3Com 3C17300-US Implementation Manual

3Com 3C17300-US Implementation Manual

Superstack 3 switch 4226t
Table of Contents

Advertisement

SuperStack
Switch 4200 Family
Implementation Guide
Generic guide for units in the SuperStack 3 Switch 4200 Family:
3C17300
3C17302
3C17304
3C17300A
3C17302A
3C17304A
http://www.3com.com/
Part No. DUA1730-0BAA03
Published June 2005
3
®

Advertisement

Table of Contents
loading

Summary of Contents for 3Com 3C17300-US

  • Page 1 SuperStack Switch 4200 Family Implementation Guide Generic guide for units in the SuperStack 3 Switch 4200 Family: 3C17300 3C17302 3C17304 3C17300A 3C17302A 3C17304A http://www.3com.com/ Part No. DUA1730-0BAA03 Published June 2005 ®...
  • Page 2 All other company and product names may be trademarks of the respective companies with which they are associated. ENVIRONMENTAL STATEMENT It is the policy of 3Com Corporation to be environmentally-friendly in all operations. To uphold our policy, we are committed to: Establishing environmental performance standards that comply with national legislation and regulations.
  • Page 3: Table Of Contents

    ONTENTS BOUT UIDE Conventions Related Documentation Documentation Comments WITCH EATURES What is Management Software? Switch Features Explained Automatic IP Configuration Security Aggregated Links Auto-negotiation Multicast Filtering Spanning Tree Protocol and Rapid Spanning Tree Protocol Switch Database Traffic Prioritization RMON Broadcast Storm Control VLANs Configuration Save and Restore PTIMIZING...
  • Page 4 Aggregated Links and Your Switch Aggregated Link Example SING ULTICAST What is an IP Multicast? Benefits of Multicast Multicast Filtering Multicast Filtering and Your Switch IGMP Multicast Filtering SING ESILIENCE Spanning Tree Protocol (STP) Rapid Spanning Tree Protocol (RSTP) What is STP? How STP Works STP Requirements STP Calculation...
  • Page 5 TATUS ONITORING AND RMON What is RMON? The RMON Groups Benefits of RMON RMON and the Switch Alarm Events The Default Alarm Settings The Audit Log Email Notification of Events ETTING IRTUAL What are VLANs? Benefits of VLANs VLANs and Your Switch The Default VLAN Communication Between VLANs Creating New VLANs...
  • Page 6 How Rada Works Auto VLAN Assignment Important Considerations What is Disconnect Unauthorized Device (DUD)? How DUD Works What is RADIUS? SING WITCH Configuration Save and Restore Upgrading Management Software ONFIGURATION Configuration Rules for Gigabit Ethernet Configuration Rules for Fast Ethernet Configuration Rules with Full Duplex ETWORK ONFIGURATION...
  • Page 7 TANDARDS UPPORTED LOSSARY NDEX...
  • Page 9: About This Guide

    Most user guides and release notes are available in Adobe Acrobat Reader Portable Document Format (PDF) or HTML on the 3Com World Wide Web site: http://www.3com.com/ Please note that when this Guide states “the Switch”, this is a reference...
  • Page 10: Conventions

    BOUT UIDE Conventions Table 1 Table 1 Notice Icons Table 2 Text Conventions Convention Screen displays This typeface represents information as it appears on the Syntax Commands The words “enter” and “type” Keyboard key names If you must press two or more keys simultaneously, the key Words in italics Table 2 list conventions that are used throughout this guide.
  • Page 11: Related Documentation

    Documentation Your suggestions are very important to us. They will help make our Comments documentation more useful to you. Please e-mail comments about this document to 3Com at: pddtechpubs_comments@3com.com Getting Started Guide This guide contains: all the information you need to install and set up the Switch in its ■...
  • Page 12 ■ ■ Please note that we can only respond to comments and questions about 3Com product documentation at this e-mail address. Questions related to technical support or sales should be directed in the first instance to your network supplier. Document title...
  • Page 13: Switch Features Overview

    WITCH Chapter 1 Switch Features Overview Chapter 2 Optimizing Bandwidth Chapter 3 Using Multicast Filtering Chapter 4 Using Resilience Features Chapter 5 Using the Switch Database Chapter 6 Using Traffic Prioritization Chapter 7 Status Monitoring and Statistics Chapter 8 Setting Up Virtual LANs Chapter 9 Using Automatic IP Configuration Chapter 10...
  • Page 15: What Is Management Software

