3Com SUPERSTACK 2200 User Manual

Manual is about: SWITCH ADMINISTRATION CONSOLE

Summary of SUPERSTACK 2200

  • Page 1

    ® s uper s tack ™ ii s witch 2200 a dministration c onsole u ser g uide part no. 801-00310-000 published september 1996 revision 01.

  • Page 2

    3com corporation ■ 5400 bayfront plaza ■ santa clara, california ■ 95052-8145 © 3com corporation, 1996. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without pe...

  • Page 3: Ontents

    C ontents a bout t his g uide introduction 1 how to use this guide 2 conventions 3 switch 2200 documentation 4 documentation comments 5 p art i i ntroduction 1 s uper s tack ™ ii s witch 2200 a dministration o verview about switch 2200 administration 1-1 configuration tasks 1-1 2 h ow to u se the a ...

  • Page 4: Art

    Administration console interface parameters 2-10 adjusting the screen height 2-10 disabling the reboot and abort keys 2-11 remote access parameters 2-11 preventing disconnections 2-11 enabling timeout of remote sessions 2-12 setting timeout interval for remote sessions 2-13 running scripts of admini...

  • Page 5: , R

    Setting up snmp on your system 3-15 displaying snmp settings 3-15 configuring community strings 3-15 administering snmp trap reporting 3-16 displaying trap information 3-16 configuring trap reporting 3-17 removing trap destinations 3-18 flushing trap destinations 3-19 setting up smt event proxying 3...

  • Page 6: Fddi R

    8 a dministering fddi r esources administering fddi stations 8-1 displaying station information 8-2 setting the connection policies 8-3 setting neighbor notification timer 8-5 enabling and disabling status reporting 8-5 administering fddi paths 8-6 displaying path information 8-6 setting tvxlowerbou...

  • Page 7

    Administering stp bridge parameters 10-7 enabling and disabling stp on a bridge 10-7 setting the bridge priority 10-7 setting the bridge maximum age 10-8 setting the bridge hello time 10-9 setting the bridge forward delay 10-9 setting the stp group address 10-10 11 a dministering b ridge p orts disp...

  • Page 8: Art

    Loading packet filters 12-22 assigning packet filters to ports 12-22 unassigning packet filters from ports 12-24 13 c onfiguring a ddress and p ort g roups to u se in p acket f ilters using groups in packet filters 13-1 listing groups 13-2 displaying groups 13-3 creating new groups 13-4 deleting gro...

  • Page 9

    B t echnical s upport online technical services b-1 3com bulletin board service b-1 access by modem b-1 access by isdn b-2 world wide web site b-2 3comforum on compuserve® b-2 3comfactssm automated fax service b-3 support from your network supplier b-3 support from 3com b-4 returning products for re...

  • Page 10: Bout

    A bout t his g uide introduction the superstack™ ii switch 2200 administration console user guide provides all the information you need to configure and manage your switch 2200 once it is installed and the system is attached to the network. Prior to using this guide, you should have already installe...

  • Page 11

    2 a bout t his g uide how to use this guide this guide is organized by types of tasks you may need to perform on the switch 2200. The parts of the guide are described in table 1. Table 1 description of guide parts part contents i: introduction introducing switch 2200 administration learning about th...

  • Page 12

    Conventions 3 conventions table 2 and table 3 list icon and text conventions that are used throughout this guide. Iv: bridging configuring bridge and bridge port parameters administering the spanning tree protocol bridge and bridge port parameters displaying and configuring bridge port addresses cre...

  • Page 13

    4 a bout t his g uide switch 2200 documentation the following documents comprise the switch 2200 documentation set. If you want to order a document that you do not have or order additional documents, contact your sales representative for assistance. ■ superstack™ ii switch 2200 unpacking instruction...

  • Page 14

    Documentation comments 5 ■ superstack™ ii switch 2200 getting started describes all the procedures necessary for planning your configuration and for installing, cabling, powering up, and troubleshooting your switch 2200 system. (shipped with system/part no. 801-00309-000) ■ superstack™ ii switch 220...

  • Page 15: Ntroduction

    I chapter 1 overview of superstack™ ii switch 2200 administration chapter 2 how to use the administration console i ntroduction.

  • Page 16: Uper

    1 s uper s tack ™ ii s witch 2200 a dministration o verview this chapter introduces you to superstack™ ii switch 2200 administration and briefly describes the system parameters that you can configure. About switch 2200 administration the switch 2200 software is installed at the factory in flash memo...

  • Page 17

    1-2 c hapter 1: s uper s tack ™ ii s witch 2200 a dministration o verview table 1-1 general system commands task quick command for details, see. . . Run a script of commands to set up a system write a script of console commands with the values you assign so that you can quickly configure one or more...

  • Page 18

    Configuration tasks 1-3 save, restore, or reset nonvolatile data in the system provide a backup for nonvolatile data, restore nonvolatile data to the system, or reset nonvolatile data to defaults. System nvdata page 6-2 reboot the system restart the system. Disconnects rlogin and telnet sessions. Sy...

  • Page 19

    1-4 c hapter 1: s uper s tack ™ ii s witch 2200 a dministration o verview configure snmp management display current snmp configurations and specify the type of authorization for snmp management. Snmp display snmp community page 3-15 configure snmp trap reporting display snmp trap reporting informati...

  • Page 20

    Configuration tasks 1-5 configure spanning tree protocol (stp) parameters for a bridge enable or disable stp and set the bridge priority, the maximum age of stored configuration message information, the period between the generation of messages by a root bridge, the amount of time a bridge spends in...

  • Page 21

    1-6 c hapter 1: s uper s tack ™ ii s witch 2200 a dministration o verview table 1-4 ethernet commands task quick command for details, see. . . Display ethernet port information display label, status, and statistic information on ethernet ports in a summarized or detailed format. Ethernet summary eth...

  • Page 22

    Configuration tasks 1-7 table 1-5 fddi commands task quick command for details, see. . . Display fddi information display information about the system’s fddi station, paths, mac, and ports. Mac information is available in a summarized or detailed format. Fddi station display fddi path display fddi m...

  • Page 23: The

    2 h ow to u se the a dministration c onsole this chapter familiarizes you with user access levels of the superstack™ ii switch 2200 administration console and explains how to: ■ move around within the menu hierarchy to perform tasks ■ set up the interface parameters ■ access online help ■ use script...

  • Page 24

    2-2 c hapter 2: h ow to u se the a dministration c onsole each time you access the administration console, the system prompts you for an access level and password, as shown here: select access level (read, write, administer): password: the passwords are stored in nonvolatile (nv) memory. You must en...

  • Page 25

    Using menus to perform tasks 2-3 read access example if you have read access, the system menu contains only the display options shown here: menu options: ------------------------------------------------------------------ display - display the system configuration baseline - administer statistics bas...

