Extreme Networks Summit1 Installation And User Manual

Extreme network summit switch installation and user guide
Hide thumbs Also See for Summit1:
Table of Contents

Advertisement

Quick Links

Summit Switch
Installation and User
Guide
Extreme Networks, Inc.
10460 Bandley Drive
Cupertino, California 95014
(888) 257-3000
http://www.extremenetworks.com
Published: June 1998
Part number: 100000-00 rev.B

Advertisement

Table of Contents
loading

Summary of Contents for Extreme Networks Summit1

  • Page 1 Summit Switch Installation and User Guide Extreme Networks, Inc. 10460 Bandley Drive Cupertino, California 95014 (888) 257-3000 http://www.extremenetworks.com Published: June 1998 Part number: 100000-00 rev.B...
  • Page 2 Copyright © Extreme Networks, Inc., 1998. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without permission from Extreme Networks, Inc.
  • Page 3: Table Of Contents

    Port Redundancy Load Sharing Virtual LANs (VLANs) Spanning Tree Protocol (STP) Quality of Service (QoS) IP Unicast Routing IP Multicast Routing Network Configuration Example Summit1 Front View 1-10 Summit2 Front View 1-11 Summit3 Front View 1-12 Summit4 Front View 1-13...
  • Page 4 1-17 Redundant Power Supply Port MAC Address 1-18 1-18 ETUP Media Types and Distances Rack Mounting Free-Standing Stacking the Switch and Other Devices WITCH Syntax Helper Command Completion with Syntax Helper Abbreviated Syntax Command Shortcuts Numerical Ranges Names Symbols 1-17...
  • Page 5 Configuring Management Access Default Accounts Changing the Default Password Creating a Management Account Viewing Switch Accounts Deleting a Switch Account Methods of Managing the Summit Using the Console Interface Using Telnet 3-12 Connecting to Another Host Using Telnet Configuring Switch IP Parameters...
  • Page 6 Turning Off Autonegotiation for a Gigabit Ethernet Port Configuring Load Sharing Verifying the Load Sharing Configuration Port-Mirroring Commands Port-Mirroring Example 4-10 Summit Switch Port Connections Extreme Discovery Protocol Summit Virtual Chassis Commands Configuring the Summit for User with the Summit Virtual Chassis 4-12...
  • Page 7 VLAN Names 5-13 Default VLAN 5-14 Configuring VLANs on the Summit VLAN Configuration Examples Displaying VLAN Settings Deleting VLANs 5-18 WITCH ORWARDING Overview of the FDB FDB Contents FDB Entry Types How FDB Entries Get Added Associating a QoS Profile with an FDB Entry Configuring FDB Entries FDB Configuration Examples Displaying FDB Entries...
  • Page 8 UALITY OF Overview of Quality of Service Building Blocks Port Queue Monitor Configuring QoS Displaying QoS Information Resetting QoS IP U Overview of IP Unicast Routing Configuring IP Unicast Routing Configuring DHCP/BOOTP Relay Routing Configuration Example viii ERVICE QoS Mode Default QoS Profiles Traffic Groupings Ingress Traffic Groupings...
  • Page 9 Displaying Router Settings Resetting and Disabling Router Settings OUTING ROTOCOLS Overview 10-1 RIP Versus OSPF Overview of RIP 10-3 Routing Table 10-3 Split Horizon 10-3 Poison Reverse 10-3 Triggered Updates Route Advertisement of VLANs RIP Version 1 versus RIP Version 2 Overview of OSPF 10-5 Link State Database...
  • Page 10 12-8 12-10 Local Logging 12-11 Real-time Display 12-11 Remote Logging 12-12 Logging Commands 12-12 12-14 About RMON 12-14 RMON Features of the Switch Statistics 12-15 History 12-15 Alarms 12-16 Events 12-16 RMON and the Switch 12-16 Event Actions 12-17 11-2...
  • Page 11 13-4 Browser Controls Status Messages Standalone Buttons Saving Changes 13-5 Do a GET When Configuring a VLAN Sending Screen Output to Extreme Networks OFTWARE PGRADE AND Downloading a New Image Rebooting the Switch Saving Configuration Changes Returning to Factory Defaults...
  • Page 12 ROUBLESHOOTING LEDs Using the Command-Line Interface NDEX NDEX OF VLANs OMMANDS...
  • Page 13 Figures Dual-homing configuration Network configuration using the Summit family of switches Summit1 front view Summit2 front view Summit3 front view Summit4 front view Summit4/FX front view Summit48 front view Summit rear view 1-17 Fitting the mounting bracket Null-modem cable pin-outs...
  • Page 14 10-3 10-4 10-5 11-1 Virtual link providing redundancy RIP configuration example 10-11 OSPF configuration example IP multicast routing configuration example 10-7 10-16 11-6...
  • Page 15 SNMP Configuration Commands SNMP Reset and Disable Commands Ping Command Parameters Port Commands Port Combinations for the Summit1 Port Combinations for the Summit2 Port Combinations for the Summit3 Port Combinations for the Summit4 and Summit4/FX Port Combinations for the Summit48...
  • Page 16 IP Multicast Routing Configuration Commands IGMP Configuration Commands IP Multicast Routing Show Commands IP Multicast Routing Reset and Disable Commands Switch Monitoring Commands Port Monitoring Display Keys Fault Levels Assigned by the Switch Fault Log Subsystems 12-10 Logging Commands 12-13 Event Actions...
  • Page 17: Introduction

    • Ethernet concepts • Ethernet switching and bridging concepts • Routing concepts • Simple Network Management Protocol (SNMP) If the information in the Release Notes shipped with your switch differs from the information in this guide, follow the Release Notes. UMMIT WITCH...
  • Page 18: Terminology

    ERMINOLOGY When features, functionality, or operation is specific to a particular model of the Summit family, the model name is used (for example, Summit1 or Summit4). Explanations about features and operations that are the same among all members of the Summit family simply refer to the product as the Summit.
  • Page 19: Related Publications

    ELATED UBLICATIONS The Summit documentation set includes the following: • Summit Quick Reference Guide • Summit Release Notes You may find the following Web site of interest: • Extreme Networks Home Page: http://www.extremenetworks.com/ UMMIT WITCH NSTALLATION AND UIDE Description Italics emphasize a point or denote new terms at the place where they are defined in the text.
  • Page 20 REFACE UMMIT WITCH NSTALLATION AND UIDE...
  • Page 21: Summit Overview

    Summit Overview This chapter describes the following: • Summit switch models • Summit features • How to use the Summit family of switches in your network configuration • Summit front views • Summit rear view • Summit LEDs • Factory default settings...
  • Page 22: Summit Switch Models

    — All ports transmit and receive packets at wire speed • Optional redundant power supply • 128K addresses in the switch forwarding database in bridging mode • Redundant physical Gigabit Ethernet backbone connection • Autonegotiation for half- or full-duplex operation (Fast Ethernet ports, only) •...
  • Page 23: Port Connections

    ™ • Simple Network Management Protocol (SNMP) support ONNECTIONS The major difference between the models of the Summit switch is the port configurations on each switch model. Summit switches use a combination of the following types of ports: • Fixed 1000BASE-SX ports using 850nm duplex SC connectors •...
  • Page 24: Media Types And Distances

    UMMIT VERVIEW EDIA YPES AND ISTANCES Table 1-2 describes the media types and distances for the different types of Summit ports. Table 1-2: Media Types and Distances Standard Media Type 1000BASE-SX 50/125um Multimode Fiber 50/125um Multimode Fiber 62.5/125um Multimode Fiber 62.5/125um Multimode Fiber 1000BASE-LX 50/125um Multimode Fiber...
  • Page 25: Full-Duplex

    UPLEX The Summit switch provides full-duplex support for all ports. Full-duplex allows frames to be transmitted and received simultaneously and, in effect, doubles the bandwidth available on a link. All 10/100 Mbps ports on the Summit autonegotiate for half- or full-duplex operation.
  • Page 26: Load Sharing

    The sharing algorithm allows the switch to use multiple ports as a single logical port. For example, VLANs see the load-sharing group as a single virtual port.
  • Page 27: Quality Of Service (Qos)

    The Summit supports up to 64 Spanning Tree Domains (STPDs). For more information on STP, refer to UALITY OF The Summit has policy-based Quality of Service (QoS) features that enable you to specify service levels for different traffic groups. By default, all traffic is assigned with the “normal”...
  • Page 28: Network Configuration Using The Summit Family Of Switches

