Black Box Series 5000 Reference Manual
Black Box Series 5000 Reference Manual

Black Box Series 5000 Reference Manual

Series 5000 bridge/router
Hide thumbs Also See for Series 5000:

Advertisement

Quick Links

Series 5000 Bridge/Router

Reference Manual

LR5100A-T, LR5200A-R2
5500148-10 equivalent to 5500072-11
© Copyright 2002 by Black Box Corporaion.

Advertisement

Table of Contents
loading

Summary of Contents for Black Box Series 5000

  • Page 1: Reference Manual

    Series 5000 Bridge/Router Reference Manual LR5100A-T, LR5200A-R2 5500148-10 equivalent to 5500072-11 © Copyright 2002 by Black Box Corporaion.
  • Page 2: Section 1 - Introduction

    Section 1 — Introduction This product provides IP and IPX routing combined with a protocol transparent bridge. This bridge/router combination is often the best solution to linking remotely located LANs where most of the traffic is IP or IPX with smaller amounts of traffic from other protocols such as NetBIOS or DEC LAT.
  • Page 3: Arp-Address Resolution Protocol

    Introduction ARP—Address Resolution Protocol A protocol called ARP (Address Resolution Protocol) is used to determine the MAC address of a particular IP address. The MAC (Medium Access Control) address is unique predefined number for each device on the LAN. The manufacturer of the device assigns MAC addresses.
  • Page 4 Introduction • Local router will receive the data frame and strip off the MAC portion. The resulting IP frame will be examined to determine the destination IP address. • Local router will look in its routing table to find the IP address of the router to send the IP frame to next. The local router will see that the destination router is the next router.
  • Page 5: Ip Header Details

    Introduction IP Header Details Every IP header has common fields of information. The layout of the information is always the same. Refer to the following diagram for a representation of the IP header. Figure 1 - 2 IP Header Protocol The protocol section is used to indicate the protocol being used by the transport layer.
  • Page 6: Icmp Messages

    Introduction Options There are various options that may be set for any IP frame. Source Routing Source routing is used to predetermine the path that the IP frame must travel through the network. There are two types of source routing: strict source routing and loose source routing. Strict source routing will contain a list of IP addresses of routers that must be used when the IP frame is sent through the network.
  • Page 7 Introduction Ping The “ping” message is actually a query status message that may be sent to devices on the LAN to determine their operation status. The LAN device will reply with a message if it is active. Time and Mask server Two other ICMP messages are used to query the time and/or subnet mask from a particular LAN device.
  • Page 8: Rip-Routing Information Protocol

    Introduction RIP—Routing Information Protocol The most important function of the IP protocol is routing. IP routers constantly exchange information keeping their routing tables up to date. A method of communication is required to ensure compatibility between all IP routers in the network. RIP is the portion of the IP protocol that is used for router communication.
  • Page 9: Ipx Routing

    Introduction IPX Routing The router may be used to route between IPX networks. Novell Netware uses a suite of protocols for LAN communications. The Novell protocols include IPX, SPX, RIP, SAP, plus others, and operate at layers 3 and above. These protocols, their relationship with each other, and the general operation of a Novell network are discussed in this section.
  • Page 10 Introduction Node Addresses The Node Number identifies the individual stations in a Network. In IPX devices, this address is assigned automatically and is identical to the MAC address. This means that the Node Number is self-configuring, and will be unique within the Network because the MAC address that was copied is (supposed to be) unique. The use of the MAC address as the Node Number allows IPX stations to be self-configuring.
  • Page 11: Establishing An Ipx Connection

    Introduction Establishing an IPX Connection The Netware model is Client/Server, where Clients initiate calls to Servers for various purposes. The Clients are made aware of the presence of Servers by listening for Service Advertisement Protocol (SAP) broadcasts. Servers send SAP broadcasts regularly to identify themselves, including their address and what type of service they offer (File Server, Print Server, Fax Server, etc.).
  • Page 12: Server Types

    Introduction SAP Requests Sometimes Clients will need to find out if a specific Server is available. This may occur immediately after a Client is brought up, and before it has received any SAP broadcasts. The Client (or a new Server) sends out a SAP Request broadcast asking for a specific Server.
  • Page 13 Introduction RIP/X Requests A Client may also request a route to a given network or server. To do so, the Client generates a Route Request broadcast that the routers hear, and routers that know of the route requested will respond to the originating station. In this way a new Client may find routes without waiting for the routers’...
  • Page 14: The Initial Bridging Process

