higher−end routers. The Cisco 3000 series is the only series of switches that comes with a unique IO[...]
-
Página 300
[P] Port Configuration [A] Port Addressing [D] Port Statistics Detail [M] Monitor [V] Virtual LAN [R] Multicast Registration [F] Firmware [I] RS−232 Interface [U] Usage Summaries [H] Help [K] Command Line [X] Exit Management Console Enter Selection: The following sections describe the Main Menu options. By typing the letter associated with each c[...]
-
Página 301
The password is case−insensitive and can contain any character with a legal keyboard representation. [E] Modify secret password —The Management Console secret password can help prevent unauthorized access. This password is stored in encrypted form and thus provides enhanced security. When specifying a secret password, use a minimum of 1 charact[...]
-
Página 302
[R] Reset system —This option recycles the power on the switch. • [F] Reset to factory defaults —This option clears all configuration settings back to the factory defaults. • Warning If you apply the [F] option, all manual configuration settings will be lost. [B] Broadcast storm control —This option launches the Broadcast Storm menu, whic[...]
-
Página 303
[V] Management VLAN —Allows you to set the VLAN in which you will configure your switch. Cisco recommends that you choose a VLAN other than 1 because all ports are in VLAN1 by default. On the Standard Edition of the IOS software, the available VLANs are 1 through 4. The Enterprise Edition has 64 available VLANs. • [X] Exit to previous menu—Ex[...]
-
Página 304
SNMP Default Trap Messages By default, the Cisco Catalyst 1900 and Catalyst 2820 series switches send certain trap messages. Trap messages are sent by default in response to the following events: Port security violations • Power recycling (powering on and off) • Logon authentication failures • STP port changes • STP bridge assignments • B[...]
-
Página 305
Enter Selection: The following list shows the commands from the CDP Configuration/Status menu: [H] Hold Time (secs) —Indicates how long a CDP multicast will remain in the CDP table. The valid entries are from 5 to 255 seconds, and the default is 180 seconds. • [T] Transmission Interval (secs) —Defines the interval in which the switch will sen[...]
-
Página 306
Syntax Port A1 Port 25 B1 Port 26 AUI The AUI port 1 through 24 An individual port on the switch The Port Configuration menu is as follows: Catalyst 2820 − Port 24 Configuration ————————————————————Settings———————————————— [D] Description/name of port Port To Hanson’s PC [S[...]
-
Página 307
[N] Next port —This option is used to forward to the next configurable port. • [G] Goto port —This option is used to configure any identified port. • [P] Previous port —This option is used to configure the previous configurable port. • [X] Exit to Main Menu —This option returns you to the Main Menu. • Let’s take a look at the opti[...]
-
Página 308
[A] Port Addressing The Port Addressing menu allows you to set up security and to add static MAC addresses to a port. When entering this option, you must first identify a port to configure, as listed in Table 15.2. Table 15.2: The available configurable ports on a Catalyst 2820 from the Port Addressing menu. Syntax Port A Port 25 AUI The AUI port 1[...]
-
Página 309
[C] Configure port —Provides a shortcut to the Port Configuration menu. • [V] View port statistics —Displays individual port statistics. • [N] Next port —Forwards to the next configurable port. • [G] Goto port —Configures any identified port. • [P] Previous port —Configures the previous configurable port. • [X] Exit to Main Menu[...]
-
Página 310
Catalyst 2820 − Virtual LAN Configuration VLAN Name Member Ports ——−− ———————————— ———————————— 1 VLAN 1 1−24, AUI, A, B ——————————————Action————————————— [C] Configure VLAN [X] Exit to Main Menu Enter Selection: This menu only gives tw[...]
-
Página 311
Catalyst 1900 − Firmware Configuration ——————————————————System Information—————————————————— FLASH: 1024K bytes V9.00.00 Standard Edition Upgrade status: No upgrade currently in progress. ——————————————————Settings————————?[...]
-
Página 312
The following list explains the options available from the RS−232 Interface Configuration menu: [B] Baud rate —Lets you enter the baud rate. The possible settings are 2400, 9600, 19200, 38400, or 57600 for the console port. The default baud rate is 9600. • [D] Data bits —Allows the configuration of data bits for the console port. The possib[...]
-
Página 313
Errors: Errors: FCS errors 0 Late collisions 0 Alignment errors 0 Excessive deferrals 0 Giant frames 0 Jabber errors 0 Address violations 0 Other transmit errors 0 Select [A] Port addressing, [C] Configure port, [N] Next port, [P] Previous port, [G] Goto port, [R] Reset port statistics, or [X] Exit to Main Menu: [A] Port Addressing Report —This o[...]