    Quality of Service. Intranet Switching Architecture Desktop switches Desktop switches Routers Gigabit 10/100 Mbps Figure 1-2: Network configuration using the Summit family of switches XAMPLE Segment switches Data Center Integrated Server switch L2/L3 UMMIT WITCH NSTALLATION AND UIDE...
  • Page 29: Network Configuration Example

    ONFIGURATION XAMPLE In the gigabit core of the network, the Summit1 and Summit2 act as aggregators of Gigabit Ethernet links from the edge and data center switches, as well as Ethernet and Fast Ethernet links from legacy routers and hubs. In the core of the network, the...
  • Page 30: Summit1 Front View

    Port status LEDs Gigabit Ethernet ports Figure 1-3: Summit1 front view The Summit1 has eight Gigabit Ethernet ports. Six of the ports use SC connectors and support 1000BASE-SX over multimode fiber-optic cable. Ports 1 and 8 use modular GBIC connectors.
  • Page 31: Summit2 Front View

    UMMIT RONT Figure 1-4 shows the Summit2 front view. 10/100 Mbps ports Figure 1-4: Summit2 front view The Summit2 has 16 autosensing 10BASE-T/100BASE-TX ports and two Gigabit Ethernet ports, one of which has a redundant Gigabit Ethernet port. For information on supported media types and distances, refer to For information on Summit LEDs, refer to UMMIT WITCH...
  • Page 32: Summit3 Front View

    UMMIT VERVIEW UMMIT RONT Figure 1-5 shows the Summit3 front view. 10/100 Mbps ports Figure 1-5: Summit3 front view The Summit3 has 24 autosensing 10BASE-T/100BASE-TX ports, one Gigabit Ethernet port, and one redundant Gigabit Ethernet port. For information on supported media types and distances, refer to For information on Summit LEDs, refer to 1-12 10/100 Mbps ports...
  • Page 33: Summit4 Front View

    UMMIT RONT Figure 1-6 shows the Summit4 front view. 10/100 Mbps ports Gigabit Ethernet ports Figure 1-6: Summit4 front view The Summit4 has 16 autosensing 10BASE-T/100BASE-TX ports and 6 Gigabit Ethernet ports. The Gigabit Ethernet ports use standard SC connectors and support 1000BASE-SX over multimode fiber-optic cable.
  • Page 34: Summit4/Fx Front View

    UMMIT VERVIEW 4/FX F UMMIT RONT Figure 1-7 shows the Summit4/FX front view. 100 Mbps ports Gigabit Ethernet ports Figure 1-7: Summit4/FX front view The Summit4/FX has 16 100BASE-FX ports and 6 Gigabit Ethernet ports. All ports use standard SC connectors. The Gigabit Ethernet ports support 1000BASE-SX over multimode fiber-optic cable.
  • Page 35: Summit48 Front View

    48 F UMMIT Figure 1-8 shows the Summit48 front view. 1000 BASE-X Gigabit Ethernet ports Figure 1-8: Summit48 front view The Summit48 has 48 autosensing 10BASE-T/100BASE-TX ports, 2 Gigabit Ethernet ports, and 2 redundant Gigabit Ethernet ports. All the Gigabit Ethernet ports use GBIC connectors.
  • Page 36: Leds

    UMMIT VERVIEW Table 1-3 describes the light emitting diode (LED) behavior on the Summit. Table 1-3: Summit LEDs Color Power Green Yellow MGMT Green flashing Slow Fast Yellow 10/100Mbps Port Status LEDs Green Yellow Green flashing Gigabit Ethernet Port Status LEDs Packet Yellow Status...
  • Page 37: Summit Rear View

    Summit Virtual Chassis. Both the Summit RPS and the Summit Virtual Chassis provide a redundant, load-shared power source to the Summit. If the primary power source for the switch fails, the RPS in either the Summit RPS or the Summit Virtual Chassis takes over, ensuring uninterrupted network operation.
  • Page 38: Mac Address

    VERVIEW In addition, when connected to a Summit RPS or Summit Virtual Chassis, the Summit switch can provide status on power and fan operation of the RPS through SNMP, the command-line interface, and the Web interface (power supply status only).
  • Page 39 UMMIT WITCH NSTALLATION AND UIDE Default Setting Disabled for the switch; enabled on each VLAN configured with an IP address. Disabled for the switch; enabled for each VLAN configured with an IP address. All VLANs belong to the backbone area.
  • Page 40 UMMIT VERVIEW 1-20 UMMIT WITCH NSTALLATION AND UIDE...
  • Page 41: Installation And Setup

    • How to check the installation using the Power On Self-Test (POST) OLLOWING AFETY NFORMATION Before installing or removing any components of the switch, or before carrying out any maintenance procedures, you must read the safety information provided in Appendix A of this guide.
  • Page 42: Media Types And Distances

    • Air-flow around the unit and through the vents in the side of the case is not restricted. You should provide a minimum of 25mm (1-inch) clearance. • No objects are placed on top of the unit. • Units are not stacked more than four high if the switch is free-standing. EDIA YPES AND...
  • Page 43: Installing The Summit

    To rack mount the Summit, follow these steps: 1 Place the switch the right way up on a hard flat surface, with the front facing toward you. 2 Remove the existing screws from the sides of the chassis and retain for Step 4.
  • Page 44: Free-Standing

    • Stop bit — 1 • Parity — None • Flow control — XON/XOFF The terminal connected to the console port on the switch must be configured with the same settings. This procedure will be described in the documentation supplied with the terminal.
  • Page 45 Appropriate cables are available from your local supplier. In order to make your own cables, pin-outs for a DB-9 male console connector are described in Table 2-2: Console Connector Pin-Outs Function TXD (transmit data) RXD (receive data) GND (ground) Figure 2-2 shows the pin-outs for a 9-pin to RS-232 25-pin null-modem cable.
  • Page 46: Powering On The Switch

    NSTALLATION AND ETUP OWERING N THE To turn on power to the switch, connect the AC power cable to the switch and then to the wall outlet, and turn the on/off switch to the on position. HECKING THE NSTALLATION After turning on power to the Summit, the device performs a Power On Self-Test (POST).
  • Page 47: Logging In For The First Time

    5 Assign an IP address and subnetwork mask for VLAN default by typing config vlan default ipaddress 123.45.67.8 255.255.255.0 Your changes take effect immediately. 6 Save your configuration changes so that they will be in effect after the next switch reboot, by typing save...
  • Page 48 NSTALLATION AND ETUP UMMIT WITCH NSTALLATION AND UIDE...
  • Page 49: Accessing The Switch

    • Configuring SNMP • Checking basic connectivity In order for configuration changes to be retained through a switch power cycle or reboot, you must issue a SAVE command after you have made the change. For more information on the SAVE command, refer to...
  • Page 50: Using The Command-Line Interface

    CCESSING WITCH NDERSTANDING THE This section describes the steps to take when entering a command. Refer to the sections that follow for detailed information on using the command-line interface. To use the command-line interface, follow these steps: 1 When entering a command at the prompt, ensure that you have the appropriate privilege level.
  • Page 51: Abbreviated Syntax

    You can add additional port numbers to the list, separated by a comma: port 1-3,6,8 AMES All named components of the switch configuration must have a unique name. Names must begin with an alphabetical character delimited by whitespace, unless enclosed in quotation marks.
  • Page 52: Symbols

    CCESSING WITCH YMBOLS You may see a variety of symbols shown as part of the command syntax. These symbols explain how to enter the command, and you do not type them as part of the command itself. Table 3-1 summarizes command syntax symbols. Table 3-1: Command Syntax Symbols Symbol Description...
  • Page 53: Line-Editing Keys

    DITING Table 3-2 describes the line-editing keys available using the command-line interface. Table 3-2: Line-Editing Keys Key(s) Backspace Delete or [Ctrl] + D [Ctrl] + K Insert Left Arrow Right Arrow Home or [Ctrl] + A End or [Ctrl] + E [Ctrl] + L [Ctrl] + U [Ctrl] + W...
  • Page 54: Common Commands

    CCESSING WITCH OMMON OMMANDS Table 3-3 describes common commands used to manage the switch. Commands specific to a particular feature are described in the other chapters of this guide. Table 3-3: Common Commands Command create account [admin | user] <username>...
  • Page 55 Disables BOOTP for one or more VLANs. Disables the fixed value timer that disconnects all sessions. Once disabled, console sessions remain open until the switch is rebooted. Telnet session remain open until you close the Telnet client. Disables a port. Disables Telnet access to the switch.
  • Page 56: Configuring Management Access

    (>) sign. For example: Summit1:2> An administrator-level account can view and change all switch parameters. It can also add and delete users, and change the password associated with any account name. The administrator can disconnect a management session that has been established by way of a Telnet connection.
  • Page 57: Default Accounts

