Section |
Page |
Contents |
3 |
About This Guide |
31 |
Audience |
31 |
Scope of this Guide |
32 |
Conventions |
32 |
Switch 4007 Documentation |
34 |
Documentation Comments |
35 |
Year 2000 Compliance |
35 |
Configuration Overview |
39 |
Physical Configuration Requirements and Options |
40 |
Requirements |
40 |
Options |
41 |
Order of Installation Activities |
41 |
System Architecture |
41 |
Management Options |
42 |
Management Module Console |
42 |
Switching Module Administration Console |
43 |
Web Management software |
43 |
SNMP-Based Network Management Overview |
44 |
Management Access |
45 |
Terminal Port Access |
45 |
Modem Port Access |
46 |
Access Levels |
46 |
System Configuration Process |
47 |
Configuration Procedure |
47 |
Configure the Management Module |
47 |
Configure Each Switching Module |
47 |
Overview of the ManagementModule |
53 |
Before You Start |
53 |
Module Overview |
54 |
Module Components |
54 |
Module Functions |
55 |
Impact on the Network |
56 |
Installing Management Modules |
57 |
Before You Start |
57 |
Installing Modules |
58 |
Hot Insert and HotSwap |
58 |
Installing Non-Management Modules |
58 |
Creating a Redundant Configuration |
59 |
Installation |
59 |
The Relationship Between Two Management Modules |
59 |
The Failover Process |
60 |
Connectivity Rules |
61 |
Verifying Management Module Operation |
62 |
The Display Button |
63 |
Making Management Connections |
63 |
Connecting to a 10BASE-T Ethernet Port |
63 |
Using an MDI-to-MDI Crossover Cable |
64 |
Connecting to an RS-232 Console Port |
64 |
Using a Modem |
66 |
Verifying Network Connectivity |
67 |
EME Technical Specifications |
69 |
Configuring and Using EME Options |
71 |
Quick Reference Configuration |
72 |
Saving Configuration Values |
72 |
Connecting to the System |
73 |
Initial Access |
73 |
Logging into the System |
73 |
Terminating a Connection |
73 |
Setting Up an IP Address for Telnet |
73 |
Connecting to Remote Devices |
74 |
In-band Connections |
75 |
Serial Line Internet Protocol Connections |
75 |
Configuring Access to the Web Interface |
76 |
Entering Commands |
77 |
The Command Completion Feature |
77 |
Listing Command Options |
78 |
Keystroke Functions |
80 |
Configuring the Terminal |
81 |
Configuring the Terminal to Default Settings |
81 |
Changing the Terminal Configuration |
82 |
Customizing Terminal Settings |
82 |
Setting Terminal Hangup |
83 |
Setting Terminal Prompt |
83 |
Setting Terminal Timeout Value |
83 |
Setting Terminal Type |
84 |
Troubleshooting the Terminal Interface |
84 |
Customizing Your System |
86 |
Assigning a UniqueName |
86 |
Setting EME Diagnostics |
86 |
Assigning a Contact Name and Location |
86 |
Configuring the Internal Clock |
87 |
Configuring User Logins |
89 |
User Access Levels |
89 |
User Login Functions |
89 |
Login Limitations |
89 |
Administer Access |
89 |
Setting the Password |
90 |
Adding New Users |
90 |
Showing Current Users |
91 |
Clearing Login Names |
93 |
Configuring SNMP Values |
94 |
Interaction Between the EME and SNMP |
94 |
Setting Up IP Connectivity |
94 |
Assigning an IP Address to the EME |
94 |
Setting a Subnet Mask |
95 |
Defining a Default Gateway |
95 |
Showing and Clearing IP Settings |
95 |
Creating a Community Table |
96 |
Configuring a Trap Destination |
97 |
Configuring the Authentication Alert Setting |
97 |
Configuring Trap Options |
97 |
Viewing SNMP Extensions and Traps |
98 |
Interpreting EME Trap Messages |
98 |
Obtaining More Information About SNMP |
99 |
Configuring the Event Log |
100 |
Using the File System |
101 |
Software Configuration Files |
101 |
Displaying Files in the File System |
101 |
Deleting Specified Files From the File System |
102 |
Deleting All Files and Resetting the Management Module |
102 |
Resetting System Components |
104 |
Resetting the Chassis |
104 |
Resetting Switching Modules |
104 |
Resetting the EME |
105 |
