Page 1
SuperStack Switch 4200 Family Implementation Guide Generic guide for units in the SuperStack 3 Switch 4200 Family: 3C17300 3C17302 3C17304 3C17300A 3C17302A 3C17304A http://www.3com.com/ Part No. DUA1730-0BAA03 Published June 2005 ®...
Page 2
All other company and product names may be trademarks of the respective companies with which they are associated. ENVIRONMENTAL STATEMENT It is the policy of 3Com Corporation to be environmentally-friendly in all operations. To uphold our policy, we are committed to: Establishing environmental performance standards that comply with national legislation and regulations.
ONTENTS BOUT UIDE Conventions Related Documentation Documentation Comments WITCH EATURES What is Management Software? Switch Features Explained Automatic IP Configuration Security Aggregated Links Auto-negotiation Multicast Filtering Spanning Tree Protocol and Rapid Spanning Tree Protocol Switch Database Traffic Prioritization RMON Broadcast Storm Control VLANs Configuration Save and Restore PTIMIZING...
Page 4
Aggregated Links and Your Switch Aggregated Link Example SING ULTICAST What is an IP Multicast? Benefits of Multicast Multicast Filtering Multicast Filtering and Your Switch IGMP Multicast Filtering SING ESILIENCE Spanning Tree Protocol (STP) Rapid Spanning Tree Protocol (RSTP) What is STP? How STP Works STP Requirements STP Calculation...
Page 5
TATUS ONITORING AND RMON What is RMON? The RMON Groups Benefits of RMON RMON and the Switch Alarm Events The Default Alarm Settings The Audit Log Email Notification of Events ETTING IRTUAL What are VLANs? Benefits of VLANs VLANs and Your Switch The Default VLAN Communication Between VLANs Creating New VLANs...
Page 6
How Rada Works Auto VLAN Assignment Important Considerations What is Disconnect Unauthorized Device (DUD)? How DUD Works What is RADIUS? SING WITCH Configuration Save and Restore Upgrading Management Software ONFIGURATION Configuration Rules for Gigabit Ethernet Configuration Rules for Fast Ethernet Configuration Rules with Full Duplex ETWORK ONFIGURATION...
Most user guides and release notes are available in Adobe Acrobat Reader Portable Document Format (PDF) or HTML on the 3Com World Wide Web site: http://www.3com.com/ Please note that when this Guide states “the Switch”, this is a reference...
BOUT UIDE Conventions Table 1 Table 1 Notice Icons Table 2 Text Conventions Convention Screen displays This typeface represents information as it appears on the Syntax Commands The words “enter” and “type” Keyboard key names If you must press two or more keys simultaneously, the key Words in italics Table 2 list conventions that are used throughout this guide.
Documentation Your suggestions are very important to us. They will help make our Comments documentation more useful to you. Please e-mail comments about this document to 3Com at: pddtechpubs_comments@3com.com Getting Started Guide This guide contains: all the information you need to install and set up the Switch in its ■...
Page 12
■ ■ Please note that we can only respond to comments and questions about 3Com product documentation at this e-mail address. Questions related to technical support or sales should be directed in the first instance to your network supplier. Document title...
WITCH Chapter 1 Switch Features Overview Chapter 2 Optimizing Bandwidth Chapter 3 Using Multicast Filtering Chapter 4 Using Resilience Features Chapter 5 Using the Switch Database Chapter 6 Using Traffic Prioritization Chapter 7 Status Monitoring and Statistics Chapter 8 Setting Up Virtual LANs Chapter 9 Using Automatic IP Configuration Chapter 10...
This chapter contains introductory information about the SuperStack Switch management software and supported features. It covers the following topics: ■ ■ For detailed descriptions of the web interface operations and the command line interface (CLI) commands that you require to manage the Switch please refer to the Management Interface Reference Guide supplied supplied in HTML format on the CD-ROM that accompanies your Switch.
