Cabletron Systems ATX User Manual

Other manuals for ATX: Supplementary Manual, Reference Manual
Manual is about: Enterasys ATX: Reference Guide

Summary of ATX

  • Page 1

    Atx user’s guide power status engine status turbo status supply a supply b 1.6 gbps reset packet processing engine nms port power fastnet atx tm offline proc pwr octal ieee 802.3 / ethernet 10base-t 3x 4x 5x 6x 7x 8x 2x 1x segment link act col 1 2 3 4 5 6 7 8 offline ring 1 rx st ring 2 rx st ring 3...

  • Page 3: Notice

    Notice i notice cabletron systems reserves the right to make changes in specifications and other information contained in this document without prior notice. The reader should in all cases consult cabletron systems to determine whether any such changes have been made. The hardware, firmware, or soft...

  • Page 4

    Notice ii doc notice this digital apparatus does not exceed the class a limits for radio noise emissions from digital apparatus set out in the radio interference regulations of the canadian department of communications. Le présent appareil numérique n’émet pas de bruits radioélectriques dépassant le...

  • Page 5

    Notice iii exclusion of warranty and disclaimer of liability 1. Exclusion of warranty. Except as may be specifically provided by cabletron in writing, cabletron makes no warranty, expressed or implied, concerning the program (including its documentation and media). Cabletron disclaims all warranties...

  • Page 6

    Notice iv declaration of conformity application of council directive(s): 89/336/eec 73/23/eec manufacturer’s name: cabletron systems, inc. Manufacturer’s address: 35 industrial way po box 5005 rochester, nh 03867 european representative name: mr. J. Solari european representative address: cabletron ...

  • Page 7: Contents

    V contents chapter 1 introduction 1.1 using this manual .........................................................................1-1 1.2 document conventions .............................................................1-3 1.3 related documentation ......................................................

  • Page 8: Network

    Vi contents 1.8.7 appletalk routing........................................................................1-34 appletalk addressing..........................................................1-34 appletalk zones ...................................................................1-34 how a macintosh l...

  • Page 9

    Contents vii 3.2.11 disabling routing functions....................................................3-12 3.3 configuring ipx routing..........................................................3-12 3.3.1 assigning an ipx address ..........................................................3-13 3.3.2 displa...

  • Page 10

    Viii contents 3.11.4 example #1: local port mirroring .......................................3-38 3.11.5 example #2: remote port mirroring....................................3-39 3.12 ipx routing over source route commands................3-40 3.13 ping commands .........................................

  • Page 11: Chapter 5  Filters

    Contents ix chapter 5 filters 5.1 filtering and performance considerations ...............5-2 5.2 using filters for security purposes....................................5-2 5.3 using filters to improve performance.............................5-3 5.4 address table filters................................

  • Page 12: Chapter 6  Traps

    X contents 5.10.1 filtering for security purposes.................................................5-20 example 1 — blocking access to a network segment ................5-20 example 2 — blocking access to specific stations ......................5-22 example 3 — restricting access to authorized users....

  • Page 13

    Contents xi 8.3 maintenance .....................................................................................8-3 8.3.1 power fuse......................................................................................8-3 8.3.2 fan filters...............................................................

  • Page 14

    Xii contents.

  • Page 15: Chapter  1

    1-1 chapter 1 introduction welcome to the cabletron systems atx user guide. This manual explains installation instructions, and provides specifications for the atx. 1.1 using this manual this manual is for system administrators responsible for configuring, monitoring, and maintaining the atx. You sh...

  • Page 16: Configuring

    1-2 introduction • chapter 2, installing and connecting to the network , describes the atx front panel, how to install the atx, and how to connect the local console manager. • chapter 3, configuring , provides instructions for configuring bridging, and ip, ipx, and appletalk phase ii routing using t...

  • Page 17: 1.2  Document Conventions

    Introduction 1-3 • appendix e, big endian to little endian address conversion , describes how to convert mac addresses from big endian (token ring native) to little endian (ethernet) format. 1.2 document conventions the following conventions are used in presenting information in this manual: lcm com...

  • Page 18: 1.3  Related Documentation

    1-4 introduction 1.3 related documentation you may need to refer to the following documentation: • atx mib reference guide – contains enterprise mib information. • token ring switch module user guide – contains instructions on installing the modules into the atx and connecting your token- ring modul...

  • Page 19: 1.4  Getting Help

    Introduction 1-5 1.4 getting help if you need additional support related to this device, or if you have any questions, comments, or suggestions concerning this manual, contact cabletron systems technical support: phone: (603) 332-9400 monday – friday 8 a . M . – 8 p . M . Eastern time compuserve: go...

  • Page 20: 1.5  Atx Architecture

    1-6 introduction • any previous return material authorization (rma) numbers for additional information about cabletron systems products, visit our world wide web site: http://www.Cabletron.Com/ 1.5 atx architecture the atx is a high-performance, multi-protocol, lanswitch providing multi-technology, ...

  • Page 21

    Introduction 1-7 processing engine. The atx offers features which allow you to easily manage and maintain your network, such as: • protection against multicast storms. • data flow control based on packet filters that you define. • compilation of statistics for traffic generated by each user device c...

  • Page 22: 1.6.1  Netbios Name Caching

    1-8 introduction with an innovative, multiple risc processor architecture, the atx’s packet processing engine is capable of filtering and forwarding at full line speed. Further, the atx’s protocol- independence and high performance allow for transparent, plug- and-play network operation. The atx off...

  • Page 23: Note:

    Introduction 1-9 unicast address. Name_query_request frames provide the atx with the name of the source workstation, the mac address, the port which recieved the frame and any applicable rif information. The name_recognized_response provides the atx with information including the name of the worksta...

  • Page 24

    1-10 introduction 1.6.3 ipx with token ring source routing token ring networks often interconnect with source routing (sr) bridges. Although the source routing is a mac layer feature, all packets must provide the correct source route information to the bridges in order to traverse the networks. To s...

  • Page 25

    Introduction 1-11 preserves network bandwidth for important user data and frees up valuable end station processing. By defining virtual workgroups, broadcasts will only be seen by other end stations within the same virtual workgroup. With the functionality to define workgroups by port grouping, ip n...

  • Page 26: 1.6.7  Input/output Modules

    1-12 introduction figure 1-2. Atx architecture 1.6.7 input/output modules the atx has four types of modules available. The modules slide into the face of the atx. The module installation procedures are in chapter 8. The atx supports the following: • 3e02-04, 3e05-04, 3e07-04, 3e08-04, and 3e02-08-at...

  • Page 27: 1.6.8  Power Supply

    Introduction 1-13 • 3t02-04, 3t05-04 and 3t01-04 - four ring token ring modules accepting data frames from and sending data frames to four token ring networks. The 3t02 and 3t01 modules support utp and stp cable types respectively, while the 3t05 supports either utp or stp. • 3f00-01 and 3f55-01 - d...

  • Page 28

    1-14 introduction as the originating packet, the atx immediately forwards the packet to the segment associated with the destination address. Local traffic, data packets whose source and destination address is on the same segment, is automatically discarded. The atx forwards data packets to network s...

  • Page 29

    Introduction 1-15 multicast packets. If source routing is desired, and either ethernet or fddi is to be used as a backbone between token rings, then the ethernet or fddi port should be configured for srt bridging. (srt over ethernet is not a standard, but is available for use between multiple atx ch...

  • Page 30: 1.7.1  Transparent Bridging

    1-16 introduction 1.7.1 transparent bridging transparent or spanning tree bridging requires no initial programming. After being installed on the network, bridges “learn” and remember the location of the attached devices by reading the source addresses of incoming packets. Then they place the source ...

  • Page 31

    Introduction 1-17 learning database to learn addresses on the incorrect ports. This could result in frames not getting forwarded and loss of communication. • srtb is a global parameter and is enabled only on token ring ports with srt bridging mode. • the rif database supports 8,192 entires. • srtb c...

  • Page 32

    1-18 introduction figure 1-3. Source routing example in the example in figure 1-3, a data packet traveling from station c on lan 43 through bridge b to station a on lan 7 must specify the full route it is to take. The source station is responsible for specifying the route, hence the term “source rou...

