Table of Contents

Advertisement

Quick Links

®
http://www.3com.com/
Part No. DUA1770-5AAA01
Published January 2000
SuperStack
Switch 9100

User Guide

II
®

Advertisement

Table of Contents
loading

Summary of Contents for 3Com 9100

  • Page 1: User Guide

    SuperStack ® Switch 9100 ® User Guide http://www.3com.com/ Part No. DUA1770-5AAA01 Published January 2000...
  • Page 2 3Com Technologies. Santa Clara, California 3Com Technologies reserves the right to revise this documentation and to make changes in content from time 95052-8145 to time without obligation on the part of 3Com Technologies to provide notification of such revision or change.
  • Page 3: Table Of Contents

    UIDE Terminology Conventions Related Documentation Year 2000 Compliance Product Registration 9100 O WITCH VERVIEW About the Switch 9100 Summary of Features Port Connections Full-duplex Load Sharing Switch Operation Virtual LANs (VLANs) Spanning Tree Protocol (STP) Quality of Service (QoS) Network Configuration Example...
  • Page 4 Configuring Management Access Default Accounts Changing the Default Password Creating a Management Account Viewing Accounts Deleting an Account Methods of Managing the Switch 9100 Using the Console Interface Creating an Access Profile Access Profile Rules Access Profile Example Using Telnet...
  • Page 5 Accessing Switch Agents Supported MIBs Configuring SNMP Settings Displaying SNMP Settings Resetting and Disabling SNMP Checking Basic Connectivity Configuring Switch 9100 Port Speed and Duplex Setting 100/1000BASE-T Ports 1000BASE-SX Ports Enabling Autonegotiation Flow Control Switch 9100 Port Commands Load Sharing on the Switch 9100...
  • Page 6 Spanning Switches with Port-Based VLANs Tagged VLANs Uses of Tagged VLANs Assigning a VLAN Tag Mixing Port-Based and Tagged VLANs Protocol-Based VLANs Predefined Protocol Filters Defining Protocol Filters Deleting a Protocol Filter Precedence of Tagged Packets Over Protocol Filters VLAN Names Default VLAN Configuring VLANs on the Switch VLAN Configuration Examples...
  • Page 7 Configuring STP on the Switch STP Configuration Example Displaying STP Settings Disabling and Resetting STP UALITY OF ERVICE Overview of Quality of Service Building Blocks QoS Profiles Modifying a QoS Profile The Blackhole QoS Profile Traffic Groupings and Creating a QoS Policy MAC-Based Traffic Groupings Permanent MAC addresses Dynamic MAC Addresses...
  • Page 8 Real-Time Display Remote Logging Logging Commands RMON About RMON About the RMON Groups Statistics History Alarms Events Benefits of RMON Improving Efficiency Allowing Proactive Management Reducing the Traffic Load RMON and the Switch RMON Features of the Switch Configuring RMON Event Actions SING THE NTERFACE...
  • Page 9 World Wide Web Site 3Com Knowledgebase Web Services 3Com FTP Site 3Com Bulletin Board Service Access by Analog Modem Access by Digital Modem 3Com Facts Automated Fax Service Support from Your Network Supplier Support from 3Com Returning Products for Repair...
  • Page 10 LOSSARY NDEX NDEX OF OMMANDS ORPORATION IMITED ARRANTY EMC S TATEMENTS...
  • Page 11: About This Guide

    Terminology Throughout this guide, the term Switch 9100 is used to refer to the SuperStack II Switch 9100. For definitions of other terms used in this guide, refer to the “Glossary,”...
  • Page 12: Conventions

    BOUT UIDE Conventions Table 1 and Table 2 list conventions that are used throughout this guide. Table 1 Notice Icons Icon Notice Type Description Information note Information that describes important features or instructions Caution Information that alerts you to potential loss of data or potential damage to an application, system, or device Warning Information that alerts you to potential personal injury...
  • Page 13: Related Documentation

    For information on Year 2000 compliance and 3Com products, visit the Compliance 3Com Year 2000 Web page: http://www.3com.com/products/yr2000.html Product You can now register your SuperStack II Switch on the 3Com Web site to Registration receive up-to-date information on your product: http://www.3com.com/productreg/pdd...
  • Page 14 BOUT UIDE...
  • Page 15: Switch 9100 Overview

    9100 O WITCH VERVIEW This chapter describes the following: Switch 9100 features How to use the Switch 9100 in your network configuration Switch 9100 front view Switch 9100 rear view Factory default settings About the Network managers are currently faced with the challenge of creating...
  • Page 16: Port Connections

    RJ-45 connectors, and supports two 1000BASE-SX ports using standard MT-RJ connectors. You can connect other 100/1000BASE-TX devices (such as 100 Mbps or 100/1000 Mbps switches or modules) to the Switch 9100. You can also connect Switch 9100 devices to each other.
  • Page 17: Full-Duplex

    Virtual LANs (VLANs) The Switch 9100 has a Virtual LAN (VLAN) feature that allows you to build your network segments without being restricted by physical connections. A VLAN is a group of location- and topology-independent devices that communicate as if they are on the same physical Local Area Network (LAN) .
  • Page 18: Spanning Tree Protocol (Stp)

    For more information on QoS, refer to Chapter Network This section describes where to position the Switch 9100 within your Configuration network. One common use of the Switch 9100 is on a Gigabit Ethernet Example backbone. Figure 1 shows an example of a Gigabit Ethernet backbone...
  • Page 19 Figure 1 Switch 9100 used in a backbone configuration The Switch 3300 on each floor has a 1000Mbps full-duplex link to the Switch 9100. Two servers on one floor of the building are connected to the Switch 9100 by way of two Gigabit Ethernet links. The two Gigabit Ethernet fiber ports on the Switch 9100 connect into a Gigabit Ethernet campus backbone.
  • Page 20: Switch 9100 Front View

    VERVIEW In addition to providing a Gigabit backbone between Fast Ethernet workgroups, Gigabit Ethernet equipped file servers and services may be directly attached to the Switch 9100 providing improved performance to the Fast Ethernet desktop. Switch 9100 Front Figure 2 shows the Switch 9100 front view.
  • Page 21: Leds

    The Switch 9100 has six autosensing 100/1000BASE-TX ports using standard RJ-45 connectors. It also has two 1000BASE-SX ports that use standard MT-RJ connectors. The Switch 9100 ports support the media types and distances listed in Table Table 3 Media Types and Distances...
  • Page 22: Switch 9100 Rear View

    Either or both LEDs green indicates the Switch 9100 is powered up. Yellow A yellow power LED indicates a power, overheat, or fan failure on the corresponding PSU. Both LEDs off indicates the Switch 9100 is powered off. MGMT Green The Switch 9100 is operating normally.
  • Page 23: Power Sockets