    This chapter contains introductory information about the SuperStack Switch management software and supported features. It covers the following topics: ■ ■ For detailed descriptions of the web interface operations and the command line interface (CLI) commands that you require to manage the Switch please refer to the Management Interface Reference Guide supplied supplied in HTML format on the CD-ROM that accompanies your Switch.
  • Page 16: Automatic Ip Configuration

    1: S HAPTER WITCH EATURES For a list of the features supported by your Switch, please refer to the Management Quick Reference Guide supplied in PDF format on the CD-ROM that accompanies your Switch. Automatic IP By default the Switch tries to configure itself with IP information without Configuration requesting user intervention.
  • Page 17: Auto-Negotiation

    They can potentially double, triple or quadruple the bandwidth of a ■ connection. They can provide redundancy — if one link is broken, the traffic load ■ can be shared amongst the remaining link(s). Your Switch supports the IEEE 802.3ad Link Aggregation Control Protocol (LACP).
  • Page 18: Multicast Filtering

    1: S HAPTER WITCH EATURES port reacts accordingly by tuning the link from its higher speed to the lower supported speed to provide an error-free connection to the network. For more information about auto-negotiation and port capabilities, see Chapter 2 “Optimizing Multicast Filtering Multicast filtering allows the Switch to forward multicast traffic to only the endstations that are part of a predefined multicast group, rather than...
  • Page 19: Switch Database

    Switch Features Explained For more information about STP and RSTP, see Chapter 4 “Using Resilience Features”. Switch Database The Switch Database is an integral part of the Switch and is used by the Switch to determine if a packet should be forwarded, and which port should transmit the packet if it is to be forwarded.
  • Page 20: Rmon

    1: S HAPTER WITCH EATURES RMON Remote Monitoring (RMON) is an industry standard feature for traffic monitoring and collecting network statistics. The Switch software continually collects statistics about the LAN segments connected to the Switch. If you have a management workstation with an RMON management application, the Switch can transfer these statistics to your workstation on request or when a pre-defined threshold is exceeded.
  • Page 21 Switch Features Explained For further information about Configuration Save and Restore, see Chapter 11 “Using Switch Configuration Features”.
  • Page 22 1: S HAPTER WITCH EATURES VERVIEW...
  • Page 23: Optimizing Bandwidth

    There are many ways you can optimize the bandwidth on your network and improve network performance. If you utilize certain Switch features you can provide the following benefits to your network and end users: ■ ■ ■ ■ ■ For detailed descriptions of the web interface operations and the command line interface (CLI) commands that you require to manage the Switch please refer to the Management Interface Reference Guide supplied in HTML format on the CD-ROM that accompanies your Switch.
  • Page 24: Flow Control

    2: O HAPTER PTIMIZING ANDWIDTH If the devices at both ends of a link do not support auto-negotiation, both ends must be manually set to full duplex or half duplex accordingly. Ports operating at 1000 Mbps support full duplex mode only. Flow Control All Switch ports support flow control, which is a mechanism that minimizes packet loss during periods of congestion on the network.
  • Page 25: Smart Auto-Sensing

    Smart Auto-sensing Smart auto-sensing allows auto-negotiating multi-speed ports, such as 10/100 Mbps or 10/100/1000 Mbps, to monitor and detect a high error rate on a link, or a problem in the “physical” interconnection to another port and react accordingly. In other words, auto-negotiation may “agree” upon a configuration that the cable cannot sustain;...
  • Page 26: Aggregated Links

    2: O HAPTER PTIMIZING ANDWIDTH Aggregated Links Aggregated links are connections that allow devices to communicate using up to four member links in parallel. Aggregated links are supported on the 10/100/1000BASE-T ports and GBIC or SFP ports links provide two benefits: ■...
  • Page 27: Implementing 802.3Ad Aggregated Links

    re-mapping occurs as soon as the Switch detects that a member link has failed — almost instantaneously. As a result, aggregated link configurations are extremely resilient and fault-tolerant. Figure 2 Dynamic Reassignment of Traffic Flows The key benefits of 802.3ad link aggregation are: ■...
  • Page 28 2: O HAPTER PTIMIZING ANDWIDTH Figure 3 Aggregated ■ ■ The Spanning Tree costs for a port running LACP is the cost assigned for an aggregated link running at that speed. As required by the IEEE 802.3ad standard, no changes in cost are made according to the number of member links in the aggregated link.
  • Page 29: Aggregated Links And Your Switch