    Introduction The Initial Bridging Process Each time a router is powered up, it will perform extensive hardware and software tests to ensure the integrity of the unit and its attached LAN and Link interfaces. Upon successful completion of the power-up diagnostics, the router will follow rules to “learn”...
  • Page 15: Aging Timer

    Introduction Forwarding Unknown Destination Addresses When a frame is received from a LAN segment with an unknown destination address (an address that does not yet exist in the filter table), the bridge will forward the frame to the other segment, logging the address, and marking the location as “unknown”.
  • Page 16: Filled Address Table

    Introduction Aging Exception “Permanent” address entries are an exception to the aging rule. A permanent address is one that is not subject to the aging timer and will remain in the filter table for an indefinite period of time. A table is reserved for permanent address entries, separate from the table that is used for those non-permanent entries that are subject to aging.
  • Page 17: Link Compression

    Introduction Router Feature Definitions Telnet A Telnet LAN station or another router has the ability to connect to the Operator Interface of any router supporting the Telnet feature. With the Telnet feature, all routers on a network may be managed from a single point. Once a connection is established, all of the menus of the other bridge/router are now available on the bridge/router that initiated the connection.
  • Page 18 Introduction Compression Ratio File Type Figure 1 - 5 Typical Compression Ratios by File Type Data compression will give a 56/64 Kbps link an effective throughput range from 112/128 Kbps when transferring binary files, to 364/384 Kbps when transferring graphic files. This increased throughput significantly reduces the bandwidth required across the WAN link to achieve a given performance level and/or allows the use of lower-cost transmission facilities.
  • Page 19: Point-To-Point

    Introduction WAN Topologies The router may be connected to other routers in two configurations: Multipoint or Point-to-Point. The WAN routing method used is set in the WAN Set-Up Menu under the Link Operation option. Point-to-Point In a Point-to-Point configuration, two routers are connected together with one or two WAN links. Each link may be set to an always active (unconditional) state or a backup/recovery (conditional) state.
  • Page 20 Introduction This second link would now be placed in a stand-by mode by setting Conditional operation option in the Secondary Activation Menu to Enabled. Now you must choose the throughput level that will be required for activating the stand-by link. The throughput level is measured in percentage of use of the primary link.
  • Page 21: Disaster Recovery Backup Link

    Introduction Multipoint A simple Multipoint configuration would consist of a head office and two remote offices. Cost comparisons might reveal that it is less expensive to use a dial-up line during business hours only instead of a permanent leased line. One router will be installed at each office (for a total of three units).
  • Page 22: Section 2 - Isdn Connection Management

    Section 2 — ISDN Connection Management ISDN Connection Management In the world of ISDN the ability to decrease connection time is a financial bonus in the LAN interconnecting marketplace. If ISDN connections can be controlled so that a minimum amount of cost is incurred while full LAN interconnecting functionality is retained, the overall cost for WAN communications can be minimized.
  • Page 23 ISDN Connection Management Auto-Call (Time-of-Day Connections) An Auto-Call connection is an ISDN connection that is established each time the router attempts to start the link. This starting of the links occurs each time an router powers up or when the link goes through a restart or at the times specified by the Time-of-Day Activation Schedule.
  • Page 24 ISDN Connection Management Address Connect An Address Connect connection is an ISDN connection that is established to a specific destination router dependent upon the destination network address contained within traffic received from the local LAN. When a device on the local LAN wishes to establish a session with a device on a remote LAN, the local device will send a frame with a destination address of the remote device.
  • Page 25: Connection Process

    ISDN Connection Management Combination A combination of the Address Connect and Auto-Call options may be configured when a semi-permanent connection is required to one remote site and a dynamic connection is required to multiple sites. A dynamic connection indicates that the remote site for the second ISDN call will change depending upon what destination IP address is required for the connection.
  • Page 26: Idle Timer

    ISDN Connection Management Protocol Awareness For Connection Management to be effective, each of the routers must be aware of the protocols used within the data being transferred over the ISDN calls between them. IP and IPX Client-Server sessions are established between devices located on the LANs that are routed by the router.
  • Page 27: Termination Process