    EFAULT CCOUNTS By default, the switch is configured with two accounts, as shown in Table 3-4: Default Accounts Account Name admin user HANGING THE EFAULT Default accounts do not have passwords assigned to them. Passwords must have a minimum of 4 characters and can have a maximum of 12 characters.
  • Page 58: Creating A Management Account

    REATING A ANAGEMENT The switch can have a total of sixteen management accounts. You can use the default names (admin and user), or you can create new names and passwords for the accounts. Passwords must have a minimum of 4 characters and can have a maximum of 12 characters.
  • Page 59: Deleting A Switch Account

    Web session, and five Telnet connections). SING THE ONSOLE The command-line interface built into the switch is accessible by way of the 9-pin, RS-232 console port located on the rear of the unit. For more information on the console port pin-outs, refer to Once the connection is established, you will see the system prompt and you may log in.
  • Page 60: Using Telnet

    VT100 emulation is supported. IP P ONFIGURING WITCH In order to manage the switch by way of a Telnet connection or by using an SNMP Network Manager, you must first configure the switch IP parameters. BOOTP S SING A ERVER...
  • Page 61: Manually Configuring The Ip Settings

    By default, BOOTP is enabled on the default VLAN. If you configure the switch to use BOOTP, the switch IP address is not retained through a power cycle, even if the configuration has been saved. To retain the IP address through a power cycle, you must configure the IP address of the VLAN using the command-line interface (CLI), Telnet, or Web interface.
  • Page 62 <ipaddress> {<metric>} For example: config iproute add default 123.45.67.1 7 Save your configuration changes so that they will be in effect after the next switch reboot, by typing save For more information on saving configuration changes, refer to...
  • Page 63: Disconnecting A Telnet Session

    8 When you are finished using the facility, log out of the switch by typing logout ISCONNECTING A The administrator-level account can disconnect a management session that has been established by way of a Telnet connection. If this happens, the user logged in by way of the Telnet connection is notified that the session has been terminated.
  • Page 64: Ip Host Configuration Commands

    CCESSING WITCH IP H ONFIGURATION Table 3-5 describes the commands that are used to configure IP settings on the switch. Table 3-5: IP Host Configuration Commands Command config iparp add <ipaddress> <mac_address> config iparp delete <ipaddress> clear iparp [<ipaddress> | vlan <name> | all] config iproute add <ipaddress>...
  • Page 65: Using Extremeware Vista

    ™ Vista enables you to access the switch over a TCP/IP network, using a standard Web browser. Any properly configured standard Web browser that supports frames (such as Netscape Navigator 3.0 or Microsoft Internet Explorer 3.0) can manage the switch over a TCP/IP network.
  • Page 66: Using Snmp

    Published by Prentice Hall CCESSING WITCH GENTS In order to have access to the SNMP agent residing in the switch, at least one VLAN must have an IP address assigned to it. For more information on assigning IP addresses, refer to UPPORTED Any Network Manager running SNMP can manage the Summit, provided the MIB is installed correctly on the management station.
  • Page 67: Configuring Snmp Settings

    • System name — The system name is the name that you have assigned to this switch. The default name is the model name of the Summit (for example, Summit1). • System location (optional) — Using the system location field, you can enter an optional location for this switch.
  • Page 68: Snmp Configuration Commands

    Configures the name of the switch. A maximum of 255 characters is allowed. The default sysname is the model name of the Summit, such as Summit1, Summit2, Summit3, and so on. The sysname appears in the Summit prompt. Configures the location of the switch. A maximum of 255 characters is allowed.
  • Page 69: Displaying Snmp Settings

    UIDE ETTINGS SNMP ISABLING Description Disables SNMP on the switch. Prevents SNMP traps from being sent from the switch. Does not clear the SNMP trap receivers that have been configured. Restores default values to all SNMP-related entries. SNMP SING Table 3-8.
  • Page 70: Checking Basic Connectivity

    If a request fails, the switch continues to send ping Press any key to interrupt a ping RACEROUTE command enables you to trace the routed path between the switch and traceroute a destination endstation. The traceroute traceroute <ip_address> where is the IP address of the destination endstation.
  • Page 71: Mtrace

    TRACE commands displays the multicast path from a source to a receiver. The mtrace mtrace command syntax is mtrace <group> <source> {<ttl>} where the following is true: • — Is the IP multicast group address. group • —Is the IP source address. source •...
  • Page 72 CCESSING WITCH 3-24 UMMIT WITCH NSTALLATION AND UIDE...
  • Page 73: Configuring Ports

    Configuring Ports Ports on the Summit switch can be configured in the following ways: • Enabling and disabling individual ports • Configuring the port speed (Fast Ethernet ports only) • Configuring half- or full-duplex mode • Creating load-sharing groups on multiple ports •...
  • Page 74: Configuring Port Speed And Duplex Setting

    To configure port speed and duplex setting, use the following command: config port <portlist> auto off {speed [10 | 100]} duplex [half | full] To configure the switch to autonegotiate, use the following command: config port <portlist> auto on URNING...
  • Page 75: Port Commands

    Enables the smart redundancy feature on the redundant Gigabit Ethernet port. When the smart redundancy feature is enabled, the switch always uses the primary link when the primary link is available. The default setting is enabled. Enables autonegotiation for the particular port type;...
  • Page 76 {<portlist>} rxerrors show port {<portlist>} stats Description Disables the smart redundancy feature. If the feature is disabled, the switch changes the active link only when the current active link becomes inoperable. Displays real-time collision statistics. Displays the port configuration, including the...
  • Page 77: Load Sharing

    If the failed port becomes active again, traffic is redistributed to include that port. Load sharing is most useful in cases where the traffic transmitted from the switch to the load-sharing group is sourced from an equal or greater number of ports on the switch.
  • Page 78: Configuring Load Sharing

    Table 4-2, Table 4-3, Table 4-4, port group combinations for the Summit1, Summit2, Summit3, Summit4 and Summit4/FX, and Summit48, respectively. Table 4-2: Port Combinations for the Summit1 Load-Sharing Group 4-port groups 2-port groups...
  • Page 79: Port Combinations For The Summit4 And Summit4/Fx

    Table 4-5: Port Combinations for the Summit4 and Summit4/FX Load-Sharing Group 4-port groups 2-port groups Table 4-6: Port Combinations for the Summit48 Load-Sharing Group 1 2 3 4 5 6 7 8 9 4-port groups x x x x x x x x x x x x x x x x x x x x x x x x 2-port groups x x x x x x x x x x x x x x x x x x x x x x x x Load-Sharing...
  • Page 80: Port-Mirroring

    Port-mirroring configures the switch to copy all traffic associated with one or more ports to a monitor port on the switch. The monitor port can be connected to a network analyzer or RMON probe for packet analysis. The switch uses a traffic filter that copies a group of traffic to the monitor port.
  • Page 81: Port-Mirroring Commands

    3 config mirroring add port 1 The following example sends all traffic coming into or out of the switch on port 1 and the VLAN default to the mirror port: config mirroring add port 1 vlan default...
  • Page 82: Summit Virtual Chassis

    UMMIT WITCH Table 4-8 describes the Summit switch ports that can be used to connect to one, two, or four Summit Virtual Chassis units. Table 4-8: Summit Ports to Use to Connect to the Summit Virtual Chassis One Virtual Chassis...
  • Page 83 XTREME ISCOVERY The Extreme Discovery Protocol (EDP) is used to locate neighbor Extreme Networks switches connected to the Summit Virtual Chassis. When running on a normal switch port, EDP is used to by the Summit switches to exchange topology information with each other.
  • Page 84: Summit Virtual Chassis Commands

    ONFIGURING ORTS UMMIT IRTUAL HASSIS Table 4-9 lists commands that are used on the Summit switch to connect it to a Summit Virtual Chassis. Table 4-9: Summit Virtual Chassis Commands Command show edp enable summitlink port <portlist> disable summitlink port <portlist>...
  • Page 85: Vlans And Summit Switches Using The Virtual Chassis

    The VLAN default is joined by all Summit switches that are connected to a Summit Virtual Chassis stack. This is because the VLAN name default exists on all Summits, and the explicit 802.1Q tag value is 1 on each switch. UMMIT...
  • Page 86 ONFIGURING ORTS 4-14 UMMIT WITCH NSTALLATION AND UIDE...
  • Page 87: Irtual Lan

    The term VLAN is used to refer to a collection of devices that communicate as if they were on the same physical LAN. Any set of ports (including all ports on the switch) is considered a VLAN. LAN segments are not restricted by the hardware that physically connects them.
  • Page 88: Types Of Vlans