    Aggregated Links and Your Switch When any port is assigned to an aggregated link (either manually or via LACP) it will adopt the configuration settings of the aggregated link. When a port leaves an aggregated link its original configuration settings are restored.
  • Page 30 2: O HAPTER PTIMIZING ANDWIDTH ■ ■ Figure 4 An illegal aggregated link configuration To make this configuration work you need to have two aggregated links defined on Switch A, one containing the member links for Switch B and the other containing those for Switch C. When using an aggregated link, note that: ■...
  • Page 31 separately. If you do this, the traffic destined for that link is distributed to the other links in the aggregated link. If you do not remove the connection and only disable one end of the member link port, traffic is still forwarded to that port by the aggregated link port at the other end.
  • Page 32: Aggregated Link Example

    2: O HAPTER PTIMIZING ANDWIDTH Aggregated Link The example shown in Example between two Switch units. Figure 5 A 4 Gbps aggregated link between two Switch units To set up this configuration: 1 Add the 1000BASE-T ports on the upper unit to the aggregated link. 2 Add the 1000BASE-T ports on the lower unit to the aggregated link.
  • Page 33: Using Multicast Filtering

    Multicast filtering improves the performance of networks that carry multicast traffic. This chapter explains multicasts, multicast filtering, and how multicast filtering can be implemented on your Switch. It covers the following topics: ■ ■ ■ For detailed descriptions of the web interface operations and the command line interface (CLI) commands that you require to manage the Switch please refer to the Management Interface Reference Guide supplied in HTML format on the CD-ROM that accompanies your Switch.
  • Page 34: Benefits Of Multicast

    3: U HAPTER SING ULTICAST A multicast packet is identified by the presence of a multicast group address in the destination address field of the packet’s IP header. Benefits of Multicast The benefits of using IP multicast are that it: ■...
  • Page 35: Multicast Filtering And Your Switch

    Multicast Filtering Figure 6 The effect of multicast filtering Multicast Filtering Your Switch provides automatic multicast filtering support using IGMP and Your Switch (Internet Group Management Protocol) Snooping. It also supports IGMP query mode. Snooping Mode Snooping Mode allows your Switch to forward multicast packets only to the appropriate ports.
  • Page 36: Igmp Multicast Filtering

    3: U HAPTER SING ULTICAST command will configure the Switch 4200 Series to automatically negotiate with compatible devices on VLAN 1 to become the querier. The Switch 4200 Family is compatible with any device that conforms to the IGMP v2 protocol. IGMP Multicast IGMP is the system that all IP-supporting network devices use to register Filtering...
  • Page 37 IGMP Multicast Filtering Management Interface Reference Guide supplied on your Switch CD-ROM. If IGMP multicast learning is not enabled then IP multicast traffic is always forwarded, that is, it floods the network. For information about configuring IGMP functionality on an endstation, refer to the user documentation supplied with your endstation or the endstation’s Network Interface Card (NIC).
  • Page 38 3: U HAPTER SING ULTICAST ILTERING...
  • Page 39: Using Resilience Features

    Setting up resilience on your network helps protect critical links against failure, protects against network loops, and reduces network downtime to a minimum. This chapter explains the features supported by the Switch that provide resilience for your network. It covers the following topics: ■...
  • Page 40: Rapid Spanning Tree Protocol (Rstp)

    RSTP implements the Spanning Tree Algorithm and Protocol, as defined in the IEEE 802.1w standard. RSTP is enabled by default. 3Com recommends that you use the Rapid Spanning Tree Protocol feature (enabled by default) to provide optimum performance for your network and ease of use.
  • Page 41: What Is Stp

    What is STP? STP is a bridge-based system that allows you to implement parallel paths for network traffic and uses a loop-detection process to: ■ ■ RSTP provides the same functionality as STP. For details on how the two systems differ, see As an example, separated by three bridges.
  • Page 42 4: U HAPTER SING ESILIENCE EATURES Figure 8 Traffic flowing through Bridges C and A If a link failure is detected, as shown in Figure 9, the STP process reconfigures the network so that traffic from LAN segment 2 flows through Bridge B.
  • Page 43: How Stp Works

    How STP Works When enabled, STP determines the most appropriate path for traffic through a network. It does this as outlined in the sections below. STP Requirements Before it can configure the network, the STP system requires: ■ ■ ■ Table 3 Default port costs * This path cost is correct where there are two ports in an aggregated link.
  • Page 44: Stp Configuration

    4: U HAPTER SING ESILIENCE ■ ■ ■ ■ STP Configuration After all the bridges on the network have agreed on the identity of the Root Bridge, and have established the other relevant parameters, each bridge is configured to forward traffic only between its Root Port and the Designated Bridge Ports for the respective network segments.
  • Page 45: How Rstp Differs To Stp

