Asante IntraCore 35516 Series User Manual

Asante IntraCore 35516 Series User Manual

Layer 2/3/4 gigabit switches
Hide thumbs Also See for IntraCore 35516 Series:
Table of Contents

Advertisement

®
IntraCore
35516 Series
Layer 2/3/4 Gigabit Switches
User's Manual

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the IntraCore 35516 Series and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Asante IntraCore 35516 Series

  • Page 1 ® IntraCore 35516 Series Layer 2/3/4 Gigabit Switches User’s Manual...
  • Page 2 - 2 - IntraCore 35516 Series Layer 2/3/4 Gigabit Switches User’s Manual Asanté Technologies, Inc. 2223 Old Oakland Road San Jose, CA 95131 SALES 800-662-9686 Home/Office Solutions 800-303-9121 Enterprise Solutions 408-435-8388 TECHNICAL SUPPORT 801-566-8991: Worldwide 801-566-3787: Fax www.asante.com/support support@asante.com Copyright © 2004 Asanté Technologies, Inc. All rights reserved. No part of this document, or any associated artwork, product design, or design concept may be copied or reproduced in whole or in part by any means without the express written consent of Asanté...
  • Page 3: Table Of Contents

    - 3 - Table of Contents Table of Contents................................3 Chapter 1: Introduction..............................10 1.1 Features ................................10 1.2 Package Contents ..............................11 1.3 LEDs...................................11 1.3.1 IC35516-T ..............................11 1.3.2 IC35516-G ..............................12 1.4 Front and Back Panel Descriptions ........................12 1.4.1 IC35516-T ..............................12 1.4.2 IC35516-G ..............................13 1.5 Management and Configuration .........................13 1.5.1 Console Interface ............................13 Chapter 2: Hardware Installation and Setup ........................14...
  • Page 4 - 4 - 2.6.1 10/100/1000BaseT Ports Cabling Procedures .....................19 2.6.2 Gigabit Ethernet Ports Cabling Procedures ....................20 2.7 Setup ..................................20 2.7.1 Connecting to a Console..........................20 2.8 Setting Passwords..............................22 2.9 Login Security..............................23 2.9.1 The username Command ..........................23 2.9.2 The password and login Commands......................23 2.10 Configuring an IP Address..........................23 2.10.1 Setting a Default IP Gateway Address .......................24 2.11 Restoring Factory Defaults ..........................24...
  • Page 5 - 5 - 3.8.5 Scrolling Down a Line or a Screen .......................36 3.8.6 Redisplaying the Current Command Line ....................36 3.8.7 Transposing Mistyped Characters .......................36 3.8.8 Controlling Capitalization ..........................36 3.9 Passwords and Privileges Commands .......................36 3.9.1 Enable Password ............................37 3.9.2 Password ..............................37 3.9.3 Service Password-Encryption ........................37 Chapter 4: Managing the System and Configuration Files ...................38 4.1 Managing the System............................38...
  • Page 6 - 6 - 5.4.3 Specify a RIP Version ..........................56 5.4.4 Redistribute Routing Information........................57 5.4.5 Set Metrics for Redistributed Routes......................58 5.4.6 Set Administrative Distance .........................58 5.4.7 Generate a Default Route ..........................59 5.4.8 Filtering Routing Information ........................59 5.4.9 Adjust Timers ...............................60 5.4.10 Enable or Disable Split-horizon........................60 5.4.11 Manage Authentication Keys ........................61 5.4.12 Monitor and Maintain RIP...........................61 5.5 Configuring IP Multicast Routing ........................62...
  • Page 7 - 7 - 5.10.1 Enabling PIM Sparse Mode ........................80 5.10.2 Setting Up BSR Candidacy ........................80 5.10.3 Setting Up RP Candidacy ..........................81 5.11 Enabling Directed Broadcast-to-Physical Broadcast Translation..............81 5.12 Monitoring and Maintaining the Network ......................81 5.13 Configuring EtherAggregate ..........................82 5.13.1 Configuring L2 EtherAggregate........................82 5.13.2 EtherAggregate Limitations and Restrictions .....................83 5.13.3 EtherAggregate Configuration Example.....................84 5.14 802.1x Support ..............................85...
  • Page 8 - 8 - 7.3.1 Assigning the Queue List to an Interface (Optional)..................96 7.3.1 Monitoring Custom Queue Lists ........................96 7.3.1 Custom Queuing Example ...........................96 7.4 Generic Traffic Shaping............................96 7.4.1 Configuring GTS for an Interface .........................97 7.4.2 Configuring GTS for an Access List ......................97 7.4.3 Monitoring the GTS Configuration........................97 7.4.4 Generic Traffic Shaping Example ........................97 7.5 Random Early Detection.............................97...
  • Page 9 - 9 - Appendix D: Console Port Pin Outs ........................... 110 Appendix E. Online Warranty Registration......................... 111...
  • Page 10: Chapter 1: Introduction