  • Page 33

    Introduction 1-19 where each bridge is likely to become congested. Figure 1-4. Data path using source routing bridging in contrast to spanning tree bridging, all bridges and all links are active with source routing bridging; the least-congested path is chosen at discovery time. With products like th...

  • Page 34: 1.7.5  Translation

    1-20 introduction 1.7.5 translation the atx is a translating bridge; meaning it translates packets across unlike protocols. For example, if an ethernet (802.3) data packet is to be forwarded to an fddi segment, the atx translates the packet to fddi packet format. Conversely, the atx translates fddi ...

  • Page 35: Translation Procedure

    Introduction 1-21 the atx uses a standardized internal format called canonical format, for packet translation. (refer to appendix b, packet translation procedure for an explanation of the packet translation procedure.) the atx converts all incoming packets into its internal format and then converts ...

  • Page 36: 1.8.1  Ip Routing

    1-22 introduction private/enterprise/sigma/ecs1/admin/config. The default setting for this mib is 0. Query the mib and change this value to the address of the snmp management station, then set. If the [confignmsaddress] mib is not changed, traps are sent to the last snmp manager which polled the dev...

  • Page 37: Proxy Arp

    Introduction 1-23 destination device. If the device is on the network, it will respond with its hardware address. Reverse address resolution protocol (rarp) if the atx is not configured with an ip address, it uses reverse arp (rarp), to send out broadcasts of its physical hardware address to find it...

  • Page 38: Physical Networks

    1-24 introduction 1.8.2 multiple ip networks per port the atx’s routing software allows you to configure a single ip network to span multiple physical network segments (atx ports). This enables you to configure multiple physical networks as one logical network. Figure 1-6. One logical network on mul...

  • Page 39: Physical Network

    Introduction 1-25 in addition, by overlapping logical networks, a user who moves to another physical network segment can remain on the same logical network and retain their net/host ip address, even if he or she is sharing the new physical network segment with other logical networks. This is known a...

  • Page 40: 1.8.3  Ip Multicast Routing

    1-26 introduction upon the operating system or tcp/ip being used. The host becomes aware of a gateway in one of three ways: • the host is manually configured with a default gateway address. • the host is listening to routing information protocol (rip) broadcasts. • the host is participating in the r...

  • Page 41: Note:

    Introduction 1-27 addressing (i.E., those ip addresses with 1110 as their high-order four bits). Using internet standard dotted decimal notation, host group ip addresses range from 224.0.0.0 to 239.255.255.255. The ip address 224.0.0.1 is assigned to the permanent group of all ip hosts. Members of a...

  • Page 42

    1-28 introduction for example, in figure 1-8, lans b, c, and d are bridged to backbone lan a. A packet originating from lan c destined to the host group member on lan b will traverse lans c and a but not lan d. Similarly, an ip multicast packet destined to the group member on lan b that originated o...

  • Page 43

    Introduction 1-29 figure 1-9. Bridged lan with two host group members 1.8.4 ip routing over source routing token ring networks are often connected by source-routing bridges. End-stations that communicate across a source-routing bridging domain must be able to build routes from themselves to their de...

  • Page 44

    1-30 introduction the architecture behind source-routing bridges is that a packet header containing a route is inserted by the source end-station. For the source end-station to discover a route to a destination end- station, it must learn of a route by transmitting a special type of packet called an...

  • Page 45

    Introduction 1-31 figure 1-12. Packet headers with and without source-routing bit set in tcp/ip hosts, an explorer packet exchange is normally accomplished as part of the address resolution protocol (arp). Arp is used to dynamically map ip addresses to mac addresses. The resulting source route is ke...

  • Page 46: 1.8.6  Ipx Routing

    1-32 introduction • transmit ip multicast packets as single route explorer packets. • transmit subnet-specific broadcasts as single route explorer packets. 1.8.5 configuring ip routing over source routing the ip routing over source-routing feature is integrated with the multiple ip networks per atx ...

  • Page 47: Note:

    Introduction 1-33 routing information protocol (rip) rip is one of the protocols that allows the atx to build an accurate, current routing table. Routers, including the atx, send out broadcasts every 60 seconds advertising the networks they know about, the routes to those networks, and the number of...

  • Page 48: 1.8.7  Appletalk Routing

    1-34 introduction 1.8.7 appletalk routing appletalk routing allows end-nodes to send packets to and receive packets from other end-nodes through the use of appletalk phase 2 protocol. The atx stores a table of routing information it learns through routing table maintenance protocol (rtmp) packets se...

  • Page 49

    Introduction 1-35 to an address. In the atx implementation, the maximum number of zones that a router may be configured is 22 ports. Each configured zone may be available on any subset of ports. How a macintosh learns its address a macintosh learns its network address automatically; you don’t have t...

  • Page 50: Note:

    1-36 introduction receives a response, it knows its network range and then performs additional aarp probes to choose a host number. The router then sends rtmp requests to begin building its routing table. Next the router asks other routers for a list of zones so it can create a zone list. Although a...

  • Page 51: 1.9  Trunking

    Introduction 1-37 a router that learns its network address from a seed router shows a status of garnered; meaning you did not configure it. 1.9 trunking if your network configuration requires you to connect two or more atxs together, but the applications you are running over the network require more...

  • Page 52: Trunk Groups

    1-38 introduction figure 1-13. Trunk connections trunk groups each set of connections between atxs is called a trunkgroup. You can configure several trunk groups to interconnect your atxs. Each atx can have up to eight trunk groups. Each trunk group can include up to eight ports. For example, you co...

  • Page 53: 1.10  Local Console Manager

    Introduction 1-39 to solve this problem, you could connect a to b with one trunk group, and connect b to c with a second trunk group. Figure 1-14. Trunk groups 1.10 local console manager the local console manager (lcm) is a tool for monitoring, managing, and configuring the atx, through an out-of-ba...

  • Page 54: Atx >Ex

    1-40 introduction 1.10.1 command syntax conventions the following conventions apply as you use lcm commands: • press the return key to execute a command after you type it in. • a port range is either a single port number, or a list of port numbers separated by commas or hyphens. For example, “3” is ...

  • Page 55: 1.10.2  Basic Lcm Commands

    Introduction 1-41 1.10.2 basic lcm commands the basic lcm commands allow you to get help and log out. Lcm commands used for configuring your atx are described in the configuration chapters. When you want to use lcm, begin by pressing the return key several times to get the lcm prompt ( atx > ). Note...

  • Page 60

    1-46 introduction.

  • Page 61: Chapter  2

    2-1 chapter 2 installing and connecting to the network carefully unpack the atx from the shipping carton and inspect it for possible damage. If any damage is evident, contact cabletron systems technical support. You can also order additional modules separately. The shipping carton contains: • the at...

  • Page 62

    2-2 installing and connecting to the network figure 2-1. Atx front panel atx leds and their functions are described in table 2-1. Refer to the module documentation for a description of the leds for that module. Table 2-1. Meaning of atx leds led meaning power status on – power supply is on and the v...

  • Page 63: 2.2  Mounting The Atx

    Installing and connecting to the network 2-3 atx switches and their functions are described in table 2-2. Refer to the module documentation for a description of the switches for that module. 2.2 mounting the atx if the atx is to be table-mounted, make sure it is within reach of the external power su...

  • Page 64: Note:

    2-4 installing and connecting to the network figure 2-2. Rack-mounting the atx 2.3 connecting the power supply the atx utilizes a two power supply system. A primary power source provides the atx with power. You can purchase an optional, redundant power supply as well. If you use both power supplies,...

  • Page 65

    Installing and connecting to the network 2-5 the atx should now be ready for operation after completing its automatic power-up diagnostics sequence and is connected to the network. 2.3.1 checking the power-up sequence before connecting the atx to any other devices, power on the unit and observe the ...

  • Page 66

    2-6 installing and connecting to the network figure 2-3. Led activity during normal operation power-up diagnostics sequence to observe the power-up sequence completely, you may want to repeat it. To restart the power-up sequence, turn the power switch off, then on again, or press the reset button ab...