    How RSTP Differs to RSTP works in a similar way to STP, but it includes additional information in the BPDUs. This information allows each bridge to confirm that it has taken action to prevent loops from forming when it wants to enable a link to a neighbouring bridge.
  • Page 46: Stp Configurations

    4: U HAPTER SING ESILIENCE ■ ■ ■ ■ STP Configurations Figure 11 Switch units. ■ ■ ■ EATURES Because Bridge A is the Root Bridge, it is also the Designated Bridge for LAN segment 1. Port 1 on Bridge A is therefore selected as the Designated Bridge Port for LAN Segment 1.
  • Page 47 How STP Works Figure 11 STP configurations...
  • Page 48: Using Stp On A Network With Multiple Vlans

    4: U HAPTER SING ESILIENCE Using STP on a The IEEE 802.1D standard does not take into account VLANs when it Network with calculates STP information — the calculations are only performed on the Multiple VLANs basis of physical connections. For this reason, some network configurations can result in VLANs being subdivided into a number of isolated sections by the STP system.
  • Page 49: Using The

    ID, and the port identifier on which the packet is received. You can enter and update entries using the CLI command, the Bridge > Address Database Web Interface operation, or an SNMP Network Manager, for example 3Com Network Supervisor. ATABASE...
  • Page 50: Switch Database Entry States

    5: U HAPTER SING THE WITCH Switch Database Databases entries can have three states: Entry States ■ ■ ■ ATABASE Learned — The Switch has placed the entry into the Switch Database when a packet was received from an endstation. Note that: Learned entries are removed (aged out) from the Switch Database ■...
  • Page 51: Using Traffic Prioritization

    For more granular prioritization and an enhanced Quality of Service support, other products are available in the 3Com range of stackable Switches. What is Traffic Traffic prioritization allows high priority data, such as time-sensitive and...
  • Page 52: How Traffic Prioritization Works

    6: U HAPTER SING RAFFIC ■ ■ ■ How Traffic Traffic prioritization ensures that high priority data is forwarded through Prioritization Works the Switch without being delayed by lower priority data. Traffic prioritization uses the two traffic queues that are present in the hardware of the Switch to ensure that high priority traffic is forwarded on a different queue from lower priority traffic.
  • Page 53: Diffserv Traffic Classification

    You cannot alter the mapping of priority levels 0 - 7 to the traffic queues. These priority levels are fixed to the traffic queues as shown in Figure 13 IEEE 802.1D traffic types Ingress Port Figure 13 levels and how they are mapped to the two supported traffic queues. The 802.1D service level of the packet is not altered by the Switch 4200 Series.
  • Page 54: Traffic Prioritization And Your Switch

    6: U HAPTER SING RAFFIC Figure 14 DSCP Service Level Mapping Figure 14 mapped to the two Traffic Queues. The DSCP service level of the packet is not altered by the Switch 4200 Family. Traffic Prioritization The traffic should be marked as it enters the network; the marking can be and your Switch achieved in two ways: ■...
  • Page 55 Traffic queues are preset on a per-unit basis on the Switch 4200 Family. Configuring traffic prioritization for QoS on a 4200 Family QoS can be configured on your Switch using the 3Com Network Supervisor or via the Command Line Interface (CLI).
  • Page 56 6: U HAPTER SING RAFFIC 3 Create Profiles The next step is to create a profile, which associates classifiers with service levels. 4 Apply QoS profile After a QoS profile has been created, it can be assigned to the Port(s). When the profile is assigned to the port(s), the QoS configuration defined in the profile will immediately become active.
  • Page 57: Status Monitoring And Statistics

    This chapter contains details of the features that assist you with status monitoring and statistics. For detailed descriptions of the web interface operations and the command line interface (CLI) commands that you require to manage the Switch please refer to the Management Interface Reference Guide supplied in HTML format on the CD-ROM that accompanies your Switch.
  • Page 58 7: S HAPTER TATUS ONITORING AND TATISTICS Statistics The Statistics group provides traffic and error statistics showing packets, bytes, broadcasts, multicasts and errors on a LAN segment. Information from the Statistics group is used to detect changes in traffic and error patterns in critical areas of your network. History The History group provides historical views of network performance by taking periodic samples of the counters supplied by the Statistics group.
  • Page 59: Benefits Of Rmon

    Benefits of RMON Using the RMON features of your Switch has three main advantages: ■ ■ ■ RMON and the The RMON support provided by your Switch is detailed in Switch It improves your efficiency Using RMON allows you to remain at one workstation and collect information from widely dispersed LAN segments or VLANs.
  • Page 60: Alarm Events