    • A combination of these criteria VLAN ASED In a port-based VLAN, a VLAN name is given to a group of one or more ports on the switch. A switch port can be a member of only one port-based VLAN. UMMIT WITCH NSTALLATION AND...
  • Page 89: Spanning Switches With Port-Based Vlans

    6 are part of VLAN Sales; and ports 7 and 8 are in VLAN Finance. Figure 5-1: Example of a port-based VLAN Even though they are physically connected to the same switch, for the members of the different VLANs to communicate, the traffic must go through the IP routing functionality provided in the Summit.
  • Page 90: Single Port-Based Vlan Spanning Two Switches

    In a port-based VLAN, to create multiple VLANs that span two switches, a port on Switch 1 must be cabled to a port on Switch 2 for each VLAN you want to have span across the switches. At least one port on each switch must be a member of the corresponding VLANs, as well.
  • Page 91: Tagged Vlans

    VLANs spanning two switches. On Switch 1, ports 1-4 are part of VLAN Accounting; ports 5 - 8 are part of VLAN Engineering. On Switch 2, ports 1-4 are part of VLAN Accounting; ports 5 - 8 are part of VLAN Engineering. VLAN Accounting spans Switch 1 and Switch 2 by way of a connection between Switch 1 port 2 and Switch 2 port 4.
  • Page 92: Uses Of Tagged Vlans

    802.1Q tag defined, you decide whether each port will use tagging for that VLAN. The default mode of the switch is to have all ports assigned to the VLAN named “default,” with an 802.1Q VLAN tag (VLANid) of 1 assigned.
  • Page 93: Physical Diagram Of Tagged And Untagged Traffic

    Figure 5-4 illustrates the physical view of a network that uses tagged and untagged traffic. Switch 1 802.1Q Tagged server Switch 2 Figure 5-4: Physical diagram of tagged and untagged traffic Figure 5-5 shows a logical diagram of the same network.
  • Page 94: Generic Vlan Registration Protocol

    • The trunk port on each switch is tagged. • The server connected to port 1 on Switch 1 has a NIC that supports 802.1Q tagging. • The server connected to port 1 on Switch 1 is a member of both VLAN Marketing and VLAN Sales.
  • Page 95: Network Example Using Gvrp

    VLAN tag 10." Figure 5-6: Network example using GVRP In Figure 5-6, Switch A is a member of VLAN Red. VLAN Red has the VLANid 10. Port 1 and port 2 on Switch A are added to the VLAN as untagged.
  • Page 96: Gvrp Commands

    (VLAN IRTUAL VLANs that are automatically created using GVRP with the VLANid 10 are given names in the following format: gvrp vlan xxxx where xxxx is the VLANid (in decimal) that is discovered by GVRP. These VLANs are not permanently stored in NVRAM, and you cannot add or remove ports from these VLANs.
  • Page 97: Protocol-Based Vlans

    ROTOCOL ASED Protocol-based VLANs enable you to define a packet filter that the Summit uses as the matching criteria to determine if a particular packet belongs to a particular VLAN. Protocol-based VLANs are most often used in situations where network segments contain hosts running multiple protocols.
  • Page 98: Predefined Protocol Filters

    (VLAN IRTUAL REDEFINED ROTOCOL ILTERS The following protocol filters are predefined on the Summit: • IP • IPX • NetBIOS • DECNet • IPX_8022 • IPX_SNAP • AppleTalk EFINING ROTOCOL ILTERS If necessary, you can define a customized protocol filter based on EtherType, LLC, and/or SNAP.
  • Page 99: Deleting A Protocol Filter

    — — Ethertype inside an IEEE SNAP packet encapsulation. snap The values for config protocol fred add llc feff config protocol fred add snap 9999 A maximum of seven protocol filters, each containing a maximum of six protocols, can be defined, however no more than seven protocol should be active and configured for use.
  • Page 100: Default Vlan

    If another switch is connected to it, the VLAN names have no significance to the other switch. The exception to this is when a switch is connected to a Summit Virtual Chassis. In this case, the VLAN name is used as part of the connectivity negotiation process.
  • Page 101 VLAN are in STP forwarding mode. The default setting is disabled. Configures an IEEE 802.1Q Ethertype. Use this command only if you have another switch that supports 802.1Q, but uses a different Ethertype value than 8100. Configures a protocol filter. Supported <protocol_type>...
  • Page 102 (VLAN IRTUAL VLAN C ONFIGURATION The following example creates a port-based VLAN named accounting, assigns the IP address 132.15.121.1, and assigns ports 1, 2, 3, and 6 to it: create vlan accounting config accounting ipaddress 132.15.121.1 config default delete port 1-3, 6 config accounting add port 1-3,6 Because VLAN names are unique, you do not need to enter the keyword after you have created the unique VLAN name.
  • Page 103 ISPLAYING To display VLAN settings, use the following command: show vlan {<name> | all} Sample output from this command is as follows: show vlan all VLAN Interface [1-fde] with name “net142” created by user Tagging: STPD: Protocol QoS Profile: Ports: LAN Interface [2-fdd] with name “net123”...
  • Page 104: Vlan Delete And Reset Commands

    (VLAN IRTUAL • Tagged/untagged status for each port • How the ports were added to the VLAN (manually or by GVRP) To display protocol information, use the following command: show protocol {<protocol> | all} This command displays protocol information, including the following: show •...
  • Page 105 Switch Forwarding Database (FDB) This chapter describes the contents of the switch forwarding database (FDB), how the FDB works, and how to configure the FDB. VERVIEW OF THE The Summit maintains a database of all media access control (MAC) addresses received on all of its ports.
  • Page 106 This means that they do not age, but they are still deleted if the switch is reset. • Permanent entries — Permanent entries are retained in the database if the switch is reset or a power off/on cycle occurs. The system administrator must make entries permanent.
  • Page 107: Fdb Configuration Commands

    The FDB treats the entry like a dynamic entry (it is learned, it can be aged out of the database, and so on). The switch applies the QoS profile as soon as the FDB entry is learned.
  • Page 108 (FDB) WITCH ORWARDING ATABASE Table 6-1: FDB Configuration Commands (continued) Command disable learning port <portlist> FDB C ONFIGURATION This example adds a permanent entry to the FDB: create fdbentry 00:E0:2B:12:34:56 vlan marketing port 4 The permanent entry has the following characteristics: •...
  • Page 109 ISPLAYING To display FDB entries, use the command show fdb {all | <mac_address> | vlan <name> | <portlist> | permanent | qos} where the following is true: • — Displays all FDB entries. • — Displays the entry for a particular MAC address. mac_address —...
  • Page 110: Removing Fdb Entry Commands

    — Dynamic entry learned by the switch — MAC address entry — MAC address entry that is used for IP routing • Port • Hash and PTAG entries (used by Extreme Networks technical support only) FDB E EMOVING NTRIES You can remove one or more specific entries from the FDB, or you can clear the entire...
  • Page 111: Spanning Tree Domains

    The following sections explain more about STP and the STP features supported by the switch. STP is a part of the 802.1D bridge specification defined by the IEEE Computer Society. To explain STP in terms used by the 802.1D specification, the Summit will be referred to as a bridge.
  • Page 112: Defaults

    • Manufacturing is defined on Switch Y, Switch Z, and Switch M. • Engineering is defined on Switch Y, Switch Z, and Switch M. • Marketing is defined on all switches (Switch A, Switch B, Switch Y, Switch Z, and Switch M).
  • Page 113: Multiple Spanning Tree Domains

    7-1, the connection between Switch A and Switch B is put into blocking state, and the connection between Switch Y and Switch Z is put into blocking state. After STP converges, all the VLANs can communicate, and all bridging loops are prevented.
  • Page 114: Tag-Based Stp Configuration

    STP topology. • All VLANs in each switch are members of the same STPD. STP may block traffic between Switch 1 and Switch 3 by disabling the trunk ports for that connection on each switch. Switch 2 has no ports assigned to VLAN marketing. Therefore, if the trunk for VLAN marketing on Switches 1 and 3 is blocked, the traffic for VLAN marketing will not be able to traverse the switches.
  • Page 115 ONFIGURING STP configuration involves the following actions: • Create one or more STP domains using the following command: create stpd <stpd_name> STPD, VLAN, and QoS profile names must all be unique. For example, a name used to identify a VLAN cannot be used when you create an STPD or a QoS profile.
  • Page 116: Stp Configuration Commands