Resetting the EME to Default Values |
105 |
Accessing the Administration Console |
106 |
Running Diagnostic Tests |
107 |
Reporting Diagnostic Errors |
108 |
Setting servdiag Characteristics |
108 |
The cont_mode Characteristic |
108 |
The loop_count Characteristic |
108 |
The verbosity Characteristic |
109 |
Displaying servdiag Characteristics |
109 |
Obtaining Technical Assistance |
109 |
Managing the Chassis Power and Temperature |
111 |
Managing Power in the Chassis |
112 |
Intelligent Power Subsystem Features |
112 |
Load-Sharing Power Supplies |
113 |
Power Non-Fault-Tolerant Mode |
114 |
Power Fault-Tolerant Mode |
114 |
Setting Power Fault-Tolerance |
115 |
Enabling and Disabling Power to Slots |
116 |
Power Class Settings |
117 |
Using the Default Power Class Setting |
117 |
Setting Power Class |
117 |
Power Class 10 Warnings |
118 |
Budgeting Power |
118 |
Allocating Power for Installed Modules |
118 |
Increasing the Unallocated Power Budget |
119 |
Determining Chassis Power Budget |
120 |
Power Supply Output in Non-Fault-Tolerant Mode |
121 |
Power Supply Output in Fault-Tolerant Mode |
121 |
Overheat Conditions |
122 |
Enabling and Disabling Automatic Module Power-off |
123 |
The Overheat Management Area |
123 |
Overheat Power-off Process |
124 |
Overheat Recovery Process |
125 |
Saved Power Management Configurations |
125 |
Displaying Operating Conditions |
126 |
Displaying Chassis Information |
126 |
Displaying Module Information |
127 |
Basic Information For One Module |
127 |
Basic Information For All Modules |
127 |
Detailed Information For All Modules |
127 |
Displaying Power Information |
128 |
Displaying Chassis Inventory Information |
129 |
Displaying EME Information |
129 |
Module Parameters |
133 |
Module Parameters Overview |
134 |
Features |
134 |
Benefits |
134 |
Key Concepts |
135 |
How to Set and Modify Module Parameters |
135 |
Terminology |
135 |
nvData |
136 |
Physical Port Numbering |
137 |
Slot Architecture |
137 |
Default Port Settings |
138 |
Configuring Port Status |
139 |
Allocating Switch Fabric Capacity to Slots |
140 |
9-port GEN Switch Fabric Module |
140 |
Using Table33: Examples |
140 |
24-port GEN Switch Fabric Module |
141 |
Using Table34: Examples |
142 |
Key Guidelines for Implementation |
142 |
Effects of Removing a Module |
143 |
VLAN Changes |
143 |
Trunk Changes |
143 |
Effects of Replacing Modules |
144 |
Replacing Modules of the Same Type |
144 |
Replacing Modules of Different Types |
144 |
Ethernet |
145 |
Ethernet Overview |
146 |
Features |
146 |
Benefits |
147 |
Link Bandwidths |
147 |
Link Availability |
147 |
Other Benefits |
147 |
Key Concepts |
148 |
Ethernet Packet Processing |
150 |
Key Guidelines for Implementation |
152 |
Link Bandwidths |
152 |
Trunks |
152 |
Port Enable and Disable (Port State) |
153 |
Important Considerations |
153 |
Port Labels |
153 |
Implementing PortLabels |
153 |
Autonegotiation |
154 |
Important Considerations |
154 |
Port Mode |
156 |
Important Considerations |
156 |
Flow Control |
157 |
Important Considerations |
157 |
PACE Interactive Access |
158 |
Important Considerations |
158 |
Port Monitoring |
158 |
Standards, Protocols, and Related Reading |
159 |
Ethernet Protocol |
159 |
Media Specifications |
159 |
Related Reading |
160 |
Bridge-Wide and Bridge Port Parameters |
161 |
Bridging Overview |
162 |
Benefits |
162 |
Key Bridging Concepts |
163 |
Learning Addresses |
163 |
Aging Addresses |
163 |
Forwarding, Filtering, and Flooding |
164 |
Loop Detection and Network Resiliency |
164 |
Bridging Implementation Summary |
165 |
Key Guidelines for Implementation |
167 |
Physical Ports and Bridge Ports |
167 |
Option For FastAging |
167 |
If You Want ToUseSTP |
167 |
Port Forwarding Behavior |
168 |
Routing Over BlockedSTP Ports |
168 |
STP Compatible with Trunking |
168 |
STP Not Compatible with Resilient Links |
169 |
Bridge Ports and Trunks |
169 |