    The rear panel has the following features: Power Sockets The Switch 9100 has two, fully redundant, load-sharing power supplies. Both automatically adjust to the supply voltage. The power supplies operate down to 90 V. The fuse is suitable for both 110 V AC and 220–240 V AC operation.
  • Page 24 1: S 9100 O HAPTER WITCH VERVIEW Table 5 Switch 9100 Factory Defaults (continued) Item Default Setting Spanning Tree Protocol Disabled for the switch; enabled for each port in the STPD 802.1p priority Recognition enabled 802.3x flow control Enabled on Gigabit Ethernet ports 802.1Q tagging...
  • Page 25: Installation And Setup

    Sicherheitsanweisungen, die in Appendix A (Anhang A) in diesem Handbuch aufgefuehrt sind. Determining the The Switch 9100 is suited for use in the office, where it can be Switch 9100 free-standing or mounted in a standard 19-inch equipment rack. Location Alternatively, the device can be rack-mounted in a wiring closet or equipment room.
  • Page 26: Configuration Rules For Ethernet

    Ethernet Switch 9100 are described in Chapter Installing the The Switch 9100 can be mounted in a rack, or placed free-standing on a Switch 9100 tabletop. Rack Mounting The Switch 9100 is 2U high and will fit in most standard 19-inch racks.
  • Page 27: Free-Standing

    7 Connect cables. Free-Standing The Switch 9100 is supplied with four self-adhesive rubber pads. Apply the pads to the underside of the device by sticking a pad in the marked area at each corner of the switch.
  • Page 28: Stacking The Switch And Other Devices

    Connecting Connection to the console port is used for direct local management. The Equipment to the Switch 9100 console port settings are set as follows: Console Port Baud rate — 9600 Data bits — 8 Stop bit —...
  • Page 29 DSR (data set ready) RTS (request to send) CTS (clear to send Figure 5 shows the pin-outs for a 9-pin to RS-232 25-pin null modem cable. Switch 9100 PC/Terminal Cable connector: 9-pin female Cable connector: 25-pin male/female Screen Shell Screen...
  • Page 30: Powering-Up The Switch

    The switch automatically powers-up once it has been connected to the wall outlet. Checking the After turning on power to the Switch 9100, the device performs a Power Installation On Self-Test (POST). During the POST, all ports are temporarily disabled, the packet LED is off,...
  • Page 31: Logging On For The First Time

    Logging on for the First Time If the switch passes the POST, the MGMT LED stops blinking and remains green. If the switch fails the POST, the MGMT LED shows a solid yellow light. Logging on for the After the switch has completed the POST, it is operational. Once First Time operational, you can log on to the switch and configure an IP address for the default VLAN (named default ).
  • Page 32 2: I HAPTER NSTALLATION AND ETUP...
  • Page 33: Accessing The Switch

    CCESSING THE WITCH This chapter provides the following required information to begin managing the Switch 9100: Understanding the command syntax Line-editing commands Command history substitution Configuring the switch for management Switch management methods Configuring SNMP Checking basic connectivity Enabling and disabling individual ports...
  • Page 34: Understanding The Command Syntax

    3: A HAPTER CCESSING THE WITCH Understanding the This section describes the steps to take when entering a command. Refer Command Syntax to the sections that follow for detailed information on using the command-line interface. To use the command-line interface (CLI), follow these steps: 1 When entering a command at the prompt, ensure that you have the appropriate privilege level.
  • Page 35: Abbreviated Syntax

    Once you have created the VLAN with a unique name, you can then eliminate the keyword from all other commands that require the vlan name to be entered. For example, instead of entering the Switch 9100 command config vlan engineering delete port 1-3,6 you could enter the following shortcut:...
  • Page 36: Symbols

    3: A HAPTER CCESSING THE WITCH Symbols You may see a variety of symbols shown as part of the command syntax. These symbols explain how to enter the command, and you do not type them as part of the command itself. Table 7 summarizes command syntax symbols.
  • Page 37: Line-Editing Keys

    Line-Editing Keys Line-Editing Keys Table 8 describes the line-editing keys available using the CLI. Table 8 Line-Editing Keys Key(s) Description Backspace Deletes character to the left of cursor and shifts the remainder of line to left. Delete or [Ctrl] + D Deletes character under cursor and shifts the remainder of line to left.
  • Page 38 3: A HAPTER CCESSING THE WITCH Table 9 Common Commands (continued) Command Description Creates a VLAN. create vlan <name> Configures a user account password. config account <username> {encrypted} Passwords must have a minimum of four {<password>} characters and can have a maximum of 12 characters.
  • Page 39 Common Commands Table 9 Common Commands (continued) Command Description Enables a timer that disconnects all sessions enable idletimeout (both Telnet and console) after 20 minutes of inactivity. The default setting is disabled. Enables Telnet access to the switch. By enable telnet {access-profile default, Telnet is enabled with no access <access_profile>...
  • Page 40: Configuring Management Access

    If you specify the keyword all, the user account information is reset as well. Displays the user-configured banner. show banner Configuring The Switch 9100 supports the following two level levels of management: Management User Access Administrator A user-level account has viewing access to all manageable parameters,...
  • Page 41: Default Accounts

    Configuring Management Access If an asterisk (*) appears in front of the command-line prompt, it indicates that you have outstanding configuration changes that have not been saved. For example: *3C17705:19# For more information on saving configuration changes, refer to Chapter Default Accounts By default, the switch is configured with two accounts, as shown in Table...
  • Page 42: Creating A Management Account

    3: A HAPTER CCESSING THE WITCH To add a password to the default user account, follow these steps: 1 Log in to the switch using the name admin . 2 At the password prompt, press [Return], or enter the password that you have configured for the admin account.
  • Page 43: Deleting An Account

    The CLI built into the switch is accessible by way of the 9-pin, RS-232 port Using the Console Interface labelled console , located on the back of the Switch 9100. For more information on the console port pinouts, refer to Chapter 2. Once the connection is established, you will see the switch prompt and you may log in.
  • Page 44: Creating An Access Profile

    3: A HAPTER CCESSING THE WITCH The most common applications that use access profiles allow you to remotely manage the switch across the network, for example: SNMP read access SNMP read and write access Telnet Web access Creating an Access Access profiles are created to specifically permit or deny users access to an application.
  • Page 45: Access Profile Rules

    Using Access Profiles The subnet mask specified in the access profile command is interpreted as a reverse mask . A reverse mask indicates the bits that are significant in the IP address. In other words, a reverse mask specifies the part of the address that must match the IP address to which the profile is applied.
  • Page 46: Using Telnet

    3: A HAPTER CCESSING THE WITCH To view the Telnet configuration, type: show management Using Telnet Any workstation with a Telnet facility should be able to communicate with the switch over a TCP/IP network. Up to eight active Telnet sessions can access the switch concurrently. If are enabled, the Telnet connection will time out after idle timeouts 20 minutes of inactivity.
  • Page 47: Manually Configuring The Ip Settings