    ISDN Connection Management When the router receives a keepalive packet from the LAN for one of the sessions, the router will not activate the ISDN call and will not pass the keepalive packet to the remote LAN. The router will generate a response to the keepalive packet and send it to the originator of the packet.
  • Page 28 ISDN Connection Management IP Specifics IP Address Connect As stated previously, an IP Address Connect connection is an ISDN connection that is established to a specific destination router dependent upon the destination IP address contained within IP traffic received from the local LAN.
  • Page 29: Ipx Specifics

    ISDN Connection Management IPX Specifics RIP/IPX and SAP/IPX ISDN routers incorporate a 3 second settling time for IPX RIP and SAP updates. This means that an will wait for three seconds after an initial change in the network is reported before transmitting that change on to the remaining routers connected on the Wide Area Network.
  • Page 30: Section 3 - Link Interfaces Reference

    Section 3 — Link Interfaces Reference Pinout Information Each link interface available is described with detailed information on pin designation. Standard interface cables will provide correct connections to modems, datasets, or DSU/CSUs. When connecting two bridge/routers back-to-back without modems, a null-modem cable is required to crossover the pins on the links.
  • Page 31 Link Interfaces Reference This product is currently produced with LXT CSU/DSU interface modules which have their link speed configured in software (please see the PPP menus manual for configuration options); however, the earlier model ATL CSU/DSU module is still compatible with the router and may be used with it. Note that ATL master mode signaling is not compatible with the current standard 64K master mode signaling;...
  • Page 32: Console Pinouts

    Link Interfaces Reference Console Pinouts The connector shown here and pinouts described here correspond to the connector labeled “Console” on the back of the unit. DB25 Female DCE CCITT Direction Contact Circuit Circuit From Number Number Circuit Name DCE DCE Protective Ground Transmitted Data Received Data...
  • Page 33 Link Interfaces Reference CSU/DSU Module: The CSU/DSU interface module uses a standard RJ45 service connector, pinout specification RJ48S. CSU/DSU Figure 3 - 5 Rear View of the CSU-DSU Connector The LXT411 CSU/DSU link connection is set to operate at 64 Kbps by default. The link may be set to 56 Kbps via the software menus if required.
  • Page 34 Link Interfaces Reference V.24 & RS232C Link Pinouts The connector shown here and pinouts described here correspond to the connector labeled “RS232/ V.24” on the back of the unit. DB25 Female DTE CCITT Direction Contact Circuit Circuit From Number Number Circuit Name DCE DCE...
  • Page 35 Link Interfaces Reference V.11 & X.21 Link Pinouts The connector shown here and pinouts described here correspond to the connector labeled “V.11/X.21” on the back of the unit. DB15 Female DTE X.21 Direction Contact Circuits Circuit From Number Reference Name DCE DCE Protective Ground T (A)
  • Page 36 Link Interfaces Reference RS442 & RS530 Link Pinouts The connector shown here and pinouts described here correspond to the connector labeled “RS530” on the back of the unit. DB25 Female DTE Direction Contact Circuit From Number Circuit Name DCE DCE Shield Protective Ground BA (A)
  • Page 37 Link Interfaces Reference V.35 Link Pinouts DB25 Female DTE DB25 M.34 CCITT Direction Contact Contact Circuit Circuit From Number Number Number Name DCE DCE Protective Ground ---------- ---------- Request to Send ---------- Data Set Ready Signal Ground Data Channel Received Line Signal Detector Transmitted Data (A) Transmitted Data (B) Received Data (A)
  • Page 38 Link Interfaces Reference RS232 Null-Modem Cable Configuration DB25 MALE DB25 MALE Shield Shield Transmitted Data Received Data Transmitted Data Received Data Data Set Ready Request To Send Data Set Ready Request To Send DTE Ready Received Line Signal Detector (CD) Signal Ground Signal Ground Received Line Signal Detector (CD)
  • Page 39: Null-Modem Cable Configuration