1: S HAPTER WITCH EATURES For a list of the features supported by your Switch, please refer to the Management Quick Reference Guide supplied in PDF format on the CD-ROM that accompanies your Switch. Automatic IP By default the Switch tries to configure itself with IP information without Configuration requesting user intervention.
They can potentially double, triple or quadruple the bandwidth of a ■ connection. They can provide redundancy — if one link is broken, the traffic load ■ can be shared amongst the remaining link(s). Your Switch supports the IEEE 802.3ad Link Aggregation Control Protocol (LACP).
1: S HAPTER WITCH EATURES port reacts accordingly by tuning the link from its higher speed to the lower supported speed to provide an error-free connection to the network. For more information about auto-negotiation and port capabilities, see Chapter 2 “Optimizing Multicast Filtering Multicast filtering allows the Switch to forward multicast traffic to only the endstations that are part of a predefined multicast group, rather than...
Switch Features Explained For more information about STP and RSTP, see Chapter 4 “Using Resilience Features”. Switch Database The Switch Database is an integral part of the Switch and is used by the Switch to determine if a packet should be forwarded, and which port should transmit the packet if it is to be forwarded.
1: S HAPTER WITCH EATURES RMON Remote Monitoring (RMON) is an industry standard feature for traffic monitoring and collecting network statistics. The Switch software continually collects statistics about the LAN segments connected to the Switch. If you have a management workstation with an RMON management application, the Switch can transfer these statistics to your workstation on request or when a pre-defined threshold is exceeded.
Page 21
Switch Features Explained For further information about Configuration Save and Restore, see Chapter 11 “Using Switch Configuration Features”.
There are many ways you can optimize the bandwidth on your network and improve network performance. If you utilize certain Switch features you can provide the following benefits to your network and end users: ■ ■ ■ ■ ■ For detailed descriptions of the web interface operations and the command line interface (CLI) commands that you require to manage the Switch please refer to the Management Interface Reference Guide supplied in HTML format on the CD-ROM that accompanies your Switch.
2: O HAPTER PTIMIZING ANDWIDTH If the devices at both ends of a link do not support auto-negotiation, both ends must be manually set to full duplex or half duplex accordingly. Ports operating at 1000 Mbps support full duplex mode only. Flow Control All Switch ports support flow control, which is a mechanism that minimizes packet loss during periods of congestion on the network.
Smart Auto-sensing Smart auto-sensing allows auto-negotiating multi-speed ports, such as 10/100 Mbps or 10/100/1000 Mbps, to monitor and detect a high error rate on a link, or a problem in the “physical” interconnection to another port and react accordingly. In other words, auto-negotiation may “agree” upon a configuration that the cable cannot sustain;...
2: O HAPTER PTIMIZING ANDWIDTH Aggregated Links Aggregated links are connections that allow devices to communicate using up to four member links in parallel. Aggregated links are supported on the 10/100/1000BASE-T ports and GBIC or SFP ports links provide two benefits: ■...
re-mapping occurs as soon as the Switch detects that a member link has failed — almost instantaneously. As a result, aggregated link configurations are extremely resilient and fault-tolerant. Figure 2 Dynamic Reassignment of Traffic Flows The key benefits of 802.3ad link aggregation are: ■...
Page 28
2: O HAPTER PTIMIZING ANDWIDTH Figure 3 Aggregated ■ ■ The Spanning Tree costs for a port running LACP is the cost assigned for an aggregated link running at that speed. As required by the IEEE 802.3ad standard, no changes in cost are made according to the number of member links in the aggregated link.
Aggregated Links and Your Switch When any port is assigned to an aggregated link (either manually or via LACP) it will adopt the configuration settings of the aggregated link. When a port leaves an aggregated link its original configuration settings are restored.
Page 30
2: O HAPTER PTIMIZING ANDWIDTH ■ ■ Figure 4 An illegal aggregated link configuration To make this configuration work you need to have two aggregated links defined on Switch A, one containing the member links for Switch B and the other containing those for Switch C. When using an aggregated link, note that: ■...