    2 seconds. Specifies the time (in seconds) that the ports in this STPD spend in the listening and learning states when the switch is the Root Bridge. The range is 4 through 30. The default setting is 15 seconds. Specifies the maximum age of a BPDU in this STPD.
  • Page 117 UIDE Description Specifies the path cost of the port in this STPD. The range is 1 through 65,535. The switch automatically assigns a default path cost based on the speed of the port, as follows: For a 10Mbps port, the default cost is 100.
  • Page 118 (STP) PANNING ROTOCOL STP S ISPLAYING ETTINGS To display STP settings for all ports, use the following command: show stpd {<stpd_name> | all} This command displays the following information: • STPD name • Bridge ID • STPD configuration information Sample output from the command is as follows: show stpd Stpd:s0 Stp:DISABLED...
  • Page 119: Stp Disable And Reset Commands

    ISABLING AND To disable STP or return STP settings to their defaults, use the commands listed in Table 7-2. Table 7-2: STP Disable and Reset Commands Command delete stpd <stpd_name> disable stpd [<stpd_name> | all] disable stpd port <portlist> unconfig stpd {<stpd_name> | all} UMMIT WITCH NSTALLATION AND...
  • Page 120 (STP) PANNING ROTOCOL 7-10 UMMIT WITCH NSTALLATION AND UIDE...
  • Page 121: Building Blocks

    The main benefit of QoS is that it allows you to have control over the types of traffic that receive enhanced service from the switch. For example, if video traffic requires a higher priority than data traffic, using QoS you can assign a different QoS profile to those VLANs that are transmitting video traffic.
  • Page 122: Qos Mode

    The lowest possible value is 0%. • Maximum bandwidth — The maximum percentage of bandwidth that the traffic is permitted to use. • Priority — The level of priority in which the traffic will be serviced by the switch. Choices include: — Low —...
  • Page 123: Traffic Groupings

    — Medium — High A QoS profile does not alter the behavior of the switch until it is assigned to a traffic classification. The details of the default profiles are shown in Table 8-1. Table 8-1: Default QoS Profiles Profile Name...
  • Page 124: P Values And Associated Qos Profiles

    UALITY OF ERVICE • Destination MAC address — When making a permanent FDB entry, you can provide a QoS profile. You can also provide a QoS profile that will be bound to a dynamic FDB entry when the MAC address is learned. This is configured using the following command: create fdbentry <mac addr>...
  • Page 125: Egress Traffic Groupings

    • VLAN — Configuration is as described in the section, “Ingress Traffic Groupings,” except that bandwidth parameters of the QoS profile are observed. In order to use ipqos traffic groupings, you must change the devicemode of the switch to ipqos RECEDENCE...
  • Page 126: Prioritization

    UALITY OF ERVICE RIORITIZATION Prioritization is used when there is bandwidth contention for transmission on a port. The four levels of priority are used as a mechanism for resolving the contention between traffic groups. If traffic groups have the same priority, a “round-robin” algorithm is applied.
  • Page 127: Port Queue Monitor

    You can assign a QoS profile to an IP address by using the following command: config ipqos [add | delete] <ip_destination_address> qosprofile <qosname> UEUE There are four queues per physical port in the Summit. In ingress mode, the four QoS profiles align to the four queues (for example, qp1 to the first queue, qp2 to the second queue, and so on).
  • Page 128: Configuring Qos

    UALITY OF ERVICE ONFIGURING Table 8-4 describes the commands used to configure QoS. Table 8-4: QoS Configuration Commands Command enable pace create qosprofile <qosname> config qosmode [ingress | egress] config qosprofile <qosname> {minbw <percent>} {maxbw <percent>} {priority <level>} config port <portlist> qosprofile <qosname> config vlan <name>...
  • Page 129: Sample Ingress Mode Qos Configuration

    • Applies the QoS profile mktgqos to a range of IP addresses. The steps to configure this example are as follows: 1 Configure the switch for the egress mode, by typing the following: config qosmode egress 2 Reboot the switch.
  • Page 130: Displaying Qos Information

    UALITY OF ERVICE ISPLAYING NFORMATION To display QoS information on the switch, use the following command: show qosprofile {<qosname> | all} Information displayed includes: • QoS profile name • Minimum bandwidth • Maximum bandwidth • Priority • A list of all traffic groups assigned to the QoS profile...
  • Page 131: Ip Unicast Routing

    IP Unicast Routing This chapter describes how to configure IP routing on the Summit. It assumes that you are already familiar with IP unicast routing. If not, refer to the following publications for additional information: RFC 1058 — Routing Information Protocol RFC 1256 —...
  • Page 132: Router Interfaces

    IP U NICAST OUTING OUTER NTERFACES The routing software and hardware routes IP traffic between router interfaces. A router interface is simply a VLAN that has an IP address assigned to it. As you create VLANs with IP addresses belonging to different IP subnets, you can also choose to route between the VLANs.
  • Page 133: Populating The Routing Table

    OPULATING THE The Summit maintains an IP routing table for both network routes and host routes. The table is populated from the following sources: • Dynamically, by way of routing protocol packets or ICMP redirects exchanged with other routers • Statically, by way of routes entered by the administrator —...
  • Page 134: Static Routes

    ARP has been expended since its introduction. Currently, proxy ARP can be used to achieve router redundancy and simplify IP client configuration. The Summit switch supports proxy ARP for this type of network configuration. Up to 64 proxy ARP entries can be configured.
  • Page 135: Proxy Arp Between Subnets

    • The valid IP ARP Request is received on a Summit router interface. • The target IP address matches the IP address configured in the proxy ARP table. • The proxy ARP table entry indicates that the switch should always answer this ARP Request (the parameter must be applied).
  • Page 136: Ip Multinetting Operation

    IP U NICAST OUTING The following rules apply when you are configuring IP multinetting: • A maximum of one IP address is associated with a router interface (or VLAN). • Multiple VLANs must be used to implement IP multinetting. • A maximum of four subnets are allowed on one multinetted port. •...
  • Page 137: Ip Multinetting Examples

    11 If you are using RIP, disable RIP on the dummy VLANs. config rip delete net22 IP M ULTINETTING The following example configures the switch to have one multinetted segment (port 5) that contains three subnets (192.67.34.0, 192.67.35.0, and 192.67.37.0). config default delete port 5 create protocol mnet...
  • Page 138 IP U NICAST OUTING The following example configures the switch to have one multinetted segment (port 5) that contains three subnets (192.67.34.0, 192.67.35.0, and 192.67.37.0). It also configures a second multinetted segment consisting of two subnets (192.67.36.0 and 192.99.45.0). The second multinetted segment spans three ports (port 8, port 9, and port 10).
  • Page 139: Configuring Ip Unicast Routing

    {vlan <name> | all} • Turn on RIP or OSPF using one of the following commands: enable rip enable ospf Only one routing protocol, either RIP or OSPF, can be enabled on the switch at any given time. UMMIT WITCH...
  • Page 140 NICAST Use the command to display the current configuration of IP unicast show iproute routing for the switch, and for each VLAN. The currently configured routes, and includes how each route was learned. Additional verification commands include the following: •...
  • Page 141: Configuring Dhcp/Bootp Relay

    This command displays the configuration of the BOOTP relay service, and the addresses that are currently configured. Table 9-1 describes the commands used to configure basic IP settings on the switch. Table 9-1: Basic IP Commands Command enable bootp vlan [<name> | all] enable bootprelay enable ipforwarding {vlan <name>...
  • Page 142 When <mask> is not specified, a how address with the mask 255.255.255.255 is assumed. When <mac_address> is not specified, the MAC address of the switch is used in the ARP Response. When always is specified, the switch answers ARP Requests without filtering requests that belong to the same subnet of the receiving router interface.
  • Page 143: Route Table Configuration Commands

    Table 9-2 describes the commands used to configure the IP route table. Table 9-2: Route Table Configuration Commands Command enable iproute sharing config ipqos add <ip_destination_address> <mask> qosprofile <qosname> config ipqos delete <ip_destination_address> <mask> config iproute add <ipaddress> <mask> <gateway> <metric> config iproute delete <ipaddress>...
  • Page 144: Icmp Configuration Commands

    IP U NICAST OUTING Table 9-3 describes the commands used to configure the ICMP protocol. Table 9-3: ICMP Configuration Commands Command enable icmp redirects {vlan <name> | all} enable icmp unreachables {vlan <name> | all} enable icmp useredirects enable irdp {vlan <name> | all} config irdp [multicast | broadcast] config irdp <mininterval>...
  • Page 145: Routing Configuration Example