    Using Telnet Subnet address mask (optional) The switch MAC address is found on the rear label of the switch. Once this is done, the IP address and subnetwork mask for the switch will be downloaded automatically. You can then start managing the switch without further configuration.
  • Page 48 3: A HAPTER CCESSING THE WITCH To manually configure the IP settings, perform the following steps: 1 Connect a terminal or workstation running terminal-emulation software to the console port. 2 At your terminal, press [Return] one or more times until you see the login prompt.
  • Page 49: Disconnecting A Telnet Session

    Using Telnet For example: config iproute add default 123.45.67.1 7 Save your configuration changes so that they will be in effect after the next switch reboot, by typing save For more information on saving configuration changes, refer to Chapter 8 When you are finished using the facility, log out of the switch by typing logout quit Disconnecting a...
  • Page 50: Ip Host Configuration Commands

    3: A HAPTER CCESSING THE WITCH IP Host Table 12 describes the commands that are used to configure IP settings Configuration on the switch. Commands Table 12 IP Host Configuration Commands Command Description Adds a permanent entry to the Address config iparp add <ipaddress>...
  • Page 51: Disabling Web Access

    Using SNMP The default home page of the switch can be accessed using the following command: http://<ipaddress> When you access the home page of the switch, you are presented with the Logon screen. For more information on using the Web Interface, refer to Chapter By default, Web access is enabled on the switch.
  • Page 52: Configuring Snmp Settings

    3: A HAPTER CCESSING THE WITCH Configuring SNMP The following SNMP parameters can be configured on the switch: Settings Authorized trap receivers — An authorized trap receiver can be one or more network management stations on your network. The switch sends SNMP traps to all trap receivers.
  • Page 53: Displaying Snmp Settings

    Using SNMP Table 13 SNMP Configuration Commands (continued) Command Description Applies an access profile for SNMP access. config snmp access-profile [readonly | You can create different access profiles for readwrite] {<access_profile> | none} readonly and readwrite access to the switch. The none option removes any previously configured access profile assignment.
  • Page 54: Resetting And Disabling Snmp

    3: A HAPTER CCESSING THE WITCH Login statistics Access profile assignments Resetting and To reset and disable SNMP settings, use the commands in Table Disabling SNMP Table 14 SNMP Reset and Disable Commands Command Description Disables SNMP on the switch. Disabling SNMP access does disable snmp access not affect the SNMP configuration (for example, community strings).
  • Page 55: Configuring Switch 9100 Port Speed And Duplex Setting

    Switch 9100 Ports [enable | disable] ports <portlist> For example, to disable ports 1, 3, and 5 through 7 on the Switch 9100, enter the following: disable ports 1,3,5-7 Even though a port is disabled, the link remains enabled for diagnostic purposes.
  • Page 56: Flow Control

    If autonegotiation is set to off, flow control is disabled. When autonegotiation is turned on, flow control is enabled. Switch 9100 Port Table 16 describes the Switch 9100 port commands. Commands Table 16 Switch 9100 Port Commands Command Description Enables MAC address learning on one or more enable learning ports <portlist>...
  • Page 57 Switch 9100 Port Commands Table 16 Switch 9100 Port Commands (continued) Command Description Disables MAC address learning on one or more ports disable learning ports <portlist> for security purposes. If MAC address learning is disabled, only broadcast traffic and packets destined to a permanent MAC address matching that port number, are forwarded.
  • Page 58: Load Sharing On The Switch 9100

    This feature is supported between Switch 9100 devices only, but may be compatible with third-party “trunking” or sharing algorithms. Check with your supplier for more information.
  • Page 59: Configuring Switch 9100 Load Sharing

    However, the address-based algorithm has a more even distribution and is, therefore, the recommended choice. Configuring To set up the Switch 9100 to load share among ports, you must create a load-sharing group of ports. The first port in the load-sharing group is Switch 9100 Load Sharing configured to be the “master”...
  • Page 60: Verifying The Load Sharing Configuration

    Configuration logical port identity. Switch 9100 Port-mirroring configures the switch to copy all traffic associated with Port-Mirroring one or more ports to a monitor port on the switch. The monitor port can be connected to a network analyzer or RMON probe for packet analysis.
  • Page 61: Port-Mirroring Commands

    Switch 9100 Port-Mirroring Port-Mirroring Switch 9100 port-mirroring commands are described in Table Commands Table 17 Switch 9100 Port-Mirroring Configuration Commands Command Description Dedicates a port to be the mirror output port. enable mirroring to <port> Adds a single mirroring filter definition. Up to eight config mirroring add [mac mirroring definitions can be added.
  • Page 62 3: A HAPTER CCESSING THE WITCH...
  • Page 63: Virtual Lan S (Vlan S )

    (VLAN IRTUAL Setting up Virtual Local Area Networks (VLANs) on the switch eases many time-consuming tasks of network administration while increasing efficiency in network operations. This chapter describes the concept of VLANs and explains how to implement VLANs on the switch. Overview of Virtual The term “VLAN”...
  • Page 64: Igmp Snooping

    4: V (VLAN HAPTER IRTUAL VLANs ease the change and movement of devices. With traditional networks, network administrators spend much of their time dealing with moves and changes. If users move to a different subnetwork, the addresses of each endstation must be updated manually.
  • Page 65 IGMP Overview the switch is configured to perform IGMP snooping and there is no other reliable querier on the network. IGMP configuration commands are described in Table Table 18 IGMP Configuration Commands Command Description Enables IGMP. If no VLAN is specified, IGMP is enable igmp {vlan <name>} enabled on all interfaces.
  • Page 66: Types Of Vlans

    4: V (VLAN HAPTER IRTUAL Table 18 IGMP Configuration Commands (continued) Command Description Configures the IGMP snooping timers. Timers config igmp snooping timer should be set to approximately 2.5 times the <router_timeout> <host_timeout> router query interval in use on the network. Specify the following: router_timeout —...
  • Page 67: Spanning Switches With Port-Based Vlans

    Finance Sales 91_00 Figure 7 Example of a port-based VLAN on the Switch 9100 Even though they are physically connected to the same switch, in order for the members of the different VLANs to communicate, the traffic must go through an IP router.
  • Page 68 IRTUAL Figure 8 illustrates a single VLAN that spans two Switch 9100 devices. All ports on both switches belong to VLAN Sales . The two switches are connected using port 1 on Switch 1, and port 6 on Switch 2.
  • Page 69: Tagged Vlans