  • Page 67

    Installing and connecting to the network 2-7 supplies. Leds are described in table 2-1. When you power up your atx, the following occurs: 1. All leds turn on briefly (this does not apply to all ethernet switch models, refer to the ethernet switch module user guide). 2. Individual module leds become ...

  • Page 68: Replacing The Power Supply

    2-8 installing and connecting to the network 2. Observe the power-up sequence again. 3. If the power-up sequence is still abnormal, contact cabletron systems technical support, see chapter 1, getting help. Replacing the power supply it is critical that the power supply inserted into the top slot of ...

  • Page 69

    Installing and connecting to the network 2-9 figure 2-4. Chassis with power supply a positioning tabs and supporting shelf indicated to replace the power supply in slot a (the top slot) 1. Turn power switch on power supply a (psa) off. 2. Remove the two thumb screws holding the power supply in place...

  • Page 70: Pinouts

    2-10 installing and connecting to the network figure 2-5. Atx with power supply a position indicated 2.4 connecting the local console manager the local console manager is a tool for configuring, monitoring, and managing the atx through an out-of-band rs-232 connection. To connect lcm: 1. Attach a nu...

  • Page 71

    Installing and connecting to the network 2-11 3. Set the terminal to 9600 baud, 8 data bits, 1 stop bit, and no parity. 4. Press the return key a few times. If the atx is powered on, it will respond with its prompt atx> . Lcm is now ready to use. Refer to chapter 1, local console manager for a gener...

  • Page 72

    2-12 installing and connecting to the network.

  • Page 73: Chapter  3

    3-1 chapter 3 configuring the atx does not require any additional configuration to operate as a standard transparent bridge. However, if you want it to communicate with an snmp manager, you have to assign an ip address to the port through which you will be communicating with the snmp manager. If you...

  • Page 74

    3-2 configuring figure 3-1. Typical bridging application bridges regulate network traffic on the basis of the source and destination addresses that are in each data packet. Bridges are protocol-transparent, meaning they can handle different types of traffic regardless of the network protocol, for ex...

  • Page 75: Note:

    Configuring 3-3 as a bridge reads addresses from the packets it processes, it builds an address table. In this way, it learns the addresses of connected devices. New devices can be added to the network, addresses can be changed, and devices can be removed from the network, without reconfiguring the ...

  • Page 76: Note:

    3-4 configuring transparent bridging on port 2. Lcm responds: port 2 bridging: srt (segment = 1 bridge = 9) to change the bridging functions for a port, re-issue the bridge command (as described above), using the new option. To set the segment number, use the srsegment command and to set the bridge ...

  • Page 77: Bridge

    Configuring 3-5 [nobpdu]]] port 2 bridging: transparent/translating port 3 bridging: srt (segment = 1 bridge = 9) port 4 bridging: sr (segment = 41 bridge = 9) port 5 bridging: transparent/translating . . . Port 21 bridging: transparent/translating you could also type: bridge to look at a specific p...

  • Page 78: Ipaddr

    3-6 configuring • class a addresses are used in very large networks that support many nodes. The first byte identifies the network and the other three bytes identify the node. The first byte of a class a address must be in the range 1-126. The address 100.125.110.10 would identify node 125.110.10 on...

  • Page 79: Ipaddr

    Configuring 3-7 3.2.3 changing a subnet mask you can optionally set the subnet mask for a port. If the subnet mask is 0.0.0.0, the atx will automatically convert the displayed mask to the standard default, based on the port’s ip address class. (class a address masks are 255.0.0.0, class b address ma...

  • Page 80

    3-8 configuring 3.2.5 enabling ip routing functions the ip routing functions you can enable for ports on the atx may be any combination of the following: • off – no ip routing at all. • on – ip routing, but no inter-router protocols. • rip – ip routing, with rip enabled, allows the atx to send out b...

  • Page 81: Iproute

    Configuring 3-9 type: iproute for example, iproute 5-6 rip bootp would enable routing on ports 5 and 6 with the rip and bootp options on. Lcm responds: port 5 routing: ip routing, rip, bootp relay port 6 routing: ip routing, rip, bootp relay 3.2.6 adding an ip address to a port to add an ip address ...

  • Page 82: Note:

    3-10 configuring note: all ip addresses sharing a common subnet must use the same subnet mask. In addition, two ip addresses assigned to the same physical interface must belong to distinct ip subnetworks. To add and delete multiple ip addresses on an atx port, the following subcommands have been add...

  • Page 83: Note:

    Configuring 3-11 addresses on port 2. Lcm responds by prompting for the next command. To display the current ip address table, type ipaddr with no arguments. Note: before you may issue the clearall command to an atx port, ip routing must be disabled for that port. To re-enable routing for the port, ...

  • Page 84: Iproute

    3-12 configuring 3.2.10 displaying ip routing functions to display the ip routing functions that are enabled for all ports: type: iproute lcm responds with a list of all ports and the routing functions that are enabled. Usage: iproute [port-range] [off] [on] [rip] [proxy] [bootp]] port 2 routing: ip...

  • Page 85: Ipxaddress

    Configuring 3-13 3.3.1 assigning an ipx address ipx addresses for each port must be unique and non-zero. When you assign an address, you can also designate the frame type. Frame types are listed below with the value you enter listed in parenthesis: • ethernet 2 ( ethernet2 ) • raw 8023, the default ...

  • Page 86: Ipxaddress

    3-14 configuring type: ipxaddress table 3-2. Displaying ipx addresses 3.3.3 enabling ipx routing functions the ipx routing functions you can enable for ports on the atx may be: • off – no ipx routing at all • on – ipx routing • sr – ipx routing over source routing to use lcm to enable ipx routing fu...

  • Page 88: Atroute On

    3-16 configuring their network number. Refer to chapter 1, appletalk routing for a conceptual overview of appletalk routing, including the concept of a seedrouter. Whenever you enable a port, it goes through the process of acquiring its address again. Once the network has been seeded, a newly enable...

  • Page 89: Atroute Off

    Configuring 3-17 port 8 appletalk routing: enabled . . . Port 21 appletalk routing: disabled 3.4.3 disabling appletalk routing appletalk routing can be disabled on a per port basis using lcm. Appletalk packets that are received on disabled ports are discarded. To disable appletalk routing on a port ...

  • Page 90: Ataddr –

    3-18 configuring the previously seeded information. You can create a new network range by using the ataddr command to assign a new range. However, if the network has already been seeded, the number you assign will not be used; the seeded information takes precedence. To assign a network number: type...

  • Page 91: Ataddr

    Configuring 3-19 3.4.5 displaying the network number you can find the current network range for any port on which appletalk routing is enabled by using lcm. To find the network number for a port: type: ataddr lcm responds: usage: ataddr [ ] notes: if there are no other devices on the network, the ne...

  • Page 92: Atzone On

    3-20 configuring port 6 engineering to make the zone name you are adding the designated default zone name: type: atzone on default . For example, atzone 6 “engineering” on default , would create the default zone name engineering on port 6. Lcm responds: appletalk zones port 6 (default)engineering 3....

  • Page 93: 3.5.1  Enabling Trunking

    Configuring 3-21 additional hardware on your network. You can use lcm to configure trunking. You can enable trunking between atxs or between an atx and a fast network 10. For more information on trunking, see section, 1.9 trunking. 3.5.1 enabling trunking to enable trunking you would: 1. Connect the...

  • Page 94: Note:

    3-22 configuring group is momentarily halted to guarantee the first-in, first-out ordering of the ethernet packets. Note: the atx-to-atx connections must be point-to-point. There cannot be any other devices on those lan segments. The ports used for trunking can be in any order. However, both ends of...

  • Page 95: 3.7.1  System Contact

    Configuring 3-23 for example, if you configure port 3 to accept no more than 5 multicasts per 60 seconds, any multicasts destined for port 3 are discarded after the first 5. After 60 seconds have elapsed, another 5 multicasts to port 3 will be allowed. This maintains an effective maximum rate of 5 m...