Page 31
separately. If you do this, the traffic destined for that link is distributed to the other links in the aggregated link. If you do not remove the connection and only disable one end of the member link port, traffic is still forwarded to that port by the aggregated link port at the other end.
2: O HAPTER PTIMIZING ANDWIDTH Aggregated Link The example shown in Example between two Switch units. Figure 5 A 4 Gbps aggregated link between two Switch units To set up this configuration: 1 Add the 1000BASE-T ports on the upper unit to the aggregated link. 2 Add the 1000BASE-T ports on the lower unit to the aggregated link.
Multicast filtering improves the performance of networks that carry multicast traffic. This chapter explains multicasts, multicast filtering, and how multicast filtering can be implemented on your Switch. It covers the following topics: ■ ■ ■ For detailed descriptions of the web interface operations and the command line interface (CLI) commands that you require to manage the Switch please refer to the Management Interface Reference Guide supplied in HTML format on the CD-ROM that accompanies your Switch.
3: U HAPTER SING ULTICAST A multicast packet is identified by the presence of a multicast group address in the destination address field of the packet’s IP header. Benefits of Multicast The benefits of using IP multicast are that it: ■...
Multicast Filtering Figure 6 The effect of multicast filtering Multicast Filtering Your Switch provides automatic multicast filtering support using IGMP and Your Switch (Internet Group Management Protocol) Snooping. It also supports IGMP query mode. Snooping Mode Snooping Mode allows your Switch to forward multicast packets only to the appropriate ports.
3: U HAPTER SING ULTICAST command will configure the Switch 4200 Series to automatically negotiate with compatible devices on VLAN 1 to become the querier. The Switch 4200 Family is compatible with any device that conforms to the IGMP v2 protocol. IGMP Multicast IGMP is the system that all IP-supporting network devices use to register Filtering...
Page 37
IGMP Multicast Filtering Management Interface Reference Guide supplied on your Switch CD-ROM. If IGMP multicast learning is not enabled then IP multicast traffic is always forwarded, that is, it floods the network. For information about configuring IGMP functionality on an endstation, refer to the user documentation supplied with your endstation or the endstation’s Network Interface Card (NIC).
Setting up resilience on your network helps protect critical links against failure, protects against network loops, and reduces network downtime to a minimum. This chapter explains the features supported by the Switch that provide resilience for your network. It covers the following topics: ■...
RSTP implements the Spanning Tree Algorithm and Protocol, as defined in the IEEE 802.1w standard. RSTP is enabled by default. 3Com recommends that you use the Rapid Spanning Tree Protocol feature (enabled by default) to provide optimum performance for your network and ease of use.
What is STP? STP is a bridge-based system that allows you to implement parallel paths for network traffic and uses a loop-detection process to: ■ ■ RSTP provides the same functionality as STP. For details on how the two systems differ, see As an example, separated by three bridges.
Page 42
4: U HAPTER SING ESILIENCE EATURES Figure 8 Traffic flowing through Bridges C and A If a link failure is detected, as shown in Figure 9, the STP process reconfigures the network so that traffic from LAN segment 2 flows through Bridge B.
How STP Works When enabled, STP determines the most appropriate path for traffic through a network. It does this as outlined in the sections below. STP Requirements Before it can configure the network, the STP system requires: ■ ■ ■ Table 3 Default port costs * This path cost is correct where there are two ports in an aggregated link.
4: U HAPTER SING ESILIENCE ■ ■ ■ ■ STP Configuration After all the bridges on the network have agreed on the identity of the Root Bridge, and have established the other relevant parameters, each bridge is configured to forward traffic only between its Root Port and the Designated Bridge Ports for the respective network segments.
How RSTP Differs to RSTP works in a similar way to STP, but it includes additional information in the BPDUs. This information allows each bridge to confirm that it has taken action to prevent loops from forming when it wants to enable a link to a neighbouring bridge.