  • Page 26

    2-4 c hapter 2: h ow to u se the a dministration c onsole administration console menu structure the following sections show the menu paths for performing tasks from the top-level menu and provide a brief description of each top-level menu option. See “selecting menu options” on page 2-8 for instruct...

  • Page 27

    Using menus to perform tasks 2-5 fddi menu from the fddi menu, you can view information about and configure the fddi station, paths, mac, and ports. (see figure 2-3.) for example, to enable the llc service of the fddi mac, you enter fddi at the top-level menu, mac at the fddi menu, and then llcservi...

  • Page 28

    2-6 c hapter 2: h ow to u se the a dministration c onsole figure 2-4 bridging menu hierarchy for administer access ip menu from the ip menu, you can view information about and configure internet protocol (ip) interfaces and routes. You can also administer the address resolution protocol (arp) and th...

  • Page 29

    Using menus to perform tasks 2-7 snmp menu from the snmp menu, you can configure snmp community strings and trap reporting. (see figure 2-6.) for example, to flush all trap reporting destinations, you enter snmp at the top-level menu, trap at the snmp menu, and then flush at the trap menu. Figure 2-...

  • Page 30

    2-8 c hapter 2: h ow to u se the a dministration c onsole selecting menu options you select a menu option at the selection prompt by entering its name (or enough of the name to uniquely identify it within the particular menu). For example, to access the system menu from the top-level menu, you enter...

  • Page 31

    Using menus to perform tasks 2-9 if you enter a command incorrectly, you receive a prompt telling you that what you entered was not valid or was ambiguous. You must re-enter the command from the point at which it became incorrect. Entering values when you reach the level at which you perform a speci...

  • Page 32

    2-10 c hapter 2: h ow to u se the a dministration c onsole administration console interface parameters you can change two administration console interface parameters: the screen height and the functioning of the reboot and abort control keys. Adjusting the screen height you can change the administra...

  • Page 33

    Remote access parameters 2-11 example: do you want this to be the new default screen height? (y/n): y disabling the reboot and abort keys as shipped, the administration console allows you to use the [ctrl + x] or [ctrl + c] key combinations within the administration console. These key strokes allow ...

  • Page 34

    2-12 c hapter 2: h ow to u se the a dministration c onsole to ensure that your administration console session will not be pre-empted by remote access, you can lock the administration console. Remote access is prohibited only for that particular session. The administration console is always locked wh...

  • Page 35

    Running scripts of administration console tasks 2-13 setting timeout interval for remote sessions you can set the timeout interval for remote sessions to any value from 30 minutes to 60 minutes. By default, the timeout interval is 30 minutes. To set the telnet timeout interval: 1 from the top level ...

  • Page 36

    2-14 c hapter 2: h ow to u se the a dministration c onsole the task you scripted is run in the administration console. The next example shows how you can script these tasks to initially configure your system: ■ setting up the console port baud rate ■ setting the system name ■ assigning an ip address...

  • Page 37

    Running scripts of administration console tasks 2-15 # this script performs some start-up configurations. # # set the console serial port baud rate. # system consolespeed 300 # console port baud rate # # set the system name # system name engineering switch2200_4 # # assign an ip address to the switc...

  • Page 38

    2-16 c hapter 2: h ow to u se the a dministration c onsole getting help in the administration console if you need assistance when using the administration console, it has online help and an outlining feature, both of which can be accessed from any menu level. These features are described in this sec...

  • Page 39

    Exiting the administration console 2-17 exiting the administration console if you are using an rlogin session to access the system, exiting will terminate the session. If you are accessing the system through the console serial port, exiting returns you to the password prompt. To exit from the admini...

  • Page 40: Ystem

    Ii chapter 3 configuring management access to the system chapter 4 administering your system environment chapter 5 baselining statistics chapter 6 saving, restoring, and resetting nonvolatile data s ystem -l evel f unctions.

  • Page 42: Onfiguring

    3 c onfiguring m anagement a ccess to the s ystem this chapter describes how to configure management access to the superstack™ ii switch 2200 stackable switch through a serial connection or an ip interface. It also describes how to configure the switch 2200 so that you can manage it using the simple...

  • Page 43

    3-2 c hapter 3: c onfiguring m anagement a ccess to the s ystem in-band or out-of-band? By default, the switch 2200 system provides in-band management through its ethernet and fddi ports. In-band management, management using the same network that carries regular data traffic, is often the most conve...

  • Page 44

    Setting up an ip interface for management 3-3 setting up an ip interface for management ip is a standard networking protocol used for communications among various networking devices. To access the system using tcp/ip or to manage the system using snmp, you must set up ip for your system as described...

  • Page 45

    3-4 c hapter 3: c onfiguring m anagement a ccess to the s ystem ■ broadcast address the system uses the ip address when it broadcasts packets to other stations on the same subnet. In particular, the system uses this address for sending rip updates. By default, the system uses a directed broadcast (a...

  • Page 46

    Setting up an ip interface for management 3-5 ip forwarding is enabled, rip is active, icmp router discovery is disabled. Index ip address subnet mask cost ports 1 158.101.1.1 255.255.255.0 1 1 2 158.101.4.1 255.255.255.0 1 2 3 158.101.6.1 255.255.255.0 1 5 4 158.101.8.1 255.255.255.0 1 8 defining a...

  • Page 47

    3-6 c hapter 3: c onfiguring m anagement a ccess to the s ystem 3 enter the subnet mask of the network to which the interface is to be connected. 4 enter the broadcast address to be used on the interface. 5 enter the cost value of the interface. 6 enter the port(s) that you want to include in the in...

  • Page 48

    Setting up an ip interface for management 3-7 removing an interface you might want to remove an interface if you no longer need to communicate with ip on the ports associated with that interface. To remove an ip interface definition: 1 from the top level of the administration console, enter: ip inte...

  • Page 49

    3-8 c hapter 3: c onfiguring m anagement a ccess to the s ystem ■ gateway ip address this address tells the router how to forward packets whose destination address matches the route’s ip address and subnet mask. The system forwards such packets to the indicated gateway. ■ status the status of the ro...

  • Page 50

    Setting up an ip interface for management 3-9 defining a static route you might want to define a static route to transmit system traffic, such as system pings or snmp response, through a consistent route. Before you define static routes, you must define at least one ip interface. (see “defining an i...

  • Page 51

    3-10 c hapter 3: c onfiguring m anagement a ccess to the s ystem flushing a route flushing deletes all learned routes from the routing table. To flush all learned routes, enter the following from the top level of the administration console: ip route flush all learned routes are immediately deleted f...