  • Page 96: 3.7.2  System Name

    3-24 configuring 3.7.2 system name the system name is a name assigned to the atx by the network administrator. By convention, the system name is the fully qualified domain name. (this name then becomes the lcm prompt.) sysname - {system 5} displaystring (size (0..255)) 3.7.3 system location the syst...

  • Page 97: Note:

    Configuring 3-25 note: configanypass permits read-write access. Configgetpass permits read only access. Get password the get password variable ( configgetpass ) must be set to the value of the community name used by the snmp manager for performing get operations. A zero length password means that an...

  • Page 98: Configuration Alarm Dynamic

    3-26 configuring configuration alarm dynamic when the atx learns a new address or ages (deletes) an old address it may or may not send a trap based on the value of this variable. Configalarmdynamic, addralarmmac 3.8 configuring netbios name caching the netbios name caching function initially comes u...

  • Page 99: Name

    Configuring 3-27 value of the netbios aging timer. The age-timeout argument can be modified and is interpreted in terms of seconds. This timer is the amount of time a netbios name remains in cache without activity. The default will be the same as that for spanning tree which is 5 minutes or 300 seco...

  • Page 100: 3.10  Classification

    3-28 configuring workgroup mktg 11,12-18 ipx 0x1234 3.10 classification when a broadcast packet is received on a workgroup defined port, the packet is classified as being ip (ip, arp or rarp), ipx(sap, rip, spx or ncp) or all (any protocol type). Based on this classification, the broadcast will only...

  • Page 101

    Configuring 3-29 broadcast from c will only be seen by a, b and d broadcast from d will only be seen by c broadcast from e will be seen by all forwarding ports 3.10.2 workgroup of type ip the destination ip address within the broadcast packet is used to determine the workgroup (see example #2). This...

  • Page 102

    3-30 configuring an arp from: a or b destined for 100.100.1.Xxx will only be seen by a, b and c a or b destined for 100.100.2.Xxx will only be seen by a, b and c a or b destined for 100.100.3.Xxx will only be seen by a, b and c c destined for 100.100.1.Xxx will only be seen by d c destined for 100.1...

  • Page 103

    Configuring 3-31 3.10.3 workgroup of type ipx to determine the workgroup of an ipx broadcast the destination ipx network number is used (see example #3). If the destination ipx network number is zero, the packet is forwarded out all of the ipx workgroups for the receiving port. If the broadcast has ...

  • Page 104

    3-32 configuring c destined for the 0x1234 network will only be seen by d c destined for the 0x999 network will be seen by all forwarding ports c destined for the 0x000 network will only be seen by d d destined for the 0x1234 network will only be seen by c d destined for the 0x999 network will be se...

  • Page 105

    Configuring 3-33 a sap from: a or b destined for the 0x1234 network will only be seen by a, b and c a or b destined for the 0x999 network will only be seen by a, b and c a or b destined for the 0x000 network will only be seen by a, b and c c destined for the 0x1234 network will only be seen by d and...

  • Page 106

    3-34 configuring c sends an ip packet destined for any network other than 100.100.1.0 the broadcast is forwarded out every other forwarding port. Even though port 5 is a member of two workgroups it does not fall back to the red workgroup’s criteria. 3.10.5 workgroup to workgroup communication this t...

  • Page 107: Commands

    Configuring 3-35 ipaddress p7 134.141.200.7 255.255.255.0 results: • stations a, b and c ip communication will be switched between ports 3, 4 and 5 since they are on the same subnet of 100. • stations d and e ip communication will be switched between ports 6 and 7. • if a, b or c needs to communicat...

  • Page 108: Mirror Remote Off

    3-36 configuring the lcm command format for remote port mirroring is: local atx (in reference to the diagnostic port) mirror remote off off - to turn remote port mirroring off mirror remote to port# oversized port# - the diagnostic port on the local atx oversized - discard or truncate; what to do wi...

  • Page 109

    Configuring 3-37 furthermore, mirroring traffic of a higher speed interface out to a lower speed interface may impose a strain on performance (e.G. Capturing fddi traffics to a 4 mbps token ring). When the size of the mirrored packet exceeds the size of the maximum transport unit (mtu) of the diagno...

  • Page 110: 3.11.3  Mirrored Filters

    3-38 configuring 3.11.3 mirrored filters the atx also allows you (via the existing port filtering feature; (chapter 5 in the atx lan switch user’s guide) to establish “mirror filters” which can help reduce the amount of traffic seen by the diagnostic port. Using a “mirror filter,” you can restrict t...

  • Page 111

    Configuring 3-39 mirror filters with local port mirroring: • desired - analyze ip traffic from station a (on p2) to station b (on p3) and vice versa • implementation - add a pmentry and pmexit filter to ports 2 and 3 with protocol type of 800(type ip in hex). The reason for a pmentry and pmexit filt...

  • Page 112: 3.13  Ping Commands

    3-40 configuring config on atx #2 mirror remote 2 to 134.141.100.1 mirror filters with remote port mirroring: • desired - to see packets from station a (on p2) only • implementation - add a pmentry filter to port 2 on atx #2 with station a’s mac address as the source address in the filter. 3.12 ipx ...

  • Page 114: 3.15.2  Eventtrap

    3-42 configuring option will turn off event logging. The event logging entries will be kept in a circular buffer, and the logging entries will be overwritten if necessary. If the “stopwhenfull” option is given, the logging mechanism will cease entering logging entries into the event logging queue on...

  • Page 115: 3.16.1  Managing Srtb

    Configuring 3-43 networks like ethernet and fddi. Rif is not supported on ethernet networks and is seldom used on fddi networks. In order to merge source routed token ring networks with transparent ethernet or fddi networks the atx must strip the rif when communicating to ethernet or fddi and insert...

  • Page 116: Other

    3-44 configuring other - enables stripping and caching of rif on appletalk, sna and netbios frames all - enables stripping and caching of rif on ip, ipx and other (default when enabled) on - enables srtb globally; enabled per port when srt is switching mode off - disables srtb globally (default) ste...

  • Page 117: Notes:

    Configuring 3-45 tp- transparent sr- source route srt- source route transparent (non token ring port) srt/tr- source route transparent on a token ring port, i.E., srtb enabled. Notes: rif caching can only be performed on a token ring port when it is set for srt mode and is either the entrance or exi...

  • Page 118: Bridge 1 Transparent

    3-46 configuring and netbios frames. All other protocols will not have their rif cached. Support for other protocols will be in future releases. Example #1: port 1 is configured for transparent port 2 is configured for source route transparent srtb is enabled lcm commands: bridge 1 transparent bridg...

  • Page 119: Bridge 1 Transparent

    Configuring 3-47 example 2: port 1 is configured for transparent port 2 is configured for source route transparent port 3 is configured for source route srtb is enabled globally lcm commands: bridge 1 transparent bridge 2 srt bridge 3 sr srtb all on are station a sends out a broadcast for station b....

  • Page 120

    3-48 configuring scenario 2 station c sends out a broadcast for station b. The frame from station c will have a null rif (2 bytes). Since the atx’s p3 is configured for sr, the atx will add ring 2, bridge 1 to the frame and send it out p2. The conversation between station b and c will be source rout...

  • Page 121: Unsupported Configuration

    Configuring 3-49 example #4: maximum transmit unit the maximum frame size on fddi is 4500 bytes, maximum on ethernet is 1518 bytes and the maximum on token ring is 17800 bytes. As you can see when transmitting a tr frame over ethernet or fddi via a bridge, there could be a frame size conflict. The m...

  • Page 122

    3-50 configuring describe a few configurations and possible solutions that address this problem. Scenario 1: local stations problem: assume station a has already communicated and the atx has learned it as a local transparent station. If station a has a mtu of anything greater than 4500 and wants to ...

  • Page 123

    Configuring 3-51 scenario 2: stations across a source route only bridge problem: assume station c has already communicated and the atx has learned the rif associated with it. If station c has a mtu of anything larger than 4500 and wants to transfer a file to station d, it will not work. Reason: the ...

  • Page 124

    3-52 configuring.