4: U HAPTER SING ESILIENCE ■ ■ ■ ■ STP Configurations Figure 11 Switch units. ■ ■ ■ EATURES Because Bridge A is the Root Bridge, it is also the Designated Bridge for LAN segment 1. Port 1 on Bridge A is therefore selected as the Designated Bridge Port for LAN Segment 1.
Page 47
How STP Works Figure 11 STP configurations...
4: U HAPTER SING ESILIENCE Using STP on a The IEEE 802.1D standard does not take into account VLANs when it Network with calculates STP information — the calculations are only performed on the Multiple VLANs basis of physical connections. For this reason, some network configurations can result in VLANs being subdivided into a number of isolated sections by the STP system.
ID, and the port identifier on which the packet is received. You can enter and update entries using the CLI command, the Bridge > Address Database Web Interface operation, or an SNMP Network Manager, for example 3Com Network Supervisor. ATABASE...
5: U HAPTER SING THE WITCH Switch Database Databases entries can have three states: Entry States ■ ■ ■ ATABASE Learned — The Switch has placed the entry into the Switch Database when a packet was received from an endstation. Note that: Learned entries are removed (aged out) from the Switch Database ■...
For more granular prioritization and an enhanced Quality of Service support, other products are available in the 3Com range of stackable Switches. What is Traffic Traffic prioritization allows high priority data, such as time-sensitive and...
6: U HAPTER SING RAFFIC ■ ■ ■ How Traffic Traffic prioritization ensures that high priority data is forwarded through Prioritization Works the Switch without being delayed by lower priority data. Traffic prioritization uses the two traffic queues that are present in the hardware of the Switch to ensure that high priority traffic is forwarded on a different queue from lower priority traffic.
You cannot alter the mapping of priority levels 0 - 7 to the traffic queues. These priority levels are fixed to the traffic queues as shown in Figure 13 IEEE 802.1D traffic types Ingress Port Figure 13 levels and how they are mapped to the two supported traffic queues. The 802.1D service level of the packet is not altered by the Switch 4200 Series.
6: U HAPTER SING RAFFIC Figure 14 DSCP Service Level Mapping Figure 14 mapped to the two Traffic Queues. The DSCP service level of the packet is not altered by the Switch 4200 Family. Traffic Prioritization The traffic should be marked as it enters the network; the marking can be and your Switch achieved in two ways: ■...
Page 55
Traffic queues are preset on a per-unit basis on the Switch 4200 Family. Configuring traffic prioritization for QoS on a 4200 Family QoS can be configured on your Switch using the 3Com Network Supervisor or via the Command Line Interface (CLI).
Page 56
6: U HAPTER SING RAFFIC 3 Create Profiles The next step is to create a profile, which associates classifiers with service levels. 4 Apply QoS profile After a QoS profile has been created, it can be assigned to the Port(s). When the profile is assigned to the port(s), the QoS configuration defined in the profile will immediately become active.
This chapter contains details of the features that assist you with status monitoring and statistics. For detailed descriptions of the web interface operations and the command line interface (CLI) commands that you require to manage the Switch please refer to the Management Interface Reference Guide supplied in HTML format on the CD-ROM that accompanies your Switch.
Page 58
7: S HAPTER TATUS ONITORING AND TATISTICS Statistics The Statistics group provides traffic and error statistics showing packets, bytes, broadcasts, multicasts and errors on a LAN segment. Information from the Statistics group is used to detect changes in traffic and error patterns in critical areas of your network. History The History group provides historical views of network performance by taking periodic samples of the counters supplied by the Statistics group.
Benefits of RMON Using the RMON features of your Switch has three main advantages: ■ ■ ■ RMON and the The RMON support provided by your Switch is detailed in Switch It improves your efficiency Using RMON allows you to remain at one workstation and collect information from widely dispersed LAN segments or VLANs.
7: S HAPTER TATUS ONITORING AND Table 4 RMON support supplied by the Switch RMON group Statistics History Alarms Events When using the RMON features of the Switch, note the following: ■ ■ Alarm Events You can define up to 200 alarms for the Switch. The events that you can define for each alarm and their resulting actions are listed in Table 5 Alarm Events Event...