Multicast Limits and Trunks |
169 |
Bridge Port Addresses in Closed VLAN Mode |
169 |
GVRP Usefulness |
169 |
STP Terms and Concepts |
170 |
Configuration Messages |
170 |
Bridge Hierarchy |
170 |
Actions That Result from CBPDU Information |
171 |
Contents of CBPDUs |
173 |
Comparing CBPDUs |
173 |
How a Single Bridge Interprets CBPDUs |
174 |
How Multiple Bridges Interpret CBPDUs |
175 |
Determining the Root Bridge |
178 |
Determining the Root Ports |
178 |
Determining the Designated Bridge and Designated Ports |
178 |
Spanning Tree PortStates |
180 |
Reconfiguring the Bridged Network Topology |
182 |
Resulting Actions |
182 |
STP Bridge and Port Parameters |
183 |
Bridge-wide STP Parameters |
183 |
Bridge-Wide STP State |
183 |
Bridge Priority |
184 |
Bridge Maximum Age |
184 |
Bridge Hello Time |
184 |
Bridge Forward Delay |
184 |
STP Group Address |
185 |
Bridge Port STPParameters |
186 |
Port State |
186 |
Port Path Cost |
186 |
Port Priority |
186 |
MAC Address Table Design |
187 |
Address Space |
187 |
Important Considerations |
187 |
Address Aging |
189 |
Address Table Dependencies |
189 |
Normal Aging Process |
190 |
If the STP State isEnabled |
190 |
STP Topology Change |
190 |
Port Down Events |
191 |
If the STP State isDisabled |
191 |
If STP State is “AgingOnly” |
192 |
Important Considerations |
192 |
Frame Processing |
194 |
IP Fragmentation |
194 |
IPX SNAP Translation |
195 |
Broadcast and Multicast Limits |
195 |
Important Considerations |
196 |
GARP VLAN Registration Protocol (GVRP) |
197 |
Important Considerations |
197 |
Standards, Protocols, and Related Reading |
198 |
Class of Service (CoS) |
199 |
Overview |
200 |
Key Concepts |
201 |
Basic Elements of theStandard |
201 |
Format of PrioritizedPackets |
202 |
Queues and PriorityLevels |
202 |
CoS in Your System |
203 |
CoS Architecture |
203 |
Important Considerations |
204 |
Configuring Priority Levels |
204 |
Configuring a Rate Limit on Queue1 |
204 |
Important Considerations |
205 |
Handling Tagged and Untagged Packets |
206 |
Standards, Protocols, and Related Reading |
206 |
IP Multicast Filtering with IGMP |
207 |
Overview |
208 |
Benefits |
208 |
Key Concepts |
210 |
Devices That Generate IP Multicast Packets |
210 |
Group Addresses and Group Members |
210 |
Communication Protocols |
210 |
IP Multicast DeliveryProcess |
211 |
How Routers and Switches UseIGMP |
211 |
Tracking Group Member Locations |
212 |
How Hosts Use IGMP |
213 |
Host Membership Reports |
213 |
Join Message |
213 |
Leave-Group Messages |
213 |
Report Suppression and Effect on Switch Activity |
213 |
Configuring IGMP in Your System |
214 |
Key Implementation Guidelines |
215 |
ProcessingIP MulticastPackets |
217 |
Effects of MAC Address Aliasing |
218 |
Important Considerations |
219 |
Operating as theQuerier |
220 |
Locating Multicast Routers |
220 |
Aging the IGMP Tables |
221 |
Standards, Protocols, and Related Reading |
221 |
Trunking |
223 |
Trunking Overview |
224 |
Features |
224 |
Benefits |
224 |
Key Concepts |
225 |
Port Numbering in a Trunk |
225 |
Trunk Control Message Protocol (TCMP) |
226 |
Key Guidelines for Implementation |
227 |
General Guidelines |
227 |
Trunk Capacity Guidelines |
229 |
Automatic Backplane Trunking |
230 |
Important Considerations |
230 |
Defining Trunks |
231 |
Important Considerations |
231 |
Modifying Trunks |
233 |
Important Considerations |
233 |
Removing Trunks |
233 |
Important Consideration |
233 |
Standards, Protocols, and Related Reading |
234 |
Resilient Links |
235 |
Resilient Links Overview |
236 |
Features |
237 |
Benefits |
237 |
Key Concepts |
237 |
Key Guidelines for Implementation |
238 |
General Guidelines |
238 |
Resilient Link Define and Modify |
238 |
Important Considerations |
238 |
Resilient LinkState |
239 |
Important Considerations |
239 |
Resilient Link ActivePort |
239 |
Important Considerations |
239 |
Resilient LinkRemove |