  • Page 125: Chapter  4

    4-1 chapter 4 monitoring and managing the atx monitoring your atx consists of collecting and analyzing statistics and status information. You can use lcm to gather some information, but you need to use an nms as your primary tool. Managing your atx consists of bringing modules on or offline, disabli...

  • Page 126: Note:

    4-2 monitoring and managing the atx • general status and statistics • ip status and statistics • icmp status and statistics • udp status and statistics • snmp status and statistics • spanning tree status and statistics. Note: all statistics counters are cleared when the atx is reset. Counters for in...

  • Page 127

    Monitoring and managing the atx 4-3 • number of packets that were sourced from outside a network that were not forwarded to the network. • number of packets with crc errors on each network. The following are the statistics collected by the atx for each end- node: • number of seconds since the end-no...

  • Page 128

    4-4 monitoring and managing the atx 4.1.1 general status and statistics the following statistics profile the general status of the atx. (the mib variable that collects the statistics is provided in square brackets.) • the number of centiseconds (hundredth of a second) since the atx was last reset. [...

  • Page 129

    Monitoring and managing the atx 4-5 • the total number of ip packets received from all ports (including the uart). [ ipinreceives ] • the number of packets received that were discarded by ip due to errors in the ip header. [ ipinhdrerrors ] • the number of packets received that were discarded by ip ...

  • Page 130

    4-6 monitoring and managing the atx • the number of ip fragments received which needed to be reassembled within this atx. [ ipreasmreqds ] • the number of ip datagrams which were successfully re- assembled. [ ipreasmoks ] • the number of failures (for whatever reason: timed-out, errors, etc.) detect...

  • Page 131

    Monitoring and managing the atx 4-7 • the number of icmp parameter problem messages received. [ icmpinparmprobs ] • the number of icmp source quench messages received. [ icmpinsrcquenchs ] • the number of icmp redirect messages received. [ icmpinredirects ] • the number of icmp echo (request) messag...

  • Page 132

    4-8 monitoring and managing the atx • the number of icmp parameter problem messages sent. [ icmpoutparmprobs ] • the number of icmp source quench messages sent. [ icmpoutsrcquenchs ] • the number of icmp redirect messages sent. [ icmpoutredirects ] • the number of icmp echo (request) messages sent. ...

  • Page 133

    Monitoring and managing the atx 4-9 level; all datagrams forwarded to udp are always forwarded to the atx's local management agent. [ udpinerrors ] • the total number of udp datagrams sent from this atx. [ udpoutdatagrams ] 4.1.5 snmp status and statistics the following statistics relate specificall...

  • Page 134

    4-10 monitoring and managing the atx • the total number of snmp getrequest pdus received by the atx, which have been processed with no errors. [ snmpingetrequests ] • the total number of snmp getnext pdus received by the atx, which have been processed with no errors. [ snmpingetnexts ] • the total n...

  • Page 135

    Monitoring and managing the atx 4-11 • whether a topology change is currently in progress. [ sttopchange ] • if a topology change is in progress then this is the time since the topology change was initiated. If a topology change is not in progress then this is the time since a topology change was fi...

  • Page 136: Filters

    4-12 monitoring and managing the atx • the time, in centiseconds, since a packet was last received from the station. • the number of packets received from the station which were forwarded. • the number of packets transmitted to the station. You can configure the atx to collect extended statistics by...

  • Page 137: 4.3  Monitoring Status

    Monitoring and managing the atx 4-13 address as source address match. [ filterpktcnts ] • number of packets sent from segment a to station b. Configure pseudo source filter on port a with station b's address as destination address match. [ filterpktcnts ] 4.3 monitoring status you can monitor the at...

  • Page 138

    4-14 monitoring and managing the atx type: to display port 2 status... If you don’t want to view the status of each port, use the ctrl-c keys to return to the lcm prompt. The status of the entire unit includes the number of learned addresses and the number of defined filters, plus the following info...

  • Page 139: Addresses Display Any

    Monitoring and managing the atx 4-15 • tempok – indicates whether the module is overheating. Normal is displayed when the module temperature is within range. Too-hot is shown for abnormal temperature status. • ports – lists the port numbers of the ports on the module. 4.3.2 displaying mac addresses ...

  • Page 140: Addresses Display

    4-16 monitoring and managing the atx address type port age(secs) frames-from frames-to 08:00:20:02:3a:44 learned 3 26 1 0 00:40:27:03:b7:21 static 5 5 17110 195 00:80:20:a2:3b:0a other 4 1 1423 121 enter to continue, ctrl-c to exit: to display a specific address: type: addresses display for example,...

  • Page 141: Ident

    Monitoring and managing the atx 4-17 address type port age(secs) frames-from frames-to 10 00 90 c1 d1 1d learned 6 0 1036886 8624 10 00 04 20 c9 39 learned 6 0 63995 4432 4.3.3 displaying manufacturing information the ident command identifies atx manufacturing information, including the version of s...

  • Page 142: 4.4.1  Disabling A Port

    4-18 monitoring and managing the atx 4.4.1 disabling a port there may be times when you need to disable a specific port. Disabling a port effectively stops all of the bridging and ip routing functions for that port. Ports that have been disabled won’t be able to accept snmp packets, and therefore ca...

  • Page 143: Offline

    Monitoring and managing the atx 4-19 enabling bridging/routing functions for port 7 enabling bridging/routing functions for port 8 enabling bridging/routing functions for port 9 you can use the bridge and iproute commands to see what functions are configured or to change the configuration. 4.4.3 tak...

  • Page 144: Note:

    4-20 monitoring and managing the atx 4.4.5 setting the baud rate you can set the baud rate for your lcm console connection. The options for baud rate include: • 1200 • 2400 • 4800 • 9600 • 19200 note: make sure that the baud rate you set matches the baud rate setting for the terminal you are using. ...

  • Page 145: Community

    Monitoring and managing the atx 4-21 the mib variable configanypass ; you must then enter the community name to perform any gets or sets. What you type is not echoed to the screen, so you won’t see what you are typing. To assign a community name 1. Type: community 2. Enter the old community name. 3....

  • Page 146

    4-22 monitoring and managing the atx.

  • Page 147: Chapter  5

    5-1 chapter 5 filters one of the most significant features of the atx is its powerful user- configurable filtering capabilities. Flexible filtering is useful for implementing security measures and improving network performance. For some applications, filtering capabilities may be so important that t...

  • Page 148

    5-2 filters 5.1 filtering and performance considerations when filters are implemented, the atx must process packets to determine if they should be filtered. The processing that takes place on filters can therefore exact a toll on atx throughput (or forwarding) performance. Typically, if you are usin...

  • Page 149: Application Examples

    Filters 5-3 detailed examples of filter applications are presented later in this chapter. (see filtering application examples.) 5.3 using filters to improve performance in many applications, atx filters can be used to enhance network performance by preventing certain types of traffic which may degra...

  • Page 150: 5.4  Address Table Filters

    5-4 filters but it is not a filter. Multicast storm protection is described in chapter 3, configuring multicast storm protection. 5.4 address table filters the simplest type of filters are address table filters. These filters use the bridge address table to screen local traffic. To make highly effic...

  • Page 151

    Filters 5-5 to filter (on) or not filter (off) packets from the specified address. With the address table entry shown in table 5-1, you could use any of the three types of address table filtering which are described in the sections that follow: • destination address filter • source address filter • ...

  • Page 152

    5-6 filters an example of a source address filter is shown in table 5-3. For illustration purposes, this example uses the same format as the address table entry shown previously. The actual format used for configuring filters depends on the nms you use. Because the source filter flag is set to on, t...

  • Page 153

    Filters 5-7 designated mac address will be filtered. Multicast packets are those destined for more than one address (using a multicast destination address). This is useful for preventing broadcast traffic from a particular station. Because the multicast source filter flag is set to on, this filter w...

  • Page 154: 5.5.1  Configurable Fields

    5-8 filters port filters are described in the next section. The atx allows you to implement up to 100 combination port filters (total, for all connected ports). Combination port filters may be logically linked to one another as described previously in the appletalk example. Each combination port fil...