  • Page 52

    Setting up an ip interface for management 3-11 administering the arp cache the switch 2200 uses the address resolution protocol (arp) to find the mac addresses corresponding to the ip addresses of hosts and routers on the same subnets. An arp cache is a table of known ip addresses and their correspo...

  • Page 53

    3-12 c hapter 3: c onfiguring m anagement a ccess to the s ystem flushing arp cache entries you might want to delete all entries from the arp cache if the mac address has changed. To remove all entries from the arp cache, enter the following command from the top level of the administration console: ...

  • Page 54

    Setting up an ip interface for management 3-13 pinging uses the internet control message protocol (icmp) echo facility to send an icmp echo request packet to the ip station you specify. It then waits for an icmp echo reply packet. Possible responses from pinging are: ■ alive ■ no answer ■ network is...

  • Page 55

    3-14 c hapter 3: c onfiguring m anagement a ccess to the s ystem displaying ip statistics the ip statistics you can view are described in table 3-3. To display ip statistics, enter the following from the top level of the administration console: ip statistics statistics are displayed, as shown in thi...

  • Page 56

    Setting up snmp on your system 3-15 setting up snmp on your system to manage the switch 2200 from an external management application, you must configure snmp community strings and set up trap reporting as described in this section. You can manage the switch 2200 using an snmp-based external manageme...

  • Page 57

    3-16 c hapter 3: c onfiguring m anagement a ccess to the s ystem in the request matches the agent’s read-write community. Only the snmp get and get-next requests are valid if the community string in the request matches the read-only community. Community string length when you set a community string,...

  • Page 58

    Setting up snmp on your system 3-17 here is an example display of the snmp trap reporting information: trap descriptions: trap #description 1 mib ii: coldstart 2 mib ii: authentication failure 3 bridge mib: new root 4 bridge mib: topology change 5 lanplex systems mib: system overtemperature 10 lanpl...

  • Page 59

    3-18 c hapter 3: c onfiguring m anagement a ccess to the s ystem 3 enter the trap number(s). Separate a series of more than two trap numbers with a hyphen (-) and nonsequential trap numbers by commas. Enter all if you want to enable all the traps for the destination. The trap numbers you enter allow...

  • Page 60

    Setting up snmp on your system 3-19 flushing trap destinations when flushing the snmp trap reporting destinations, you remove all trap destination address information for the snmp agent. To flush all snmp trap reporting destinations: 1 from the top level of the administration console, enter: snmp tr...

  • Page 61

    3-20 c hapter 3: c onfiguring m anagement a ccess to the s ystem occurring locally on the one switch 2200 and to those reported by other stations on the fddi ring (including other switch 2200s). ■ enable local snmp traps and disable the proxying of remote smt events on every switch 2200 in your netw...

  • Page 62: Dministering

    4 a dministering y our s ystem e nvironment this chapter focuses on the administration of your superstack™ ii switch 2200 system environment, which involves: ■ displaying the current system configuration ■ setting system passwords ■ setting the system name ■ changing the system date and time ■ reboo...

  • Page 63

    4-2 c hapter 4: a dministering y our s ystem e nvironment ■ system temperature has exceeded the maximum level for normal operation ■ fan failure ■ power supply failure setting passwords the administration console supports three levels of password: one for browsing or viewing only (read), one for con...

  • Page 64

    Setting the system name 4-3 the administration console password has been successfully changed. 6 repeat steps 1 through 5 for each level of password you want to configure. Setting the system name you should give the switch 2200 an easily recognizable and unique name to help you manage the system. Fo...

  • Page 65

    4-4 c hapter 4: a dministering y our s ystem e nvironment 4 press [return] when you want the system to start keeping the time that you entered. Example: enter the new system time (mm/dd/yy hh:mm:ss xm): 09/30/96 10:00:00 am press return at the exact time: rebooting the system if your system is conne...

  • Page 66: Aselining

    5 b aselining s tatistics this chapter describes how baselining statistics work in the superstack™ ii switch 2200, and how to set, display, enable, or disable a baseline statistic. About setting baselines normally, statistics for macs and ports start compiling at system power-up. Baselining allows y...

  • Page 67

    5-2 c hapter 5: b aselining s tatistics setting baselines setting a baseline resets the counters to zero. The accumulated totals since power up are maintained by the system. The baseline is time-stamped. To set a baseline, enter the following commands from the top level of the administration console...

  • Page 68: Aving

    6 s aving , r estoring , and r esetting n onvolatile d ata this chapter describes the nonvolatile (nv) data in the superstack™ ii switch 2200 system and how to save, restore, and reset the data. About working with nonvolatile data if you want to transfer nv data from one system to another, save the ...

  • Page 69

    6-2 c hapter 6: s aving , r estoring , and r esetting n onvolatile d ata saving nv data when nv data is saved, it is written to a disk file on a host computer. The information can then be retrieved from the disk file when you use the restore command. To save nv data: 1 from the top level of the admi...

  • Page 70

    Restoring nv data 6-3 the failure message varies depending on the problem encountered while saving the nv data. At the end of the save, you are returned to the previous menu. Restoring nv data when you restore system nv data, the software presents you with a proposal for how to restore the data. Thi...

  • Page 71

    6-4 c hapter 6: s aving , r estoring , and r esetting n onvolatile d ata to restore the nv data: 1 from the top level of the administration console, enter: system nvdata restore you are prompted for information for restoring the nv data saved to a file. Press [return] at a prompt to use the value sp...

  • Page 72

    Examining a saved nv data file 6-5 examining a saved nv data file after saving nv data to a file, you can examine the header information of that file. To examine the file: 1 from the top level of the administration console, enter: system nvdata examine you are prompted for information for examining ...

  • Page 73

    6-6 c hapter 6: s aving , r estoring , and r esetting n onvolatile d ata resetting nv data to defaults at times you may not want to restore the system nv data. Instead, you may want to reset the values to the factory defaults so that you can start configuring the system from the original settings. C...

  • Page 74: III

    Iii chapter 7 administering ethernet ports chapter 8 administering fddi resources chapter 9 setting up the system for roving analysis e thernet and fddi p arameters.

  • Page 76: Dministering

    7 a dministering e thernet p orts this chapter describes how to: ■ view ethernet port information ■ configure ethernet port labels ■ enable or disable an ethernet port displaying ethernet port information you can display either a summary of ethernet port information or a detailed report. When you di...

  • Page 77

    7-2 c hapter 7: a dministering e thernet p orts port rxframes rxbytes rxframerate rxbyterate 1 406430 36336795 0 0 12 242400 29275605 0 0 port rxpeakbyterate rxpeakframerate norxbuffers alignmenterrs 1 90484 163 0 0 12 58438 394 0 0 port fcserrs lengtherrs rxinternalerrs rxdiscards 1 0 0 0 0 12 0 0 ...