    7: S HAPTER TATUS ONITORING AND Table 4 RMON support supplied by the Switch RMON group Statistics History Alarms Events When using the RMON features of the Switch, note the following: ■ ■ Alarm Events You can define up to 200 alarms for the Switch. The events that you can define for each alarm and their resulting actions are listed in Table 5 Alarm Events Event...
  • Page 61: The Default Alarm Settings

    Table 5 Alarm Events Event Notify and filter port Notify and disable port Notify and enable port Disable port Enable port Notify and unfilter port System started Software Upgrade report The Default Alarm A new or initialized Switch has the following alarm(s) defined for each Settings port: Broadcast bandwidth used...
  • Page 62: The Audit Log

    7: S HAPTER TATUS ONITORING AND The Audit Log The Switch keeps an audit log of all management user sessions, providing a record of a variety of changes, including ones relating to RMON. The log can only be read by users at the security access level using an SNMP Network Management application.
  • Page 63 A link fails or returns to service — you can select specific links that you ■ wish to receive messages for, for example, a mission-critical link to a server. A security violation occurs. ■ A resilient link activates ■ System Started ■...
  • Page 64 7: S HAPTER TATUS ONITORING AND TATISTICS...
  • Page 65: Setting U P Virtual Lans

    Setting up Virtual LANs (VLANs) on your Switch reduces the time and effort required by many network administration tasks, and increases the efficiency of your network. This chapter explains more about the concept of VLANs and explains how they can be implemented on your Switch. It covers the following topics: ■...
  • Page 66: Benefits Of Vlans

    8: S HAPTER ETTING IRTUAL Figure 15 A network setup showing three VLANs Benefits of VLANs The main benefit of VLANs is that they provide a network segmentation system that is far more flexible than any traditional network. Using VLANs also provides you with three other benefits: ■...
  • Page 67: Vlans And Your Switch

    ■ VLANs and Your Your Switch provides support for VLANs using the IEEE 802.1Q standard. Switch This standard allows traffic from multiple VLANs to be carried across one physical link. The IEEE 802.1Q standard allows each port on your Switch to be placed ■...
  • Page 68: Creating New Vlans

    8: S HAPTER ETTING IRTUAL Figure 16 Two VLANS connected via a router Creating New VLANs If you want to move a port from the Default VLAN to another VLAN, you must first define information about the new VLAN on your Switch. VLANs: Tagged and Your Switch supports 802.1Q VLAN tagging, a system that allows traffic Untagged...
  • Page 69: Placing A Port In A Single Vlan

    identify which packets belong in which VLANs. To communicate between VLANs a router must be used. Placing a Port in a Once the information for a new VLAN has been defined, you can place a Single VLAN port in that VLAN. Creating an IEEE 802.1Q Tagged Link This method of tagging is defined in the IEEE 802.1Q standard, and allows a link to carry traffic for any of the VLANs defined on your Switch.
  • Page 70: Vlan Configuration Examples

    8: S HAPTER ETTING IRTUAL VLAN This section contains examples of simple VLAN configurations. It Configuration describes how to set up your switch to support simple untagged and Examples tagged connections. Using Untagged The simplest VLAN operates in a small network using a single switch. In Connections this network there is no requirement to pass traffic for multiple VLANs across a link.
  • Page 71: Using 802.1Q Tagged Connections

    2 Add ports to the VLANs Add ports 10, 11 and 12 of the Switch as untagged members to VLAN 2. Using 802.1Q Tagged In a network where the VLANs are distributed amongst more than one Connections Switch, you must use 802.1Q tagged connections so that all VLAN traffic can be passed along the links between the Switches.
  • Page 72 8: S HAPTER ETTING IRTUAL 3 Add port 12 on Switch 1 to the VLANs Add port 12 on Switch 1 as a tagged member of both VLANs 1 and 2 so that all VLAN traffic is passed over the link to Switch 2. 4 Configure the VLANs on Switch 2 Define VLAN 2.
  • Page 73: Using Automatic Ip Configuration

    SING ONFIGURATION This chapter explains more about IP addresses and how the automatic configuration option works. It covers the following topics: How Your Switch Obtains IP Information ■ How Automatic IP Configuration Works ■ Important Considerations ■ For detailed information on setting up your Switch for management, see the Getting Started Guide that accompanies your Switch.
  • Page 74: How Your Switch Obtains Ip Information