  • Page 155: Type

    Filters 5-9 • pseudo – allows you to create a pseudo filter to monitor traffic patterns without discarding packets. • and/or – allows you to combine multiple port filters using the and/or operators to create boolean filter expressions. These options are discussed in detail in the section “combinatio...

  • Page 156: Source Range Mask

    5-10 filters source range mask mac address mask to apply to the range of source mac addresses. Ff:ff:ff:ff:ff:ff is the default. Destination range either na (not applicable), true (filter the packet if the destination mac address is within the range), or false (filter the packet if the destination m...

  • Page 157: Exit. Na Is The Default.

    Filters 5-11 exit. Na is the default. Note: you can assign a filter to a group by entering a group number rather than a port number. You can assign a group number to specified ports using an nms. Port group numbers start at 22. Protocol match either na (not applicable), true (filter the packet if th...

  • Page 158: Field Origin

    5-12 filters field origin either ip, mac, or sr (see field offset below). The origin is the field from which the offset count starts. Ip is the default. Field offset the decimal offset of the portion of the packet (as stored in canonical format) to be examined. If the origin is ip, then the offset i...

  • Page 159: Threshold

    Filters 5-13 values greater than 3600 (one hour) are not valid; a value of zero indicates that no alarms should be generated. Zero is the default. Threshold number of occurrences allowed within the specified threshold time; occurrences above this number cause an alarm to be generated. (the atx’s con...

  • Page 160: 5.6  Adding A Filter

    5-14 filters • monitoring traffic patterns as an aid in determining optimum network design, usage policies, etc. • monitoring potential security threats. • evaluating security policies. Values: either yes (don’t filter the packet; just count the packet for statistical purposes) or no (filter the pac...

  • Page 161: Note:

    Filters 5-15 note: if you are adding a filter to be used in conjunction with another filter and they must be ordered sequentially, use the filters display command to find the index number of the existing filter. Complete the following steps to add a filter or pseudo filter to a port. To accept a def...

  • Page 162: True

    5-16 filters 6. Enter the first mac address in the source range. 7. Enter the last mac address in the source range. 8. Enter the source range mac address mask. Ff:ff:ff:ff:ff:ff is the default address mask. If ff:ff:ff:ff:ff:ff is the mask you want to use, you don’t need to enter anything. If you wa...

  • Page 163: True

    Filters 5-17 14. Enter the protocol type to match. 15. Select whether the filter will use a field match. Na is the default. You don’t need to enter anything if you are not using a field match. If you are not using a field match, go to step 20. If you are using a field match type either: true – filte...

  • Page 164: 5.7  Modifying A Filter

    5-18 filters if you want the filter to have another index number, enter the value you wish to use. Lcm displays the filter you have just entered and prompts you whether you want to save it. Enter y (yes) to save the filter or n (no) to cancel it. If you save the filter, it is redisplayed. 5.7 modify...

  • Page 165: 5.9  Displaying A Filter

    Filters 5-19 5.9 displaying a filter to display a filter complete the following steps: 1. Type: filters display . Lcm prompts you for the port number. 2. Enter the port number. Lcm displays the filter which would look something like the filter display shown below, depending on how you had set up you...

  • Page 166: Note:

    5-20 filters • using a firewall filter to prevent problems and enhance performance. For each application example, the situation is described first, and the objective to be accomplished is explained. Then, how the objective would be accomplished using the atx is explained in general terms. In these e...

  • Page 167

    Filters 5-21 figure 5-1. Using filters to restrict access to an adjoining subnet the company wishes to allow engineering and accounting workstations to access resources on the fddi backbone, but wants to prevent engineering users from accessing resources on the accounting subnet. Therefore, the obje...

  • Page 168

    5-22 filters packets from accounting destined for engineering (lan 4 to lan 3). Each filter includes: • the source lan or port number • the destination port • match flags the filters are constructed as follows: • filter 1: identifier is port 4 as a destination fields are source lan = 3, match • filt...

  • Page 169

    Filters 5-23 figure 5-2. Using filters to restrict access to specific workstations in this example, a combination port filter is configured which instructs the atx to discard data packets whose destination address is f, g, or h. Therefore, the atx will not pass any packets from lan 1 to lan 2 if the...

  • Page 170

    5-24 filters • filter fields – destination address f-h (range, match) source lan = 1 (match). Note that a match flag is specified for both fields; this instructs the atx to filter any packets which match both fields (traffic from lan 1 and to addresses f-h on lan 2). Several methods are available to...

  • Page 171

    Filters 5-25 example 3 — restricting access to authorized users the example, shown in figure 5-3, is very similar to the previous example. The difference is that access to stations f, g, and h will not be denied to all lan 1 users. Instead, only authorized users on lan 1 will be able to access the s...

  • Page 172

    5-26 filters all traffic that does not match both fields. All packets destined for the restricted computers (f, g, or h) will be filtered unless the source address is the address of an authorized user (b, c, or d). Only authorized users will be able to access stations f, g, or h on lan 2. Note that ...

  • Page 173: Note:

    Filters 5-27 note: in order for this trap to work, you must have configalarmdynamic set and your nms must be able to process traps from the atx. Example 5 — configuring a firewall filter to control multicasts to optimize network performance, you can configure filters to reduce multicasts (packets br...

  • Page 174

    5-28 filters this filter is configured as follows: • filter identifier – port number of the port attached to lan 4 as a destination • filter fields – protocol type = appletalk i, match source lan = lan 1, match destination address = 01-00-00-00-00-00 with mask 01-00-00-00-00-00, match this filter wi...

  • Page 175: Chapter  6

    6-1 chapter 6 traps the atx sends trap pdus to an snmp manager, using a pre- configured snmp manager ip address. (see confignmsaddress in the atx mib reference guide). If no address has been pre-configured, then the atx sends the traps to the source ip address of the last snmp datagram received from...

  • Page 176: Note:

    6-2 traps for one of the debugging attributes; those pdus must always provide the configanypass . • egpneighborloss (5) – not used by the atx. • enterprisespecific (6) – the atx is reporting some interesting information, which is contained in the variable- bindings portion of the pdu. If the atx has...

  • Page 177: 6.2  Atx Unique Trap Ids

    Traps 6-3 6.2 atx unique trap ids the atx possesses unique trap ids which allow a snmp manager (spectrum element manager, spectrum) to have more control over snmp traps. Each trap is given a unique trap id, which gives detailed information about the trap and why it was sent. This also gives you the ...

  • Page 178

    6-4 traps • trunkstate (10) - a trunking state change transition has occurred. The possible transitions are: • closed - oneway • oneway - perturbed • perturbed - joined • joined - helddown • closed - helddown • oneway - helddown • perturbed - helddown trunkbridgeaddr (11) - the associated trunking m...

  • Page 179

    Traps 6-5 topchangeend (20) - the spanning tree topology has stopped changing. Iferrors (21) - sent whenever the number of hardware errors in received and transmitted packets has exceeded the port's limit. Strootid (22) - the spanning tree root bridge id for the unit has changed. Strootcost (23) - t...

  • Page 180

    6-6 traps fddimibsmtcfstate (200) - sent whenever the fddi port's cfm state has changed.The fddimibportmacindicated (one or two instances, depending upon whether the fddi connection is a sas or a das) is also included. Fddimibmacupstreamnbr (201) - sent whenever the fddi port's upstream neighbor has...

  • Page 181

    Traps 6-7 sfddiobsfusebad (212) - sent whenever the fuse to the fddi port's optical bypass becomes bad, or switches from bad to good. Sfddistationstate (213) - sent whenever the fddi port's station state has changed. Swanactualspeed (214) - the actual line speed of the wan port has changed. Fddismtu...

  • Page 182

    6-8 traps eepromreconfig (230) - the unit's eeprom has been reconfigured. Maxnexthop (231) - maximum number of next hops reached. Ripbadnet (232) - rip received with wrong local network number. Routeageout (233) - route aged out. Sipxsapageout (234) - ipx service aged out. Ipunknowndest (235) - ip p...

  • Page 183

    -9.