    {vlan <name> | all} OUTING ONFIGURATION Figure 9-2 illustrates a switch that has three VLANs defined as follows: • Finance — Protocol-sensitive VLAN using the IP protocol — Ports 1 and 3 have been assigned — IP address 192.207.35.1 •...
  • Page 146: Unicast Routing Configuration Example

    IP U NICAST OUTING 192.207.35.1 My Company 192.207.35.0 Finance NetBIOS NetBIOS Figure 9-2: Unicast routing configuration example The stations connected to ports 1 through 4 generate a combination of IP traffic and NetBIOS traffic. The IP traffic is filtered by the protocol-sensitive VLANs. All other traffic is directed to the VLAN MyCompany.
  • Page 147: Displaying Router Settings

    VLANs, including the following: Displays the IP QoS table. Displays IP statistics for the CPU of the switch. Displays the IP Address Resolution Protocol (ARP) table. You can filter the display by IP address, VLAN, or permanent entries. Each...
  • Page 148: Router Reset And Disable Commands

    IP U NICAST OUTING Table 9-4: Router Show Commands (continued) Command show ipfdb {<ipaddress> <netmask> | vlan <name> | all} show iproute vlan {<name> | all | permanent | <ipaddress> <mask>} ESETTING AND ISABLING To return router settings to their defaults and disable routing functions, use the commands listed in Table 9-5.
  • Page 149: Routing Protocols

    Published by Addison-Wesley Publishing Company VERVIEW The Summit switch supports the use of either the Routing Information Protocol (RIP) or the Open Shortest Path First (OSPF) protocol for IP unicast routing. RIP is a distance vector protocol, based on the Bellman-Ford (or distance vector) algorithm.
  • Page 150: Rip Versus Ospf

    OUTING ROTOCOLS RIP V OSPF ERSUS The distinction between RIP and OSPF lies in the fundamental differences between distance vector protocols and link state protocols. Using a distance vector protocol, each router creates a unique routing table from summarized information obtained from neighboring routers.
  • Page 151: Overview Of Rip

    VERVIEW OF VERVIEW OF RIP is an Interior Gateway Protocol (IGP) first used in computer routing in the ARPAnet as early as 1969. It is primarily intended for use in homogeneous networks of moderate size. To determine the best path to a distant network, a router using RIP always selects the path that has the least number of hops.
  • Page 152: Triggered Updates

    OUTING ROTOCOLS RIGGERED PDATES Triggered updates occur whenever a router changes the metric for a route, and it is required to send an update message immediately, even if it is not yet time for a regular update message to be sent. This will generally result in faster convergence, but may also result in more RIP-related traffic.
  • Page 153: Overview Of Ospf

    OSPF VERVIEW OF OSPF VERVIEW OF OSPF is a link state protocol that distributes routing information between routers belonging to a single IP domain, also known as an autonomous system. In a link state routing protocol, each router maintains a database describing the topology of the autonomous system.
  • Page 154: Area 0

    OUTING ROTOCOLS The three types of routers defined by OSPF are as follows: • Internal Router (IR) An internal router has all of its interfaces within the same area. • Area Border Router (ABR) An ABR has interfaces in multiple areas. It is responsible for exchanging Summary Advertisements with other ABRs.
  • Page 155: Virtual Links

    IRTUAL INKS In the situation when a new area is introduced that does have a direct physical attachment to the backbone, a virtual link is used. A virtual link provides a logical path between the ABR of the disconnected area and the ABR of the backbone. A virtual link must be established between two ABRs that have a common area, with one ABR connected to the backbone.
  • Page 156: Configuring Rip

    Enables RIP. The default setting is disabled. Enables RIP aggregation of subnet information an interface configured to sent RIP v2 or RIP v2-compatible traffic. The switch summarizes subnet routes to the nearest class network route. The following rules apply when using...
  • Page 157 Table 10-1: RIP Configuration Commands (continued) Command config rip add {vlan <name> | all} config rip delete [vlan <name> | all] config rip garbagetime {<delay>} config rip routetimeout {<delay>} config rip rxmode [none | v1only | v2only | any] {vlan <name> | all} config rip txmode [none | v1only | v1comp | v2only] {vlan <name>...
  • Page 158: Rip Configuration Example

    {<delay>} RIP C ONFIGURATION Figure 10-4 illustrates a switch that has three VLANs defined as follows: • Finance — Protocol-sensitive VLAN using the IP protocol — Ports 1 and 3 have been assigned — IP address 192.207.35.1 •...
  • Page 159: Rip Configuration Example

    192.207.35.1 192.207.35.0 Finance NetBIOS Figure 10-4: RIP configuration example The stations connected to ports 1 through 4 generate a combination of IP traffic and NetBIOS traffic. The IP traffic is filtered by the protocol-sensitive VLANs. All other traffic is directed to the VLAN MyCompany. In this configuration, all IP traffic from stations connected to ports 1 and 3 have access to the router by way of the VLAN Finance.
  • Page 160: Displaying Rip Settings

    OUTING ROTOCOLS config Finance ipaddress 192.207.35.1 config Personnel ipaddress 192.207.36.1 enable ipforwarding config rip add vlan all enable rip RIP S ISPLAYING ETTINGS To display settings for RIP, use the commands listed in Table 10-2: RIP Show Commands Command show rip {vlan <name> | all} show rip stat {vlan <name>...
  • Page 161: Resetting And Disabling Rip

    ESETTING AND To return RIP settings to their defaults, or to disable RIP, use the commands listed in Table 10-3. Table 10-3: RIP Reset and Disable Commands Command config rip delete [vlan <name> | all] disable rip disable rip aggregation disable rip splithorizon disable rip poisonreverse disable rip triggerupdate...
  • Page 162: Configuring Ospf

    OUTING ROTOCOLS OSPF ONFIGURING Table 10-4 describes the commands used to configure OSPF. Table 10-4: OSPF Configuration Commands Command create ospf area <areaid> enable ospf enable ospf exportstatic type [1 | 2] config ospf [vlan <name> | area <areaid> | virtual-link <routerid>...
  • Page 163 Deletes a range of IP addresses in an OSPF area. Configures the OSPF router ID. If automatic is specified, the switch uses the largest IP interface address as the OSPF router ID. The default setting is automatic. Configures the timers for one interface or all interfaces in the same OSPF area.
  • Page 164: Ospf Configuration Example

    OUTING ROTOCOLS OSPF C ONFIGURATION XAMPLE Figure 10-5 shows an example of an autonomous system using OSPF routers. The details of this network follow. Area 0 IR 2 IR 1 10.0.1.1 10.0.1.2 10.0.3.2 10.0.2.2 Headquarters ABR 2 ABR 1 10.0.3.1 10.0.2.1 160.26.25.1 160.26.26.1...
  • Page 165 Area 5 is connected to the backbone area by way of ABR1 and ABR2. It is located in Chicago and has the following characteristics: • Network number 160.26.x.x • 1 identified VLAN (Chi_160_26_26) • 2 internal routers • A virtual link from ABR1 to ABR2 that traverses both internal routers. In the event that the link between either ABR and the backbone fails, the virtual link provides a connection for all routers that become discontiguous from the backbone.
  • Page 166: Ospf Show Commands

    OUTING ROTOCOLS config ospf area 0.0.0.6 stub nosummary stub-default-cost 10 config ospf vlan LA_161_48_2 area 0.0.0.6 config ospf vlan Chi_160_26_2 area 0.0.0.5 config ospf add virtual-link 160.26.25.1 0.0.0.5 config ospf add vlan all enable ospf ONFIGURATION FOR The following is the configuration for the router labeled IR1: config vlan HQ_10_0_1 ipaddress 10.0.1.2 255.255.255.0 config vlan HQ_10_0_2 ipaddress 10.0.2.2 255.255.255.0 config ospf add vlan all...
  • Page 167: Ospf Reset And Disable Commands

    ESETTING AND To return OSPF settings to their defaults, use the commands listed in Table 10-6: OSPF Reset and Disable Commands Command config ospf delete [vlan <name> | all] delete ospf area [<areaid> | all] disable ospf disable ospf exportstatic UMMIT WITCH NSTALLATION AND...
  • Page 168 OUTING ROTOCOLS 10-20 UMMIT WITCH NSTALLATION AND UIDE...
  • Page 169: Ip Multicast Routing

    IP Multicast Routing This chapter describes the components of IP multicast routing, and how to configure IP multicast routing on the Summit. For more information on IP multicasting, refer to RFC 1112, RFC 1075, RFC 2236, and other more recent Internet draft documents. VERVIEW IP multicast routing is a function that allows a single IP host to send a packet to a group of IP hosts.
  • Page 170: Dvmrp Overview