  • Page 78

    Displaying ethernet port information 7-3 an example of a summary display for ethernet ports is shown here: table 7-1 describes the information provided about an ethernet port. Port portlabel portstate 1 office113_sparcstation5 on-line 12 office322_quadra900 on-line port rxframes txframes rxbytes txb...

  • Page 79

    7-4 c hapter 7: a dministering e thernet p orts portlabel 32-character string containing a user-defined name. The maximum length of the string is 32 characters, including the null terminator. Portstate current software operational state of this port. Possible values are on-line and off-line. Porttyp...

  • Page 80

    Displaying ethernet port information 7-5 txframerate average number of frames transmitted per second by this port during the most recent sampling period. Sampling periods are 1 second long and are not configurable. Txframes the number of frames transmitted by this port txinternalerrs number of frame...

  • Page 81

    7-6 c hapter 7: a dministering e thernet p orts frame processing and ethernet statistics all frames on the ethernet network are received promiscuously by an ethernet port. However, frames may be discarded for the following reasons: ■ there is no buffer space available. ■ the frame is in error. Figur...

  • Page 82

    Displaying ethernet port information 7-7 frames are delivered to an ethernet port by bridge and management applications. However, a frame may be discarded for the following reasons: ■ the ethernet port is disabled. ■ there is no room on the transmit queue. ■ an error occurred during frame transmissi...

  • Page 83

    7-8 c hapter 7: a dministering e thernet p orts labeling a port port labels serve as useful reference points and as an accurate means of identifying your ports for management. You may want to label your ethernet ports so that you can easily identify the device specifically attached to each port (for...

  • Page 84: Dministering

    8 a dministering fddi r esources this chapter describes how to display information about and configure the superstack™ ii switch 2200 system and its: ■ fddi station ■ fddi paths ■ media access control (mac) ■ fddi ports this chapter, which covers advanced fddi topics, is intended for users familiar ...

  • Page 85

    8-2 c hapter 8: a dministering fddi r esources displaying station information when you display fddi station information, you receive information about the station, including its configuration, status reporting, and the most pertinent statistics about general station activity and errors. 1 enter the ...

  • Page 86

    Administering fddi stations 8-3 setting the connection policies the connectpolicy attribute is a bit string representing the connection policies in effect on a station. A connection’s type is defined by the types of the two ports involved (a, b, m, or s) in the connection. You can set the correspond...

  • Page 87

    8-4 c hapter 8: a dministering fddi r esources to set the connection policies of an fddi station: 1 from the top level of the administration console, enter: fddi station connectpolicy you are prompted for a station. The switch 2200 has one station, which appears in brackets. 2 press return. 3 enter ...

  • Page 88

    Administering fddi stations 8-5 setting neighbor notification timer the t-notify attribute is a timer used in the neighbor notification protocol to indicate the interval of time between the generation of neighbor information frames (nif). Nif frames allow stations to discover their upstream and down...

  • Page 89

    8-6 c hapter 8: a dministering fddi r esources 2 press [return]. 3 enter the new statusreporting value ( enabled or disabled ). See the following example: select station [1]: station 1 - enter new value (disabled,enabled) [enabled]: disabled administering fddi paths fddi’s dual, counter-rotating rin...

  • Page 90

    Administering fddi paths 8-7 3 enter the path ( p = primary, s = secondary). See the following example of path information: table 8-3 describes these statistics. Setting tvxlowerbound the tvxlowerbound attribute specifies the minimum time value of fddimac tvxvalue that will be used by any mac that i...

  • Page 91

    8-8 c hapter 8: a dministering fddi r esources to set tvxlowerbound: 1 from the top level of the administration console, enter: fddi path tvxlowerbound you are prompted for a station, path, and value. The switch 2200 has one station, which appears in brackets. 2 press [return]. 3 enter the path ( p ...

  • Page 92

    Administering fddi macs 8-9 setting maxt-req the maxt-req attribute specifies the maximum time value of fddimact-req that will be used by any mac that is configured onto this path. T-req is the value that a mac bids during the claim process to determine a ring’s operational token rotation time, t_op...

  • Page 93

    8-10 c hapter 8: a dministering fddi r esources displaying mac information fddi mac information can be viewed in a summary or in detail. When you display a summary of various fddi mac statistics, you receive information about the mac, including received and transmitted frames and received and transm...

  • Page 94

    Administering fddi macs 8-11 the following example shows the detail display of fddi mac information: rxframes rxbytes rxframerate rxbyterate 103666 23089968 36 7582 rxpeakframerate rxpeakbyterate lostcount latecount 48 10308 0 0 notcopiedcount notcopiedthresh notcopiedratio notcopiedcond 0 6550 0 in...

  • Page 95

    8-12 c hapter 8: a dministering fddi r esources table 8-4 describes the information provided for the fddi mac. Table 8-4 description of fields for fddi mac attributes field description currentpath path on which this mac is currently located (primary or secondary) downstream mac address of this mac’s...

  • Page 96

    Administering fddi macs 8-13 olddownstream previous value of the mac address of this mac’s downstream neighbor oldupstream previous value of the mac address of this mac’s upstream neighbor ringopcount number of times that this mac has entered the operational state from the nonoperational state rmtst...

  • Page 97

    8-14 c hapter 8: a dministering fddi r esources frame processing and fddi mac statistics all frames on the fddi network are received promiscuously by an fddi mac. However, a frame might be discarded for the following reasons: ■ there is no buffer space available. ■ the frame is in error. Tvxcapab ma...

  • Page 98

    Administering fddi macs 8-15 ■ llc service is disabled. ■ this is an nsa frame and the a-bit is set. Figure 8-1 shows the order in which these discard tests are made. Figure 8-1 how frame processing affects fddi mac receive frame statistics frames are delivered to an fddi mac by bridges and manageme...

  • Page 99

    8-16 c hapter 8: a dministering fddi r esources figure 8-2 shows the order in which the discard tests are made. Figure 8-2 how frame processing affects fddi mac transmit frame statistics setting the frame error threshold the frameerrorthreshold attribute determines when a mac condition report is gen...

  • Page 100

    Administering fddi macs 8-17 see the following example: select mac [1]: mac 1 - enter new value [655]: setting the not copied threshold the notcopiedthreshold attribute determines when a mac condition report is generated because too many frames could not be copied. Not-copied frames occur when there...

  • Page 101

    8-18 c hapter 8: a dministering fddi r esources enabling and disabling llc service the logical link control (llc) service allows llc frames to be sent and received on the mac. Llc frames are all data frames transmitted on the network. If there is something wrong on your network, you may want to turn...