-
Página 314
Receive Forward Transmit —————————————————————————————— 1 : 0 0 0 2 : 0 0 0 3 : 9352 9352 90514 4 : 0 0 0 5 : 0 0 0 6 : 3678 3677 81423 7 : 0 0 0 8 : 0 0 0 9 : 0 0 0 10 : 0 0 0 11 : 0 0 0 12 : 0 0 0 AUI: 0 0 82461 A : 0 0 0 B : 0 0 0 Select [R] Reset all statistics, or [X] Exit to previous[...]
-
Página 315
The following list describes the three menu options: [M] Menus —Displays the switch’s Main Menu. ♦ [I] IP Address —Available at log−on if the switch does not have a password configured. ♦ [P] Console Password —Allows you to enter an unencrypted privileged−level password to the switch management interface. This option is available at[...]
-
Página 316
[X] Exit to previous menu Enter Selection: This menu allows you to control the propagation of broadcasts to each port. The following list gives a brief description of each setting: [A] Action upon exceeding broadcast threshold —Indicates what action will be taken in the event that the broadcast number threshold is exceeded. There are two settings[...]
-
Página 317
Catalyst 1900 − Network Management (SNMP) READ Configuration ——————————————————————— Settings ————————————————— [1] First READ community string [2] Second READ community string [3] Third READ community string [4] Fourth READ community string [X] Exit to previous menu [...]
-
Página 318
[D] Fourth WRITE manager name or IP address [X] Exit to previous menu At this point you can select option [1] and configure the WRITE community string and change the default community string from “private” to “techwrite,” as we did in the following: Catalyst 1900 − Network Management (SNMP) WRITE Configuration —————————?[...]
-
Página 319
We now want to bind the IP address of our SNMP management station to the trap community string. To do this, enter the new community string, and select [1]. Then select [A] to enter the IP address. The following will appear on your screen: Enter Trap Manager community string (32 characters max): Current setting ===> New setting ===> Techtraps [...]
-
Página 320
——————————— Actions ——————————————————————————————————— [A] Add ports to capture list [D] Delete ports from capture list [X] Exit to Main Menu Enter Selection: A This command adds ports to the capture list. Actual monitoring takes place only if all of the fo[...]
-
Página 321
[P] VTP Statistics [X] Exit to Main Menu Select [V], and accept the default setting of Server. Because the change we want to make is to add a server, we will take the defaults: VTP mode may be set to [C]lient, [S]erver or [T]ransparent: Current setting ===> Server New setting ===> Server 2. Select [A] to add an Ethernet VLAN to the switch. Yo[...]
-
Página 322
You should now see the Trunk A Configuration menu The next step is to enable trunking. To do so, select [T] from the menu, as shown here: Catalyst 1900 − Trunk A Configuration Menu Trunking status: Off Encapsulation type: Unknown —————————————————————— Information —————————————[...]
-
Página 323
Assigning a Static VLAN to an Interface on a 1900EN Series 156 Configuring Spanning Tree Protocol To configure Spanning Tree Protocol, start from the Main Menu and do the following: Select option [N], Network Management. 1. From the Network Management menu, select option [B]: Catalyst 1900 − Network Management [I] IP Configuration [S] SNMP Manage[...]
-
Página 324
This command disables the Spanning Tree Protocol for a list of VLANs. You may disable the Spanning Tree Protocol for a list of VLAN numbers. VLAN numbers range from 1 to 1005. VLAN numbers should be separated by commas or spaces. A VLAN number range may also be specified. Example: 1, 2, 10−20 Enter VLAN numbers: 1 Notice here we selected the mana[...]
-
Página 325
Chapter 16: Switch Troubleshooting In Depth Switch troubleshooting includes both hardware and software. The switch hardware can be anything from a Supervisor Engine to a module, card, chassis, or even a power supply. The software can be the individual module software or the IOS. In this chapter, we will focus on troubleshooting both the Command Lin[...]
-
Página 326
Port Number LED Test 1 Ports (loopback) 2 Ethernet address PROM 3 CAM (MAC address) table 4 RS−232 console port 5 Realtime clock 6 CAM memory (SRAM) 7 Timer interrupt 8 Port control status 9 Flag memory (DRAM) 10 Buffer memory (DRAM) 11 Forwarding engine memory (SRAM) 12 Forwarding engine CPU 16/26 ECU memory (DRAM) Tip If the light turns green, [...]
-
Página 327
The active LED indicates the following: Orange —The Supervisor Engine is in standby. • Green —The Supervisor Engine is operating correctly. • Other LEDs are on the individual line modules, as shown in Figure 16.2. These LEDs indicate the status of each module. A green link light indicates a good established link. An orange or amber link lig[...]
-
Página 328
This problem is addressed by Cisco with the use of Switched Port Analyzer (SPAN). SPAN allows the switch to copy all the packets that are sent to nodes connected to the switch ports and direct them to another port. In essence, the designated switch port becomes a mirror of the monitored port or ports. Cable Problems When a cable problem surfaces, i[...]