    Switch 1 Switch 2 91_005 Figure 9 Two port-based VLANs spanning two Switch 9100 devices VLAN Accounting spans Switch 1 and Switch 2 by way of a connection between Switch 1, port 1 and Switch 2, port 3. VLAN Engineering spans Switch 1 and Switch 2 by way of a connection between Switch 1, port 5, and Switch 2, port 6.
  • Page 70: Uses Of Tagged Vlans

    4: V (VLAN HAPTER IRTUAL Uses of Tagged VLANs Tagging is most commonly used to allow VLANs to span switches. The switch-to-switch connections are typically called trunks . Using tags, multiple VLANs can span multiple switches using one or more trunks. In a port-based VLAN, each VLAN requires its own pair of trunk ports, as shown in Figure...
  • Page 71 Types of VLANs Switch 1 = Marketing = Sales 802.1Q = Tagged port Tagged server Switch 2 91_006 Figure 10 Physical diagram of tagged and untagged traffic Figure 11 shows a logical diagram of the same network. Sales Marketing Switch 1 Port 1 * Switch 1 Switch 2...
  • Page 72: Mixing Port-Based And Tagged Vlans

    4: V (VLAN HAPTER IRTUAL Figure 10 Figure The trunk port on each switch carries traffic for both VLAN Marketing and VLAN Sales . The trunk port on each switch is tagged. The server connected to port 1 on Switch 1 has a NIC that supports 802.1Q tagging.
  • Page 73: Predefined Protocol Filters

    Types of VLANs 192.207.35.1 192.207.36.1 My Company 192.207.35.0 192.207.36.0 Finance Personnel = IP traffic = All other traffic 91_008 Figure 12 Protocol-based VLANs Predefined Protocol Filters The following protocol filters are predefined on the switch: NetBIOS DECNet IPX_8022 IPX_SNAP AppleTalk...
  • Page 74: Defining Protocol Filters

    4: V (VLAN HAPTER IRTUAL Defining Protocol Filters If necessary, you can define a customized protocol filter based on EtherType, Logical Link Control (LLC), and/or Subnetwork Access Protocol (SNAP). Up to six protocols may be part of a protocol filter. To define a protocol filter, do the following: 1 Create a protocol using the following command: create protocol <protocol_name>...
  • Page 75: Deleting A Protocol Filter

    VLAN Names For more information on SNAP for Ethernet protocol types, see TR 11802-5:1997 (ISO/IEC) [ANSI/IEEE std. 802.1H, 1997 Edition]. Deleting a Protocol Filter If a protocol filter is deleted from a VLAN, the VLAN is assigned a protocol filter of .
  • Page 76: Configuring Vlans On The Switch

    4: V (VLAN HAPTER IRTUAL Configuring VLANs This section describes the commands associated with setting up VLANs on the Switch on the switch. Configuring a VLAN involves the following steps: 1 Create and name the VLAN. 2 Assign an IP address and mask (if applicable) to the VLAN, if needed. Each IP address and mask assigned to a VLAN must represent a unique IP subnet.
  • Page 77: Vlan Configuration Examples

    Assigns a numerical VLANid. The valid range is config vlan <name> tag <vlanid> from 1 to 4095. VLAN Configuration The following Switch 9100 example creates a port-based VLAN named accounting , assigns the IP address 132.15.121.1, and assigns ports 1, 2, Examples 3, and 6 to it: create vlan accounting config accounting ipaddress 132.15.121.1...
  • Page 78: Displaying Vlan Settings

    HAPTER IRTUAL The following Switch 9100 example creates a VLAN named sales , with the VLANid 120. The VLAN uses both tagged and untagged ports. Ports 1 through 3 are tagged, and ports 4 and 7 are untagged. Note that when not explicitly specified, ports are added as untagged.
  • Page 79: Deleting Vlans

    Deleting VLANs Ports assigned Tagged/untagged status for each port How the ports were added to the VLAN (manually or by GVRP) To display protocol information, use the following command: show protocol {<protocol>} This command displays protocol information, including the show following: Protocol name List of protocol fields...
  • Page 80 4: V (VLAN HAPTER IRTUAL...
  • Page 81: Forwarding

    (FDB) ORWARDING ATABASE This chapter describes the contents of the forwarding database (FDB), how the FDB works, and how to configure the FDB. Overview of the The switch maintains a database of all media access control (MAC) addresses received on all of its ports. It uses the information in this database to decide whether a frame should be forwarded or filtered.
  • Page 82: How Fdb Entries Get Added

    5: F (FDB) HAPTER ORWARDING ATABASE way of the command-line interface are stored as permanent. The switch can support a maximum of 64 permanent entries. Once created, permanent entries stay the same as when they were created. For example. the permanent entry store is not updated when any of the following take place: A VLAN is deleted.
  • Page 83: Configuring Fdb Entries

    Configuring FDB Entries Configuring FDB To configure entries in the FDB, use the commands listed in Table Entries Table 21 FDB Configuration Commands Command Description Creates an FDB entry. Specify the following: create fdbentry <mac_address> vlan <name> [blackhole | mac_address — Device MAC address, using <portlist>...
  • Page 84: Displaying Fdb Entries

    5: F (FDB) HAPTER ORWARDING ATABASE Port number for this device is 4. This example associates the QoS profile qp2 with a dynamic entry that will be learned by the FDB: create fdbentry 00:D0:96:BF:31:50 vlan net34 dynamic qosprofile qp2 This entry has the following characteristics: MAC address is 00D096BF3150.
  • Page 85: Removing Fdb Entries

    Removing FDB Entries Removing FDB You can remove one or more specific entries from the FDB, or you can Entries clear the entire FDB of all entries by using the commands listed in Table Table 22 Removing FDB Entry Commands Command Description Deletes a permanent FDB entry.
  • Page 86 5: F (FDB) HAPTER ORWARDING ATABASE...
  • Page 87: Spanning Tree Protocol (Stp)

    Using the Spanning Tree Protocol (STP) functionality of the switch makes your network more fault tolerant. The following sections explain more about STP and the STP features supported by the Switch 9100. STP is a part of the 802.1D bridge specification defined by the IEEE Computer Society.
  • Page 88 6: S (STP) HAPTER PANNING ROTOCOL Figure 13 Network with an illegal topology This configuration is illegal because it creates loops that cause the network to overload. However, STP allows you to use this configuration because STP detects duplicate paths and immediately prevents (or blocks ) one of them from forwarding traffic.
  • Page 89: How Stp Works

    Overview of the Spanning Tree Protocol If the link through Bridge C fails, as shown in Figure 15, the STP system reconfigures the network so that traffic from segment 2 flows through Bridge B. Figure 15 Traffic flowing through Bridge B STP has the following three stages of operation: How STP Works Initialization...
  • Page 90: Stabilization

    6: S (STP) HAPTER PANNING ROTOCOL The Root Bridge generates BPDUs on all ports at a regular interval known as the Hello Time. All other bridges in the network have a Root Port. This is the port that costs the least in getting to the Root Bridge, and it is used for receiving the BPDUs initiated by the Root Bridge.
  • Page 91: Defaults

