Page 1
SuperStack ® Switch 4200 Series Implementation Guide Generic guide for units in the SuperStack 3 Switch 4200 Series: 3C17300 3C17302 3C17304 http://www.3com.com/ Part No. DUA1730-0BAA02 Published November 2002...
Page 2
Software is delivered as “Commercial Computer Software” as defined in DFARS 252.227-7014 (June 1995) or as a “commercial item” as defined in FAR 2.101(a) and as such is provided with only such rights as are provided in 3Com’s standard commercial license for the Software. Technical data is provided with limited rights only as provided in DFAR 252.227-7015 (Nov 1995) or FAR 52.227-14 (June 1987), whichever is applicable.
EATURES VERVIEW What is Management Software? Switch Features Explained Automatic IP Configuration Port Security Aggregated Links Auto-negotiation Multicast Filtering Spanning Tree Protocol and Rapid Spanning Tree Protocol Switch Database Traffic Prioritization RMON Broadcast Storm Control VLANs PTIMIZING ANDWIDTH Port Features...
Page 4
STP Calculation STP Configuration STP Reconfiguration How RSTP Differs to STP STP Example STP Configurations Using STP on a Network with Multiple VLANs SING THE WITCH ATABASE What is the Switch Database? How Switch Database Entries Get Added Switch Database Entry States...
Page 5
Benefits of VLANs VLANs and Your Switch The Default VLAN Communication Between VLANs Creating New VLANs VLANs: Tagged and Untagged Membership Placing a Port in a Single VLAN VLAN Configuration Examples Using Untagged Connections Using 802.1Q Tagged Connections IP C SING...
Page 6
ETWORK ONFIGURATION XAMPLES Simple Network Configuration Examples Segmentation Switch Example Desktop Switch Example Advanced Network Configuration Examples Improving the Resilience of Your Network Enhancing the Performance of Your Network IP A DDRESSING IP Addresses Simple Overview Advanced Overview Subnets and Subnet Masks...
® This guide describes the features of the SuperStack 3 Switch 4200 Series and outlines how to use these features to optimize the performance of your network. This guide is intended for the system or network administrator who is responsible for configuring, using, and managing the Switch. It assumes...
Return or Enter. Do not press Return or Enter when an instruction simply says “type.” Keyboard key names If you must press two or more keys simultaneously, the key names are linked with a plus sign (+). Example:...
Documentation following: Getting Started Guide This guide contains: all the information you need to install and set up the Switch in its default state information on how to access the management software to begin managing the Switch. Management Interface Reference Guide...
Page 25 Please note that we can only respond to comments and questions about 3Com product documentation at this e-mail address. Questions related to technical support or sales should be directed in the first instance to your network supplier. Product...
Switch Features Overview Chapter 2 Optimizing Bandwidth Chapter 3 Using Multicast Filtering Chapter 4 Using Resilience Features Chapter 5 Using the Switch Database Chapter 6 Using Traffic Prioritization Chapter 7 Status Monitoring and Statistics Chapter 8 Setting Up Virtual LANs Chapter 9...
HTML format on the CD-ROM that accompanies your Switch. What is Your Switch can operate in its default state. However, to make full use of Management the features offered by the Switch, and to change and monitor the way it...
169.254.100.100 if it is operating in standalone mode, and/or no other Switches on the network have this IP address. If this default IP address is already in use on the network then the Switch detects this and configures itself with an IP address in the range 169.254.1.0 to 169.254.254.255.
All Switch ports support flow control, which is a mechanism that minimizes packet loss during periods of congestion on the network. Flow control is supported on ports operating in half duplex mode, and is implemented using the IEEE 802.3x standard on ports operating in full duplex mode.
Features”. Switch Database The Switch Database is an integral part of the Switch and is used by the Switch to determine if a packet should be forwarded, and which port should transmit the packet if it is to be forwarded.
Switch without being delayed by lower priority data. Traffic prioritization uses the two traffic queues that are present in the hardware of the Switch to ensure that high priority traffic is forwarded on a different queue from lower priority traffic. High priority traffic is given preference over low priority traffic to ensure that the most critical traffic gets the highest level of service.
VLANs A Virtual LAN (VLAN) is a flexible group of devices that can be located anywhere in a network, but which communicate as if they are on the same physical segment. With VLANs, you can segment your network without being restricted by physical connections —...
In normal operation, you do not need to alter the Switch from its default state. However, under certain conditions you may wish to alter the default state of these ports, for example, if you want to force a port to operate at 10 Mbps.