-
Página 329
Figure 16.3: A screen capture from CiscoView. User Tracking —Used in the creation and management of dynamic VLANs. Cisco switches permit VLAN assignments based on dynamic VLAN assignments. This means the Media Access Control (MAC) address is used to assign the port to a specific VLAN. User Tracking defines these dynamic VLANs and maintains the wh[...]
-
Página 330
show cam • show cdp neighbors • show config • show flash • show interface • show log • show mac • show port • show spantree • show system • show test • show version • show vtp domain controller • show cam The show cam command displays a switch’s transparent bridging table (also known as the Content Addressable Memory [CA[...]
-
Página 331
show flash Cisco switches operate with software that is very similar to the Cisco IOS on routers. This software is stored and may be upgraded in flash stored on the Supervisor module. The show flash command reports the space required for the installed software and the version of the code, including the file names, software version numbers, and file[...]
-
Página 332
show system Using the show system command, you can obtain a component status summary regarding the switch components. This information includes the system status, current traffic percentage, peak percentage, status of the fans, power supplies, and modem; uptime, and system identification configuration. There is no comparable command on the 1900EN s[...]
-
Página 333
set system contact Sean Odom/Gina Galbraith ! #snmp set snmp community read−only public set snmp community read−write private set snmp community read−write−all all set snmp rmon disable set snmp trap enable module set snmp trap enable chassis set snmp trap enable bridge set snmp trap enable repeater set snmp trap enable vtp set snmp trap en[...]
-
Página 334
set vlan 1003 name Token−Ring−default type trcrf mtu 1500 said 101003 state active parent 0 ring 0x0 mode srb aremaxhop 7 stemaxhop 7 ! #spantree ! #uplinkfast groups set spantree uplinkfast disable ! #vlan 1 set spantree enable 1 set spantree fwddelay 15 1 set spantree hello 2 1 set spantree maxage 20 1 set spantree priority 32768 1 ! #vlan 2 [...]
-
Página 335
set logging level snmp 2 default set logging level spantree 2 default set logging level sys 5 default set logging level tac 2 default set logging level tcp 2 default set logging level telnet 2 default set logging level tftp 2 default set logging level vtp 2 default set logging level vmps 2 default set logging level kernel 2 default set logging leve[...]
-
Página 336
set port membership 2/1−24 static set cdp enable 2/1−24 set cdp interval 2/1−24 60 set spantree portfast 2/1−24 disable set spantree portcost 2/11 10 set spantree portcost 2/12 10 set spantree portcost 2/17 10 set spantree portcost 2/18 10 set spantree portcost 2/19 100 set spantree portcost 2/21 10 set spantree portcost 2/1−10,2/13−16,[...]
-
Página 337
1912EN# Viewing the Software Version on a Set/Clear Command−Based IOS Module To view the software version of a module on a Set/Clear command−based IOS, use the show version command. This command will not work on internal route processor modules, however. Let’s look at the command and an example of its output: show version <slot number> [...]
-
Página 338
epld 3.1 30 72920 06/14/99 19:33:06 lcp atm 3.1 12−15 23747 06/14/99 11:16:06 lcp tr 3.1 12−15 28737 06/14/99 11:17:19 lcp c5ip 3.1 12−15 23723 06/14/99 11:26:40 lcp 64k 3.1 12−15 57100 06/14/99 11:28:15 atm/fddi 3.1 12−15 24502 06/14/99 11:47:07 lcp 360 3.1(212) 12−15 120648 06/14/99 01:32:33 mcp 3.1 12−15 26278 06/14/99 11:50:41 Cat[...]
-
Página 339
—————————————— . . . Channel Status : Ports 1 2 —————————————— . . Note There is no comparable command on the 1900EN series switches. Testing External Module Hardware on a Set/Clear Command−Based Switch The Catalyst 5002 I am using has a Supervisor Engine in Slot 1. Slot 2 has a 10/100 Ether[...]
-
Página 340
Viewing the VTP Domain Configuration on a Set/Clear IOS The show vtp domain command can be used to obtain the VTP domain configuration on a Set/Clear command−based IOS switch. Let’s take a look at the command and an example of the output associated with it: Catalyst5002> (enable) show vtp domain Domain Name Domain Index VTP Version Local Mod[...]
-
Página 341
Protocols Configured: Address: Received: Transmitted: IP 68.127.187.10 95563219847 81294682 Virtual LAN ID: 2 (Inter Switch Link Encapsulation) vLAN Trunk Interface: FastEthernet1/0.2 Protocols Configured: Address: Received: Transmitted: IP 68.127.186.1 855147 854281 Catalyst5002> Viewing the VLAN Configuration on a CLI−Based IOS To view the V[...]
-
Página 342
Catalyst5002> (enable) show spantree VLAN 1 Spanning tree enabled Spanning tree type ieee Designated Root 00−00−80−0c−a1−b3 Designated Root Priority 32768 Designated Root Cost 0 Designated Root Port 1/0 Root Max Age 20 sec Hello Time 2 sec Forward Delay 15 sec Bridge ID MAC ADDR 00−00−80−0c−a1−b3 Bridge ID Priority 32768 Brid[...]