    STP Configurations Care must be taken to ensure that multiple STPD instances within a single switch do not see each other in the same broadcast domain. This could happen if, for example, another external bridge is used to connect VLANs belonging to separate STPDs.
  • Page 92 6: S (STP) HAPTER PANNING ROTOCOL Sales, Personnel, Marketing Manufacturing, Engineering, Marketing Switch A Switch Y Switch B Switch Z STPD 1 STPD 2 Switch M Sales, Personnel, Manufacturing, Engineering, Marketing 91_009 Figure 16 Multiple Spanning Tree Domains When the switches in this configuration start up, STP configures each STPD such that there are no active loops in the topology.
  • Page 93 STP Configurations Marketing & Sales Marketing, Sales & Engineering Switch 1 Switch 3 Switch 2 Sales & Engineering 91_010 Figure 17 Tag-based STP configuration The tag-based network in Figure 17 has the following configuration: Switch 1 contains VLAN Marketing and VLAN Sales . Switch 2 contains VLAN Engineering and VLAN Sales .
  • Page 94: Configuring Stp On The Switch

    6: S (STP) HAPTER PANNING ROTOCOL Configuring STP on STP configuration involves the following actions: the Switch Create one or more STP domains using the following command: create stpd <stpd_name> STPD, VLAN, and QoS profile names must all be unique. For example, a name used to identify a VLAN cannot be used when you create an STPD or a QoS profile.
  • Page 95 Configuring STP on the Switch Table 23 shows the commands used to configure STP. Table 23 STP Configuration Commands Command Description Creates an STPD. When created, an STPD has the create stpd <stpd_name> following default parameters: Bridge priority — 32,768 Hello time —...
  • Page 96: Stp Configuration Example

    6: S (STP) HAPTER PANNING ROTOCOL Table 23 STP Configuration Commands (continued) Command Description Specifies the path cost of the port in this STPD. config stpd <stpd_name> port cost <value> <portlist> The range is 1 through 65,535. The switch automatically assigns a default path cost based on the speed of the port, as follows: For a 100Mbps port, the default cost is 19.
  • Page 97: Disabling And Resetting Stp

    Disabling and Resetting STP To display the STP state of a port, use the following command: show stpd <stpd_name> port <portlist> This command displays the following: STPD port configuration STPD state (Root Bridge, and so on) STPD port state (forwarding, blocking, and so on) Disabling and To disable STP or return STP settings to their defaults, use the commands Resetting STP...
  • Page 98 6: S (STP) HAPTER PANNING ROTOCOL...
  • Page 99: Quality Of Service (Q O S)

    This chapter describes the concept of Quality of Service (QoS) and explains how to configure QoS on the switch. Overview of QoS is a feature of the Switch 9100 that allows you to specify different Quality of Service service levels for traffic traversing the switch. QoS is an effective control mechanism for networks that have heterogeneous traffic patterns.
  • Page 100: Qos Profiles

    7: Q HAPTER UALITY OF ERVICE The next sections describe how QoS profiles are used and modified. After this, various traffic groupings are explained and QoS profiles are assigned to the traffic groupings. QoS Profiles Eight default QoS profiles are provided that can be modified, but not deleted.
  • Page 101: Modifying A Qos Profile

    QoS Profiles A QoS profile does not alter the behavior of the switch until it is assigned to a traffic grouping. The settings of the default profiles are shown in Table Table 25 Default QoS Profiles Profile Name Priority Minimum Bandwidth Maximum Bandwidth 100% LowHi 100%...
  • Page 102: The Blackhole Qos Profile

    7: Q HAPTER UALITY OF ERVICE The Blackhole QoS In the description of various options for configuring Policy-Based QoS, Profile there is an option to specify in place of a named QoS profile. blackhole As its name implies, a traffic grouping assigned to the “blackhole” goes nowhere, and is not forwarded by the switch.
  • Page 103: Mac-Based Traffic Groupings

    Traffic Groupings and Creating a QoS Policy Table 26 Traffic Groupings by Precedence (continued) Destination Address Packet Priority Physical/Logical MAC-based Groupings Groupings Groupings Blackhole Broadcast/unknown rate limiting MAC-Based Traffic QoS profiles can be assigned to destination MAC addresses. The various Groupings options that fall into this category are as follows: Permanent...
  • Page 104: Blackhole

    7: Q HAPTER UALITY OF ERVICE The command to clear the FDB is as follows: clear fdb Blackhole Using the option configures the switch to not forward any blackhole packets to the destination MAC address on any ports for the VLAN specified.
  • Page 105: 802.1P Packets

    Traffic Groupings and Creating a QoS Policy 802.1p Packets When traffic that contains 802.1p prioritization bits is seen, the traffic is mapped to the eight default QoS profiles. No user configuration is required for this type of traffic grouping. Table 27 describes 802.1p values and their associated QoS profiles.
  • Page 106: Source Port

    7: Q HAPTER UALITY OF ERVICE Source Port A source port traffic grouping implies that any traffic sourced from this physical port uses the indicated QoS profile when the traffic is transmitted out any other port. To configure a source port traffic grouping, use the following command: config ports <portlist>...
  • Page 107: Verifying Configuration And Performance

    Verifying Configuration and Performance Verifying The following information is used to verify the QoS configuration and Configuration and monitor the use of the QoS policies that are in place. Performance Displaying QoS To display QoS information on the switch, use the following command: Information show qosprofile <qosname>...
  • Page 108: Modifying A Qos Policy

    7: Q HAPTER UALITY OF ERVICE QoS monitor sampling is configured as follows: The port is monitored for 20 seconds before the switch moves on to the next port in the list. A port is sampled for five seconds before the packets per second (pps) value is displayed on the screen.
  • Page 109: Configuring Qos

    Configuring QoS For physical and logical groupings of a source port or VLAN, re-apply the QoS profile to the source port or Vlan. You can also save and reboot the switch. Configuring QoS Table 29 describes the commands used to configure QoS. Table 29 QoS Configuration Commands Command Description...
  • Page 110 7: Q HAPTER UALITY OF ERVICE...
  • Page 111: Status Monitoring And Statistics

    The status monitoring facility provides information about the switch. This information may be useful for your technical support representative if you have a problem. The Switch 9100 includes many show commands that display information about different switch functions and facilities.
  • Page 112: The Switch

    8: S HAPTER TATUS ONITORING AND TATISTICS Table 30 describes commands that are used to monitor the status of show the switch. Table 30 Status Monitoring Commands Command Description Displays the current snapshot of the log. The priority show log {<priority>} option filters the log to display message with the selected priority or higher (more critical).
  • Page 113: Port Statistics