    Link Interfaces Reference V.35 Null-Modem Cable Configuration DB25 MALE DB25 MALE Protective GND Protective GND Received Data (A) Transmitted Data (A) Received Data (B) Transmitted Data (B) Received Data (A) Transmitted Data (A) Received Data (B) Transmitted Data (B) Receiver Signal Element Timing (A) Transmitter Signal Element Timing (A) Transmitter Signal Element Timing (B) Receiver Signal Element Timing (B)
  • Page 40 Link Interfaces Reference RS530 Null-Modem Cable Configuration DB25 MALE DB25 MALE Shield Shield Received Data (A) Transmitted Data (A) Transmitted Data (B) Received Data (B) Transmitted Data (A) Received Data (A) Received Data (B) Transmitted Data (B) Request To Send (A) DCE Ready (A) DCE Ready (B) Request To Send (B)
  • Page 41 Link Interfaces Reference RS530 To RS449 Conversion Cable DB25 MALE DB37 MALE/FEMALE Transmitted Data (A) Transmitted Data (B) Received Data (A) Received Data (B) Received Line Signal Detector (A) Received Line Signal Detector (B) Data Set Ready (A) Data Set Ready (B) Request to Send (A) Request to Send (B) Clear to Send (A)
  • Page 42 Link Interfaces Reference V.11/X.21 Null-Modem Cable Configuration Figure 3 – 15 V.11/X.21 Null-Modem Cable The connecting cable must be a shielded cable. Circuits which are paired (contain an (A) and (B) reference) should be connected to twisted pairs within the connecting cable. This cable is needed when it is necessary to connect two units back-to-back and a set of modems is not available.
  • Page 43 Link Interfaces Reference WAN Link Control-Signal Operation CTS flow control is not supported. It is assumed that Dial In/Dial Out modes of dial-up operation will be configured externally to the bridge/router, i.e. on the attached modem, by setting Originate Only/Answer Only modes. A dataset or DSU/CSU can be used for a leased-line operation.
  • Page 44: Appendix A - Event Logs

    Appendix A - Event Logs The router generates event logs for various functions performed by the bridge/router. All of the event logs are stored in the internal event log file, which is accessible through the Network Events menu. Certain event logs are classified as alarms because they are deemed to be of higher urgency. Alarm logs are indicated by an asterisk (“* ”) at the start of the alarm text and are printed on the ALARM line on the menu system as well as being stored in the event log.
  • Page 45 Event Logs Completed BACP negotiation with <remote site alias> Generated when the Bandwidth Allocation Control Protocol negotiation has been completed with the remote site device associated with the stated remote site profile. Once BACP negotiations are complete, the two routers will negotiate when required to bring up the second link.
  • Page 46 Event Logs DHCP services – release. <IP address> released. Generated when IP address displayed is released from its assignment to a device and put back in the IP pool for re- assignment. Error executing: XXXXXX Generated when an error is detected loading back a configuration. The invalid command is specified. Incorrect password from <IP address>...
  • Page 47 Event Logs LCP X establishing Generated when the Link Control Protocol of a PPP link or remote site is establishing between this device and the remote site PPP device. LCP X no reply to Y Echo-Requests Generated just prior to a link going down. The link or remote site has gone down due to no replies to the echo request messages sent.
  • Page 48 Event Logs Link X CSU/DSU: Loopback Started Generated when the CSU/DSU link module starts a new loopback test. Link X - CSU/DSU out of service Generated when the CSU/DSU is in communication with the local telco, but is not connected to the remote partner CSU/DSU.
  • Page 49 Event Logs LMI discarding STATUS on link X – Enquiries not started Generated when the bridge/router discards a Status message received from the frame relay network on a link that the bridge/router has not yet started the Local Management Interface. No NCP's open, tearing link down Generated when a PPP link does not have a Network Control Protocol operating.
  • Page 50 Event Logs Starting BACP negotiation with <remote site alias> Generated when the Bandwidth Allocation Control Protocol negotiation has been initiated with the remote site device associated with the stated remote site profile. Starting BCP negotiation with <remote site alias> Generated when the Bridging Control Protocol negotiation has been initiated with the remote site device associated with the stated remote site profile.
  • Page 51 Event Logs TFTP: <IP address> getting filename A LAN device with IP address displayed is getting a file (filename) from the bridge/router. TFTP: <IP address> putting filename A LAN device with IP address displayed is putting a file (filename) onto the bridge/router.
  • Page 52: Alarm Logs