239 |
Important Consideration |
239 |
Virtual LANs (VLANs) |
241 |
VLAN Overview |
242 |
Need for VLANs |
242 |
Benefits |
243 |
VLANs on the Switch4007 |
243 |
Features |
245 |
Key Concepts |
246 |
Related Standards and Protocols |
246 |
Tagging Types |
247 |
VLAN IDs |
248 |
Terminology |
249 |
Key Guidelines for Implementation |
250 |
Migration Path for Network-based VLANs |
250 |
VLANs Created by Router Port IP Interfaces |
252 |
Design Guidelines |
253 |
Procedural Guidelines |
254 |
Number of VLANs |
256 |
Equation for VLANs on Multilayer Switching Modules |
256 |
VLAN Aware Mode |
258 |
General Guidelines |
259 |
VLAN allOpen or allClosed Mode |
261 |
Important Considerations |
261 |
Modifying the VLAN Mode |
263 |
Mode Requirements |
264 |
Using allOpen Mode |
265 |
Using allClosed Mode |
265 |
Port-based VLANs |
266 |
The Default VLAN |
266 |
Modifying the Default VLAN |
267 |
Trunking and the Default VLAN |
268 |
User-Configured Port-based VLANs |
270 |
Important Considerations |
270 |
Example 1: A Single VLAN Configuration |
271 |
Example 2: VLANs with Tagged Backplane Ports |
272 |
Example 3: VLANs with Tagged Front-Panel Ports |
274 |
Dynamic Port-based VLANs Using GVRP |
277 |
Important Considerations |
277 |
Example: GVRP |
279 |
Protocol-based VLANs |
280 |
Important Considerations |
280 |
Selecting a Protocol Suite |
281 |
Establishing Routing Between VLANs |
282 |
Important Considerations |
282 |
Example 1: Routing Between Multilayer Modules |
283 |
Example 2: One-Armed Routing Configuration |
286 |
Network-based IP VLANs |
289 |
Important Considerations |
289 |
Example: Network-based VLANs |
290 |
Ignore STP Mode |
293 |
Important Considerations |
293 |
Example: Ignore STP Mode |
293 |
Rules of VLAN Operation |
295 |
Ingress Rules |
295 |
Egress Rules |
298 |
Standard Bridging Rules for Outgoing Frames |
298 |
Tag Status Rules |
298 |
Examples of Flooding and Forwarding Decisions |
299 |
Example 1: Flooding Decisions for Protocol-based VLANs |
299 |
Example 2: VLAN Exception Flooding |
300 |
Rules for Network-based (Layer 3) VLANs |
300 |
Example 3: Decisions for One Network-based VLAN |
301 |
Modifying and Removing VLANs |
302 |
Monitoring VLAN Statistics |
303 |
Packet Filtering |
305 |
Packet Filtering Overview |
306 |
What Can You Filter? |
306 |
When Is a Filter Applied? — Paths |
307 |
Input Packet Filtering: Receive Path |
307 |
Output Packet Filtering: Transmit Path |
307 |
Internal Packet Filtering: Receive Internal Path |
307 |
Path Assignment |
308 |
Key Concepts |
309 |
Standard Packet Filters |
309 |
Custom Packet Filters |
310 |
Important Considerations |
311 |
Managing Packet Filters |
311 |
Tools for Writing Filters |
313 |
ASCII Text Editor |
313 |
Built-in Line Editor |
313 |
Web Management Filter Builder Tool |
315 |
Downloading Custom Packet Filters |
317 |
Setting Up Your Environment |
317 |
Loading a Custom Filter on the Switch4007 |
318 |
The Packet Filtering Language |
319 |
Principles for Writing a Custom Filter |
319 |
How the Packet Filter Language Works |
319 |
Procedure for Writing a Custom Filter |
320 |
Packet Filter Opcodes |
322 |
Implementing Sequential Tests in a Packet Filter |
329 |
Common Syntax Errors |
331 |
Custom Packet Filter Examples |
333 |
Destination AddressFilter |
333 |
Source Address Filter |
333 |
Length Filter |
333 |
Type Filter |
334 |
Ethernet Type IPX and Multicast Filter |
334 |
Multiple Destination Address Filter |
334 |
Source Address and Type Filter |
335 |
Accept XNS or IP Filter |
335 |
XNS Routing Filter |
335 |
Port Group Filter |
336 |
Limits to Filter Size |
336 |
Storage Rules for Preprocessed Packet Filters |
336 |
Run-time Storage of Packet Filters |
336 |
Using Port Groups in Custom Packet Filters |
337 |
Port Group Packet Filter Example |
337 |
Port Group Filter Operation |
337 |
Port Group Management and Control Functions |
340 |