Table 5 Alarm Events Event Notify and filter port Notify and disable port Notify and enable port Disable port Enable port Notify and unfilter port System started Software Upgrade report The Default Alarm A new or initialized Switch has the following alarm(s) defined for each Settings port: Broadcast bandwidth used...
7: S HAPTER TATUS ONITORING AND The Audit Log The Switch keeps an audit log of all management user sessions, providing a record of a variety of changes, including ones relating to RMON. The log can only be read by users at the security access level using an SNMP Network Management application.
Page 63
A link fails or returns to service — you can select specific links that you ■ wish to receive messages for, for example, a mission-critical link to a server. A security violation occurs. ■ A resilient link activates ■ System Started ■...
Page 64
7: S HAPTER TATUS ONITORING AND TATISTICS...
Setting up Virtual LANs (VLANs) on your Switch reduces the time and effort required by many network administration tasks, and increases the efficiency of your network. This chapter explains more about the concept of VLANs and explains how they can be implemented on your Switch. It covers the following topics: ■...
8: S HAPTER ETTING IRTUAL Figure 15 A network setup showing three VLANs Benefits of VLANs The main benefit of VLANs is that they provide a network segmentation system that is far more flexible than any traditional network. Using VLANs also provides you with three other benefits: ■...
■ VLANs and Your Your Switch provides support for VLANs using the IEEE 802.1Q standard. Switch This standard allows traffic from multiple VLANs to be carried across one physical link. The IEEE 802.1Q standard allows each port on your Switch to be placed ■...
8: S HAPTER ETTING IRTUAL Figure 16 Two VLANS connected via a router Creating New VLANs If you want to move a port from the Default VLAN to another VLAN, you must first define information about the new VLAN on your Switch. VLANs: Tagged and Your Switch supports 802.1Q VLAN tagging, a system that allows traffic Untagged...
identify which packets belong in which VLANs. To communicate between VLANs a router must be used. Placing a Port in a Once the information for a new VLAN has been defined, you can place a Single VLAN port in that VLAN. Creating an IEEE 802.1Q Tagged Link This method of tagging is defined in the IEEE 802.1Q standard, and allows a link to carry traffic for any of the VLANs defined on your Switch.
8: S HAPTER ETTING IRTUAL VLAN This section contains examples of simple VLAN configurations. It Configuration describes how to set up your switch to support simple untagged and Examples tagged connections. Using Untagged The simplest VLAN operates in a small network using a single switch. In Connections this network there is no requirement to pass traffic for multiple VLANs across a link.
2 Add ports to the VLANs Add ports 10, 11 and 12 of the Switch as untagged members to VLAN 2. Using 802.1Q Tagged In a network where the VLANs are distributed amongst more than one Connections Switch, you must use 802.1Q tagged connections so that all VLAN traffic can be passed along the links between the Switches.
Page 72
8: S HAPTER ETTING IRTUAL 3 Add port 12 on Switch 1 to the VLANs Add port 12 on Switch 1 as a tagged member of both VLANs 1 and 2 so that all VLAN traffic is passed over the link to Switch 2. 4 Configure the VLANs on Switch 2 Define VLAN 2.
SING ONFIGURATION This chapter explains more about IP addresses and how the automatic configuration option works. It covers the following topics: How Your Switch Obtains IP Information ■ How Automatic IP Configuration Works ■ Important Considerations ■ For detailed information on setting up your Switch for management, see the Getting Started Guide that accompanies your Switch.
9: U HAPTER SING UTOMATIC How Your Switch You can use one of the following methods to allocate IP information to Obtains IP your Switch (essential if you wish to manage your Switch across the Information network): ■ ■ If you select an option for no IP configuration the Switch will not be accessible from a remote management workstation on the LAN.
Automatic Process To detect its IP information using the automatic configuration process, the Switch goes through the following sequence of steps: 1 The DHCP client that resides in the Switch makes up to four attempts to contact a DHCP server on the network requesting IP information from the server.