    9: U HAPTER SING UTOMATIC How Your Switch You can use one of the following methods to allocate IP information to Obtains IP your Switch (essential if you wish to manage your Switch across the Information network): ■ ■ If you select an option for no IP configuration the Switch will not be accessible from a remote management workstation on the LAN.
  • Page 75: Automatic Process

    Automatic Process To detect its IP information using the automatic configuration process, the Switch goes through the following sequence of steps: 1 The DHCP client that resides in the Switch makes up to four attempts to contact a DHCP server on the network requesting IP information from the server.
  • Page 76: Important Considerations

    9: U HAPTER SING UTOMATIC Important This section contains some important points to note when using the Considerations automatic IP configuration feature. The dynamic nature of automatically configured IP information means that a Switch may change its IP address whilst in use. Event Log Entries An event log will be generated and an SNMP trap will be sent if any of and Traps...
  • Page 77: Making Your Network Secure

    This chapter explains the security features of the Switch and gives examples of how and why you would use them in your network. It covers the following topics: ■ ■ ■ ■ ■ ■ For detailed descriptions of the Web interface operations and the Command Line Interface (CLI) commands that you require to manage the Switch please refer to the Management Interface Reference Guide supplied in HTML format on the CD-ROM that accompanies your Switch.
  • Page 78: Port Security

    10: M HAPTER AKING Port Security The Switch supports the following port security modes, which you can set for an individual port or a range of ports: ■ ■ ■ ■ ■ ■ ETWORK ECURE No Security Port security is disabled and all network traffic is forwarded through the port without any restrictions.
  • Page 79 Rada (Radius Authenticated Device Access) ■ Rada (Radius Authenticated Device Access) provides a means of disabling access and where necessary the VLAN assignment based purely on central authentication of an End Station's MAC address. In practice this can be used to provide RADIUS-based security for network administrators who do not have 802.1X clients installed.
  • Page 80: What Is Network Login

    10: M HAPTER AKING What is Network Network Login controls user access at the network edge by blocking or Login? unblocking access on a per-port basis. When a client device attempts to connect to a Switch port, the user is challenged to provide their identity and authentication credentials in the form of a user name and password.
  • Page 81: How Network Login Works

    What is Network Login? Network Login When Network Login is enabled the Switch acts as a relay agent between Works the client device that is requesting access to the network and the RADIUS server. The authentication information that is exchanged between the client device and the RADIUS server is received and transmitted by the Switch, as shown in Figure...
  • Page 82: What Is Rada

    10: M HAPTER AKING ETWORK ECURE For Network Login, the Switch uses EAP (Extensible Authentication Protocol). For further information about RADIUS, see “What is RADIUS?” page What is Rada? The Radius Authenticated Device Access feature complements the existing 802.1X support of the Switch. Instead of needing an 802.1X client on every end station, the switch can use the MAC address of the end station to query the RADIUS server.
  • Page 83: Auto Vlan Assignment

    ■ ■ Rada is similar to DUD (Disconnect Unauthorized Device), only Rada affects a single device where as DUD affects the whole port. Rada can also be used in conjunction with the existing 802.1X Secure Network Login to provide the capability to support a variety of host and network configurations.
  • Page 84 10: M HAPTER AKING ■ ■ ■ ■ ■ RADIUS Server settings for Auto VLAN When setting up Auto VLAN on a RADIUS server the following attributes must be set to supply VLAN data to the Switch: Table 8 Setting Auto VLAN attributes Attribute Tunnel-Type Tunnel-Medium-Type...
  • Page 85: What Is Disconnect Unauthorized Device (Dud)

    What is Disconnect The port security feature Disconnect Unauthorized Device (DUD), disables Unauthorized a port if an unauthorized client device transmits data on it. Device (DUD)? DUD may be automatically enabled when a port is set to one of the following port security modes: ■...
  • Page 86 10: M HAPTER AKING ETWORK ECURE...
  • Page 87: Using Switch Configuration Features

    (CLI) commands that you require to manage the Switch please refer to the Management Interface Reference Guide supplied in HTML format on the CD-ROM supplied with your Switch or on the 3Com Web site. Configuration Save The Configuration Save and Restore feature allows the configuration of...
  • Page 88 The system summary progress of restore and save operations to all other users. When using the Configuration Save and Restore feature, 3Com recommends that aggregated links are configured as either: Manual aggregations with Link Aggregation Configuration ■...
  • Page 89: Upgrading Management Software