    Chapter 1: Introduction Thank you for purchasing the Asanté IntraCore 35516 Series Gigabit switch. The IC35516 is from a family of multi- media and multi-protocol switches capable of supporting Layer 2 switching and Layer 3 and Layer 4 protocols. They are designed to offer industry-leading performance at a very competitive cost of ownership.
  • Page 11: Package Contents

    - 11 - • 128 KB internal packet buffer • Full duplex 1000 Mbps, full and half duplex 10/100 Mbps • Support for Jumbo Frames (up to 32 KB in length) 1.2 Package Contents The following items are included in the switch’s package: •...
  • Page 12: Ic35516-G

    - 12 - Duplex/Activity Green A full-duplex link has been established on the port. Blinking Green Activity has been detected in full-duplex mode. Yellow A half-duplex link has been established on the port. Blinking Yellow Activity has been detected in half-duplex mode. No link has been established on the port.
  • Page 13: Ic35516-G

    Users can access the switch by connecting a PC or terminal to the console port of the switch, via a serial cable. The default password set on the console line is Asante (it is case-sensitive). The default IP address is 192.168.0.1/24.
  • Page 14: Chapter 2: Hardware Installation And Setup

    - 14 - Chapter 2: Hardware Installation and Setup The following guidelines will help you easily install the switch, ensuring that it has the proper power supply and environment. 2.1 Installation Overview Follow these steps to install the IntraCore switch: 1.
  • Page 15: Power Requirements

    - 15 - You will need the following tools and equipment (not included) to install the switch into an equipment rack: • Flat head screwdriver • Phillips head screwdriver • Antistatic mat or foam 2.1.3 Power Requirements The electrical outlet should be located near the switch and be easily accessible. It must also be properly grounded. Make sure the power source adheres to the following guidelines: •...
  • Page 16: Equipment Rack Guidelines

    - 16 - 6. Secure the switch by securing its mounting brackets onto the equipment rack with the appropriate screws (supplied). Important! Make sure the switch is supported until all the mounting screws for each bracket are secured to the equipment rack.
  • Page 17: Installing A Gbic

    - 17 - 2.3.1 Installing a GBIC GBICs are hot-swappable. This means that they can be inserted and removed while the switch is powered on. However, please allow 40–60 seconds for the switch to recognize the module when it has been installed while the switch is on.
  • Page 18: Installing The Optional Emergency Power Supply

    - 18 - 2.4 Installing the Optional Emergency Power Supply To ensure increased reliability for mission-critical applications, the IC35516 can be equipped with a 12 VDC emergency backup power supply (the IC35-EPS12, sold separately). When installed, the emergency power supply is in standby mode.
  • Page 19: 10/100/1000Baset Ports Cabling Procedures

    - 19 - 2. After the switch is connected to the network, it can be configured for management capabilities (see the following chapters for information on configuration). 2.6.1 10/100/1000BaseT Ports Cabling Procedures The 10/100/1000 ports on the switch allow for the connection of 10BaseT, 100BaseTX, or 1000BaseT network devices.
  • Page 20: Gigabit Ethernet Ports Cabling Procedures

    - 20 - Table 2-2 Pin Numbers and Wire Colors 2.6.2 Gigabit Ethernet Ports Cabling Procedures Cabling requirements for the optional hardware modules depend on the type of module installed. Use the following guidelines to determine the particular cabling requirements of the module(s): •...
  • Page 21 After connecting to the console, a prompt like the following will appear: User Access Verification Password: By default, the initial password for access via console and telnet is Asante (case-sensitive). See the following section for setting new passwords on the terminal lines.
  • Page 22: Setting Passwords

    A separate password should be set for the primary terminal line (console) and the virtual terminal lines (telnet). The default password Asante is assigned only to the virtual terminal line Vty0. Up to three other virtual terminal lines may be created, and they each will require a separate password.
  • Page 23: Login Security