  • Page 102

    Administering fddi ports 8-19 administering fddi ports within an fddi station, the phy and pmd entities make up a port. A port (consisting of the phy/pmd pair that connects to the fiber media) is located at both ends of a physical connection and determines the characteristics of that connection. Eac...

  • Page 103

    8-20 c hapter 8: a dministering fddi r esources table 8-5 describes the type of information provided for an fddi port. Setting leralarm the leralarm attribute is the link error rate (ler) value at which a link connection generates an alarm. If the ler value is greater than the alarm setting, then sm...

  • Page 104

    Administering fddi ports 8-21 values so that you are only receiving alarms if your network is in poor health. The smt standard recommended value is 8. The leralarm value must be higher than the lercutoff value so that the network manager will be alerted to a problem before the phy (port) is actually...

  • Page 105

    8-22 c hapter 8: a dministering fddi r esources to set the lercutoff: 1 from the top level of the administration console, enter: fddi port lercutoff you are prompted for a port number and an estimated link error rate value at which the link connection will be broken. 2 enter the port number. 3 enter...

  • Page 106

    Administering fddi ports 8-23 setting the port paths in the switch 2200 you can assign the a and b ports to either the primary or the secondary path. To assign ports to paths: 1 from the top level of the administration console, enter: fddi port path you are prompted for a port. 2 enter the port(s) y...

  • Page 107: Etting

    9 s etting u p the s ystem for r oving a nalysis this chapter describes how to set up the superstack™ ii switch 2200 system for roving analysis. With roving analysis, you can monitor ethernet port activity either locally or remotely using a network analyzer attached to the system. About roving analy...

  • Page 108

    9-2 c hapter 9: s etting u p the s ystem for r oving a nalysis the remote port is located. The remote system must be located on the same fddi ring as the system to which the analyzer is attached. Figure 9-1 shows the process for establishing local and remote monitoring of ports. Figure 9-1 roving an...

  • Page 109

    Adding an analyzer port 9-3 to display the roving analysis configurations, enter the following from the top level of the administration console: analyzer display the configurations are displayed as shown in the following example: ethernet ports configured as analyzer ports: ethernet port address 9 0...

  • Page 110

    9-4 c hapter 9: s etting u p the s ystem for r oving a nalysis once the analyzer port is set, it is disabled from receiving or transmitting any other data. Instead, it transmits the data it receives from the monitored port to the network analyzer. If you have enabled spanning tree on this port, it i...

  • Page 111

    Starting port monitoring 9-5 starting port monitoring after you have a local or remote port configured for the network analyzer, you can start monitoring port activity. 3com recommends that you always configure the analyzer port before configuring the monitored ports. To start monitoring a new port:...

  • Page 112

    9-6 c hapter 9: s etting u p the s ystem for r oving a nalysis you are then prompted for an fddi port through which the data should be forwarded, as shown below: select fddi port (1-2): 2 once you successfully configure a port to monitor, all the data received and transmitted on the port is forwarde...

  • Page 113: Ridging

    Iv chapter 10 administering the bridge chapter 11 administering bridge ports chapter 12 creating and using packet filters chapter 13 configuring address and port groups to use in packet filters b ridging p arameters.

  • Page 114: Dministering

    10 a dministering the b ridge this chapter describes how to view the bridge setup and how to configure the following bridge-level parameters: ■ ip fragmentation ■ ipx snap translation ■ address threshold ■ address aging time ■ spanning tree protocol (stp) parameters for information about configuring...

  • Page 115

    10-2 c hapter 10: a dministering the b ridge the following example shows a display of bridge information. Each item in the bridge parameter list is described in table 10-1. Stpstate timesincelasttopologychange enabled 1 hr 28 mins 31 secs topologychangecount 2 topologychangeflag bridgeidentifier fal...

  • Page 116

    Displaying bridge information 10-3 table 10-1 bridge attributes parameter description addresscount number of addresses in the bridge address table addrtablesize maximum number of addresses that will fit in the bridge address table addrthreshold reporting threshold for the total number of addresses k...

  • Page 117

    10-4 c hapter 10: a dministering the b ridge maxage the maximum age value at which the stored configuration message information is judged too old and discarded. This value is determined by the root bridge. Mode operational mode of the bridge. Valid value is transparent for ieee 802.1d transparent br...

  • Page 118

    Enabling and disabling ip fragmentation 10-5 enabling and disabling ip fragmentation when ip fragmentation is enabled, large fddi packets are “fragmented” into smaller packets. Ip fragmentation allows fddi and ethernet stations connected to the switch 2200 to communicate using ip even if the fddi st...

  • Page 119

    10-6 c hapter 10: a dministering the b ridge setting the address threshold the address threshold for a bridge is the reporting threshold for the total number of ethernet addresses known to the system. When this threshold is reached, the snmp trap addressthresholdevent is generated. Address threshold...

  • Page 120

    Administering stp bridge parameters 10-7 administering stp bridge parameters you can enable or disable spanning tree protocol in the system and set the following stp bridge parameters: priority, maximum age, hello time, and forward delay. For more information about how the spanning tree parameters i...

  • Page 121

    10-8 c hapter 10: a dministering the b ridge to configure the stp bridge priority: 1 from the top level of the administration console, enter: bridge stppriority 2 enter the priority value at the prompt. If your configuration was successful, you return to the previous menu. If the configuration was n...

  • Page 122

    Administering stp bridge parameters 10-9 setting the bridge hello time hello time is the period between the generation of configuration messages by a root bridge. If the probability of losing configuration messages is high, shortening the time makes the protocol more robust. However, lengthening the...

  • Page 123

    10-10 c hapter 10: a dministering the b ridge setting the stp group address the stp group address is a single address that bridges listen to when receiving stp information. Each bridge on the network sends stp packets to the group address. Every bridge on the network receives stp packets sent to the...

  • Page 124: Dministering

    11 a dministering b ridge p orts this chapter describes how to view bridge port information and configure the following: ■ multicast packet threshold ■ spanning tree protocol (stp) parameters ■ bridge port addresses displaying bridge port information bridge port information includes the stp configur...

  • Page 125

    11-2 c hapter 11: a dministering b ridge p orts the following example shows a bridge port summary display. Port rxframes rxdiscards txframes ethernet 1 411180 0 1353766 ethernet 12 243559 0 1184225 port portid stp state fwdtransitions ethernet 1 0x8003 enabled forwarding 1 ethernet 12 0x800e enabled...

  • Page 126

    Displaying bridge port information 11-3 table 11-1 describes the type of information provided for the bridge port. Table 11-1 bridge port attributes parameter description designatedbridge identification of the designated bridge of the lan to which the port is attached designatedcost cost through thi...