9: U HAPTER SING UTOMATIC Important This section contains some important points to note when using the Considerations automatic IP configuration feature. The dynamic nature of automatically configured IP information means that a Switch may change its IP address whilst in use. Event Log Entries An event log will be generated and an SNMP trap will be sent if any of and Traps...
This chapter explains the security features of the Switch and gives examples of how and why you would use them in your network. It covers the following topics: ■ ■ ■ ■ ■ ■ For detailed descriptions of the Web interface operations and the Command Line Interface (CLI) commands that you require to manage the Switch please refer to the Management Interface Reference Guide supplied in HTML format on the CD-ROM that accompanies your Switch.
10: M HAPTER AKING Port Security The Switch supports the following port security modes, which you can set for an individual port or a range of ports: ■ ■ ■ ■ ■ ■ ETWORK ECURE No Security Port security is disabled and all network traffic is forwarded through the port without any restrictions.
Page 79
Rada (Radius Authenticated Device Access) ■ Rada (Radius Authenticated Device Access) provides a means of disabling access and where necessary the VLAN assignment based purely on central authentication of an End Station's MAC address. In practice this can be used to provide RADIUS-based security for network administrators who do not have 802.1X clients installed.
10: M HAPTER AKING What is Network Network Login controls user access at the network edge by blocking or Login? unblocking access on a per-port basis. When a client device attempts to connect to a Switch port, the user is challenged to provide their identity and authentication credentials in the form of a user name and password.
What is Network Login? Network Login When Network Login is enabled the Switch acts as a relay agent between Works the client device that is requesting access to the network and the RADIUS server. The authentication information that is exchanged between the client device and the RADIUS server is received and transmitted by the Switch, as shown in Figure...
10: M HAPTER AKING ETWORK ECURE For Network Login, the Switch uses EAP (Extensible Authentication Protocol). For further information about RADIUS, see “What is RADIUS?” page What is Rada? The Radius Authenticated Device Access feature complements the existing 802.1X support of the Switch. Instead of needing an 802.1X client on every end station, the switch can use the MAC address of the end station to query the RADIUS server.
■ ■ Rada is similar to DUD (Disconnect Unauthorized Device), only Rada affects a single device where as DUD affects the whole port. Rada can also be used in conjunction with the existing 802.1X Secure Network Login to provide the capability to support a variety of host and network configurations.
Page 84
10: M HAPTER AKING ■ ■ ■ ■ ■ RADIUS Server settings for Auto VLAN When setting up Auto VLAN on a RADIUS server the following attributes must be set to supply VLAN data to the Switch: Table 8 Setting Auto VLAN attributes Attribute Tunnel-Type Tunnel-Medium-Type...
What is Disconnect The port security feature Disconnect Unauthorized Device (DUD), disables Unauthorized a port if an unauthorized client device transmits data on it. Device (DUD)? DUD may be automatically enabled when a port is set to one of the following port security modes: ■...
(CLI) commands that you require to manage the Switch please refer to the Management Interface Reference Guide supplied in HTML format on the CD-ROM supplied with your Switch or on the 3Com Web site. Configuration Save The Configuration Save and Restore feature allows the configuration of...
Page 88
The system summary progress of restore and save operations to all other users. When using the Configuration Save and Restore feature, 3Com recommends that aggregated links are configured as either: Manual aggregations with Link Aggregation Configuration ■...
For a detailed description of how to upgrade the software on your Switch please refer to the Management Interface Reference Guide supplied in HTML format on the CD-ROM supplied with your Switch or on the 3Com Web site. CAUTION: 3Com strongly recommends that you use the TFTP Server as the primary means of upgrading your Switch.
Page 90
11: U HAPTER SING WITCH ONFIGURATION EATURES has subsequently failed to power up correctly. The symptoms of a failed TFTP software upgrade are: the PowerOn Self Test (POST) has failed, the Power/Self Test LED is yellow, all of the Port Status LEDs are Off, you cannot access the Switch via Telnet.