    - 23 - Specifies a HIDDEN line password will follow 2.9 Login Security Two methods are available on the IntraCore 35516 to configure an authentication query process for better login security: the username command or the password and login commands. 2.9.1 The username Command To establish a username-based authentication system, use the username command in global configuration mode.
  • Page 24: Setting A Default Ip Gateway Address

    - 24 - Type enable. The new prompt is Router#. Type configure terminal. The new prompt is Router(config)#. The default IP address is assigned to the veth1 interface. Type interface veth1. The new prompt is Router(config-if-veth1)#. Type ip address and the new address. Your screen will look like this example: Router>...
  • Page 25: Chapter 3: Understanding The Command Line Interface (Cli)

    - 25 - Chapter 3: Understanding the Command Line Interface (CLI) The switch utilizes Command Line Interface (CLI) to provide access to several different command modes. Each command mode provides a group of related commands. After logging into the system, you are automatically in the user top (user EXEC) mode. From the user top mode you can enter into the privileged top (privileged EXEC) mode.
  • Page 26: Privileged Top (Privileged Exec) Mode

    - 26 - To list the commands available in user top mode, enter a question mark (?). Use a space and a question mark (?) after entering a command to see all the options for that particular command. Command Purpose Lists the user EXEC commands.
  • Page 27: Global Configuration Mode

    - 27 - prompt, as shown in the following example. Enter a question mark (?) after a command to see all the options for that command. Router> enable Router# ? clear Reset functions clock Manage the system clock configure Enter configuration mode copy Copy from one file to another debug...
  • Page 28: Interface Configuration Mode

    - 28 - Ctrl-Z EXEC mode. To list the commands available in global configuration mode, enter a question mark (?) at the prompt, as shown in the following example. Enter a question mark (?) after a command to see all the options for that command. Router# configure terminal Router(config)# ? access-list...
  • Page 29: Router Configuration Mode

    - 29 - configuration command, which defines the interface type as ethernet or virtual. The virtual interfaces are bound to VLANs and can be assigned IP addresses. In the following example, Ethernet interface eth1 is about to be configured. The new prompt, Router(config-if- eth1)#, indicates the interface configuration mode.
  • Page 30: Route-Map Configuration Mode

    - 30 - default-metric Set a metric of redistribute routes distance Administrative distance distribute-list Filter networks in routing updates End current mode and change to enable mode exit Exit current mode and down to previous mode help Description of the interactive help system neighbor Specify a neighbor router network...
  • Page 31 - 31 - Command Purpose help Obtain a brief description of the help system in any command mode. List all commands available for a particular command mode. When using context-sensitive help, the space (or lack of a space) before the question mark (?) is significant. To obtain a list of commands that begin with a particular character sequence, type in those characters followed immediately by the question mark (?).
  • Page 32: Checking Command Syntax

    - 32 - terminal Configure from the terminal Note that in the example below, if you enter the configure command followed by the Carriage Return (Enter or Return key), you will be prompted that the command is incomplete. Router# configure % Command incomplete.
  • Page 33: Using Cli Command History

    - 33 - Router(config)# router ? BGP information ospf Open Shortest Path First Routing Information Protocol (RIP) Router(config)# router Router(config)#router rip Router(config-rip-router)# 3.6 Using CLI Command History The CLI user interface provides a history or record of commands that you have entered. This feature is particularly useful for recalling long or complex commands or entries, including access lists.
  • Page 34: Moving Around On The Command Line

    - 34 - • Transposing Mistyped Characters • Controlling Capitalization 3.8.1 Moving Around on the Command Line Use the following keystrokes to move the cursor around on the command line in order to make corrections or changes: Keystrokes Purpose Press Ctrl-B or the left arrow. Move the cursor back one character.
  • Page 35: Editing Command Lines That Wrap

    - 35 - 3.8.3 Editing Command Lines That Wrap The enhanced editing feature provides a wraparound for commands that extend beyond a single line on the screen. When the cursor reaches the right margin, the command line shifts 8 spaces to the left. You cannot see the first eight characters of the line, but you can scroll back and check the syntax at the beginning of the command.
  • Page 36: Scrolling Down A Line Or A Screen

    - 36 - 3.8.5 Scrolling Down a Line or a Screen When using a command that list more information than will fill on the screen, the prompt --More-- is displayed at the bottom of the screen. Whenever the More prompt is displayed, use the following keystrokes to view the next line or screen: Keystrokes Purpose...
  • Page 37: Enable Password