  • Page 127

    11-4 c hapter 11: a dministering b ridge p orts rxframes number of frames that have been received by this port from its segment. A frame received on the interface corresponding to this port is only counted by this object if the frame is for a protocol being processed by the local bridging function, ...

  • Page 128

    Displaying bridge port information 11-5 state spanning tree state (blocking, listening, learning, forwarding, disabled) in which the port is currently operating: blocking: the bridge continues to run the spanning tree algorithm on that port, but the bridge does not receive data packets from the port...

  • Page 129

    11-6 c hapter 11: a dministering b ridge p orts frame processing and bridge port statistics all frames received on a physical (ethernet or fddi) interface and not explicitly directed to the switch 2200 are delivered to the corresponding bridge port. A frame is then either forwarded to another bridge...

  • Page 130

    Setting the multicast limit 11-7 figure 11-2 shows the order in which the discard decisions are made. Figure 11-2 how frame processing affects transmit bridge port statistics setting the multicast limit you can assign a multicast packet firewall threshold to a bridge port on the switch 2200 to limit...

  • Page 131

    11-8 c hapter 11: a dministering b ridge p orts 4 enter the new multicast threshold value for the port(s). See the example below: ethernet port 4 - enter new value [0]: 400 ethernet port 5 - enter new value [0]: 400 administering stp bridge port parameters you can enable or disable the spanning tree...

  • Page 132

    Administering stp bridge port parameters 11-9 the following example shows values being set for more than one port: ethernet port 4 - enter new value (disabled,enabled) [enabled]: disabled ethernet port 5 - enter new value (disabled,enabled) [enabled]: disabled setting the port path cost you can set ...

  • Page 133

    11-10 c hapter 11: a dministering b ridge p orts setting the port priority the stp port priority influences the choice of port when the bridge has two ports connected to the same lan, creating a loop. The port with the lowest port priority will be the one used by the spanning tree protocol. Port pri...

  • Page 134

    Administering port addresses 11-11 administering port addresses you can administer the mac addresses of stations connected to ethernet and fddi ports on the switch 2200. Listing addresses you can display mac addresses currently associated with the selected ports. Each address type (static or dynamic...

  • Page 135

    11-12 c hapter 11: a dministering b ridge p orts adding new addresses when you assign new mac addresses to the selected ports, these addresses are added as statically configured addresses. A statically configured address is never aged and can never be learned on a different ethernet port. To add a m...

  • Page 136

    Administering port addresses 11-13 flushing all addresses you can flush all static and dynamic mac addresses from the selected port(s). Static mac addresses are those that you specified using the add menu option. Dynamic mac addresses are those that were automatically learned by the bridge. To flush...

  • Page 137

    11-14 c hapter 11: a dministering b ridge p orts to freeze all dynamic addresses: 1 from the top level of the administration console, enter: bridge port address freeze you are prompted for the port type. 2 enter ethernet , fddi , or all . You are prompted for the port number(s). 3 enter the number(s...

  • Page 138: Reating

    12 c reating and u sing p acket f ilters this chapter describes how to create and edit packet filters using the packet filter language. This chapter also provides instructions for how to: ■ list, display, and delete currently defined filters ■ load packet filter definitions created in an ascii-based...

  • Page 139

    12-2 c hapter 12: c reating and u sing p acket f ilters listing packet filters when you list the packet filters for the system, the filter identification, filter name (if any), and filter assignments are displayed. To list the currently defined packet filters, enter the following from the top level ...

  • Page 140

    Displaying packet filters 12-3 displaying packet filters when displaying the contents of a single packet filter, you select the packet filter using the filter id (which you can obtain by listing the packet filters as described in the previous section). The packet filter instructions are displayed; h...

  • Page 141

    12-4 c hapter 12: c reating and u sing p acket f ilters concepts for writing a filter before writing a packet filter, you should understand thsee basic concepts: ■ how the packet filter language works ■ the basic elements of a packet filter ■ how to implement sequential tests in a packet filter ■ th...

  • Page 142

    Creating packet filters 12-5 table 12-2 describes the instructions and stacks of a packet filter. Table 12-2 packet filter instructions and stacks — descriptions and guidelines element descriptions and guidelines instructions each instruction in a packet filter definition must be on a separate line ...

  • Page 143

    12-6 c hapter 12: c reating and u sing p acket f ilters basic elements of a packet filter before creating a packet filter, you must decide which part of the packet you want to filter. You can filter ethernet packets by the destination address, source address, type/length, or some part of the data. Y...

  • Page 144

    Creating packet filters 12-7 the ethernet and fddi packet fields in figure 12-1 are used as operands in the packet filter. The two simplest operands are described in table 12-3. The operators that you specify in the packet filter allow the filter to make a logical decision about whether the packet s...

  • Page 145

    12-8 c hapter 12: c reating and u sing p acket f ilters implementing sequential tests in a packet filter filter language expressions are normally evaluated to completion — a packet is accepted if the value remaining on the top of the stack is non-zero. Frequently, however, a single test is insuffici...

  • Page 146

    Creating packet filters 12-9 the following example shows the use of both accept and reject in a packet filter. This packet filter was created for a network running both phase i and phase ii appletalk. Tm the goal of the filter is to eliminate the appletalk traffic. Name “filter appletalk datagrams” ...

  • Page 147

    12-10 c hapter 12: c reating and u sing p acket f ilters run-time storage of packet filters for run-time storage of packet filter programs, each switch 2200 system provides a maximum of 8192 bytes. There is no explicit system or per-packet-filter overhead; however, performance considerations can res...

  • Page 148

    Creating packet filters 12-11 4 apply a logic operation to the values in steps 2 and 3. The operator you use depends on what comparison you want to make. Variations on these four basic steps of writing packet filters include: ■ use pushtop for each additional comparison you intend to make with the p...

  • Page 149

    12-12 c hapter 12: c reating and u sing p acket f ilters packet filter solution the solution described here is to create a highly sophisticated packet filter that prevents only the broadcast packets from the market data servers from being forwarded onto the segments that are not part of an active tr...

  • Page 150

    Creating packet filters 12-13 the pseudocode translates into the following packet filter: name “ip xns ticker bcast filter” # assign this filter in the multicast path # of a port only--this is very important # # xns filtering section # pushfield.W 12 # get the type field of the packet and # place it...

  • Page 151

    12-14 c hapter 12: c reating and u sing p acket f ilters the rest of this section concentrates on the parts of the filter, showing you how to translate the pseudocode’s requirements into filter language. The large filter on page 12-13 is broken down into subsets to show how you can create small filt...

  • Page 152

    Creating packet filters 12-15 4 enter executable instruction #3: eq # if the two values on the top of the stack are equal, # then return a non-zero value packet filter two. This filter is designed to accept packets within the socket range of 0x76c and 0x898. These steps show how to create this filte...