All Switch ports support flow control, which is a mechanism that minimizes packet loss during periods of congestion on the network. Packet loss is caused by one or more devices sending traffic to an already overloaded port on the Switch. Flow control minimizes packet loss by inhibiting the transmitting port from generating more packets until the period of congestion ends.
100 Mbps to provide an error-free 100 Mbps connection to the network. An SNMP Trap is sent every time a port is down-rated to a lower speed. Conditions that affect smart auto-sensing: Smart auto-sensing will not operate on links that do not support auto-negotiation, or on links where one end is at a fixed speed.
If a member link in an aggregated link fails, the traffic using that link is dynamically reassigned to the remaining member links in the aggregated link.
Figure 3, if a port on Switch C is physically connected to Switch B, but you manually configure the port on Switch C to be a member of an aggregated link for Switch A in error, LACP (if it is enabled) will detect this and place the port in the aggregated link for Switch B, thus overriding the manual configuration.
Page 24
The Spanning Tree costs for a port running LACP is the cost assigned for an aggregated link running at that speed. As required by the IEEE 802.3ad standard, no changes in cost are made according to the number...
When multiple links of different speed connect two devices only the highest speed links will be aggregated. The other links will be held in a standby state until there is a problem with a higher speed link(s). The lower speed link(s) will then become active.
Page 26
To be an active participant in an aggregated link the member link ports must operate in full duplex mode. (If a member link port does not operate in full duplex mode it can still be a member of an aggregated link but it will never be activated.) If ports of a different speed are aggregated together, the higher speed links carry the traffic.
Page 27
To gather statistics about an aggregated link, you must add together the statistics for each port in the aggregated link. If you wish to disable a single member link of an aggregated link, you must first physically remove the connection to ensure that you do not lose any traffic, before you disable both ends of the member link separately.
Single-to-multiple endstation conversations, on the other hand, may still take place over different ports. If the link state on any of the ports in an aggregated link becomes inactive due to link failure, then the Switch will automatically redirect the aggregated link traffic to the remaining ports.
Page 29
6 Connect the 1000BASE-T port marked ‘Down’ on the upper Switch to the 1000BASE-T port marked ‘Down’ on the lower Switch. 7 Connect the GBIC port marked ‘27’ on the upper Switch to the GBIC port marked ‘27’ on the lower Switch.
Users explicitly request to participate in the communication by joining an endstation to a specific multicast group. If the network is set up correctly, a multicast can only be sent to an endstation or a subset of endstations in a LAN, or VLAN, that belong to the relevant multicast group.
Enables the simultaneous delivery of information to many receivers in the most efficient, logical way. Reduces the load on the source (for example, a server) because it does not have to produce multiple copies of the same data. Makes efficient use of network bandwidth and scales well as the number of participants or collaborators expands.
Query Mode Query mode allows the Switch to function as the Querier if it has the lowest IP address in the subnetwork to which it belongs. IGMP querying is disabled by default on the Switch 4200 Series. This helps prevent interoperability issues with core products that may not follow the lowest IP address election method.
IP address becomes the querier. The Switch can be the IGMP querier and will become so if its own IP address is lower than that of any other IGMP queriers connected to the LAN or VLAN. However, as the Switch only has an IP address on its default VLAN, the Switch will only ever query on the default VLAN (VLAN1).
Page 35
IGMP Multicast Filtering Management Interface Reference Guide supplied on your Switch CD-ROM. If IGMP multicast learning is not enabled then IP multicast traffic is always forwarded, that is, it floods the network. For information about configuring IGMP functionality on an endstation, refer to the user documentation supplied with your endstation or the endstation’s Network Interface Card (NIC).
The Spanning Tree Protocol (STP) makes your network more resilient to Protocol (STP) link failure and also provides a protection from loops — one of the major causes of broadcast storms. STP is enabled by default on your Switch. To be fully effective, STP must be enabled on all Switches in your network.
RSTP (or STP) will detect any misconfiguration that may cause a temporary loop and react accordingly. If you have Fast Start disabled on a port, the Switch will wait for 30 seconds before RSTP (or STP) lets the port forward traffic.
Page 39
What is STP? Enable one of the less efficient paths if the most efficient path fails. RSTP provides the same functionality as STP. For details on how the two systems differ, see “How RSTP Differs to STP” page As an example,...
Page 40
Once the most efficient path has been determined, all other paths are blocked. Therefore, in Figure 7, Figure 8, and Figure 9, STP initially determined that the path through Bridge C was the most efficient, and so blocked the path through Bridge B.