    Exit current mode and down to previous mode Router(config-line)# password ? LINE The UNENCRYPTED (cleartext) line password Specifies an UNENCRYPTED line password will follow Specifies a HIDDEN line password will follow Router(config-line)# password Asante Router(config-line)# end Router# write ? file Write to configuration file memory...
  • Page 38: Chapter 4: Managing The System And Configuration Files

    - 38 - Chapter 4: Managing the System and Configuration Files This chapter explains how to manage the system information, as well as how to manage the configuration files for the IC35516. 4.1 Managing the System This section discusses the following tasks needed to manage the system information of the IC35516: •...
  • Page 39: Changing The Password

    - 39 - hostname name New host name for the network. 4.1.3 Changing the Password The switch ships with a default of no password, which allows immediate access to ANYONE on the network. In order to guard against unauthorized access, only the administrator should be allowed to change the password. A new password is prompted for twice to avoid any typing mistakes.
  • Page 40: Displaying The Operating Configuration

    - 40 - To log messages, use the following command in global configuration mode. Command Purpose logging address IP address of the host to be used as a syslog server. logging facility Facility parameters for syslog messages. logging trap Set syslog server logging level. 4.1.7 Displaying the Operating Configuration The configuration file may be displayed from the EXEC (enable) mode.
  • Page 41: Copying Configuration Files To A Network Server

    - 41 - You can add comments to a configuration file describing the commands you have entered. Precede a comment with an exclamation point (!). Use the following commands to configure the software from the terminal. Command Purpose configure terminal Enters global configuration mode and select the terminal option.
  • Page 42: Copying Configuration Files From A Network Server To The Ic35516

    - 42 - Router# copy running-config ? startup-config Copy to startup configuration tftp:[//A.B.C.D/filename] Copy to tftp: file system Router# copy running-config tftp Enter TFTP Server IP Address [A.B.C.D]? Enter file name 'my-config' to copy? Reply to any prompts for additional information or confirmation. The prompts will depend on how much information has been provided in the copy command and the current setting of the file prompt command.
  • Page 43: Configuring Snmp And Spanning Tree

    - 43 - Reply to any router prompts for additional information or confirmation. Additional prompts will depend on how much information is provided in the copy command and the current setting of the file prompt command. In the following example, the software is configured from the file my-config at IP address 192.168.123.59: Router# copy tftp://192.168.123.59/my-confg running-config Download file ‘my-config’...
  • Page 44 - 44 - Important! Be sure to change the SNMP default community strings in order to prevent unauthorized access to management information. To set up the community access string to permit access to the SNMP, use the following command from the global command mode.
  • Page 45: Other Snmp Configuration

    - 45 - of the SNMP agent. 4.3.2 Other SNMP Configuration Command Purpose snmp-server Enable the SNMP agent. The first snmp-server global configuration command enables SNMP. snmp-server engineID {local engineid- Set Engine ID for local or remote devices. The remote engine string|remote host-ip-address [udp-port ID is used to create users that can send SNMPv3 traps.
  • Page 46: Configuring Spanning Tree Protocol (Stp)

    - 46 - 4.3.3 Configuring Spanning Tree Protocol (STP) The Spanning Tree Protocol (STP) is part of the IEEE 802.1D standard. It provides for a redundant network without the redundant traffic through closed paths. For example, in a network without spanning tree protocol, the same message will be broadcast through multiple paths, which may start an unending packet-passing cycle.
  • Page 47: Rapid Spanning Tree Protocol (Rstp)

    - 47 - Priority Setting the bridge priority to a low value will increase the likelihood that the current bridge will become the root bridge. If the current bridge is located physically near the center of the network, decrease the Bridge Priority from its default value of 32768 to make it become the root bridge.
  • Page 48 - 48 - • Root port—provides the best path (lowest cost) when the bridge forwards packets to the root switch. • Designated port—connects to the designated switch, which has the lowest path cost when forwarding packets from that LAN to the root bridge. The port through which the designated switch is attached to the LAN is called the designated port.
  • Page 49 - 49 - Valid priority values are 0, 4096, 8192, 12288, 16384, 20480, 24576, 28672, 32768, 36864, 40960, 45056, 49152, 53248, 57344, and 61440. All other values are rejected. To return the switch to its default setting, use the no spanning-tree priority configuration command. Restarting the Protocol Migration Process A switch when running RSTP supports a built-in protocol migration mechanism that enables it to interoperate with legacy 802.1D switches.
  • Page 50: Mac Address Table