Page 91
PPENDICES AND Appendix A Configuration Rules Appendix B Network Configuration Examples Appendix C IP Addressing Appendix D Standards Supported Glossary Index NDEX...
Configuration Rules Gigabit Ethernet is designed to run over several media: for Gigabit ■ Ethernet ■ ■ The different types of Gigabit Ethernet media and their specifications are detailed in Table 9 Gigabit Ethernet cabling ONFIGURATION Single-mode fiber optic cable, with connections up to 5 km (3.1 miles).
A: C PPENDIX ONFIGURATION Configuration Rules The topology rules for 100 Mbps Fast Ethernet are slightly different to for Fast Ethernet those for 10 Mbps Ethernet. and provides examples of how they allow for large-scale Fast Ethernet networks. Figure 21 Fast Ethernet configuration rules The key topology rules are: ■...
Configuration Rules The Switch provides full duplex support for all its ports, including with Full Duplex Expansion Module ports. Full duplex allows packets to be transmitted and received simultaneously and, in effect, doubles the potential throughput of a link. With full duplex, the Ethernet topology rules are the same, but the Fast Ethernet rules are: ■...
ETWORK XAMPLES This chapter contains the following sections: Simple Network Configuration Examples ■ ■ Advanced Network Configuration Examples ■ ■ ONFIGURATION Desktop Switch Example Improving the Performance and Resilience of Your Network...
B: N PPENDIX ETWORK ONFIGURATION Simple Network The following illustrations show some simple examples of how the Switch Configuration 4200 Family can be used in your network. Examples Desktop Switch The example in Example for a group of users that require dedicated 10 Mbps or 100 Mbps connections to the desktop.
Advanced Network This section shows some network examples that illustrate how you can Configuration set up your network for optimum performance using some of the Examples features supported by your Switch. Improving the Figure 23 Performance and resilience by using aggregated links; this increases the bandwidth Resilience of Your available for the backbone connection and also provides extra resilience.
Page 100
B: N PPENDIX ETWORK ONFIGURATION XAMPLES...
The IP address can be split into two parts: ■ ■ If your network is internal to your organization only, you may use any arbitrary IP address. 3Com suggests you use addresses in the series DDRESSING IP Addresses Subnets and Subnet Masks...
C: IP A PPENDIX DDRESSING 192.168.100.X (where X is a number between 1 and 254) with a subnet mask 255.255.255.0. If you are using SLIP, use the default SLIP address of 192.168.101.1 with a subnet mask of 255.255.255.0. These suggested IP addresses are part of a group of IP addresses that have been set aside specially for use “in house”...
Page 103
Dotted Decimal Notation The actual IP address is a 32-bit number that is stored in binary format. These 32 bits are segmented into 4 groups of 8 bits — each group is referred to as a field or an octet. Decimal notation converts the value of each field into a decimal number, and the fields are separated by dots.
C: IP A PPENDIX DDRESSING Subnets and Subnet You can divide your IP network into sub-networks also known as subnets. Masks Support for subnets is important because the number of bits assigned to the device part of an IP address limits the number of devices that may be addressed on any given network.
Page 105
Subnets and Subnet Masks As shown in this example, the 32 bits of an IP address and subnet mask are usually written using an integer shorthand. This notation translates four consecutive 8-bit groups (octets) into four integers that range from 0 through 255.
C: IP A PPENDIX DDRESSING Table 11 Subnet Mask Notation The subnet mask 255.255.255.255 is reserved as the default broadcast address. Default Gateways A gateway is a device on your network which is used to forward IP packets to a remote destination. An alternative name for a gateway is a Router.