-
Página 343
Port Ethernet 0/1 of VLAN2 is Forwarding Port path cost 100, Port priority 128 Designated root has priority 32768, address 0000.0C00.4BD0 Designated bridge has priority 32768, address 0000.0C00.4BD0 Designated port is Ethernet 0/7, path cost 0 Timers: message age 20, forward delay 15, hold 1 Port Ethernet 0/2 of VLAN2 is Forwarding Port path cost 1[...]
-
Página 344
Port path cost 100, Port priority 128 Designated root has priority 32768, address 0000.0C00.4BD0 Designated bridge has priority 32768, address 0030.8054.6C00 Designated port is Ethernet 0/12, path cost 100 Timers: message age 20, forward delay 15, hold 1 Port Ethernet 0/25 of VLAN1 is Forwarding Port path cost 100, Port priority 128 Designated root[...]
-
Página 345
1912EN#show mac Number of permanent addresses : 5 Number of restricted static addresses : 0 Number of dynamic addresses : 1 Address Dest Interface Type Source Interface List ——————————————————————————————————————————————————————————?[...]
-
Página 346
1912EN#show cdp neighbors Capability Codes: R − Router, T − Trans Bridge, B − Source Route Bridge S − Switch, P − Repeater, H − Host, I − IGMP DeviceID IP Addr Local Port Capability Platform Remote Port 1005 68.127.187.254 Et0/1 R cisco 1000 Ethernet0 1912EN# Viewing Individual Port CAM Tables on a CLI−Based IOS The show mac interfa[...]
-
Página 347
MAC Dely−Exced MTU−Exced In−Dcrd Lrn−Dcrd In−Lost Out−Lost 1/1 0 0 0 0 0 0 1/2 0 0 0 0 0 0 2/1 0 0 0 0 0 0 2/2 0 0 0 0 0 0 2/3 0 0 0 0 0 0 2/4 0 0 0 0 0 0 2/5 0 0 0 0 0 0 2/6 0 0 0 0 0 0 2/7 0 0 0 0 0 0 2/8 0 0 0 0 0 0 2/9 0 0 0 0 0 0 2/10 0 0 0 0 0 0 2/11 0 0 0 0 0 0 2/12 0 0 0 0 0 0 Port Rcv−Unicast Rcv−Multicast Rcv−Broadcast 1[...]
-
Página 348
Last−Time−Cleared —————————————————————————— Sat Sep 23 2000, 11:29:11 Viewing Port Statistics on a CLI−Based IOS To view the port statistics on a CLI−based IOS, use the show usage command. Let’s take a look at the command, the options available, and an example of its output: 1912EN#show[...]
-
Página 349
Using the Port Configuration on a Set/Clear Command−Based IOS The show port command can be used on a Set/Clear command−based IOS switch to view the port configuration. Let’s take a look at the command, its optional syntaxes, and an example of its output: show port [module/port] show port [module] Catalyst5002> (enable) show port 2/1 Port N[...]
-
Página 350
Ethernet 0/9, Ethernet 0/10, Ethernet 0/11, Ethernet 0/12 Ethernet 0/25, FastEthernet 0/26, FastEthernet 0/27 1912EN#show port monitor Port monitoring state: Enabled Monitor port: None Ports being monitored: Ethernet 0/1 1912EN#show port system Switching mode: FragmentFree Use of store and forward for multicast: Enabled Network port: Ethernet 0/8 H[...]
-
Página 351
1 default Enabled 5−12, AUI, A, B 2 Engineering Enabled 1−2 3 Admins Enabled 3−4 1002 fddi−default Suspended 1003 token−ring−defau Suspended 1004 fddinet−default Suspended 1005 trnet−default Suspended ———————————————————————————————————— VLAN Type SAID MTU Paren[...]
-
Página 352
Receive Statistics Transmit Statistics —————————————————————————————————— ————————————————————————————————— Total good frames 2504 Total frames 11745 Total octets 242467 Total octets 875657 Broadcast/multicast frames[...]
-
Página 353
sp+B0: 10001030 10001030 10000BD0 10000AD0 sp+C0: 10000B28 10001030 10001030 10001030 sp+D0: 10001030 10001030 10001030 10001030 sp+E0: 10001030 10001030 10001030 10001030 sp+F0: 10001030 10001030 10001030 493798E4 D0: 00000000, D1: 00000004, D2: 00000030, D3: 00005C05 D4: 11000000, D5: 11000000, D6: 10FF0008, D7: 11000000 A0: 68000000, A1: 0000000[...]