    - 50 - Configuring port priority Use the following interface mode command to configure port priority: Router(config)# interface eth1 Router(config-if-eth1)#spanning-tree port-priority <port-priority> For <port-priority>, the range is 0–240 in increments of 16; the default is 128. The lower the number, the higher the priority.
  • Page 51: Chapter 5: Configuring Ip

    - 51 - Chapter 5: Configuring IP The Internet Protocol (IP) is a packet-based protocol used to exchange data over computer networks. It is the foundation on which all other IP protocols are built. IP is a network-layer protocol that contains addressing and control information that allows data packets to be routed.
  • Page 52: Assign Multiple Ip Addresses To Network Interfaces

    - 52 - The following table describes the Class C equivalent of CIDR prefixes. CIDR Prefix Class C Equivalent Host Addresses 1/8 Class C 32 Hosts 1/4 Class C 64 Hosts 1/2 Class C 128 Hosts 1 Class C 256 Hosts 2 Class C 512 Hosts 4 Class C...
  • Page 53: Establish Address Resolution

    - 53 - Note: If any router on a network segment uses a secondary address, all other routers on that same segment must also use a secondary address from the same network or subnet. To assign multiple IP addresses to network interfaces, use the following command in interface configuration mode: Command Purpose ip address address I mask secondary...
  • Page 54: Configuring Static Routes

    - 54 - Configuring IP Routing IP routing protocols are divided into two classes: Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs). Note: The word gateway is often a part of a routing protocol’s name, since many routing protocol specifications refer to routers as gateways.
  • Page 55: Configuring Rip

    - 55 - Connected interface Static route External BGP OSPF Internal BGP Unknown Table 5-3: Dynamic Routing Protocol Default Administrative Distances 5.4 Configuring RIP The Routing Information Protocol (RIP) is a commonly used interior gateway protocol (IGP) created for use in small, homogeneous networks.
  • Page 56: Allow Unicast Updates For Rip

    - 56 - network {IP prefix} Associate a network with a RIP routing process. 5.4.2 Allow Unicast Updates for RIP Because RIP is normally a broadcast protocol, in order for RIP routing updates to reach non-broadcast networks, it is necessary to establish a direct link between routers. Use the following command in router configuration mode. Command Purpose neighbor ip-address...
  • Page 57: Redistribute Routing Information

    - 57 - 5.4.4 Redistribute Routing Information The router can redistribute routing information from a source route entry into the RIP tables. For example, you can instruct the router to re-advertise connected, kernel, or static routes as well as routing protocol-derived routes. This capability applies to all the IP-based routing protocols.
  • Page 58: Set Metrics For Redistributed Routes

    - 58 - To define conditions for redistributing routes from a source route entry into the RIP tables, perform at least one of the following tasks in route-map configuration mode: Command Purpose match interface interface-name Match the specified interface. match ip address {access-list-name | Match a standard access list or prefix list.
  • Page 59: Generate A Default Route

    - 59 - To set an administrative RIP distance to a specified value, use the distance router configuration command. Command Purpose distance distance-value [prefix] [access- Assign an administrative distance. list-name] 5.4.7 Generate a Default Route You can force an autonomous system boundary router to generate a default route into an RIP routing domain. Whenever you specifically configure the redistribution of routes into an RIP routing domain, the router automatically becomes an autonomous system boundary router.
  • Page 60: Adjust Timers

    - 60 - To do this, perform the following task in router configuration mode. Command Purpose distribute-list {access-list-name | prefix Suppress routes from being advertised and processed in prefix-list-name} in | out} routing updates depending upon the action listed in the [interface-name] access list or prefix list.
  • Page 61: Manage Authentication Keys

    - 61 - To enable or disable split horizon, perform the following tasks in interface configuration mode. Command Purpose ip rip poison reverse Enable split horizon with poison reverse. no ip rip poison reverse Disable split horizon with poison reverse. 5.4.11 Manage Authentication Keys If you are sending and receiving RIP Version 2 packets, you can enable RIP authentication on an interface.
  • Page 62: Configuring Ip Multicast Routing

    - 62 - debug ip rip packet [recv | send] detail Display detailed information about the RIP packets. The information includes the origin and port number of the packet as well as a packet dump. show debugging rip Show all information currently set for RIP debug. 5.5 Configuring IP Multicast Routing Multicast traffic is a means to transmit a multimedia stream from the Internet (a video conference, for example) without requiring a TCP connection from every remote host that wants to receive the stream.
  • Page 63 - 63 - Multicast routers elect designated router (DR) for the LAN (subnet). The DR is the router with the highest IP address. The DR is responsible for sending IGMP host-query messages to all hosts on the LAN. By default, the DR sends IGMP host-query messages every 60 seconds in order to keep the IGMP overhead on hosts and networks very low.
  • Page 64: Dvmrp