  • Page 153

    12-16 c hapter 12: c reating and u sing p acket f ilters combining a subset of the filters. The next filter accepts ip packets with a socket range of 0x76c (1900) and 0x898 (2200). The filter combines packet filters one and two, modifying them for ip. These steps show how to create this filter. 1 na...

  • Page 154

    Creating packet filters 12-17 combining all the filters. Together, the four packet filters work to perform the solution to the problem: filtering the broadcast packets from the market data servers. These steps show how to create this filter: 1 name the filter: “discard xns & ip pkts w/in socket rang...

  • Page 155

    12-18 c hapter 12: c reating and u sing p acket f ilters the maximum length of a packet filter definition is 4096 bytes. The editor assumes a terminal capability no higher than a glass tty (that is, it does not assume an addressable screen). You can place any ascii printable character into the editi...

  • Page 156

    Creating packet filters 12-19 table 12-6 packet filter editor commands command keys description list buffer ctrl+l displays each of the lines in the editing buffer and then redisplays the line currently being edited next line ctrl+n moves cursor to next line; positions cursor at start of line previo...

  • Page 157

    12-20 c hapter 12: c reating and u sing p acket f ilters using an external text editor to use an ascii-based editor to create a packet filter: 1 create the definition in a text file. 2 from a networked workstation, ftp the file to the switch 2200 on which you want to load the filter. 3 load the filt...

  • Page 158

    Editing, checking and saving packet filters 12-21 to edit a packet filter using the switch 2200 system line editor: 1 from the top level of the administration console, enter: bridge packetfilter edit 2 enter the packet filter id number. Specifying a filter id loads that filter into the edit buffer. ...

  • Page 159

    12-22 c hapter 12: c reating and u sing p acket f ilters loading packet filters when you create packet filters using an external text editor, you must load the filters onto the system from the network host on which you created them. Once loaded, the packet filter definition is converted into the int...

  • Page 160

    Assigning packet filters to ports 12-23 it meets the forwarding criteria. A packet that does not meet the forwarding criteria defined in the filter is discarded. To assign a packet filter: 1 from the top level of the administration console, enter: bridge packetfilter assign 2 enter the id number of ...

  • Page 161

    12-24 c hapter 12: c reating and u sing p acket f ilters unassigning packet filters from ports to unassign a packet filter from one or more ports, the packet filter must have been previously assigned to at least one port. To unassign a packet filter: 1 from the top level of the administration consol...

  • Page 162: Onfiguring

    13 c onfiguring a ddress and p ort g roups to u se in p acket f ilters this chapter describes how to use address and port groups as filtering criteria in a packet filter, and how to administer address and port groups. Using groups in packet filters you can use address groups (a list of mac addresses...

  • Page 163

    13-2 c hapter 13: c onfiguring a ddress and p ort g roups to u se in p acket f ilters port group packet filter example in this example, packets are not forwarded to ports in groups 3 and 8. Name “discard groups 3 and 8” pushspgm # get source port group mask pushliteral.L 0x0084 # select bits 3 and 8...

  • Page 164

    Displaying groups 13-3 address group example in this example, three address groups are defined in the system. The first address group has an id of 1 and the name accounting. This group uses an address group mask of 1 (the bit set in the mask) . Address groups address group 1 - accounting address gro...

  • Page 165

    13-4 c hapter 13: c onfiguring a ddress and p ort g roups to u se in p acket f ilters members of the group. The name of the address group in this example is development, and the group has five members. Select address group to be displayed [1-n]: 2 address group 2 - development 05-39-24-56-ab-ee 08-2...

  • Page 166

    Creating new groups 13-5 enter the ports in this syntax: [port] as you enter each address or port, the system attempts to add it to the group. If the address or port you enter is already a member of the group, the system displays a message, as shown next, and the address or port is ignored. Warning:...

  • Page 167

    13-6 c hapter 13: c onfiguring a ddress and p ort g roups to u se in p acket f ilters port group example in this example, a new port group is created and loaded on the system. The bit in the port group mask for the group is 12 and the name of the group is education. One port is entered and assigned ...

  • Page 168

    Adding addresses and ports to groups 13-7 adding addresses and ports to groups when adding addresses or ports to an existing group, you can either enter the addresses or ports at the prompts or import them from a file. At least one address group or port group must exist before you can add addresses ...

  • Page 169

    13-8 c hapter 13: c onfiguring a ddress and p ort g roups to u se in p acket f ilters enter the ports in this syntax: [port] as you enter each address or port, the system attempts to add it to the group. If the address or port you enter is already a member of the group, a message is displayed, as sh...

  • Page 170

    Removing addresses or ports from a group 13-9 port group example this example shows a port successfully added to the manufacturing port group. Select port group to be modified [1-4]: 2 adding ports to group 2 - manufacturing enter the ports to be added - type q to return to the menu: port: ethernet ...

  • Page 171

    13-10 c hapter 13: c onfiguring a ddress and p ort g roups to u se in p acket f ilters as you enter addresses and ports, the system attempts to remove them from the group. If the address or port is not found in the group, a warning message is displayed, as shown here: warning: specified address was ...

  • Page 172

    Loading groups 13-11 loading groups there is no explicit menu item to load address and port groups that are defined in a file on a remote host. However, you can “load” groups by creating a script on a remote host (which includes your address or port group) and then running that script. The following...

  • Page 173

    13-12 c hapter 13: c onfiguring a ddress and p ort g roups to u se in p acket f ilters.

  • Page 174: Ppendixes

    V appendix a packet filter opcodes, examples, and sytax errors appendix b technical support a ppendixes.

  • Page 175: Acket

    A p acket f ilter o pcodes , e xamples , and s yntax e rrors this appendix: ■ describes the specific opcodes you can use when creating a packet filter ■ provides numerous examples of commonly used packet filters ■ describes the possible syntax errors you might receive when loading a packet filter fo...

  • Page 176

    A-2 a ppendix a: p acket f ilter o pcodes , e xamples , and s yntax e rrors pushfield.Size description: pushes a field from the target packet onto the stack. Packet data starting at is copied onto the stack. The most significant byte of the field is the byte at the specified offset. The number of by...

  • Page 177

    Opcodes a-3 pushtop description: pushes the current top of the stack onto the stack (that is, it reads the top of the stack and pushes the value onto the stack). The size of the push is determined by the size of the contents of the stack. Storage needed: 1 byte pushsagm description: pushes the sourc...

  • Page 178

    A-4 a ppendix a: p acket f ilter o pcodes , e xamples , and s yntax e rrors pushspgm description: pushes the source port group mask (spgm) onto the top of the stack. The spgm is a bitmap representing the groups to which the source port of a packet belongs. This instruction pushes 4 bytes on to the s...