    For a detailed description of how to upgrade the software on your Switch please refer to the Management Interface Reference Guide supplied in HTML format on the CD-ROM supplied with your Switch or on the 3Com Web site. CAUTION: 3Com strongly recommends that you use the TFTP Server as the primary means of upgrading your Switch.
  • Page 90 11: U HAPTER SING WITCH ONFIGURATION EATURES has subsequently failed to power up correctly. The symptoms of a failed TFTP software upgrade are: the PowerOn Self Test (POST) has failed, the Power/Self Test LED is yellow, all of the Port Status LEDs are Off, you cannot access the Switch via Telnet.
  • Page 91 PPENDICES AND Appendix A Configuration Rules Appendix B Network Configuration Examples Appendix C IP Addressing Appendix D Standards Supported Glossary Index NDEX...
  • Page 93: Configuration Rules

    Configuration Rules Gigabit Ethernet is designed to run over several media: for Gigabit ■ Ethernet ■ ■ The different types of Gigabit Ethernet media and their specifications are detailed in Table 9 Gigabit Ethernet cabling ONFIGURATION Single-mode fiber optic cable, with connections up to 5 km (3.1 miles).
  • Page 94: Configuration Rules For Fast Ethernet

    A: C PPENDIX ONFIGURATION Configuration Rules The topology rules for 100 Mbps Fast Ethernet are slightly different to for Fast Ethernet those for 10 Mbps Ethernet. and provides examples of how they allow for large-scale Fast Ethernet networks. Figure 21 Fast Ethernet configuration rules The key topology rules are: ■...
  • Page 95: Configuration Rules With Full Duplex

    Configuration Rules The Switch provides full duplex support for all its ports, including with Full Duplex Expansion Module ports. Full duplex allows packets to be transmitted and received simultaneously and, in effect, doubles the potential throughput of a link. With full duplex, the Ethernet topology rules are the same, but the Fast Ethernet rules are: ■...
  • Page 96 A: C PPENDIX ONFIGURATION ULES...
  • Page 97: Etwork Configuration Examples

    ETWORK XAMPLES This chapter contains the following sections: Simple Network Configuration Examples ■ ■ Advanced Network Configuration Examples ■ ■ ONFIGURATION Desktop Switch Example Improving the Performance and Resilience of Your Network...
  • Page 98: Simple Network Configuration Examples

    B: N PPENDIX ETWORK ONFIGURATION Simple Network The following illustrations show some simple examples of how the Switch Configuration 4200 Family can be used in your network. Examples Desktop Switch The example in Example for a group of users that require dedicated 10 Mbps or 100 Mbps connections to the desktop.
  • Page 99: Advanced Network Configuration Examples

    Advanced Network This section shows some network examples that illustrate how you can Configuration set up your network for optimum performance using some of the Examples features supported by your Switch. Improving the Figure 23 Performance and resilience by using aggregated links; this increases the bandwidth Resilience of Your available for the backbone connection and also provides extra resilience.
  • Page 100 B: N PPENDIX ETWORK ONFIGURATION XAMPLES...
  • Page 101: Ip Addressing

    The IP address can be split into two parts: ■ ■ If your network is internal to your organization only, you may use any arbitrary IP address. 3Com suggests you use addresses in the series DDRESSING IP Addresses Subnets and Subnet Masks...
  • Page 102: Advanced Overview

    C: IP A PPENDIX DDRESSING 192.168.100.X (where X is a number between 1 and 254) with a subnet mask 255.255.255.0. If you are using SLIP, use the default SLIP address of 192.168.101.1 with a subnet mask of 255.255.255.0. These suggested IP addresses are part of a group of IP addresses that have been set aside specially for use “in house”...
  • Page 103 Dotted Decimal Notation The actual IP address is a 32-bit number that is stored in binary format. These 32 bits are segmented into 4 groups of 8 bits — each group is referred to as a field or an octet. Decimal notation converts the value of each field into a decimal number, and the fields are separated by dots.
  • Page 104: Subnets And Subnet Masks

    C: IP A PPENDIX DDRESSING Subnets and Subnet You can divide your IP network into sub-networks also known as subnets. Masks Support for subnets is important because the number of bits assigned to the device part of an IP address limits the number of devices that may be addressed on any given network.
  • Page 105 Subnets and Subnet Masks As shown in this example, the 32 bits of an IP address and subnet mask are usually written using an integer shorthand. This notation translates four consecutive 8-bit groups (octets) into four integers that range from 0 through 255.
  • Page 106: Default Gateways