    Port Statistics Port Statistics The Switch 9100 provides a facility for viewing port statistic information. The summary information lists values for the current counter against each port on each operational module in the system, and it is refreshed approximately every two seconds. Values are displayed to nine digits of accuracy.
  • Page 114: Port Errors

    8: S HAPTER TATUS ONITORING AND TATISTICS Port Errors The switch keeps track of errors for each port. To view port transmit errors, use the following command: show ports <portlist> txerrors The following port transmit error information is collected by the system: Link Status —...
  • Page 115: Port Monitoring Display Keys

    Port Monitoring Display Keys Receive Alignment Errors (RX Align) — The total number of frames received by the port that occurs if a frame has a CRC error and does not contain an integral number of octets. Receive Frames Lost (RX Lost) — The total number of frames received by the port that were lost because of buffer overflow in the switch.
  • Page 116: Local Logging

    8: S HAPTER TATUS ONITORING AND TATISTICS Table 32 Fault Levels Assigned by the Switch Level Description Critical A desired switch function is inoperable. The switch may need to be reset. Warning A noncritical error that may lead to a function failure. Informational Actions and events that are consistent with expected behavior.
  • Page 117: Real-Time Display

    Logging Real-Time Display In addition to viewing a snapshot of the log, you can configure the system to maintain a running real-time display of log messages on the console. To turn on the log display, enter the following command: enable log display To configure the log display, use the following command: config log display {<priority>} is not specified, only messages of critical priority are...
  • Page 118: Logging Commands

    8: S HAPTER TATUS ONITORING AND TATISTICS Logging Commands The commands described in Table 34 allow you to configure logging options, reset logging options, display the log, and clear the log. Table 34 Logging Commands Command Description Enables logging CLI configuration commands to enable cli-config-logging the syslog for auditing purposes.
  • Page 119: Rmon

    You can only use the RMON features of the system if you have an RMON management application, such as the RMON application supplied with ® 3Com Transcend Enterprise Manager software, and have enabled RMON on the switch. RMON is the common abbreviation for the Remote Monitoring...
  • Page 120: About The Rmon Groups

    8: S HAPTER TATUS ONITORING AND TATISTICS About the RMON The IETF defines nine groups of Ethernet RMON statistics. The switch Groups supports the following four of these groups: Statistics History Alarms Events This section describes these groups, and discusses how they can be used. Statistics The RMON Ethernet Statistics group provides traffic and error statistics showing packets, bytes, broadcasts, multicasts, and errors on a LAN...
  • Page 121: Events

    RMON Events The Events group creates entries in an event log and/or sends SNMP traps to the management workstation. An event is triggered by an RMON alarm. The action taken can be configured to ignore it, to log the event, to send an SNMP trap to the receivers listed in the trap receiver table, or to both log and send a trap.
  • Page 122: Rmon And The Switch

    Implementing RMON in the switch means that all ports can have security features enabled. RMON Features of Table 35 details the RMON support provided by the Switch 9100. the Switch Table 35 RMON Support Supplied By the Switch 9100 RMON Group Support Supplied by the Switch The switch supports the EtherStats group.
  • Page 123: Configuring Rmon

    RMON When using the RMON features of the switch, you should note the following: After the default sessions are created, they have no special status. You can delete or change them as required. The greater the number of RMON sessions, the greater the burden on the management resources of the switch.
  • Page 124 8: S HAPTER TATUS ONITORING AND TATISTICS...
  • Page 125: Using The

    SING THE NTERFACE The Web Interface is device-management software running in the switch that allows you to access the switch over a TCP/IP network, using a standard Web browser. Any properly configured standard Web browser that supports frames and JavaScript (such as Netscape Navigator 3.0 or higher, or Microsoft Internet Explorer 3.0 or higher) can be used to manage the system.
  • Page 126: Setting Up Your Browser

    9: U HAPTER SING THE NTERFACE Setting Up Your In general, the default settings that come configured on your browser Browser work well with the Web Interface. The following are recommended settings that you can use to improve the display features and functionality of the Web Interface: After downloading a newer version of the switch image, clear the browser disk and memory cache to see the updated menu screens.
  • Page 127: Navigating The Web Interface

    Navigating the Web Interface If you have entered the name and password of an administrator-level account, you have access to all Web Interface pages. If you have used a user-level account name and password, you only have access to the Statistics and Support information.
  • Page 128: Content Frame

    9: U HAPTER SING THE NTERFACE Content Frame The content frame contains the main body of information in the Web Interface. For example, if you select an option from the Configuration task button, enter configuration parameters in the content frame. If you select the Statistics task button, statistics are displayed in the content frame.
  • Page 129: Saving Changes

    Saving Changes Saving Changes There are two ways to save your changes to non-volatile storage using the Web Interface: Select Save Configuration from the Configuration task button, Switch option. This field contains a drop-down list box that allows you to select either the primary or secondary configuration area.
  • Page 130 9: U HAPTER SING THE NTERFACE...
  • Page 131: Software Upgrade And Boot Options

    OFTWARE PGRADE AND PTIONS This chapter describes the procedure for upgrading the switch software image. This chapter also discusses how to save and load a primary and secondary image and configuration file on the switch. Downloading a The image file contains the executable code that runs on the switch. It New Image comes preinstalled from the factory.
  • Page 132: Rebooting The Switch

    10: S HAPTER OFTWARE PGRADE AND PTIONS The switch can store up to two images; a primary and a secondary. When you download a new image, you must select into which image space (primary or secondary) you want the new image to be placed. You can select which image the switch will load on the next reboot by using the following command: use image [primary | secondary]...
  • Page 133: Returning To Factory Defaults

    BootROM menu. Upgrading BootROM Upgrading BootROM is done using TFTP (from the CLI), after the switch has booted. Upgrade the BootROM only when asked to do so by a 3Com technical representative. To upgrade the BootROM, use the following command: download bootrom <ip_address>...
  • Page 134 10: S HAPTER OFTWARE PGRADE AND PTIONS To access the BootROM menu, follow these steps: 1 Attach to the console port of the switch, as described in Chapter 2 With the serial port connected to a properly configured terminal or terminal emulator, power cycle the switch while depressing the spacebar on the keyboard of the terminal.
  • Page 135: Boot Option Commands

    Boot Option Commands Boot Option Table 38 lists the commands associated with switch boot options. Commands Table 38 Boot Option Commands Command Description Displays the current configuration to the terminal. show configuration You can then capture the output and store it as a file.
  • Page 136 10: S HAPTER OFTWARE PGRADE AND PTIONS...
  • Page 137: A Safety Information

    You must read the following safety information before carrying out any installation or removal of components, or any maintenance procedures on the Switch 9100. WARNING: Warnings contain directions that you must follow for your personal safety. Follow all directions carefully.
  • Page 138: Important Safety Information