    IGMP S NOOPING IGMP snooping adds intelligence to a layer 2 device (such as a switch), to reduce the flooding of IP multicast traffic. The goal of IGMP snooping is to optimize the usage of network bandwidth and prevent multicast traffic from being flooded to parts of the network that do not need to see it.
  • Page 171: Ip Multicast Routing Configuration Commands

    NSTALLATION AND UIDE IP M ONFIGURING Description Enables DVMRP on the switch. The default setting is disabled. interface. If all is specified, all configured IP interfaces are affected. When new IP interfaces are added, ipforwarding is disabled by default. Enables DVMRP on an IP interface. When an IP interface is created, DVMRP is enabled by default.
  • Page 172: Igmp Configuration Commands

    Description Configures the global DVMRP timers. Specify the following: route_report_interval — The amount of time the switch waits between transmitting periodic route report packets. The range is 1 to 4294967296 seconds (136 years). The default setting is 60 seconds. route_replacement_time — The...
  • Page 173 Configures the IGMP timers. Timers are based on RFC2236. Specify the following: query_interval — The amount of time, in seconds, the switch waits between sending out General Queries. The range is 1 to 4294967296 seconds (136 years). The default setting is 125 seconds.
  • Page 174: Configuration Example

    ULTICAST OUTING ONFIGURATION XAMPLE Figure 11-1 is used in Chapter 10 Chapter 10 for more information about configuring OSPF. In this example, the switch labeled IR1 is configured for IP multicast routing. Area 0 IR 2 10.0.3.2 Headquarters ABR 2 160.26.25.1...
  • Page 175: Configuration For Ir1

    ONFIGURATION FOR The following is the configuration for the router labeled IR1: config vlan HQ_10_0_1 ipaddress 10.0.1.2 255.255.255.0 config vlan HQ_10_0_2 ipaddress 10.0.2.2 255.255.255.0 config ospf add vlan all enable ipforwarding enable ospf enable ipmcforwarding config dvmrp add vlan all enable dvmrp ISPLAYING To display settings for IP multicast routing components, use the commands listed in...
  • Page 176: Ip Multicast Routing Reset And Disable Commands

    IP M ULTICAST ETTINGS Table 11-4. Description Disables DVMRP on the switch. Disables IP multicast forwarding. Disables IGMP on a router interface. Disables IGMP snooping. Resets the DVMRP timers to their default settings. Resets all IGMP settings to their default values and clears the IGMP group table.
  • Page 177: Status Monitoring And Statistics

    Status Monitoring and Statistics This chapter describes how to view the current operating status of the switch, how to display information in the switch log, and how to take advantage of the RMON capabilities available in the switch. Viewing statistics on a regular basis allows you to see how well your network is performing.
  • Page 178 {<ipaddress> | vlan <name> | all} 12-2 Description Displays the current switch configuration to the terminal. You can then capture the output and store it as a file. Displays switch software diagnostics. Displays the DVMRP configuration and statistics, or the unicast route table.
  • Page 179 Table 12-1: Switch Monitoring Commands (continued) Command show ipmc cache {<group> {<src_ipaddress> <mask>}} | all} show ipqos {<ip_destination_address> <mask> | all} show iproute vlan {<name> | all | permanent | <ipaddress> <mask>} show ipstats {vlan [<name> | all]} show log {<priority>} {<subsystem>}...
  • Page 180 TATUS ONITORING AND TATISTICS Table 12-1: Switch Monitoring Commands (continued) Command show management show memory show mirroring show ospf show ospf area {<areaid> | all} show ospf interfaces {vlan <name> | area <areaid> | all} show ospf lsdb {detail} {area <areaid> |...
  • Page 181 Table 12-1: Switch Monitoring Commands (continued) Command show port {<portlist>} information show port {<portlist>} packet show port {<portlist>} qosmonitor show port {<portlist>} rxerrors show port {<portlist>} stats show port {<portlist>} txerrors show port {<portlist>} utilization show protocol {<protocol> | all} show qosmonitor show qosprofile {<qosname>...
  • Page 182 TATUS ONITORING AND TATISTICS Table 12-1: Switch Monitoring Commands (continued) Command show rip stat {vlan <name> | all} show session show stpd {<stpd_name> | all} show stpd <stpd_name> port <portlist> show switch 12-6 Description Displays RIP-specific statistics. Statistics include the...
  • Page 183: Port Statistics

    The Summit provides a facility for viewing port statistic information. The summary information lists values for the current counter against every port on the switch, and it is refreshed approximately every two seconds. Values are displayed to nine digits of accuracy.
  • Page 184: Port Errors

    To view port transmit errors, use the following command: show port <portlist> txerrors The following port transmit error information is collected by the switch: • Link Status — The current status of the link. Options are — Ready — The port is ready to accept a link.
  • Page 185: Port Monitoring Display Keys

    The following port receive error information is collected by the switch: • Receive Bad CRC Frames (RX CRC) — The total number of frames received by the port that were of the correct length, but contained a bad FCS value.
  • Page 186: Switch Logging

    A noncritical error that may lead to a function failure. Informational Actions and events that are consistent with expected behavior. • Subsystem — The facility refers to the specific functional area of the switch to which the error refers. Table 12-4...
  • Page 187: Local Logging

    TIME ISPLAY In addition to viewing a snapshot of the switch log, you can configure the switch to maintain a running real-time display of log messages on the console. To turn on the log display, enter the following command:...
  • Page 188: Remote Logging

    (more critical). Priorities include critical, warning, and informational. If not specified, only critical priority messages are sent to the syslog host. • — Filters the log to display messages associated with the selected switch subsystem subsystem. Subsystems include Syst, STP Brdg, SNMP, Telnet, VLAN, and Port. If not specified, all subsystems are sent to the syslog host.
  • Page 189: Logging Commands

    — Filters the log to display messages associated with the selected switch subsystem. Subsystems include Syst, STP Brdg, SNMP, Telnet, VLAN, and Port. If not specified, all subsystems are displayed. Configures the syslog host address and filter messages sent to the syslog host.
  • Page 190: Rmon

    The following sections explain more about the RMON concept and the RMON features supported by the Summit. You can only use the RMON features of the switch if you have an RMON management application. RMON...
  • Page 191: Rmon Features Of The Switch

    A typical RMON setup consists of the following two components: • RMON probe — An intelligent, remotely controlled device or software agent that continually collects statistics about a LAN segment or VLAN. The probe transfers the information to a management workstation on request, or when a predefined threshold is crossed.
  • Page 192: Alarms

    RMON requires one probe per LAN segment, and standalone RMON probes have traditionally been expensive. Therefore, Extreme’s approach has been to build an inexpensive RMON probe into the agent of each switch. This allows RMON to be widely deployed around the network without costing more than traditional network management.
  • Page 193: Event Actions

    VENT CTIONS The actions that you can define for each alarm are shown in Table 12-6: Event Actions Action No action Notify only Notify and log To be notified of events using SNMP traps, you must configure one or more trap receivers, as described in UMMIT WITCH...
  • Page 194 TATUS ONITORING AND TATISTICS 12-18 UMMIT WITCH NSTALLATION AND UIDE...
  • Page 195: Using Extremeware Vista

    Using ExtremeWare Vista ExtremeWare Vista is device-management software running in the Summit that allows you to access the switch over a TCP/IP network, using a standard Web browser. Any properly configured standard Web browser that supports frames (such as Netscape Navigator 3.0 or higher, or Microsoft Internet Explorer 3.0 or higher) can be used to...
  • Page 196: Setting Up Your Browser

    • Turn off one or more of the browser toolbars to maximize the viewing space of the ExtremeWare Vista content screen. • If you will be using ExtremeWare Vista to send an e-mail to the Extreme Networks Technical Support department, configure the e-mail settings in your browser.
  • Page 197 When you access the home page of the switch, you are presented with the Login screen. Enter your user name and password in the appropriate fields, and click OK. If you have entered the name and password of an administrator-level account, you have access to all ExtremeWare Vista pages.
  • Page 198: Task Frame

    SING XTREME ISTA RAME The task frame has two sections. At the top of the task frame are the task tabs. There are four task tabs, as follows: • Configuration • Statistics • Support • Logout Below the task tabs are options. Options are specific to the task tab that you select. When you select an option, the information displayed in the content frame changes.
  • Page 199: Status Messages

    At the bottom of some of the content frames is a section that contains standalone buttons. Standalone buttons are used to perform tasks that are not associated with a particular configuration option. An example of this is the Reboot Switch button. AVING...
  • Page 200 3 From Microsoft Internet Explorer, select Save As File from the File menu, and enter a name for the file. 4 Attach the file to the e-mail message that you are sending to Extreme Networks. 13-6 VLAN...
  • Page 201: Software Upgrade And Boot Options