Aggregated Link 10,000* * This path cost is correct where there are two ports in an aggregated link. However, if there are more ports in the aggregated link, the path cost will be proportionately lower. For example, if there are four ports in the aggregated link, the 802.1w path costs will be: 500,000 for 10 Mbps, 50,000 for 100 Mbps, and 5,000 for 1000 Mbps.
Bridge is the central reference point from which the network is configured. The Root Path Costs for each bridge — that is, the cost of the paths from each bridge to the Root Bridge. The identity of the port on each bridge that is to be the Root Port.
How STP Works How RSTP Differs to RSTP works in a similar way to STP, but it includes additional information in the BPDUs. This information allows each bridge to confirm that it has taken action to prevent loops from forming when it wants to enable a link to a neighbouring bridge.
LAN segment 1. Port 1 on Bridge A is therefore selected as the Designated Bridge Port for LAN Segment 1. Port 1 of Bridges B, C, X and Y have been defined as Root Ports because they are the nearest to the Root Bridge and therefore have the most efficient path.
Page 45
How STP Works Figure 11 STP configurations...
VLANs 1 and 2. They are connected using the 802.1Q-tagged link between Switch B and Switch C. By default, this link has a path cost of 100 and is automatically blocked because the other Switch-to-Switch connections have a path cost of 36 (18+18).
The Switch Database is used by the Switch to determine where a packet Database? should be forwarded to, and which port should transmit the packet if it is to be forwarded. The database contains a list of entries — each entry contains three items: MAC (Ethernet) address information of the endstation that sends packets to the Switch.
Learned entries are removed from the Switch Database if the Switch is reset or powered-down. Non-aging learned — If the aging time is set to 0 seconds, all learned entries in the Switch Database become non-aging learned entries. This means that they are not aged out, but they are still removed from the database if the Switch is reset or powered-down.
For a list of the features supported by your Switch, please refer to the Management Quick Reference Guide that accompanies your Switch. For detailed descriptions of the web interface operations and the...
DiffServ code point (classification is done at layer 3 of the OSI model). 802.1D traffic At layer 2, a traffic service class is defined in 802.1Q frame, which is able classification to carry VLAN identification and user priority information. The information is carried in a header field immediately following the destination MAC address, and Source MAC address.
DiffServ is an alternative method of classifying traffic so that different classification levels of service can be applied to it on a network. DiffServ is a layer 3 function; and the service to be applied is contained within the DSCP field,...
Figure 14 illustrates how DiffServ code point (DSCP) service levels are mapped to the two Traffic Queues. The DSCP service level of the packet is not altered by the Switch 4200 Series. Traffic Prioritization The traffic should be marked as it enters the network; the marking can be...
Page 53
Switch is the main tool for configuring QoS, and 3Com recommends that you use this application to configure QoS. You can also configure QoS via the command line interface (CLI), for a is a detailed description of the commands that you require refer to the Management Interface Reference Guide supplied in HTML format on the CD-ROM that accompanies your Switch.
Page 54
3 Create Profiles The next step is to create a profile, which associates classifiers with service levels. 4 Apply Qos profile After a QoS profile has been created, it can be assigned to the Port(s). When the profile is assigned to the port(s), the...
TATUS ONITORING AND TATISTICS This chapter contains details of the features that assist you with status monitoring and statistics. For detailed descriptions of the web interface operations and the command line interface (CLI) commands that you require to manage the Switch please refer to the Management Interface Reference Guide supplied in HTML format on the CD-ROM that accompanies your Switch.
The Events group provides you with the ability to create entries in an event log and send SNMP traps to the management workstation. Events are the action that can result from an RMON alarm. In addition to the standard five traps required by SNMP (link up, link down, warm start, cold start, and authentication failure), RMON adds two more: rising threshold and falling threshold.
RMON and the Switch addition, probes record the behavior of your network, so that you can analyze the causes of problems. It reduces the load on the network and the management workstation Traditional network management involves a management workstation polling network devices at regular intervals to gather statistics and identify problems or trends.
HAPTER TATUS ONITORING AND TATISTICS Alarm Events You can define up to 200 alarms for the Switch. The events that you can define for each alarm and their resulting actions are listed in Table Table 5 Alarm Events Event Action...
The Switch keeps an audit log of all management user sessions, providing a record of a variety of changes, including ones relating to RMON. The log can only be read by users at the security access level using an SNMP Network Management application.
Unit powers up. Unit in the stack fails. Fan in the unit fails. A link fails or returns to service — you can select specific links that you wish to receive messages for, for example, a mission-critical link to a server.
Page 61
Select menu option (system) : Via the web. On the Web interface, an indication of a general hardware failure will be provided through the top-level System Summary information screen. You should refer to the detailed Device Summary Web page, Figure...