    Installation and removal of the unit must be carried out by qualified Information personnel only. If installing the Switch 9100 in a stack with SuperStack II units that are narrower than the 9100, the Switch 9100 unit must be installed below the narrower units.
  • Page 139: Lithium Battery

    † Impédance à la terre. U.K. only: The Switch 9100 is covered by Oftel General Approval, NS/G/12345/J/100003, for indirect connection to a public telecommunications system. This can only be achieved using the console port on the unit and an approved modem.
  • Page 140 A: S PPENDIX AFETY NFORMATION If service personnel disregard the instructions and attempt to replace the bq4830/DS1644, replace the lithium battery with the same or equivalent type, as recommended by the manufacturer. WARNING: There is danger of personal injury and explosion if battery is improperly discarded.
  • Page 141: L'information De Sécurité Importante

    Sécurité Importante personnel qualifié. Si vous entassez l'unité Switch avec les unités SuperStack II Hub, l'unité Switch 9100 doit être installée en dessous des unités Hub plus étroites. Vous devez mettre l’appareil à la terre (à la masse) ce groupe.
  • Page 142 A: S PPENDIX AFETY NFORMATION La prise secteur doit se trouver à proximité de l’appareil et son accès doit être facile. Vous ne pouvez mettre l’appareil hors circuit qu'en débranchant son cordon électrique au niveau de cette prise. L’appareil fonctionne à une tension extrêmement basse de sécurité qui est conforme à...
  • Page 143: Batterie Au Lithium

    L’information de Sécurité Importante Batterie au lithium Les batteries du dispositif bq4830/DS1644 est hermétiquement scellé et ne peut donc pas être remplacé par l'utilisateur. Si les techniciens de maintenance outrepassent ces instructions et tentent de remplacer la bq4830/DS1644, la batterie lithium doit être remplacée par une batterie identique ou de même type, selon les recommandations du fabricant.nne AVERTISSEMENT: Toute personne mettant au rebus la batterie de façon...
  • Page 144: Wichtige Sicherheitsinformationen

    Die Installation und der Ausbau des Geräts darf nur durch Sicherheitsinformat Fachpersonal erfolgen. ionen Wenn die Switch 9100 Einheit in einer Stapel mit anderen SuperStack II Hub Einheiten eingebaut werden soll, muß die Switch 9100 Einheit unter die schmaleren Hub Einheiten eingebaut werden. Das Gerät muß geerdet sein.
  • Page 145: Lithiumbatterie

    Wichtige Sicherheitsinformationen WARNHINWEIS: RJ-45 Ports. RJ-45-Anschlüsse. Dies sind abgeschirmte RJ-45-Datenbuchsen. Sie können nicht als Telefonanschlußbuchsen verwendet werden. An diesen Buchsen dürfen nur RJ-45-Datenstecker angeschlossen werden. Diese Datenstecker können entweder mit abgeschirmten oder unabgeschirmten Datenkabeln mit abgeschirmten oder unabgeschirmten Klinkensteckern verbunden werden. WARNUNG: Faseroptikanschlüsse –...
  • Page 146 A: S PPENDIX AFETY NFORMATION Lithiumbatterien sind kein von der EPA aufgelisteter Sondermüll und können daher in der Regel mit dem normalen Müll entsorgt werden. Bei der Entsorgung größerer Mengen ist die örtliche Müllverwaltungsstelle zu Rate zu ziehen. Das Batteriemodul enthält keine gefährlichen Verbindungen. In jeder Zelle ist ca.
  • Page 147: Echnical Specifications

    ECHNICAL PECIFICATIONS Physical Dimensions Height: 89mm (3.5 in.) x Width: 440mm (17.3 in.) x Depth: 472mm (18.6 in.) Weight: 9.53kg (21 lb.) Environmental Requirements Operating Temperature 0 to 40° C (32 to 104° F) Storage Temperature -10 to 70 ° C (14 to 158° F) Operating Humidity 10% to 95% relative humidity, noncondensing Standards...
  • Page 148 B: T PPENDIX ECHNICAL PECIFICATIONS The following is a list of software standards supported by the Switch 9100. SNMP Terminal Emulation MIB-II (RFC 1213) Telnet (RFC 854) Bridge MIB (RFC 1493) HTTP 1.1 (RFC 2068) Entity MIB (RFC 2037) Protocols Used for...
  • Page 149 ROUBLESHOOTING If you encounter problems when using the switch, this appendix may be helpful. If you have a problem not listed here or in the “Release Notes,” contact your supplier. LEDs Power LED does not light: Check that the power cable is firmly connected to the device and to the supply outlet.
  • Page 150 ROUBLESHOOTING Switch does not power up: The Switch 9100 uses a digital power supply with surge protection. In the event of a power surge, the protection circuits shut down the power supply. To reset, unplug the switch for 1 minute, plug it back in, and attempt to power up the switch.
  • Page 151 Using the Command-Line Interface attempt to log in and the maximum number of Telnet sessions are being used, you should receive an error message indicating so. Traps are not received by the SNMP Network Manager: Check that the SNMP Network Manager's IP address and community string are correctly configured, and that the IP address of the Trap Receiver is configured properly on the system.
  • Page 152: C Troubleshooting

    Excessive RX CRC errors: When a device that has auto-negotiation disabled is connected to a Switch 9100 that has auto-negotiation enabled, the switch links at the correct speed, but in half duplex mode. The switch 100/1000 physical interface uses a method called parallel detection to bring up the link.
  • Page 153: Vlans

    Using the Command-Line Interface A mismatch of duplex mode between the Switch 9100 and the network device will cause poor network performance. Viewing using the show command on the Switch 9100 may display a constant increment port rx of CRC errors. This is characteristic of a duplex mismatch between devices.
  • Page 154 C: T PPENDIX ROUBLESHOOTING which should now allow you to re-enter the previous command without error as follows: localhost:26 # config vlan red add port 1,2 VLAN names: There are restrictions on VLAN names. They cannot contain whitespaces and cannot start with a numeric value unless you use quotation marks around the name.
  • Page 155: Stp

    You have connected an endstation directly to the switch and the endstation fails to boot correctly: The Switch 9100 has STP enabled, and the endstation is booting before the STP initialization process is complete. Specify that STP has been disabled for that VLAN, or turn off STP for the switch ports of the endstation and devices to which it is attempting to connect, and then reboot the endstation.
  • Page 156 C: T PPENDIX ROUBLESHOOTING...
  • Page 157: D Technical Support

    3Com recommends that you access the 3Com Corporation World Wide Web site. Online Technical 3Com offers worldwide product support 24 hours a day, 7 days a week, Services through the following online systems: World Wide Web site...
  • Page 158: 3Com Ftp Site