    MAGE The image file contains the executable code that runs on the Summit. It comes preinstalled on the switch from the factory. As new versions of the image are released, you should upgrade the software running on your switch. The image is upgraded by using a download procedure from either a TFTP server on the network or from a PC connected to the serial port using the XMODEM protocol.
  • Page 202: Rebooting The Switch

    (primary or secondary) you want the new image to be placed. You can select which image the switch will load on the next reboot by using the following command:...
  • Page 203 Settings that are stored in run-time memory are not retained by the switch when the switch is rebooted. To retain the settings, and have them be loaded when you reboot the switch, you must save the configuration to nonvolatile RAM (NVRAM).
  • Page 204: Using Tftp To Upload The Configuration

    • Modify the configuration using a text editor, and later download a copy of the file to the same switch, or to one or more different switches. • Send a copy of the configuration file to Extreme Networks Technical Support for problem-solving purposes.
  • Page 205: Boot Option Commands

    If no parameters are specified, the image is saved to the current image. Reboots the switch at the date and time specified. If you do not specify a reboot time, the reboot happens immediately following the command, and any previously scheduled reboots are cancelled.
  • Page 206 OFTWARE PGRADE AND PTIONS 14-6 UMMIT WITCH NSTALLATION AND UIDE...
  • Page 207: A Safety Information

    MPORTANT Please read the following safety information thoroughly before installing the Summit switch. • Installation and removal of the unit must be carried out by qualified personnel only. • To reduce the risk of fire or electrical shock, install the unit in a temperature- and humidity-controlled indoor area free of conductive contaminants.
  • Page 208: Power Cord

    AFETY NFORMATION • This unit operates under Safety Extra Low Voltage (SELV) conditions according to IEC 950. The conditions are only maintained if the equipment to which it is connected also operates under SELV conditions. • The appliance coupler (the connector to the unit and not the wall plug) must have a configuration for mating with an EN60320/IEC320 appliance inlet.
  • Page 209: Fuse

    • Disconnect power from the unit before opening the fuse holder cover. The unit automatically adjusts to the supply voltage. The fuse is suitable for both 110V A.C. and 220-240V A.C. operation. To change the fuse, release the fuse holder by gently levering a small screwdriver under the fuse holder catch.
  • Page 210: Lithium Battery

    AFETY NFORMATION ITHIUM ATTERY • Replace the lithium battery with the same or equivalent type, as recommended by the manufacturer. There is a danger of explosion if the battery is incorrectly replaced. •Dispose of used batteries according to the manufacturer’s instructions. —...
  • Page 211: B Technical Specifications

    Technical Specifications Physical Dimensions Environmental Requirements Operating Temperature Storage Temperature Operating Humidity Standards Safety Agency Certifications Electromagnetic Compatibility Summit products that have RJ-45 ports comply with EN55022 Class B when used with shielded UTP cable. UMMIT WITCH NSTALLATION AND Height: 3.5 inches x Width: 17.32 inches x Depth: 17.32 inches Weight: 10 kg 0 to 40°...
  • Page 212 ECHNICAL PECIFICATIONS Heat Dissipation Power Supply AC Line Frequency Input Voltage Options Current Rating Standards Supported SNMP SNMP protocol (RFC 1157) MIB-II (RFC 1213) Bridge MIB (RFC 1493) Interfaces MIB (RFC 1573) RMON MIB (RFC 1757) 802.3 MAU MIB (RFC 2239) IP Forwarding MIB (RFC 1354) OSPF2 MIB (RFC 1850) RIP2 MIB (RFC 1724)
  • Page 213: Troubleshooting

    Troubleshooting If you encounter problems when using the switch, this appendix may be helpful. If you have a problem not listed here or in the release notes, contact your local technical support representative. Power LED does not light: Check that the power cable is firmly connected to the device and to the supply outlet.
  • Page 214 Telnet facility. Check that Telnet access was not disabled for the switch. If you attempt to log in and the maximum number of Telnet sessions are being used, you should receive an error message indicating so.
  • Page 215 A network problem may be preventing you accessing the device over the network. Try accessing the device through the console port. Check that the community strings configured for the switch and the Network Manager are the same. Check that SNMP access was not disabled for the switch.
  • Page 216 ROUBLESHOOTING You forget your password and cannot log in: If you are not an administrator, another user having administrator access level can log in, delete your user name, and create a new user name for you, with a new password. Alternatively, another user having administrator access level can log in and initialize the device.
  • Page 217 VLANs, IP Addresses and default routes: Recall that the switch can have an IP address for each configured VLAN. It is only necessary to have an IP address associated with a VLAN if you intend to manage (telnet, SNMP, ping) through that VLAN.
  • Page 218 ROUBLESHOOTING The switch keeps aging out endstation entries in the switch Forwarding Database (FDB): Reduce the number of topology changes by disabling STP on those switches that do not use redundant paths. Specify that the endstation entries are static or permanent.
  • Page 219 access levels 3-8 accounts, creating 3-10 account 3-9 admin aging entries 6-1 alarm actions 12-17 Alarms, RMON 12-16 area 0, OSPF 10-6 areas, OSPF 10-5 autonegotiation 4-2 backbone area, OSPF 10-6 blackhole entries 6-2 boot option commands (table) 14-5 BOOTP relay, configuring 9-10 BOOTP, using 3-12 bridge priority 7-5 browser...
  • Page 220 (table) 11-4 description 11-2 snooping 11-2 image downloading 14-1 primary and secondary 14-2 upgrading 14-1 installing the switch 2-3 interfaces, router 9-2 Internet Group Management Protocol. See IGMP IP address, entering 3-13 IP multicast routing configuration commands (table) 11-3 configuring 11-2...
  • Page 221: Media Types And Distances

    3-8 master port, load sharing 4-6 max age 7-5 media types and distances 1-4, 2-2 MIBs 3-18 mode, QoS 8-2 monitoring the switch 12-1 command 3-23 mtrace multiple routes 9-4 names, VLANs 5-13 non-aging entries 6-2 Open Shortest Path First. See OSPF...
  • Page 222 (table) 4-9 description 4-8 example 4-9 virtual port 4-8 power socket 1-17 power supply 1-17 powering on the switch 2-6 commands (table) 8-7 description 8-7 primary image 14-2 profiles, QoS 8-2 protocol filters 5-12 protocol-based VLANs 5-11...
  • Page 223 Summit Virtual Chassis commands (table) 4-12 description 4-10 Extreme Discovery Protocol 4-11 features 4-10 SummitLink port 4-10 Summit1, front view 1-10 Summit2, front view 1-11 Summit3, front view 1-12 Summit4, front view 1-13 Summit4/FX, front view 1-14 Summit48, front view 1-15...
  • Page 224 tagging, VLAN 5-5 Telnet disabling 3-15 disconnecting a session 3-15 logging 12-11 using 3-12 TFTP server 14-1 using 14-4 command 3-22 traceroute traffic groupings, QoS 8-3 transmit errors 12-8 triggered updates 10-4 trunks 5-6 upgrading the image 14-1 uploading the configuration 14-4 users access levels 3-8 creating 3-10...
  • Page 225: Index Of Commands

    clear counters 12-14 clear fdb 6-6 clear igmp snooping 11-8 clear iparp 3-16, 9-12, 9-18 clear ipfdb 9-12, 9-18 clear ipmc cache 11-8 clear log 12-14 clear session 3-7, 3-15 config account 3-6 config banner 3-6 config bootprelay add 9-11 config bootprelay delete 9-11 config devicemode 3-6 config dot1q ethertype 5-15...
  • Page 226 config snmp add trapreceiver 3-20 config snmp community 3-20 config snmp delete 3-20 config snmp delete trapreceiver 3-20 config snmp syscontact 3-20 config snmp syslocation 3-20 config snmp sysname 3-20 config stpd add vlan 7-6 config stpd forwarddelay 7-6 config stpd hellotime 7-6 config stpd maxage 7-6 config stpd port cost 7-7 config stpd port priority 7-7...
  • Page 227 8-10, 12-5 show rip 10-12, 12-5 show rip stat 10-12, 12-6 show session 3-15, 12-6 show stpd 7-8, 12-6 show stpd port 7-8, 12-6 show switch 12-6 show version 12-7 show vlan 5-17, 12-7 telnet 3-12 traceroute 3-22 unconfig dvmrp 11-8...

This manual is also suitable for:

Summit2Summit3Summit4Summit48Summit4/fx

Table of Contents