Defining Port Groups |
340 |
Important Considerations |
340 |
Long Custom Filter Example |
341 |
Filtering Problem |
341 |
Packet Filter Solution |
342 |
Packet Filter One |
344 |
Packet Filter Two |
345 |
Combining a Subset of the Filters |
346 |
Combining All the Filters |
347 |
Optimizing the Filter with Accept and Reject Commands |
348 |
IP Routing |
351 |
Routing Overview |
352 |
Routing in a Subnetworked Environment |
354 |
Integrating Bridging and Routing |
355 |
Bridging and Routing Models |
355 |
3Com Bridging and Routing |
356 |
IP Routing Overview |
358 |
Features and Benefits |
359 |
Key Concepts |
359 |
Multiple IP Interfaces per VLAN |
359 |
Media Access Control (MAC) Address |
360 |
Network-Layer Address |
360 |
IP Addresses |
360 |
Dotted Decimal Notation |
361 |
Network Portion |
361 |
Subnetwork Portion |
362 |
Subnet Mask Numbering |
363 |
Variable Length Subnet Masks (VLSMs) |
364 |
How VLSMs Work |
364 |
Guidelines for Using VLSMs |
364 |
Router Interfaces |
365 |
Routing Table |
366 |
Default Route |
368 |
Routing Models: Port-based and VLAN-based |
368 |
Key Guidelines for Implementing IP Routing |
369 |
Configure Trunks (Optional) |
369 |
Configure IP VLANs |
370 |
Establish Your IP Interfaces |
370 |
Interface Parameters |
370 |
Important Consideration |
371 |
Defining an IP Interface |
371 |
Enable IP Routing |
372 |
Administering IP Routing |
372 |
Address Resolution Protocol (ARP) |
372 |
Important Considerations |
374 |
ARP Proxy |
375 |
Important Considerations |
375 |
Example |
375 |
Internet Control Message Protocol (ICMP) |
376 |
ICMP Router Discovery |
377 |
Important Considerations |
377 |
Example |
378 |
ICMP Redirect |
378 |
Important Considerations |
379 |
Broadcast Address |
380 |
Important Considerations |
380 |
Directed Broadcast |
380 |
Important Considerations |
380 |
Routing Information Protocol (RIP) |
380 |
Basic RIP Parameters |
381 |
RIP Mode |
381 |
Compatibility Mode |
382 |
Cost |
382 |
Poison Reverse |
382 |
Advertisement Address |
383 |
Effects and Consequences |
383 |
RIP-1 Versus RIP-2 |
383 |
Important Considerations |
384 |
Routing Policies |
384 |
How Routing Policies Work |
385 |
Important Considerations |
387 |
Implementing RIP Routing Policies |
387 |
RIP Metric Adjustments |
387 |
RIP Import Policy Conditions for Specified Interfaces |
388 |
RIP Export Policy Conditions for Specified Interfaces |
389 |
Multiple Matched Routing Policies |
389 |
Setting Up RIP Routing Policies |
390 |
Effects and Consequences |
390 |
Creating RIP Routing Policies |
391 |
Domain Name System (DNS) |
392 |
Important Considerations |
392 |
User Datagram Protocol (UDP) Helper |
393 |
Implementing UDP Helper |
393 |
Configuring Overlapped Interfaces |
394 |
Important Considerations |
394 |
Standards, Protocols, and Related Reading |
395 |
Requests For Comments (RFCs) |
395 |
Standards Organizations |
395 |
Related Reading |
396 |
Virtual Router Redundancy Protocol (VRRP) |
397 |
VRRP Overview |
398 |
Router to Router |
398 |
Host to Host and Hostto Gateway |
398 |
Routing Protocols |
398 |
ICMP Router Discovery |
398 |
Static Route |
399 |
Default Gateway |
399 |
Example |
399 |
Key Concepts |
400 |
How VRRP Works |
401 |
Virtual Router Decision-making |
402 |
Important Considerations |
403 |
VRRP and Other Networking Operations |
404 |
Spanning Tree Protocol (STP) |
405 |
Dynamic Routing Protocols (RIP, RIP-2, OSPF) |
405 |
IGMP Queries |
406 |
ICMP Redirect |
407 |
Quality of Service |
407 |
IP Routing Policies |
407 |
Dynamic Host Configuration Protocol (DHCP) |
407 |
Using VRRP On Your Switch4007 |
407 |
VRRP with Multiple Virtual Routers |
407 |
Spanning Tree Considerations |
410 |
End Station Configuration |
410 |
VRRP Activity |
411 |
Sequence of Failover Events |
411 |
VRRP with a Single Virtual Router |
412 |
Configuring VRRP |
414 |
Configuring Router 1 as the Master Router |
414 |