    Event Logs Alarm Logs: * Auto-learning of LMI type on link X unsuccessful Generated when the LMI type on a link is not successfully auto-learned. * Backup Battery is bad The backup battery power for memory backup has dropped below operating level, replace the batteries (see Installation and Applications Manual, Appendix D.
  • Page 53 Event Logs * Closing remote site X (no NCPs open) Generated when no Network Control Protocols operating. * Closing remote site X (nonexistant) Generated when remote site being deleted by the operator. * Closing remote site X (not enabled) Generated when remote site autocall being disabled by the operator. * Closing remote site X (PVC change) Generated due to the enabling or disabling of PPP encapsulation over frame relay.
  • Page 54 Event Logs * Download aborted – Incomplete file Generated when a TFTP download is abortet before the file transfer is complete * Download aborted – Invalid FCS Generated when there is a checksum failure after a file download. * Download aborted – Incompatible boot code Generated when the operating code file downloaded is incopatible with the boot code in this device.
  • Page 55 Event Logs * FTP server added to firewall The IP address of the FTP server added to the table of services available through the firewall. * FTP server removed from firewall The IP address of the FTP server removed from the table of services available through the firewall. * Gopher server added to firewall The IP address of the Gopher server added to the table of services available through the firewall.
  • Page 56 Event Logs * Link X Connected Generated when and end-to-end ISDN call has been established. * Link X connection rejected Generated when Link X connection is being terminated as it could not be attached to a remote site. This may be due to usage limits or suspension resumptions. * Link X - CSU/DSU not responding, Power Cycle Device.
  • Page 57 Event Logs Code Description Circuit out of order No circuit/channel available Destination unattainable Out of order Degraded service Network out of order Transit delay range cannot be achieved Throughput range cannot be achieved Temporary failure Switching equipment congestion Access information discarded Requested circuit/channel not available Preemption Precedence call blocked...
  • Page 58 Event Logs * Link X, DLCI Y attached to remote site <remote site alias> Generated for frame relay applications when a connection has been made for the DLCI associated with the remote site alias. * Link X down Generated when a WAN link goes down. * Link X down to <remote site alias>...
  • Page 59 Event Logs * Link X up at Y baud Generated when frame relay link is established. * Link X up to <remote site alias> Generated when a WAN link connection to the specified remote site comes up. * Local DNS server added to firewall The IP address of the Local DNS server added to the table of services available through the firewall.
  • Page 60 Event Logs * No ISDN line available for remote site <remote site alias> All ISDN lines are currently in use; none are available for the new connection requested. May be generated when CMCP is enabled and more ISDN calls are attempted than there are available ISDN lines. * No ISDN resource available for remote site <remote site alias>...
  • Page 61 Event Logs * Remote site <remote site alias> frame relay closing Generated when frame relay is diabled on the link to the specified remote site. * Remote site <remote site alias> resumed Generated when the connection to the specified remote site has been resumed. * Remote Site <remote site alias>...
  • Page 62 Event Logs * TFTP: Abort. Error (#) received Aborted a TFTP session because of the reception of a TFTP error message from the connected device. The errors are: 0 - not defined, 1 - file not found, 2 - access violation, 3 - disk full or allocation exceeded, 4 - illegal TFTP operation, 5 - unknown transfer ID, 6 - file already exists, 7 - no such user.
  • Page 63 Event Logs PPP Security Logs: CHAP authentication failure so terminate link. Generated when the CHAP authentication sent by this router in response to a request from a remote site is rejected. CHAP failed for <remote site alias> Generated when the remote site router failed a CHAP authentication request from this router. The remote site name is displayed if known.
  • Page 64: Appendix B - Programmable Filtering