    3Com FTP Site Download drivers, patches, software, and MIBs across the Internet from the 3Com public FTP site. This service is available 24 hours a day, 7 days a week. To connect to the 3Com FTP site, enter the following information into...
  • Page 159: Access By Digital Modem

    Support from Your Network Supplier Access by Digital Modem ISDN users can dial in to the 3Com BBS using a digital modem for fast access up to 64 Kbps. To access the 3Com BBS using ISDN, call the following number:...
  • Page 160 D: T PPENDIX ECHNICAL UPPORT When you contact 3Com for assistance, have the following information ready: Product model name, part number, and serial number A list of system hardware and software, including revision levels Diagnostic error messages Details about recent configuration changes, if applicable...
  • Page 161: Returning Products For Repair

    Returning Products for Repair Returning Products Before you send a product directly to 3Com for repair, you must first for Repair obtain an authorization number. Products sent to 3Com without authorization numbers will be returned to the sender unopened, at the sender’s expense.
  • Page 163 LOSSARY 10BASE-T The IEEE specification for 10Mbps Ethernet over Category 3, 4 or 5 twisted pair cable. 100BASE-FX The IEEE specification for 100Mbps Fast Ethernet over fiber-optic cable. 100BASE-TX The IEEE specification for 100Mbps Fast Ethernet over Category 5 twisted-pair cable. The IEEE specification for 1000Mbps Gigabit Ethernet over four-pair 1000BASE-T Category 5 twisted-pair cable.
  • Page 164 LOSSARY BOOTP The BOOTP protocol allows you to automatically map an IP address to a given MAC address each time a device is started. In addition, the protocol can assign the subnet mask and default gateway to a device. A device that interconnects two LANs of a different type to form a bridge single logical network that comprises of two network segments.
  • Page 165 LOSSARY Forwarding Database A database that is stored by a switch to determine if a packet should be forwarded, and which port should forward the packet if it is to be forwarded. Also known as Switch Database. The process of screening a packet for certain characteristics, such as filtering source address, destination address, or protocol.
  • Page 166 LOSSARY Internet Protocol. IP is a layer 3 network protocol that is the standard for sending data through a network. IP is part of the TCP/IP set of protocols that describe the routing of packets to addressed devices. Internetwork Packet Exchange. IPX is a layer 3 and 4 network protocol designed for networks that use Novell ®...
  • Page 167 LOSSARY MAC address Media Access Control address; also called hardware or physical address. A layer 2 address associated with a particular network device. Most devices that connect to a LAN have a MAC address assigned to them as they are used to identify other devices in a network. MAC addresses are 6 bytes long.
  • Page 168 LOSSARY repeater A simple device that regenerates LAN traffic so that the transmission distance of that signal can be extended. Repeaters are used to connect two LANs of the same network type. A pair of ports that can be configured so that one takes over data resilient link transmission should the other fail.
  • Page 169 A system which allows data that has been assigned a high priority to traffic prioritization be forwarded through a switch without being obstructed by other data. ® The 3Com umbrella management system used to manage all of 3Com’s Transcend networking solutions. A packet sent to a single endstation on a network.
  • Page 170 LOSSARY Virtual LAN Trunk. A Switch-to-Switch link that carries traffic for all the VLANs on each Switch. Wide Area Network. A communications network that covers a wide area. A WAN can cover a large geographic area, and may contain several LANs within it.
  • Page 171 NDEX Numbers 1000BASE-SX port 16 command history 37 3Com bulletin board service (3Com BBS) 158 3Com Knowledgebase Web Services 157 command shortcuts 35 3Com URL 157 line-editing keys 37 named components 35 3ComFacts 159 numerical ranges 35 symbols 36 syntax helper 34...
  • Page 172 NDEX primary and secondary 132 upgrading 131 enabling a port 55 installing the switch 26 errors, port 114 IP address, entering 47 Events, RMON 121, 122 keys factory defaults 23 line-editing 37 fax service (3ComFacts) 159 port monitoring 115 adding an entry 82 aging entries 81 blackhole entries 82 LEDs 21...
  • Page 173 NDEX blackhole 102 configuring 109 online technical services 157 default 100 description 99 modifying 101 parameters 100 passwords traffic groupings default 41 802.1p 105 forgetting 42 description 99 permanent entries, FDB 81 MAC address 103 command 54 ping source port 106 port VLAN 106 commands (table) 56...
  • Page 174 23 Spanning Tree Protocol. See STP tagging, VLAN 69 technical support statistics, port 113 Statistics, RMON 120 3Com Knowledgebase Web Services 157 3Com URL 157 Statistics, RMON group 122 status monitoring 111 bulletin board service 158 fax service 159...
  • Page 175 NDEX configuring 76 default 75 delete and reset commands (table) 79 description 17 displaying settings 78 mixing port-based and tagged 72 names 75 port-based 66 protocol filters 73 protocol-based 72 restoring default values 79 tagged 69 trunks 70 types 66 Web Interface accessing 126 browser controls 128...
  • Page 176 NDEX...
  • Page 177 NDEX OF OMMANDS config snmp sysname 53 config stpd add vlan 94 , 95 config stpd forwarddelay 95 config stpd hellotime 95 config stpd maxage 95 clear counters 119 config stpd port cost 96 clear fdb 85 , 104 config stpd port priority 96 clear igmp snooping 66 config stpd priority 95 clear iparp 50...
  • Page 178 NDEX OF OMMANDS disable log display 118 disable mirroring 61 ping 54 disable ports 55 , 57 disable qosmonitor 108 disable rmon 123 quit 49 disable sharing 57 , 59 disable snmp access 54 disable snmp traps 54 reboot 132 , 135 disable stpd 97 restart ports 57 disable stpd port 97...
  • Page 179 NDEX OF OMMANDS unconfig management 54 unconfig ports display-string 56 unconfig stpd 97 unconfig switch 40 , 133 unconfig vlan ipaddress 79 use configuration 133 , 135 use image 132 , 135...
  • Page 180 NDEX OF OMMANDS...
  • Page 181 If it appears that any product that is stated to meet this standard does not perform properly with regard to such date data on and after January 1, 2000, and Customer notifies 3Com before the later of April 1, 2000, or ninety (90) days after purchase of the product from 3Com or its authorized reseller, 3Com shall,...
  • Page 182 Please refer to the Technical Support appendix in the User Guide for telephone numbers. Response to requests for telephone technical support will be in the form of a return call from a 3Com representative by close of business the following business day.
  • Page 183 This Limited Warranty shall be governed by the laws of the State of California, U.S.A. excluding its conflicts of laws principles and excluding the United Nations Convention on Contracts for the International Sale of Goods. 3Com Corporation 5400 Bayfront Plaza P.O. Box 58145...
  • Page 184 EMC S TATEMENTS FCC S TATEMENT This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment.

This manual is also suitable for:

Superstack ii 91003c17705

Table of Contents