Page 107
TANDARDS This Appendix lists the industry standards supported by this version of Gigabit Multilayer Switching Software Table 12 Standards Supported. SNMP: SNMP Protocol (RFC 1157) MIB-II (RFC 1213) Bridge MIB (RFC 1493) RMON MIB II (RFC2021) Remote Monitoring MIB (RFC 1757) MAU MIB (RFC 2239) Administration: UDP (RFC 768)
Page 109
LOSSARY 3Com Network The 3Com network management application used to manage 3Com’s Supervisor networking solutions. 10BASE-T The IEEE specification for 10 Mbps Ethernet over Category 3, 4 or 5 twisted pair cable. 100BASE-FX The IEEE specification for 100 Mbps Fast Ethernet over multimode fiber-optic cable.
Page 110
LOSSARY Fast Ethernet is 100 Mbps, and the bandwidth of Gigabit Ethernet is 1000 Mbps. baud The signalling rate of a line, that is, the number of transitions (voltage or frequency changes) made per second. Also known as line speed. BOOTP The BOOTP protocol allows you to automatically map an IP address to a given MAC address each time a device is started.
Page 111
DHCP Dynamic Host Control Protocol. A protocol that lets you centrally manage and automate the assignment of Internet Protocol (IP) addresses in an organization's network. Domain Name System. This system maps a numerical Internet Protocol (IP) address to a more meaningful and easy-to-remember name. When you need to access another device on your network, you enter the name of the device, instead of its IP address.
Page 112
LOSSARY full duplex A system that allows packets to be transmitted and received at the same time and, in effect, doubles the potential throughput of a link. gateway See router. GBIC Gigabit Interface Converter. Gigabit Ethernet IEEE standard 802.3z for 1000 Mbps Ethernet; it is compatible with existing 10/100 Mbps Ethernet standards.
Page 113
IGMP snooping A mechanism performed by an intermediate device, such as a Layer 2 Switch, that optimizes the flow of multicast traffic. The device listens for IGMP messages and build mapping tables and associated forwarding filters, in addition to reducing the IGMP protocol traffic. Internet Group Internet Group Management Protocol (IGMP) is a protocol that runs Management...
Page 114
LOSSARY latency The delay between the time a device receives a packet and the time the packet is forwarded out of the destination port. line speed See baud. loop An event that occurs when two network devices are connected by more than one path, thereby causing packets to repeatedly cycle around the network and not reach their destination.
Page 115
Policy Comprises a set of “rules” that are applied to a network so that a network meets the needs of the business. That is, traffic can be prioritised across a network according to its importance to that particular business type. POST Power On Self Test.
Page 116
LOSSARY Service Access Point. A well-defined location that identifies the user of services of a protocol entity. segment A section of a LAN that is connected to the rest of the network using a switch or bridge. server A computer in a network that is shared by multiple endstations. Servers provide endstations with access to shared network services such as computer files and printer queues.
Page 117
bridges, in that they connect LANs of a different type; however they connect more LANs than a bridge and are generally more sophisticated. Switch Database A database that is stored by a switch to determine if a packet should be forwarded, and which port should forward the packet if it is to be forwarded.
Page 118
LOSSARY Webcache A device that is installed on the network to cache frequently accessed Web pages from which they can be retrieved, thus reducing network traffic over the WAN.
Page 119
NDEX Numbers 802.1D priority levels 52 traffic classification 52 802.1Q tagging 69 addresses classes 103 IP 101 aggregated links 16, 26 example 32 aging time, definition 50 alarm events 60 alarm settings, default 61 Alarms (RMON group) 58, 60 audit log 62 Auto VLAN and QoS Assignment 83 auto-IP 16, 74 automatic IP configuration 16, 74...
Page 120
NDEX IGMP multicast filtering 36 Internet addresses 101 InterNIC 102 IP (Internet Protocol) addresses 102 IP address 16, 74, 101 classes of 103 defined 102 derivation 102 division of network and host 102 example 104 obtaining 102 subnet mask 104 subnetwork portion 104 IP multicast addressing 33...
Page 121
default port costs 43 default priority 43 Designated Bridge 44 Designated Bridge Port 44 example 45 Hello BPDUs 44 Max Age 44 priority 43 Root Bridge 43 Root Path Cost 44 Root Port 44 using on a network with multiple VLANs 48 subnet mask 104 defined 104 example 104...