Configuring the Protocol (IP) VLAN of the Master Router |
415 |
Configuring the IP Interfaces |
416 |
Configuring the Master Router |
417 |
Configuring Router 2 as the Backup Router |
417 |
Configuring the Protocol (IP) VLAN of the Backup Router |
418 |
Configuring the IP Interfaces |
419 |
Configuring the Backup Router |
420 |
Switching from Master Router to Backup Router |
420 |
Disabling the Master Router |
421 |
Displaying the Results of the Master Router Change |
421 |
Standards, Protocols, and Related Reading |
422 |
IP Multicast Routing |
423 |
IP Multicast Overview |
424 |
Unicast Model |
424 |
Broadcast Model |
424 |
Multicast Model |
424 |
Benefits of IPMulticast |
425 |
How a Network Supports IP Multicast |
426 |
IP MulticastRouting |
426 |
Supporting Protocols in Your Module |
427 |
IP Multicast Tunnels |
427 |
Supporting Protocol in Your Module |
428 |
IP Multicast Filtering |
428 |
Supporting Protocol in Your Multilayer Switching Module |
428 |
Internet Support for IP Multicast |
429 |
Key Concepts |
429 |
Traffic Movement |
429 |
IP Multicast Groups |
430 |
Source-Group Pairs |
430 |
Multicast Addresses |
430 |
Registered Groups |
430 |
Reserved MAC Addresses |
431 |
How IGMP Supports IPMulticast |
432 |
Electing the Querier |
432 |
Query Messages |
432 |
Host Messages |
432 |
Response to Queries |
432 |
Join Message |
433 |
Leave-Group Messages |
433 |
Role of IGMP in IP Multicast Filtering |
433 |
How DVMRP Supports IPMulticast |
434 |
Spanning Tree Delivery |
434 |
Managing the Spanning Tree |
435 |
Interface Relationships |
436 |
Broadcasting |
436 |
Pruning |
436 |
Grafting |
437 |
DVMRP Interface Characteristics |
437 |
Key Guidelines for Implementation |
438 |
Configuration Procedure |
438 |
Impact of Multicast Limits |
439 |
Impact of IEEE 802.1Q on Multicasts |
439 |
Protocol Interoperability |
439 |
Configuring IGMP Options |
440 |
Querying and Snooping Modes |
440 |
Important Considerations |
440 |
Configuring DVMRP Interfaces |
440 |
Important Considerations |
440 |
Configuring DVMRP Tunnels |
441 |
Important Considerations |
441 |
Configuring DVMRP Default Routes |
443 |
How Default Routes Work |
443 |
How to Configure A Default Route |
443 |
Important Considerations |
443 |
Viewing the DVMRP RoutingTable |
444 |
Viewing the DVMRP Cache |
444 |
Using IP Multicast Traceroute |
445 |
Important Considerations |
446 |
Standards, Protocols, and Related Reading |
446 |
Open Shortest Path First (OSPF) Routing |
447 |
OSPF Overview |
448 |
Features |
448 |
Benefits |
450 |
Key Concepts |
453 |
Autonomous Systems |
453 |
Areas |
453 |
Neighbors and Adjacency |
453 |
Router Types |
454 |
Router IDs |
455 |
Protocol Packets |
455 |
How OSPF Routing Works |
456 |
Starting Up |
456 |
Finding Neighbors |
456 |
Establishing Adjacencies |
456 |
Electing the Backup Designated Router |
456 |
Electing the Designated Router |
457 |
Calculating Shortest Path Trees |
457 |
Routing Packets |
457 |
Key Guidelines for Implementing OSPF |
458 |
Autonomous System Boundary Routers |
459 |
Configuring an ASBR |
459 |
Areas |
461 |
Types of Areas |
462 |
Area Border Routers |
464 |
Routing Databases |
464 |
Configuring Route Summarization in ABRs |
465 |
Important Considerations |
465 |
Default Route Metric |
468 |
OSPF Interfaces |
468 |
Mode |
468 |
Priority |
469 |
Using Priority to Select a Designated Router |
469 |
Area ID |
470 |
Cost |
470 |
Specifying Cost Metrics for Preferred Paths |
470 |
Delay |
471 |
Hello Interval |
471 |
Retransmit Interval |
472 |
Dead Interval |
472 |
Password |
472 |
Statistics |
473 |
Important Considerations |
473 |
Link State Databases |
475 |
Router Link State Advertisements |
475 |
Network Link State Advertisements |
476 |
Summary Link State Advertisements |
477 |
External Link State Advertisements |
478 |
Important Considerations |
479 |
Neighbors |
480 |
Neighbor Information |
481 |
Static Neighbors |