Page 62
RMON Trap “Events” page 58 for details of this feature of your Switch. RMON Event Notification. Event Notification for fan failure can be configured by the User; refer “Email Notification of Events” on page page 61 for details of this...
HTML format on the CD-ROM that accompanies your Switch. What are VLANs? A VLAN is a flexible group of devices that can be located anywhere in a network, but which communicate as if they are on the same physical segment.
With a VLAN setup, if an endstation in VLAN Marketing for example is moved to a port in another part of the network, and retains its original subnet membership, you only need to specify that the new port is in VLAN Marketing.
IEEE 802.1Q tagged packet (that is, the packet that contains a VLAN ID) is received at a port and that port is NOT a member of that VLAN, the Switch does not perform any VLAN filtering. As a result a tagged packet will be forwarded if the address has been previously learned by the Switch.
8: S HAPTER ETTING IRTUAL All the ports are initially placed in this VLAN, and it is the only VLAN that allows you to access the management software of the Switch over the network. Communication If the devices placed in a VLAN need to communicate to devices in a...
VLAN IDs are global across the network). 2 Place the Switch ports in the required VLANs as tagged members. 3 Place the port at the other end of the link as a tagged member of the same VLANs as the port on your Switch.
Switch connected to endstations and servers using untagged connections. Ports 1, 2 and 3 of the Switch belong to VLAN 1, ports 10, 11 and 12 belong to VLAN 2. VLANs 1 and 2 are completely separate and cannot communicate with each other.
VLAN Configuration Examples 2 Add ports to the VLANs Add ports 10, 11 and 12 of the Switch as untagged members to VLAN 2. Using 802.1Q Tagged In a network where the VLANs are distributed amongst more than one Connections Switch, you must use 802.1Q tagged connections so that all VLAN traffic...
Page 70
IRTUAL 3 Add port 12 on Switch 1 to the VLANs Add port 12 on Switch 1 as a tagged member of both VLANs 1 and 2 so that all VLAN traffic is passed over the link to Switch 2.
SING UTOMATIC ONFIGURATION This chapter explains more about IP addresses and how the automatic configuration option works. It covers the following topics: How Your Switch Obtains IP Information How Automatic IP Configuration Works Important Considerations For detailed information on setting up your Switch for management, see the Getting Started Guide that accompanies your Switch.
Manual IP Configuration — you can manually input the IP information (IP address, subnet mask, and default gateway). If you select an option for no IP configuration the Switch will not be accessible from a remote management workstation on the LAN. In addition, the Switch will not be able to respond to SNMP requests.
To detect its IP information using the automatic configuration process, the Switch goes through the following sequence of steps: 1 The DHCP client that resides in the Switch makes up to four attempts to contact a DHCP server on the network requesting IP information from the server.
DHCP or BOOTP servers are operating normally before you power on your Switch. Event Log Entries An event log will be generated and an SNMP trap will be sent if any of and Traps the following changes occur in the IP configuration:...
Page 75
PPENDICES AND NDEX Appendix A Configuration Rules Appendix B Network Configuration Examples Appendix C IP Addressing Glossary Index...
(3.1 miles). Support for distances over 5 km is supported depending on the module specification. Multimode fiber optic cable, with connections up to 550 m (1804 ft). Category 5 cabling, with connections up to 100 m (328 ft). The different types of Gigabit Ethernet media and their specifications are...
Figure 22 Fast Ethernet configuration rules The key topology rules are: Maximum UTP cable length is 100 m (328 ft) over Category 5 cable. A 412 m (1352 ft) fiber link is allowed for connecting switch-to-switch, or endstation-to-switch, using half-duplex 100BASE-FX.
Configuration Rules for Fast Ethernet collapsed backbone). For example, a 225 m (738 ft) fiber link from a repeater to a router or switch, plus a 100 m (328 ft) UTP link from a repeater out to the endstations. Configuration Rules...
ETWORK ONFIGURATION XAMPLES This chapter contains the following sections: Simple Network Configuration Examples Segmentation Switch Example Desktop Switch Example Advanced Network Configuration Examples Improving the Resilience of Your Network Enhancing the Performance of Your Network...
10/100 Switch, such as the Switch Example 4200 Series stack, can segment a network of shared 10 Mbps and 100 Mbps connections. There is a 10/100 shared segment on each floor, and these segments are connected to the Switch which is positioned in the basement.
Switch 4200 Series can be used Example for a group of users that require dedicated 10 Mbps or 100 Mbps connections to the desktop. The Switch 4200 Series stack has a 1000BASE-T Module fitted that allows it to provide a Gigabit Ethernet link to a Switch 4900 in the basement.