  • Page 179

    Opcodes a-5 ne (not equal) description: pops two values from the stack and compares them. If they are not equal, a byte containing the value non-zero is pushed onto the stack; otherwise, a byte containing 0 is pushed. The size of the operands is determined by the contents of the stack. Storage neede...

  • Page 180

    A-6 a ppendix a: p acket f ilter o pcodes , e xamples , and s yntax e rrors gt (greater than) description: pops two values from the stack and performs an unsigned comparison. If the first is greater than the second, a byte containing the value non-zero is pushed onto the stack; otherwise, a byte con...

  • Page 181

    Opcodes a-7 or (bit-wise or) description: pops two values from the stack and pushes the bit-wise or of these values back onto the stack. The size of the operands and the result are determined by the contents of the stack. Storage needed: 1 byte xor (bit-wise exclusive-or) description: pops two value...

  • Page 182

    A-8 a ppendix a: p acket f ilter o pcodes , e xamples , and s yntax e rrors reject description: conditionally rejects the packet being examined. A byte is popped from the stack. If it is non-zero, the packet is rejected and evaluation of the filter ends immediately; otherwise, filter evaluation cont...

  • Page 183

    Packet filter examples a-9 packet filter examples the following examples of using the packet filter language start with basic packet filter concepts. Destination address filter this filter operates on the destination address field of a frame. It allows packets to be forwarded that are destined for s...

  • Page 184

    A-10 a ppendix a: p acket f ilter o pcodes , e xamples , and s yntax e rrors type filter this filter operates on the type field of a frame. It allows packets to be forwarded that are ip frames. To customize this filter to another type value, change the literal value loaded in the pushliteral.W instr...

  • Page 185

    Packet filter examples a-11 source address and type filter this filter operates on the source address and type fields of a frame. It allows xns packets to be forwarded that are from stations with an oui of 08-00-02. To customize this filter to another oui value, change the literal value loaded in th...

  • Page 186

    A-12 a ppendix a: p acket f ilter o pcodes , e xamples , and s yntax e rrors address group filter this filter accepts only frames whose source and destination address are in the same group. Name “forward same source and destination” pushsagm # get source address group mask pushdagm # get destination...

  • Page 187

    Common syntax errors a-13 common syntax errors when a packet filter definition is loaded, the definition is checked for syntax errors. The syntax errors and their causes are listed in table a-1. Table a-1 possible syntax errors when loading packet filters syntax error description opcode not found an...

  • Page 188

    A-14 a ppendix a: p acket f ilter o pcodes , e xamples , and s yntax e rrors invalid characters in number the number specified as an offset or literal is improperly formatted. Possible causes are 1) lack of white space setting off the number, and 2) invalid characters in the number. Note: the radix ...

  • Page 189: Echnical

    B t echnical s upport 3com provides easy access to technical support information through a variety of services. This appendix describes these services. Online technical services 3com offers worldwide product support seven days a week, 24 hours a day, through the following online systems: ■ 3com bull...

  • Page 190

    B-2 a ppendix b: t echnical s upport access by isdn isdn users can dial in to 3combbs using a digital modem for fast access up to 56 kbps. To access 3combbs using isdn, dial the following number: (408) 654 2703 world wide web site access the latest networking information on 3com’s world wide web sit...

  • Page 191

    Support from your network supplier b-3 3comfacts sm automated fax service 3com corporation’s interactive fax service, 3comfacts, provides data sheets, technical articles, diagrams, and troubleshooting instructions on 3com products 24 hours a day, seven days a week. Call 3comfacts using your touch-to...

  • Page 192

    B-4 a ppendix b: t echnical s upport support from 3com if you are unable to receive support from your network supplier, technical support contracts are available from 3com. In the u.S. And canada, call (800) 876-3266 for customer service. If you are outside the u.S. And canada, contact your local 3c...

  • Page 193: Ndex

    I ndex numerics 3com bulletin board service (3combbs) b-1 3com sales offices b-4 3comfacts b-3 3comforum b-2 a abort at prompts 2-9 enabling ctl+c 2-11 accept opcode 12-8, a-7 access levels 2-1 address adding static 11-12 aging time 10-6 filters a-9 flushing 11-13 for snmp trap reporting 3-17 freezi...

  • Page 194

    2 i ndex baud rate console serial port 3-2 bell, warning 4-1 blocking state 11-5 bridge see also packet filter address threshold, setting 10-6 aging time, setting 10-6 designated 11-3 ip fragmentation, enabling 10-5 ipx snap translation, enabling 10-5 menus 2-5 spanning tree bridge priority, setting...

  • Page 195

    I ndex 3 portstate 7-8 station mac addresses 11-11 ethernet address and restoring nv data 6-3 for the monitored port 9-5 ethernet port analyzer attached 9-3 displaying information 7-1 label 7-4 labeling 7-8 setting state (on-line or off-line) 7-8 static mac addresses 11-12 statistics 7-3 f fan, warn...

  • Page 196

    4 i ndex internet control message protocol. See icmp ip address translation 3-11 arp cache 3-11 interface 3-3 management access 3-1 menus 2-6 pinging 3-12 rip mode 3-12 route table 3-8 routes 3-7 statistics, displaying 3-14 ip address and restoring nv data 6-3 configuring 3-5 for ip interface 3-3 in...

  • Page 197

    I ndex 5 multicast frames and packet filters 12-1 multicast limit configuring 11-7 defined 11-7 n name opcode a-1 naming the switch 2200 4-3 ne opcode a-5 neighbor notification and llc service 8-18 network monitoring. See roving analysis and analyzer network supplier support b-3 network troubleshoot...

  • Page 198

    6 i ndex path cost defined 11-9 setting 11-9 path. See fddi path and backplane paths phy and fddi ports 8-19 ping ip station 3-12 pmd and fddi ports 8-19 port see also fddi port bridging priority 11-10 for analyzer 9-3 including in ip interface 3-4 label 8-20 maximum number in group 13-7 path cost 1...

  • Page 199

    I ndex 7 s sagm (source address group mask) 13-1 screen height adjusting 2-10 scripts for the administration console examples 2-15 running 2-13 serial port (console) for management 3-1 rebooting the system 4-4 setting baud rate 3-2 service access points (saps) and packet filters 12-4 shiftl opcode a...

  • Page 200

    8 i ndex switch 2200 administration overview 1-1 and network monitoring 9-1 bell warning 4-1 documentation 4 fan warning 4-2 naming 4-3 nv data restoration 6-3 ports and ip interfaces 3-6 power supply warning 4-2 quick commands 1-1 rebooting 4-4 resetting to system defaults 6-6 system backup 6-2 sys...