483 |
Important Considerations |
483 |
Router IDs |
484 |
Important Considerations |
484 |
OSPF Memory Partition |
485 |
Default Memory Allocation |
485 |
Current Partition Maximum Size |
485 |
Allocated Memory Size |
486 |
Running Out of Memory — Soft Restarts |
486 |
Manual Memory Allocation |
487 |
System Memory Allocation |
487 |
Stub Default Metrics |
487 |
Important Considerations |
488 |
Virtual Links |
488 |
Important Considerations |
490 |
OSPF Routing Policies |
490 |
Important Considerations |
491 |
Implementing Import Policies |
493 |
Import Policies at a Glance |
495 |
Import Example 1: Accept Route |
496 |
Import Example 2: Reject Route |
496 |
Implementing Export Policies |
496 |
Export Policies for RIP and Static Routes |
499 |
Export Policies for Direct Interfaces |
500 |
Export Example 1: Prohibit Advertisement of non-OSPF Interfaces |
500 |
Export Example 2: Prohibit Advertisement of Static Address |
501 |
Export Example 3: Prohibit Advertisement of RIP Routes |
501 |
Export Example 4: Advertisement of Direct Interfaces |
502 |
Export Example 5: Advertisement of Static Routes |
502 |
Export Example 6: Advertisement of RIP Routes |
503 |
OSPF Statistics |
504 |
Standards, Protocols, and Related Reading |
505 |
IPX Routing |
507 |
IPX Routing Overview |
508 |
Features |
509 |
Benefits |
509 |
Key Concepts |
510 |
How IPX Routing Works |
510 |
IPX Packet Format |
510 |
IPX Packet Delivery |
512 |
Sending Node’s Responsibility |
513 |
Router’s Responsibility |
514 |
Terminology |
515 |
Key Guidelines for Implementation |
516 |
Procedural Guidelines |
516 |
General Guidelines |
516 |
IPX Interfaces |
517 |
Important Considerations |
517 |
Per-Interface Options |
519 |
NetBIOS Option |
519 |
OddLengthPadding Option |
519 |
IPX Routes |
519 |
Important Considerations |
519 |
Primary and Secondary Routes |
520 |
Static Routes |
520 |
Dynamic Routes Using RIP |
520 |
Routing Tables |
521 |
Selecting the Best Route |
522 |
IPX Servers |
523 |
Important Considerations |
523 |
Primary and Secondary Servers |
524 |
Static Servers |
524 |
Dynamic Servers Using SAP |
524 |
Maintaining Server Information |
525 |
SAP Aging |
525 |
SAP Request Handling |
525 |
Server Tables |
525 |
IPX Forwarding |
526 |
Important Considerations |
526 |
IPX RIP Mode |
527 |
Important Considerations |
527 |
RIP Policies |
528 |
RIP Import Policies |
528 |
RIP Export Policies |
528 |
RIP Policy Parameters |
529 |
IPX SAP Mode |
530 |
Important Considerations |
530 |
SAP Policies |
530 |
SAP Import Polices |
531 |
SAP Export Policies |
531 |
SAP Policy Parameters |
531 |
IPX Statistics |
532 |
Standards, Protocols, and Related Reading |
533 |
AppleTalk Routing |
535 |
AppleTalk Overview |
536 |
Features |
536 |
Benefits |
537 |
Key Concepts |
538 |
AppleTalk Protocols |
538 |
Physical Layer Protocols |
539 |
Link Layer Protocols |
539 |
Network Layer Protocols |
539 |
Transport Layer Protocols |
540 |
Session Layer Protocols |
543 |
Presentation Layer Protocols |
544 |
AppleTalk Network Elements |
545 |
AppleTalk Networks |
545 |
AppleTalk Nodes |
545 |
Named Entities |
546 |
AppleTalk Zones |
546 |
Seed Routers |
546 |
Terminology |
546 |
Key Implementation Guidelines |
547 |
AppleTalk Interfaces |
548 |
Important Considerations |
549 |
AppleTalk Routes |
550 |
Important Considerations |
551 |
AppleTalk Address Resolution Protocol (AARP) Cache |
552 |
AppleTalk Zones |
554 |
Important Considerations |
555 |
Changing Zone Names |
556 |
Aging Out the Network Range |
556 |
Forwarding AppleTalk Traffic |
558 |
Enabling Forwarding |
558 |
Disabling Forwarding |
558 |
Important Considerations |
558 |
Checksum Error Detection |
559 |
Important Considerations |
559 |
AppleTalk Echo Protocol (AEP) |
559 |
AppleTalk Statistics |
560 |
Datagram Delivery Protocol (DDP) |
560 |
Routing Table Maintenance Protocol |
561 |
Zone Information Protocol |