-
Página 354
Press and hold down the Mode button, as shown in Figure 16.5, while cycling the power on the switch. Figure 16.5: The Mode button on a 1900 Series switch. 2. Proceed through the following options: 3. ——————————————————————————————————————————————————[...]
-
Página 355
[C] Continue with standard system start up [U] Upgrade operation firmware (XMODEM) [S] System debug interface Enter Selection: Use the [U] Upgrade Operation Firmware (XMODEM) option to upgrade the firmware (you must be using X−Modem compatible software on the network node attached to the switch): Enter Selection: U The XMODEM protocol will be use[...]
-
Página 356
[T] Toggle byte/word display Word [V] Value for output 0000H (0) ————————————————Actions———————————————— [I] Input [O] Output [X] Exit to Previous Menu Enter Selection: Here is an example of the output from the [M] Memory (CPU) I/O option: Enter Selection: M Diagnostic Console − Memo[...]
-
Página 357
Appendix A: Study Resources Glossary Books McDysan, David E. and Darren L. Spohn, ATM Theory and Application , McGraw−Hill: New York, 1998. ISBN: 0−07045−346−2. This book is a great resource on Asynchronous Transfer Mode (ATM) and LAN Emulation (LANE). Odom, Sean and Douglas Hammond, CCNP Switching Exam Prep , The Coriolis Group: Scottsdale[...]
-
Página 358
Online Resources Multiple documents are available on the Web, but the best place for information is the Cisco Web site. Cisco is one of the best companies at providing documentation on its products. You can find the Cisco Web site at http://www.cisco.com/ . Asynchronous Transfer Mode ATM fundamentals information on an 8500 Series switch — www.cis[...]
-
Página 359
Quality of Service Quality of Service Overview — www.cisco.com/univercd/cc/td/doc/product/software/ios121/121cgcr/qos_c/qcdintro.htm • Configuring Quality of Service on a Cisco Catalyst 6000 — www.cisco.com/univercd/cc/td/doc/product/lan/cat6000/sw_5_4/config/qos.htm • Configuring IOS Quality of Service on the Catalyst 6000 Family — www.c[...]
-
Página 360
Internet Engineering Task Force (IETF) —This organization is responsible for the TCP/IP, Simple Network Management Protocol (SNMP), and Internet standards. A lot of its work relates to upgrading and enlarging the TCP/IP protocol suite and networks utilizing that protocol. The IETF Web site can be found at http://www.ietf.org/ . • National Commi[...]
-
Página 361
Appendix B: Basic IOS CLI−to−Set/Clear Commands Overview Many features are supported by the Set/Clear−based switches, which include the Catalyst 5000 and 6000 families of switches. Most basic commands on a Command Line Interface (CLI)−based IOS can be mapped to commands that provide similar functionality on the Set/Clear−based CLI. Table [...]
-
Página 362
configuration show vlan Shows the VLAN configuration show vlan show vtp Shows the VLAN Trunking Protocol (VTP) configuration show vtp domain spantree <vlan−list> Configures STP set spantree enable <mod/number> hello <hellotime> spantree cost <cost−value> Configures the port cost set spantree portcost <mod/number cost&[...]
-
Página 363
Appendix C: The Cisco Consultant Overview On the side, I run a small consulting company. When I tell people that I am a Cisco consultant, they usually reply, “Oh”; or, they ask how well Cisco’s stock is currently doing. Consulting means that you work from one project to another on a freelance basis. Usually, if you’re the consultant for a C[...]
-
Página 364
Make sure you are on time for your first appointment with the customer. Turn off your cellular phone (let voice mail be useful for once) and put your pager on vibrate. You want to project to the customer that he or she is the most important person in the world at that moment. No one wants to buy something from someone who frustrates them by answeri[...]
-
Página 365
(briefly, this term refers to the fact that buying equipment correctly up front will be significantly cheaper than upgrading individual components later when it becomes necessary). Customers may not want to invest more money than they have to in the short term, but sometimes they will—and you wind up making a much bigger sale. Occasionally, your [...]
-
Página 366
Contracting When you first go into business as a consultant, you should have a contract that is created by an attorney and authorized by your insurance carrier. Once you have the contract in a word−processing document form that outlines your liabilities and those of the customer, you can modify the contract to suit each individual customer. The i[...]
-
Página 367
would only be there a week or so. The first day the contractor showed up, we gave him the initial payment for his work. He did a great day of work, removing the old flooring, vents, cabinets, toilet, and other fixtures. He said he would be back the next day to work some more—but the next day came and went, and he failed to show up. I called him, [...]
-
Página 368
Failing to Take Responsibility If you realize that you failed to contract an item, you should absorb the cost if it is small. No one feels more nickeled and dimed than a person who has hired a consultant, when the consultant says he forgot to add a cable and will be charging another $10 five times. You can absorb small costs into the 10 percent pad[...]