    Appendix B - Programmable Filtering Programmable filtering gives the network manager the ability to control under what conditions Ethernet frames are forwarded across bridge or bridge/router ports. There are many reasons why this might need to be accomplished, some of which are security, protocol discrimination, bandwidth conservation, and general restrictions.
  • Page 65 Programmable Filtering Security—“Filter if Destination” Filter if Destination is a function that allows you to filter an Ethernet frame based on the destination of its address. If the destination address equals the address that the Filter if Destination function has been applied to, the frame is filtered.
  • Page 66 Programmable Filtering Security—“Filter if Source” Filter if Source is a function that allows you to filter an Ethernet frame if the source address of the frame equals the address that the Filter if Source function has been applied to. Example: Assume that a Personal Computer is located on segment 1 on the local bridge/router.
  • Page 67 Programmable Filtering The bridge/router will prompt you for the LAN that the station is located on; enter the name of the partner bridge/router LAN (LAN345678, for example). Note that the Status of the address is marked as [present], the location is updated to LAN345678 and the Permanent entry is [enabled].
  • Page 68 Programmable Filtering From the MAC ADDRESS FILTERS MENU, make sure that the Filter Operation is currently set to “negative.” This will cause the MAC Address Filters specified to be used for forwarding frames with the specified MAC addresses. From the MAC ADDRESS FILTERS MENU, enter a 1. This will place you at the first EDIT MAC ADDRESS FILTER MENU screen.
  • Page 69 Programmable Filtering From the CONFIGURATION MENU, enter an 8. This will place you at the FILTER SET-UP MENU, where access to the individual filtering menus is obtained. From the FILTER SET-UP MENU, enter a 1. This will place you at the MAC ADDRESS FILTERS MENU, where access to the MAC Address filters is obtained.
  • Page 70: Protocol Discrimination

    Programmable Filtering Pattern Filter Operators The following operators are used in creating Pattern filters and will be discussed further in the following pages. For additional information refer to the octet locations diagrams at the back of this manual. Each octet location may contain a HEX value. offset Used in pattern filters to determine the starting position to start the pattern checking.
  • Page 71: Internet Protocol (Ip)

    Programmable Filtering The Bridge Filter Patterns menu is located under the FILTER SET-UP MENU. Within the Bridge Filter Patterns Menu there exists a Help function that can be used as a reference during Bridge Filter Pattern creation. This Help function includes all of the logical operators that may be applied to the mask expression.
  • Page 72 Programmable Filtering Transport Control Protocol / Internet Protocol (TCP/IP) The previous example showed how to filter all Ethernet frames that contained an IP protocol packet. However, IP is used as the Network-layer protocol for more than 40 different Transport-layer protocols, TCP being only one of them.
  • Page 73: Bandwidth Conservation

    Programmable Filtering DEC uses protocol types 6000 to 600F, and although some are undefined, a simple filter mask can be created to filter all DEC traffic. Filter all DEC The mask to filter all DEC traffic would be: 12-600X The X is a variable representing the last four bits (a nibble) of the type. This will effectively filter all Ethernet frames that contain a protocol type of 6000 through to 600F.
  • Page 74: General Restrictions

    Programmable Filtering General Restrictions Bridge Filter Masks may be created to generally restrict access for various purposes. Some of these purposes may be to filter specific combinations of information. This section will generally depict masks that may be created to control traffic across the bridged LAN network.
  • Page 75 Programmable Filtering Mask Combinations Mask combinations may be required to ensure that a frame is sufficiently qualified before the decision to filter is made. The qualification a frame must go through before a filter decision is made depends on the reason for the filter. Nonetheless, a few examples below have been provided that should aid in the creation of a mask that may require that extra little bit of qualification.
  • Page 76 Programmable Filtering IP Router Pattern Filtering Pattern filtering may be used on any portion of the IP frame. IP pattern filtering behaves the same as bridge pattern filtering, except the start of the IP frame is offset 0, because the IP router function of the bridge/router handles only the IP frame itself.
  • Page 77: Appendix C - Frame Formats

    Appendix C - Frame Formats This appendix provides octet locations for the various portions of three of the common Ethernet frames. When creating pattern filters these diagrams will assist in the correct definition of the patterns. The offset numbers are indicated by the numbers above the frame representations.
  • Page 78: Ethernet Type Codes

    Frame Formats ETHERNET TYPE CODES Type Code Description 0800 DOD IP 0801 X.75 Internet 0804 Chaosnet 0805 X.25 Level 3 0806 0807 XNS Compatibility 6001 DEC MOP Dump/Load 6002 DEC MOP Remote Console 6003 DEC DECNET Phase IV Route 6004 DEC LAT 6005 DEC Diagnostic Protocol...
  • Page 79 Frame Formats Octet Locations on an IPX Routed Novell Netware Frame Octet Locations on a Bridged XNS Frame 5500148-10...

Table of Contents