    - 64 - Configuring the TTL Threshold The time-to-live (TTL) value controls whether packets are forwarded out of an interface. The TTL value is specified in hops. Only multicast packets with a TTL value greater than the interface TTL threshold are forwarded on the interface.
  • Page 65 - 65 - Graft-retransmit-interval This value defines the interval of time that a DVMRP router sending a graft message will wait for a graft acknowledgment from an upstream router before re-transmitting that message. Subsequent re-transmissions will be sent at an interval of twice that of the preceding interval. DVMRP must be enabled on the router for this command to be operational.
  • Page 66: Using Access Lists

    - 66 - Command Purpose prune-age <20–8000 seconds> Defines how long a prune state will remain in effect for a source-routed multicast tree. After the prune age period expires, flooding will resume. Default value: 180 seconds Report-interval This value defines how often routers will propagate their complete routing tables to other neighbor DVMRP routers. DVMRP must be enabled on the router for this command to be operational.
  • Page 67: Create A Standard Access List

    - 67 - When configuring an access list, you can add multiple statements by adding criteria to the same numbered list. The order of the statements is important, as the switch tests addresses against the criteria in an access list one by one (in the order the statements are entered) until it finds a match.
  • Page 68: Create An Expanded Access List

    - 68 - deny statement would follow the last entry, if no match was found before the end of the list. In this case, however, we are permitting any other IP address other than 192.168.123.254, and a deny statement isn’t necessary. Router(config)# access-list 1 deny 192.168.123.254 ? A.B.C.D Source wildcard.
  • Page 69: Creating An Access List With A Name

    - 69 - icmp Specify ICMP connections Specify TCP connections Specify UDP connections Router(config)# access-list 101 deny tcp ? A.B.C.D Source address to match. e.g. 10.0.0.0 host Host address to match. Any source address to match Router(config)# access-list 101 deny tcp 192.168.123.0 0.0.0.255 ? A.B.C.D Destination address to match.
  • Page 70: Applying An Access List To An Interface

    - 70 - 5.6.4 Applying an Access List to an Interface After creating your access lists, you must apply them to an interface in order to enable the access list. Enter the interface configuration mode for the desired interface. Each interface may have only one access list applied to it at one time.
  • Page 71: Configure Abr Type

    - 71 - 5.7.2 Configure ABR Type The IC35516 OSPF conforms to the specifications in standard RFC2328. Because a variety of implementations support OSPF, the OSPF configuration depends on different types of routers. To configure OSPF on an Area Border Router (ABR), specify what type the router belongs to.
  • Page 72: Configure Ospf Network Type

    - 72 - ip ospf dead-interval seconds Set the number of seconds that a device's hello packets must not have been seen before its neighbors declare the OSPF router down. This value must be the same for all routers attached to a common network. The default value is 40 seconds.
  • Page 73: Configure Ospf Not So Stubby Area (Nssa)

    - 73 - Authentication allows password-based protection against unauthorized access to an area. Stub areas are areas into which information on external routes is not sent. Instead, there is a default external route (generated by the area border router) into the stub area for destinations outside the autonomous system. To further reduce the number of link state advertisements sent into a stub area, no-summary configuration on the ABR is allowed to prevent it from sending summary link advertisement into the stub area.
  • Page 74: Configure Route Summarization Between Ospf Areas

    - 74 - If you configure an NSSA totally stub area using no summary command, inter-area routes are not allowed in the NSSA area. When redistribution takes place in the situations where there is no need to inject external routes into the NSSA, you can prevent the router from creating Type 7 LSAs for NSSA using the translate-never command.
  • Page 75: Configure Route Calculation Timers

    - 75 - Command Purpose auto-cost reference-bandwidth ref-bw Differentiate high bandwidth links. 5.7.12 Configure Route Calculation Timers You can configure the delay time between when OSPF receives a topology change and when it starts a shortest path first (SPF) calculation. To do this, perform the following task in router configuration mode.
  • Page 76: Change The Ospf Administrative Distances