-
Página 369
Appendix D: Cisco 1912EN and Catalyst 5000 Configuration Practice Lab Today Joe Snow, our imaginary consultant, has received a Catalyst 1912EN switch, a Catalyst 5000 with a Supervisor Engine III, and a 24−port 10/100 Ethernet module. Joe has taken both the switches out of the box and has assembled all the devices into a rack. At present, neither[...]
-
Página 370
Mod MAC−Address(es) Hw Fw Sw —— ————————————————————————————————————— ———— ——————— —————————————————— 1 00−50−bd−a0−b0−00 to 00−50−bd−a0−b3−ff 2.0 3.1.2 5.5(2) 2 00−50−0f−b7−ff−50 to[...]
-
Página 371
Figure D.1: The sample configuration. Possible Solution More than one solution exists to any problem; however, here is the suggested solution to configuring the Cisco Catalyst 1912EN, the Cisco Catalyst 5000, and the Cisco 2620 trunked interface. The 1912 Basic Configuration To configure the Cisco Catalyst 1912EN, follow these steps: Access the Cis[...]
-
Página 372
1912EN(config)# enable password level ? <1−15> Level number 1912EN(config)# enable password level 1 coriolis1 1912EN(config)# enable password level 15 coriolis2 1912EN (config)# enable secret coriolispass Enter Interface Configuration mode to configure the Fast Ethernet 0/27 port on the 1912EN. Enter the switch’s IP address and the defaul[...]
-
Página 373
1912EN(config)#vtp domain Coriolis 1912EN(config)#vtp domain server 1912EN(config)# exit Note The configuration on the 1912EN is saved automatically, so you do not need to save the configuration. The Catalyst 5000 Basic Configuration To configure the Cisco Catalyst 5000 10/100 Ethernet module and Supervisor Engine, follow these steps: Access the Ci[...]
-
Página 374
Port(s) 2/24 trunk mode set to on. Port(s) 2/24 trunk type set to isl. 2000 Oct 19 12:32:46 %DTP−5−TRUNKPORTON:Port 2/24 Enable this switch to be a VTP client for the Coriolis VTP domain. By doing this step you will propagate VLAN information to and from the 1912EN switch: Catalyst5000> (enable) set vtp domain ? Usage: set vtp [domain <na[...]
-
Página 375
Appendix E: Switch Features This appendix is dedicated to helping you determine which switch needs to be placed in your network. If the wrong switch is placed in each point in your network the load can cause severe problems, including bottlenecks or load failures. We will break down the switches into the layers in which Cisco feels they should resi[...]
-
Página 376
Cisco Catalyst 2820 For an environment that needs high−speed links to the wiring closet for 20 or so users, the Catalyst 2820 is an ideal solution. This switch is perfect for smaller wiring closets where it is not economical to purchase a high−end solution such as a Cisco Catalyst 5000 series switch. The Catalyst 2820 series switch architecture[...]
-
Página 377
Table E.3: The models and features available for the standard version of each Cisco Catalyst 2900 XL series switch. Feature 2908 XL 2912 MFXL 2916 XL 2924 MXL 2924 CXL 10/100 ports 8 0 16 24 22 100BaseFX ports 0 12 0 0 2 Expansion slots 0 2 0 2 0 Enterprise Edition Yes Yes Yes Yes Yes Standard Edition Yes No Yes Yes Yes Backplane 3.2Gbps 3.2Gbps 3.[...]
-
Página 378
Expansion slots 0 0 2 0 Enterprise Edition Yes Yes Yes Yes Standard Edition No No No No Backplane 1.2Gbps 1.2Gbps 1.2Gbps 24Gbps Flash 4MB 8MB 12MB 0 RAM 20MB 32MB 64MB NA Modularity No No Yes NA Forwarding rate 1 million pps 1 million pps 1 million pps 18 million pps Max VLANs 1,024 1,024 1,024 N/A Cisco Catalyst 3000 The Cisco Catalyst 3000 has a[...]
-
Página 379
Gigabit Ethernet ports for GBIC Ethernet aggregation. It also has built−in support for Voice Over IP telephony, in addition to built−in support for up to 250 port−based VLANs and ISL VTP. In addition, the 3500 series supports many of the features of the 1900 and 2900 series, such as DNS and DHCP. The series is offered in both Standard and Ent[...]
-
Página 380
Key Features and Benefits The Catalyst 3900 has the following features: Twenty shielded Token Ring ports for 150−ohm shielded twisted pair (STP) or 100−ohm unshielded twisted pair (UTP) connectivity • FlexSlot accommodating two expansion modules or one double−wide module for future expansion • Nine−pin EIA/TIA−232 interface for local [...]
-
Página 381
Catalyst 4000 series • Catalyst 5000 series • Catalyst 6000 series • Cisco Catalyst 4000 Series The Catalyst 4000 series provides very fast and intelligent Layer 2 switching services using a 24Gbps switching fabric. It is used in Ethernet networks utilizing 10−, 100−, and 100Mbps switching. Let’s take a look at the features of each of t[...]