    C: IP A PPENDIX DDRESSING Table 11 Subnet Mask Notation The subnet mask 255.255.255.255 is reserved as the default broadcast address. Default Gateways A gateway is a device on your network which is used to forward IP packets to a remote destination. An alternative name for a gateway is a Router.
  • Page 107 TANDARDS This Appendix lists the industry standards supported by this version of Gigabit Multilayer Switching Software Table 12 Standards Supported. SNMP: SNMP Protocol (RFC 1157) MIB-II (RFC 1213) Bridge MIB (RFC 1493) RMON MIB II (RFC2021) Remote Monitoring MIB (RFC 1757) MAU MIB (RFC 2239) Administration: UDP (RFC 768)
  • Page 108 D: S PPENDIX TANDARDS UPPORTED...
  • Page 109 LOSSARY 3Com Network The 3Com network management application used to manage 3Com’s Supervisor networking solutions. 10BASE-T The IEEE specification for 10 Mbps Ethernet over Category 3, 4 or 5 twisted pair cable. 100BASE-FX The IEEE specification for 100 Mbps Fast Ethernet over multimode fiber-optic cable.
  • Page 110 LOSSARY Fast Ethernet is 100 Mbps, and the bandwidth of Gigabit Ethernet is 1000 Mbps. baud The signalling rate of a line, that is, the number of transitions (voltage or frequency changes) made per second. Also known as line speed. BOOTP The BOOTP protocol allows you to automatically map an IP address to a given MAC address each time a device is started.
  • Page 111 DHCP Dynamic Host Control Protocol. A protocol that lets you centrally manage and automate the assignment of Internet Protocol (IP) addresses in an organization's network. Domain Name System. This system maps a numerical Internet Protocol (IP) address to a more meaningful and easy-to-remember name. When you need to access another device on your network, you enter the name of the device, instead of its IP address.
  • Page 112 LOSSARY full duplex A system that allows packets to be transmitted and received at the same time and, in effect, doubles the potential throughput of a link. gateway See router. GBIC Gigabit Interface Converter. Gigabit Ethernet IEEE standard 802.3z for 1000 Mbps Ethernet; it is compatible with existing 10/100 Mbps Ethernet standards.
  • Page 113 IGMP snooping A mechanism performed by an intermediate device, such as a Layer 2 Switch, that optimizes the flow of multicast traffic. The device listens for IGMP messages and build mapping tables and associated forwarding filters, in addition to reducing the IGMP protocol traffic. Internet Group Internet Group Management Protocol (IGMP) is a protocol that runs Management...
  • Page 114 LOSSARY latency The delay between the time a device receives a packet and the time the packet is forwarded out of the destination port. line speed See baud. loop An event that occurs when two network devices are connected by more than one path, thereby causing packets to repeatedly cycle around the network and not reach their destination.
  • Page 115 Policy Comprises a set of “rules” that are applied to a network so that a network meets the needs of the business. That is, traffic can be prioritised across a network according to its importance to that particular business type. POST Power On Self Test.
  • Page 116 LOSSARY Service Access Point. A well-defined location that identifies the user of services of a protocol entity. segment A section of a LAN that is connected to the rest of the network using a switch or bridge. server A computer in a network that is shared by multiple endstations. Servers provide endstations with access to shared network services such as computer files and printer queues.
  • Page 117 bridges, in that they connect LANs of a different type; however they connect more LANs than a bridge and are generally more sophisticated. Switch Database A database that is stored by a switch to determine if a packet should be forwarded, and which port should forward the packet if it is to be forwarded.
  • Page 118 LOSSARY Webcache A device that is installed on the network to cache frequently accessed Web pages from which they can be retrieved, thus reducing network traffic over the WAN.
  • Page 119 NDEX Numbers 802.1D priority levels 52 traffic classification 52 802.1Q tagging 69 addresses classes 103 IP 101 aggregated links 16, 26 example 32 aging time, definition 50 alarm events 60 alarm settings, default 61 Alarms (RMON group) 58, 60 audit log 62 Auto VLAN and QoS Assignment 83 auto-IP 16, 74 automatic IP configuration 16, 74...
  • Page 120 NDEX IGMP multicast filtering 36 Internet addresses 101 InterNIC 102 IP (Internet Protocol) addresses 102 IP address 16, 74, 101 classes of 103 defined 102 derivation 102 division of network and host 102 example 104 obtaining 102 subnet mask 104 subnetwork portion 104 IP multicast addressing 33...
  • Page 121 default port costs 43 default priority 43 Designated Bridge 44 Designated Bridge Port 44 example 45 Hello BPDUs 44 Max Age 44 priority 43 Root Bridge 43 Root Path Cost 44 Root Port 44 using on a network with multiple VLANs 48 subnet mask 104 defined 104 example 104...
  • Page 122 NDEX...

Table of Contents