  • Page 184

    6-10 traps.

  • Page 185: Chapter  7

    7-1 chapter 7 diagnostics and troubleshooting the main topics covered in this chapter are: • power-up diagnostics • diagnostics while the atx is operational • status and activity indicators (leds) • troubleshooting 7.1 diagnostics overview the atx incorporates several built-in diagnostic and testing...

  • Page 186

    7-2 diagnostics and troubleshooting • power-up • reset using the front panel reset button • reset via the nms (a soft reset) • automatic reset occurs in response to a non-recoverable failure the power-up diagnostics test processors, memory, and other critical components on all atx modules. Power-up ...

  • Page 187

    Diagnostics and troubleshooting 7-3 modules are on for approximately 3 seconds. B. The engine status led on the ppe begins to flash. C. The engine status led continues to slowly flash while the remaining modules are running power diagnostics. D. The turbo status led stays on for approximately 3 seco...

  • Page 188

    7-4 diagnostics and troubleshooting 7.2.3 software checksum comparison when the atx reboots, its operational software is verified by a checksum comparison before it is loaded. If the software fails the checksum test due to an aborted new software distribution procedure, the atx will automatically us...

  • Page 189: Failure Indicators

    Diagnostics and troubleshooting 7-5 failure indicators if an fddi or ethernet module has failed, its front panel status led will be off. Nms failure traps as each module completes its power-up diagnostics, it saves information on any detected failures. These results are passed to the nms when the po...

  • Page 190: 7.3.2  Diagnostic Results

    7-6 diagnostics and troubleshooting loopback tests, the atx creates llc type 1 test packets for lans, and ppp echo-request packets for wans and uarts. Both types of loopback tests can be initiated by the nms, and test results are reported to the nms. Refer to the atx mib reference guide for the mib ...

  • Page 191

    Diagnostics and troubleshooting 7-7 table 7-1. Meaning of atx leds led meaning power status on – power is on and the voltage is within the acceptable range. Engine status on – packet processing engine is ready for operation. Blinking – a module is overheating. Turbo status on – turbo (a key packet p...

  • Page 192: 7.5  Troubleshooting

    7-8 diagnostics and troubleshooting figure 7-1. Led activity during normal operation 7.5 troubleshooting this section lists several problem situations that could be encountered while using the atx and suggests appropriate action. Layer 1 packet processing engine po wer st atus engine st atus turbo s...

  • Page 193

    Diagnostics and troubleshooting 7-9 because every situation is potentially unique and may involve unique external factors, the corrective actions suggested here should be considered as guidelines only. 7.5.1 atx does not power up if your atx does not power up, check each one of the following; if it ...

  • Page 194: 7.5.4  Atx Has Rebooted

    7-10 diagnostics and troubleshooting • check for loose port connections. Check all connectors to the modules (especially twisted pair connectors, which may be fragile). • check to make sure all the modules are firmly connected; check all the screws are fully tightened. • number of carrier losses is ...

  • Page 195

    Diagnostics and troubleshooting 7-11 • check that a pathway to the atx exists (intermediate bridges and routers are functioning). • verify atx’s ip addresses, one at a time using lcm. • verify values of confignmsaddress , configanypass , and/or configgetpass ..

  • Page 196

    7-12 diagnostics and troubleshooting.

  • Page 197: Chapter  8

    8-1 chapter 8 adding/swapping modules and maintenance the atx configuration may include a total of five interface modules in various combinations. This means any configuration that does not use all five interface slots may be expanded by installing additional interface modules. Install the additiona...

  • Page 198: 8.2  Swapping A Module

    8-2 adding/swapping modules and maintenance 4. Loosen the screws at each end of the panel that covers the interface slot and remove the protective panel. 5. Gently slide the module into the plastic guides in the module slot until it is completely inserted. 6. Push the module firmly into place to ful...

  • Page 199: 8.3  Maintenance

    Adding/swapping modules and maintenance 8-3 3. Remove the installed interface module by pulling gently but firmly on the “ears” at the ends of the module's front panel. 4. Gently slide the new module into the plastic guides in the module slot until it is completely inserted. 5. Push the module firml...

  • Page 200: Caution:

    8-4 adding/swapping modules and maintenance 1. Disconnect the power cord from the atx. 2. Pull the small plastic fuse drawer below the power input connector directly outward. 3. Remove and replace the fuse. Caution: for continued protection against fire hazard, replace only with 250v slow-blow 6.3 a...

  • Page 201

    Adding/swapping modules and maintenance 8-5 supply into the chassis at an angle, or if you position the power supply above the tabs shown in figure 8-1, you risk short circuiting the ppe board. Figure 8-1. Chassis with power supply a positioning tabs and supporting shelf indicated to replace the pow...

  • Page 202

    8-6 adding/swapping modules and maintenance 4. Slide the new power supply straight into the chassis under the tabs shown in figure 8-1. The power supply should be placed as shown by the dotted line rectangle in figure 8-2. 5. Tighten the two screws that hold the power supply into the chassis. 6. Tur...

  • Page 203: Appendix  A

    A-1 appendix a specifications for the atx a.1 packet processing engine dual amd 29000 risc processors 4 mb flash memory 8 mb main memory 2 mb shared memory 128 kb configuration memory 1.6 gbps internal bandwidth a.2 standards compliance a.2.1 protocols • ansi fddi x3t9.5 (smt 7.3/mac-2) • ieee 802.1...

  • Page 204: A.2.3  Local Routing

    A-2 specifications for the atx a.2.3 local routing • ip routing (rip) • appletalk routing • ipx routing (rip, sap, diagnostic) • ip multicast support (dvmrp) a.2.4 interfaces • eia • rs-232c a.3 physical (base unit) height 7.0 in. (17.78 cm) width 16.8 in. (42.67 cm) depth 18.0 in. (45.72 cm) weight...

  • Page 205: A.5  Electrical

    Specifications for the atx a-3 a.5 electrical input voltage auto-ranging from 100 to 120 or 200 to 240 vac frequency 47 to 65 hz ac power 380 w maximum ac current requirements 4 amps – 100 to 120 vac 2 amps – 200 to 240 vac a.6 environmental operating temperature 5˚ c to 40˚ c (41˚ f to 104˚ f) rela...

  • Page 206: A.10  Software Loading

    A-4 specifications for the atx power supply b reset a.10 software loading flash memory via tftp a.11 address table size 8,192 dynamic (learned) entries default, expandable to 16,384 a.12 certification safety ul 1950, csa c22.2 950, en 60950, and iec 950 emission fcc part 15 class a, en 55022 class a...

  • Page 207: Appendix  B

    B-1 appendix b packet translation procedure since the atx is a multi-media unit, packets are converted from the different media into a standard canonical format. The offset field for the filters command refers to the canonical format packet. The exact translation procedure is defined by rfc 1188 and...

  • Page 208

    B-2 packet translation procedure figure b-2. Canonical packet format da (big endian) sa (big endian) dsap ssap control protocol id data or frame type more data more data.

  • Page 209

    Packet translation procedure b-3 figure b-3. Ip header (after canonical packet format) figure b-4. Udp header (after ip header) ip version header length service type total length identification flags fragment offset source ip address destination ip address ip options (if any)... Padding (if necessar...

  • Page 210

    B-4 packet translation procedure figure b-5. Tcp header (after ip header) acknowledgment number window options (if any)... Padding (if necessary) source port destination port sequence number header length reserved plus code bits.

  • Page 211: Appendix  C

    C-1 appendix c null modem cable pinouts to connect lcm you need to insert a null modem cable at either the terminal end or the atx port end. The null modem cable can be either a female db25 or db9 straight-through serial cable. Pinout information is provided in figure c-1. Figure c-1. Connector pin ...

  • Page 212

    C-2 null modem cable pinouts.

  • Page 213: Appendix  D

    D-1 appendix d glossary 4b/5b primary data encoding scheme used for fddi. Aarp (appletalk address resolution protocol) appletalk arp performs network address to datalink address mapping on ethernet, token ring, and fddi ports. This facility is similar to ip arp with the additional capability to prob...