-
Página 382
configuration across all switches Support for all advanced switching features of the Cisco IOS software • Support for advanced multicasting with CGMP • The Catalyst 5000 series of switches uses an architecture based on Supervisor Engines I, II, and III. The Supervisor Engine provides network management and uplink ports. The Supervisor Engine II[...]
-
Página 383
switching in distribution and server−aggregation environments. The Catalyst 6000 family complements the Catalyst 5000 series and 8500 series switches. The Catalyst 6000 family is capable of scaling bandwidth from T1 to OC−192 in the WAN/MAN, and from Ethernet to 10 Gigabit Ethernet in the LAN. The Catalyst 6000 series uses a Cisco IOS software [...]
-
Página 384
Catalyst 8400 series • Catalyst 8500 series • BPX 8600 series • MGX 8800 series • Catalyst 12000 series • Note Cisco considers the Catalyst 5500 and the Catalyst 6500 series switches as versatile Distribution and Core layer switches. Cisco Catalyst 8400 Series The Catalyst 8400 series wide−area switches provide the backbone services to [...]
-
Página 385
Low−Delay, Code−Excited Linear Prediction (LD−CELP) at 16Kbps • Conjugate−Structured, Algebraic Code−Excited Linear Prediction (CS−ACELP) at 8Kbps • The IGX voice interfaces also support the VAD silence suppression technique, which sends cells on the trunk only when there is something to send. With most voice connections consisting [...]
-
Página 386
Table E.12: The key features of the Cisco Catalyst 8510 and 8540. Feature 8510 8540 Modular slots 5 13 Forwarding rate 6 million pps 24 million pps Backplane 10Gbps 40Gbps BPX 8600 Series The BPX 8600 series provides a scalable set of solutions delivering ATM, Frame Relay, SNA, voice, and circuit emulation services, plus Voice Over IP, IP−based V[...]
-
Página 387
MGX 8800 Series The Cisco MGX 8800 series wide−area edge switches integrate Cisco IOS software IP capabilities and carrier−class ATM in a single platform. The MGX 8850 switch enables delivery of differentiated services while scaling from DS0 to OC−48c/STM−16 speeds. The MGX platform provides a cost− effective edge infrastructure for volum[...]
-
Página 388
The MGX 8800 RPM also supports MPLS. It can act as a label edge router or label switch router. It also supports MPLS−VPNs via mulitprotocol BGP extentions, VPN route−target extended BGP community attributes, MPLS forwarding across backbone, and multiple routing/forwarding instances on the provider edge router. As mentioned earlier, the Route Pr[...]
-
Página 389
512K configuration nonvolitile RAM (NVRAM) • 8MB boot flash • Two PC Card Type II software upgrades • Ethernet (RJ−45 and MII connectors) for network management access • Local console and modem ports (DB−25/EIA/TIA−232c) • The GRP provides the following key functions: Processes interior gateway protocols (IGPs) such as Intermediate [...]
-
Página 390
then forwards the frame out all the ports. American National Standards Institute (ANSI) The organization that publishes standards for communications, programming languages, and networking. ANDing The process of comparing the bits of an IP address with the bits in a subnet mask to determine how a packet will be handled. anycast address An address us[...]
-
Página 391
B backbone A high−capacity infrastructure system that provides optimal transport on a LAN. Typically in a LAN, the data running from router to router, switch to switch, or switch to router is transported through a faster physical topology than the rest of the local area or virtual LAN devices. The physical cable is called the backbone. BackboneFa[...]
-
Página 392
device or Layer 2 device that can filter broadcasts. On a switched network using VLANs, the broadcast domain is all the ports or collision domains that belong to the same VLAN. broadcast storm Occurs when broadcasts throughout the LAN become so numerous that they use up all the available bandwidth, thus grinding the network to a halt. brouter A dev[...]
-
Página 393
support CDP. Cisco Express Forwarding (CEF) Used in the CEF ASIC (CEFA) and Distributed Cisco Express Forwarding (dCEF) ASIC, Cisco’s newest ASICs. These ASICs, which are used in Cisco’s high−end devices, are the most functional and efficient ASICs in the Cisco product line. They use a CEF search engine, which makes IP prefix−based switchin[...]
-
Página 394
A feature of the SAMBA ASIC used to cause the EARL to make forwarding decisions. It also ensures that a tagged frame that comes from a particular VLAN does not exit through a port belonging to another VLAN. CBL also assists in placing ports in one of four different modes for Spanning−Tree Protocol: blocking, learning, listening, or forwarding. co[...]
-
Página 395
Data Service Unit (DSU) A component that formats and controls data for transmission over digital lines. It is used in conjunction with a Channel Service Unit (CSU). Data Terminal Equipment (DTE) A device at the user end of a user−network interface that serves as a data source, a destination, or both. These devices include computers, protocol tran[...]