Spanning Tree Protocol (STP). Aggregated links Network have also been setup from the Core Switch, this increases the bandwidth available for the backbone connection, and also provides extra resilience. Figure 25 Network set up to provide resilience...
Network All ports are auto-negotiating and smart auto-sensing and will therefore pass data across the network at the optimum available speed and duplex mode. Flow control will help avoid packet loss during periods of network congestion. A Gigabit Ethernet backbone is set up between the Switch 4900 and each Switch in the workgroups to increase the bandwidth, and therefore the overall network performance.
Page 86
B: N PPENDIX ETWORK ONFIGURATION XAMPLES...
IP A DDRESSING This chapter provides some background detail on the IP information that needs to be assigned to your Switch to enable you to manage it across a network. The topics covered are: IP Addresses Subnets and Subnet Masks...
CAUTION: If your network has a connection to the external IP network, you must apply for a registered IP address. This registration system ensures that every IP address used is unique; if you do not have a registered IP address, you may be using an identical address to someone else and your network will not operate correctly.
Page 89
The actual IP address is a 32-bit number that is stored in binary format. These 32 bits are segmented into 4 groups of 8 bits — each group is referred to as a field or an octet. Decimal notation converts the value of each field into a decimal number, and the fields are separated by dots.
The IP address can also contain a subnetwork part at the beginning of the host part of the IP address. Thus, you can divide a single Class A, B, or C network internally, allowing the network to appear as a single network to other external networks.
Default Gateways A gateway is a device on your network which is used to forward IP packets to a remote destination. An alternative name for a gateway is a Router. “Remote” refers to a destination device that is not directly attached to the same network segment as the source device.
The 3Com network management application used to manage 3Com’s Supervisor networking solutions. 10BASE-T The IEEE specification for 10 Mbps Ethernet over Category 3, 4 or 5 twisted pair cable. 100BASE-FX The IEEE specification for 100 Mbps Fast Ethernet over fiber-optic cable.
Page 94
Carrier-sense Multiple Access with Collision Detection. The protocol defined in Ethernet and IEEE 802.3 standards in which devices transmit only after finding a data channel clear for a period of time. When two devices transmit simultaneously, a collision occurs and the colliding...
Page 95
Domain Name System. This system maps a numerical Internet Protocol (IP) address to a more meaningful and easy-to-remember name. When you need to access another device on your network, you enter the name of the device, instead of its IP address.
Page 96
Contrast with full duplex. A device that regenerates LAN traffic so that the transmission distance of that signal can be extended. Hubs are similar to repeaters, in that they connect LANs of the same type; however they connect more LANs than a repeater and are generally more sophisticated.
Page 97
The Protocol protocol allows a host to inform its local router that it wishes to receive transmissions addressed to a specific multicast group. Based on group membership information learned from the IGMP, a router is able to determine which if any multicast traffic needs to be forwarded to each of its subnetworks.
Page 98
A system that allows a network device to only forward multicast traffic to an endstation if it has registered that it would like to receive that traffic. Network Interface Card. A circuit board installed in an endstation that allows it to be connected to a network.
Page 99
Service Access Point. A well-defined location that identifies the user of services of a protocol entity. segment A section of a LAN that is connected to the rest of the network using a switch or bridge. server A computer in a network that is shared by multiple endstations. Servers provide endstations with access to shared network services such as computer files and printer queues.
Page 100
See Spanning Tree Protocol (STP). subnet mask A subnet mask is used to divide the device part of the IP address into two further parts. The first part identifies the subnet number. The second part identifies the device on that subnet.
Page 101
Switch. traffic classification Traffic can be classified using one or more of types of traffic classifiers. A classifier detects the packet attributes and classifies the traffic accordingly.
Page 103
17, 22 Gigabit Ethernet configuration rules 79 glossary 95 bandwidth 21 BOOTP 16, 74 BPDUs. See Bridge Protocol Data Units Hardware Status Monitoring 62 Bridge Identifier 43 Hello BPDUs 44 Bridge Protocol Data Units 43 History (RMON group) 59...
Page 104
Switch 4200 55 division of network and host 90 example 92 creating profiles 56 obtaining 90 How traffic is processed to provide QoS 55 subnet mask 92 service levels 56 subnetwork portion 92 traffic classification 55...
Page 105
93 subnets 92 subnetworking defined 92 subnet mask 92 sub-networks. See subnets Switch Database 49 topology rules for Fast Ethernet 80 topology rules with full duplex 81 traffic classification 802.1D 52 traffic prioritization 51 802.1D 52 VLANs 65 802.1Q tagging 69...