  • Page 214: Agent

    D-2 glossary agent network management software that runs within a managed network device. Alarm see trap. Ansi american national standards institute – one of several organizations that establishes standards which apply to internetworking and bridging. Arp address resolution protocol – an auxiliary p...

  • Page 215: Attenuation

    Glossary d-3 attenuation the amount of power (or light) lost as power travels through a medium, from the transmitter to the receiver. Difference between transmitted and received power, in decibels (db). Aui (attachment unit interface) a standard connector type used for ethernet connections. Backbone...

  • Page 216: Bps (Bits Per Second)

    D-4 glossary bpdu (bridge protocol data unit) a data unit transmitted as part of the ieee 802.1d spanning tree protocol. The exchange of bpdus allows bridges within a network to logically configure the network as a single spanning tree. Bps (bits per second) the basic unit of data communications rat...

  • Page 217: Combination Port Filter

    Glossary d-5 combination port filter a filter which may include several configurable fields and may be used to filter bridge traffic in a very specific manner. Concentrator a device that provides attachment points for stations that are not connected directly to an fddi dual ring. The concentrator is...

  • Page 218: Data Link Layer

    D-6 glossary das (dual attachment station) an fddi station connected to both the primary and secondary rings. Data link layer layer 2 in the osi model. Defines frame construction, addressing, error detection and other services to higher layers. Datagram abbreviated and connectionless single-packet m...

  • Page 219: Dual Homing

    Glossary d-7 downstream from another station if it receives the token or data after the other station receives the token or data. Dual homing a method of connecting concentrators and stations that permits an alternate or backup path to the dual ring in case the primary connection fails. Dynamic addr...

  • Page 220: Entity

    D-8 glossary entity an active element within an open systems interconnection (osi) network layer or sublayer. Ethernet input/output module the atx component which accepts and sends data packets to and from a connected ethernet network. Extended lan a collection of lans interconnected by protocol-ind...

  • Page 221: Filtering Rate

    Glossary d-9 filtering rate a measure (in packets per second) of a bridge's efficiency in examining each frame, comparing it with an address table, and then deciding whether to discard the frame or forward it. Forwarding rate the rate (in packets per second) at which a bridge can receive a stream of...

  • Page 222: Ieee 802.2

    D-10 glossary icmp (internet control message protocol) an auxiliary protocol of ip used to convey advice and error messages about events in the ip layer. Ieee (institute of electrical and electronic engineers) international professional society which issues networking and other standards. The ieee c...

  • Page 223: Initialization

    Glossary d-11 initialization transition of a device or network from startup state to operational state. Intelligent bridge a bridge that is able to identify source and destination addresses. Internet a large communications infrastructure composed of wide and local area networks. A generic reference ...

  • Page 224: I/o

    D-12 glossary module. I/o see input-output module. Ip (internet protocol) ip is the basic datagram protocol used at the network layer of the tcp/ip stack. Iso (international standards organization) an organization that creates, controls and publishes standards. Jitter clocking deviation on a network...

  • Page 225: Llc (Logical Link Control)

    Glossary d-13 llc (logical link control) a part of the data link layer of the osi model that defines the transmission of a frame of data between two stations (with no intermediate switching nodes). Lma (local management agent) software running on a network device to control the device in terms of ne...

  • Page 226: Mbps (Megabits Per Second)

    D-14 glossary mbps (megabits per second) 1 million bits per second. Mib (management information base) a collection of objects unique to a specific device that can be accessed via a network management protocol. The atx has its own mib. Mic (media interface connector) optical fiber connector type used...

  • Page 227: Network

    Glossary d-15 router on each of those networks. The destination router(s) then multicasts a lookup request on the destination network. A response is then returned by an end-node in a directly addressed packet. Note that wildcards are allowed to enable the chooser to display all objects of any given ...

  • Page 228: Optical Transmitter

    D-16 glossary optical transmitter a circuit that converts an electrical signal to an optical signal. Osi (open systems interconnection) refers to the osi reference model, a logical structure for network operations. Osi is the internationally accepted framework of standards for internetwork communica...

  • Page 229: Physical Layer

    Glossary d-17 requirements and the encoding of data for transmission. Physical layer layer 1 of the osi model. Defines and handles the electrical and physical connections between systems. Pmd (physical layer medium dependent) fddi standard that defines the medium and protocols used to transfer symbo...

  • Page 230: Protocol Suite

    D-18 glossary protocol suite a group of protocols related to a common framework. Rarp (reverse address resolution protocol) a protocol that translates mac addresses to ip addresses. Ring a network of stations that uses a circular logical topology. Data is passed from station to station, for examinat...

  • Page 231: Segment

    Glossary d-19 network and master (m) ports for the attachment of stations or other concentrators. Sas (single attachment station) an fddi station that uses only one connection (an s port) for connection to the fddi ring. Segment when two or more networks are interconnected to form an internetwork, t...

  • Page 232: Stp (Spanning Tree Protocol)

    D-20 glossary opposed to those automatically “learned” by the bridge). Stp (spanning tree protocol) a protocol which ensures that only one path will be used between two devices; prevents active loops (multiple paths to devices) by closing certain paths. With stp operating, a redundant link serves as...

  • Page 233: Token Ring

    Glossary d-21 transmit. Token ring local area network access mechanism and topology in which a supervisory frame (the token) is passed from station to station. Stations wishing to gain access to the network wait for the token to arrive before transmitting data. Topology the arrangement of devices an...

  • Page 234: Udp (User Datagram Protocol)

    D-22 glossary ttrt (target token rotation time) a time defined for tokens to travel around an fddi ring; used to synchronize the clocking of traffic on the ring. Udp (user datagram protocol) a tcp/ip protocol for the connectionless transport layer. Upstream refers to the relative position of a stati...

  • Page 235: Wan (Wide Area Network)

    Glossary d-23 groups must consist of ports with all the same underlying link type. Wan (wide area network) a communication network that spans a large geographic area. Zip (zone information protocol) in the appletalk routing protocol, zip is used to disseminate zone information from routers to end no...

  • Page 236

    D-24 glossary.

  • Page 237: Appendix  E

    E-1 appendix e big endian to little endian conversion the chart below provides the bit swap values and a conversion formula. The conversion process has two steps, first you swap the bits, then you use the conversion chart above to convert the swapped bits to the little endian format. Table e-1. Big ...

  • Page 238

    E-2 big endian to little endian conversion 1. First, swap the big endian bits, use the conversion chart to find the equivalent values. For example: 00 00 f6 09 47 88 00 00 6f 90 74 88 2. Now that you have the bits swapped, use the conversion chart to find the equivalent values. For example: 0 = 0 6 ...

  • Page 239: Index

    Index-1 index a adding filters 5-15 ip addresses 3-6 ipx addresses 3-13 address classes, ip 3-5 address resolution protocol. See arp address table filters about 5-4 combination address 5-6 destination address 5-5 source address 5-5 source address multicast 5-6 addresses adding ip 3-6 ipx 3-13 changi...

  • Page 240

    Index-2 index bridging functions 3-5 ip routing 3-12 ipx routing 3-15 ports 4-18 displaying baud rate 4-20 bridge functions 3-4 es/1 status 4-13 filters 5-19 ip addresses 3-7 ip routing functions 3-12 ipx addresses 3-13 ipx routing functions 3-15 mac addresses 4-15 manufacturing information 4-17 e e...

  • Page 241

    Index index-3 l lcm connecting 2-10 description of 1-39 lcm command syntax 1-40 led sequence normal operation 7-6 power-up 7-2 leds, front panel meaning 2-2 local console manager. See lcm 1-39 loopback tests 7-5 m mac addresses, displaying 4-15 manufacturing information, displaying 4-17 mib variable...

  • Page 242

    Index-4 index service advertising protocol. See sap set password, defined 3-24 setting baud rate 4-20 statistics, monitoring 4-1 status, displaying es/1 4-13 led 7-6 stopping modules 4-19 subnet mask, ip, changing 3-7 swapping modules 8-2 switches, front panel, meaning 2-3 syntax, lcm command 1-40 s...