-
Página 396
dumb terminal An end−user station that can access another computer or switch but cannot provide any processing at the local level. Dynamic Host Configuration Protocol (DHCP) A protocol that provides an IP address to requesting nodes on the network. Dynamic ISL A protocol that performs trunking negotiation. It also verifies that two connected port[...]
-
Página 397
A connection used on the Catalyst 5000 family of switches. It allows as many as seven Ethernet links to be bundled and load−balanced frame by frame to provide up to 800Mbps of bandwidth. It can utilize half−duplex or full−duplex links. Fast Ethernet IEEE 802.3 specification for data transfers of up to 100Mbps. fault tolerance A theoretical co[...]
-
Página 398
A Data Link layer switching protocol used across multiple virtual circuits of a common carrier, giving the end user the appearance of a dedicated line. frame tagging A VLAN implementation method used to add VLAN information to data frames. As a frame enters the switch, it is tagged with VLAN information. It retains this information through the swit[...]
-
Página 399
hub A hardware device that connects multiple independent nodes. Also known as a concentrator or multiport repeater . Hypertext Transfer Protocol (HTTP) A protocol used by Web browsers to transfer pages and files from a remote node to your computer. IEEE See Institute of Electrical and Electronics Engineers . IEEE 802.1 Standard that defines the OSI[...]
-
Página 400
Standard for inserting a frame tag VLAN identifier in the frame header. As a frame enters the switching fabric, it is tagged with additional information regarding the VLAN properties. The tag remains in the frame as it is forwarded between switches and is removed prior to exiting the access link to the destination interface. This process is complet[...]
-
Página 401
internetwork A group of networks that are connected by routers or other connectivity devices so that the networks function as one network. Internetwork Operating System (IOS) Cisco’s proprietary operating system, used in its routers and switches. Internetwork Packet Exchange (IPX) The Network−layer protocol generally used by Novell’s NetWare [...]
-
Página 402
A broadcast on the local network, looking for the IP address of the destination host. local service Service where the device supplying the service resides on the same subnet as the device requesting the service. Local Target Logic (LTL) A feature of some line modules that assists the EARL in making forwarding decisions. local VLAN Beneficial for ne[...]
-
Página 403
microwaves Very short radio waves used to transmit data over 890MHz. modem A device used to modulate and demodulate the signals that pass through it. It converts the direct current pulses of the serial digital code from the controller into the analog signal that is compatible with the telephone network. multicast A single packet transmission from o[...]
-
Página 404
A protocol that allows all network equipment to synchronize the date and time on the private or internetwork environment. network−to−network interface (NNI) An interface that provides connectivity between two ATM switches. non−blocking A condition in which the fabric contains more bandwidth than the sum total of all the ports’ bandwidth com[...]
-
Página 405
is the common modem connection used for Internet dial−up. Point−To−Point Tunneling Protocol (PPTP) A protocol that encapsulates private network data in IP packets. These packets are transmitted over synchronous and asynchronous circuits to hide the underlying routing and switching infrastructure of the Internet from both senders and receivers[...]
-
Página 406
customers, which remains analog. Q−R Quality of Service (QoS) A guarantee of a particular level of service for a connection. QoS uses queuing and other methods to guarantee that bandwidth is available for a certain protocol, application, or address. QoS is important for implementing applications such as voice and video. queuing Uses buffering and[...]
-
Página 407
Route Switch Module (RSM) Cisco’s first multiprotocol multilayer switch module, which utilizes the full support of the Cisco IOS for performing Layer 3 routing from a slot internally on a Layer 2 switch. This module provides for interVLAN connectivity. Routing Information Field (RIF) A field on Source Route Bridge Token Ring frames that contains [...]
-
Página 408
the same community. Simple Network Management Protocol (SNMP) trap An SNMP protocol utility that sends out an alarm in an identified community notifying members of the community that some network activity differs from the established threshold, as defined by the administrator. Simple Server Redundancy Protocol (SSRP) A Cisco protocol that provides [...]
-
Página 409
A 12−digit number that is used to uniquely identify each device on an IPX network. storage area network A subnetwork of storage devices, usually found on high−speed networks and shared by all servers on the network. store−and−forward A fast packet−switching method that produces a higher latency than other switching methods. The switch wai[...]
-
Página 410
An organization that develops standards with the EIA (Electronics Industries Association) for telecommunications technologies. Telnet Standard terminal−emulation protocol in the TCP/IP protocol stack. It is used to perform terminal emulation over TCP/IP via remote terminal connections, enabling users to log in to remote systems and use resources [...]
-
Página 411
U−X unicast A frame in which the destination MAC address specifies the single destination computer. Unicast can be summarized as direct network traffic between two individual nodes. unshielded twisted−pair (UTP) A type of cable that uses multiple twisted pairs of copper wire in a casing that does not provide much protection from EMI. The most c[...]