    - 76 - To force the autonomous system boundary router to generate a default route, perform the following task in router configuration mode. Command Purpose redistribute {kernel | connected | Redistribute routes into OSPF routing domain. static | rip | bgp} [metric metric-value] [metric-type {1|2}][route-map map-tag] 5.7.16 Change the OSPF Administrative Distances An administrative distance is a value that rates the trustworthiness of a routing information source, such as an...
  • Page 77: Monitor And Maintain Ospf

    - 77 - 5.7.19 Monitor and Maintain OSPF You can display specific statistics such as the contents of IP routing tables and databases. The information provided can be used to determine resource utilization and solve network problems. You can also display information about node availability and discover the routing path that packets are taking through the network.
  • Page 78: Virtual Router Redundancy Protocol (Vrrp)

    - 78 - show ip ospf neighbor [neighbor-id | Display OSPF-neighbor information. interface-name ] The debugging commands are useful to quickly diagnose problems. Use the following commands to display OSPF information in top mode. Command Purpose debug ospf packet {hello | dd | ls-ack | Display one set of information for each packet.
  • Page 79: Configuring Icmp Router Discovery Protocol (Irdp)

    - 79 - ip vrrp VRID priority level Sets the priority level of the router within a VRRP VRID group. The default value is 100. ip vrrp VRID timers [advertise interval] Configures the interval between successive advertisements by the master virtual router in a VRRP VRID group. ip vrrp VRID authentication string Authenticates VRRP packets received from other routers in the VRID group.
  • Page 80: Change Irdp Parameters

    - 80 - 5.9.2 Change IRDP Parameters When IRDP processing is enabled, the default parameters will apply. You may change any of the following default parameters. Use the following commands in interface configuration mode. Command Purpose ip irdp multicast Send IRDP advertisements to the all-systems multicast address (224.0.0.1) on a specified interface.
  • Page 81: Setting Up Rp Candidacy

    - 81 - • Priority—Priority of the bootstrap router in the range 0–255, with the larger priority being preferred. If the priority values are the same, the router with the larger IP address will be the preferred bootstrap router. To delete this router as a candidate for being a bootstrap router, use the no form of this command: 5.10.3 Setting Up RP Candidacy To configure the router to advertise itself as PIM candidate rendezvous point (RP) to the bootstrap router, use the following global configuration command:...
  • Page 82: Configuring Etheraggregate

    - 82 - ping {host | address} Test network node reach-ability. traceroute {host | destination} Trace packet routes through the network. 5.13 Configuring EtherAggregate An EtherAggregate consists of individual Gigabit Ethernet links bundled into a single logical link. The EtherAggregate feature allows you to manually configure multiple high-speed load-sharing links between two switch/routers or a switch/router and a server.
  • Page 83: Etheraggregate Limitations And Restrictions

    - 83 - default is no port member. speed [100 | 1000] Set the operating speed of the port aggregate to 100 or 1000 Mbps. Note that the speed will be applied only when the negotiation is disabled (that is, no auto-negotiation). By default, all added ports are configured to 1000 Mbps.
  • Page 84: Etheraggregate Configuration Example

    - 84 - 5.13.3 EtherAggregate Configuration Example The following example creates four L3 EtherAggregates. EtherAggregate example configuration file // The below configures port-aggregate 1 with 1-4 eth ports with speed 1000 Mbps // The Vlan Mode is default Access mode //Access vlan is 1 interface port-aggregate 1 name EtherAggregate 1...
  • Page 85: Support

    - 85 - 5.14 802.1x Support 802.1x is a standard for passing Extensible Authentication Protocol (EAP) information over a network. This enables you to restrict network access on a per-port basis. This section lists the commands needed to configure the IntraCore 35516 to act as an EAP authentication server. Please refer to the IEEE 802.1X standard (available on the web at standards.ieee.org/getieee802/) for details of the terminology.
  • Page 86: Interface Configuration Mode Commands

    - 86 - dot1x radius-server host A.B.C.D Defines a RADIUS server and its parameters. [auth-port <1-65535>] [key SHARED_KEY_STRING] dot1x radius-server key Sets RADIUS server shared key. SHARED_KEY_STRING dot1x radius-server nas-identifier Sets RADIUS NAS-Identifier attribute. NAS_ID_STRING 5.14.2 Interface Configuration Mode Commands Command Purpose dot1x multiple-hosts...
  • Page 87: Chapter 6: Vlan Configuration