562 |
Name Binding Protocol |
563 |
Standards, Protocols, and Related Reading |
564 |
QoS and RSVP |
565 |
QoS Overview |
566 |
Features |
566 |
Benefits |
567 |
Methods of Using QoS |
567 |
Key Concepts |
568 |
Related Standards and Protocols |
568 |
IEEE 802.1p |
568 |
Resource Reservation Protocol (RSVP) |
569 |
Terminology |
569 |
Key Guidelines for Implementation |
573 |
Procedural Guidelines |
573 |
General Guidelines |
573 |
QoS Classifiers |
574 |
Important Considerations |
574 |
Using Predefined Classifiers |
575 |
Assigning Flow and Nonflow Classifier Numbers |
576 |
Defining Flow Classifiers |
577 |
Flow Classifier Information |
578 |
Specifying Addresses and Address Masks |
578 |
Specifying Ports and Port Ranges |
579 |
Defining NonFlow Classifiers |
580 |
NonFlow Classifier Information |
580 |
QoS Controls |
581 |
Important Considerations |
582 |
Assigning Control Numbers |
583 |
Specifying Rate Limits |
585 |
Specifying Service Levels |
586 |
Specifying TCP Drop Control |
587 |
Setting the QoS Timer Control |
589 |
Timer Options |
590 |
Examples of Classifiers and Controls |
591 |
Example 1: Traffic To/From a Specific Server |
591 |
Example 2: Filtering Traffic to a Destination |
593 |
Example 3: Using Two Classifiers to Filter Traffic |
595 |
Example 4: Assigning High Priority to Specific Traffic |
598 |
Example 5: Nonflow Multimedia Tagged Traffic |
599 |
Example 6: Bridged Nonflow IP Unicast Traffic |
601 |
Modifying and Removing Classifiers and Controls |
602 |
Important Considerations |
603 |
QoS Excess Tagging |
603 |
Example: QoS Excess Tagging |
604 |
Transmit Queues and QoS Bandwidth |
606 |
RSVP |
607 |
RSVP Terminology |
608 |
Example: RSVP |
609 |
Setting RSVP Parameters |
610 |
Device Monitoring |
613 |
Chapter Scope |
614 |
Device Monitoring Overview |
616 |
Key Concepts and Tools |
616 |
Administration Console |
616 |
Web Management Tools |
616 |
Network Management Platform |
617 |
SmartAgent Embedded Software |
617 |
Event Logging |
618 |
Baselining |
618 |
Important Considerations |
618 |
Displaying the Current Baseline |
618 |
Setting a Baseline |
618 |
Enabling or Disabling Baselines |
618 |
Roving Analysis |
619 |
Key Guidelines for Implementation |
620 |
Important Considerations |
620 |
Ping |
622 |
Important Consideration |
622 |
Using Ping |
622 |
Ping Responses |
622 |
Strategies for Using Ping |
623 |
traceRoute |
623 |
Using traceRoute |
623 |
traceRoute Operation |
624 |
SNMP |
624 |
SNMP Overview |
625 |
Manager/Agent Operation |
625 |
SNMP Messages |
625 |
Trap Reporting |
626 |
Setting Up SNMP on Your System |
630 |
Administering SNMP Trap Reporting |
630 |
Remote Monitoring (RMON) |
631 |
Overview of RMON |
631 |
RMON Benefits |
632 |
RMON in Your System |
633 |
3Com Transcend RMON Agents |
633 |
Important Considerations |
634 |
RMON-1 Groups |
635 |
Statistics and axFddiStatistics Groups |
636 |
History and axFDDIHistory Groups |
637 |
Alarm Group |
637 |
Host Group |
640 |
HostTopN Group |
640 |
Matrix Group |
640 |
Event Group |
641 |
RMON-2 Groups |
641 |
Protocol Directory Group |
642 |
Protocol Distribution Group |
642 |
Address Map Group |
643 |
Network-Layer Host Group |
643 |
Network-Layer Matrix Group |
643 |
Application-Layer Host Group |
643 |
Application-Layer Matrix Group |
644 |
Probe Configuration Group Capabilities |
644 |
Management Information Base(MIB) |
644 |
MIB Files |
645 |
Compiler Support |
647 |
MIB Objects |
647 |
MIB Tree |
648 |
MIB-II |
651 |
RMON-1 MIB |
652 |
RMON-2 MIB |
653 |
3Com Enterprise MIBs |
654 |
Technical Support |
659 |
Online Technical Services |
659 |
World Wide Web Site |
659 |
3Com FTP Site |
659 |
3Com Bulletin Board Service |
660 |
Access by Analog Modem |
660 |
Access by Digital Modem |
660 |
3Com Facts Automated Fax Service |
661 |
Support from Your Network Supplier |
661 |
Support from 3Com |
661 |
Returning Products forRepair |
663 |