    - 87 - Chapter 6: VLAN Configuration Up to 4094 Virtual LANs (VLANs) are supported on the IC35516. The switch is shipped with a default VLAN with VLAN ID (VID) 1. All switchports (eth1–eth16) are included in the default VID 1. The default VID 1 cannot be deleted.
  • Page 88: Deleting A Vlan

    - 88 - First, a VLAN is created and named tester. Router# configure terminal Router(config)# vlan 2 Router(config-vlan)# name tester Router(config-vlan)# exit Router(config)# exit Router# show vlan In the output of the show vlan command, the new VLAN will be listed, but will not yet be active. Next, a switchport is chosen to belong to VLAN 2.
  • Page 89: Vlan Port Membership Modes

    - 89 - 6.2 VLAN Port Membership Modes A switchport can be assigned to a VLAN by designating a membership mode. The membership mode determines the kind of traffic the port carries and the number of VLANs to which it can belong. The membership modes are as follows: •...
  • Page 90 - 90 - Router(config-if-IFNAME)# end Return to Enable mode. Use the following commands, beginning in config mode, to configure the VLAN Allowed List for the trunk port: Command Purpose interface IFNAME Enter the interface name to access the interface configuration mode. switchport mode trunk This command designates the interface as IEEE 802.1q trunk-access mode.
  • Page 91: Dot1Q Tunnel

    - 91 - 6.2.3 Dot1q Tunnel 802.1Q tunnel ports are used to maintain customer VLAN integrity across a service provider network. You can configure a tunnel port on an edge switch in the service provider network and connect it to an 802.1Q trunk port on a customer interface, creating an asymmetric link.
  • Page 92: Chapter 7: Quality Of Service (Qos) Configuration

    - 92 - Chapter 7: Quality of Service (QoS) Configuration Quality of Service (QoS) is a general term referring to various methods of traffic management you can employ on your network to ensure that traffic you identify as high-priority can use a sufficient share of the available bandwidth. The IC35516 supports the following QoS methods: •...
  • Page 93: Monitoring Weighted Fair Queuing Lists

    - 93 - 7.1.3 Monitoring Weighted Fair Queuing Lists To display information about the input and output queues, use the following command in EXEC mode: Command Purpose show queuing fair Displays the status of the weighted fair queuing. 7.1.4 Weighted Fair Queuing Example This example shows eth10 has 10% bandwidth for class 3, 20% for class 2, 30% for class 1, and 40% for class 0.
  • Page 94: Assigning The Priority List To An Interface

    - 94 - {list | tcp | udp} access-list-number/layer4-port-number priority-list list-number interface Establishes queuing priorities for packets entering from a interface-type-number given interface. {high | medium | normal | low} priority-list list-number default Assigns a priority queue for those packets that do not match {high | medium | normal | low} any other rule in the priority list.
  • Page 95: Defining The Custom Queue List

    - 95 - You must follow certain required, basic steps to enable CQ for your network. In addition, you can choose to assign packets to custom queues based on protocol type, interface where the packets enter the router, or other criteria you specify.
  • Page 96: Assigning The Queue List To An Interface (Optional)

    - 96 - matching protocol or interface type. When a match is found, the packet is assigned to the appropriate queue. The list is searched in the order it is specified, and the first matching rule terminates the search. 7.3.1 Assigning the Queue List to an Interface (Optional) You can assign a custom queue list number to an interface.
  • Page 97: Configuring Gts For An Interface

    - 97 - 7.4.1 Configuring GTS for an Interface To configure GTS for outbound traffic on an interface, use the following command in interface configuration mode: Router(config-if)# traffic-shape rate bit-rate 7.4.2 Configuring GTS for an Access List To configure GTS for outbound traffic on an access list, use the following commands beginning in global configuration mode: Command Purpose...
  • Page 98: Configuring Red To Use Ip Precedence

    - 98 - 7.5.1 Configuring RED to Use IP Precedence To configure RED to use the IP precedence value when it calculates the drop probability, use the following commands in interface configuration mode: Command Purpose random-detect prec-based Indicates that RED is to use the ip precedence value when it calculates the drop probability for the packet.
  • Page 99: Chapter 8: Configuring Dhcp And Dns

    - 99 - Chapter 8: Configuring DHCP and DNS 8.1 DHCP Dynamic Host Control Protocol (DHCP) allows users to automatically assign re-usable IP addresses to DHCP clients. The router software supports a full DHCP server implementation that assigns and manages IP addresses from specified address pools within the router to DHCP clients.
  • Page 100: Configuring The Domain Name For The Client

    - 100 - 8.1.5 Configuring the Domain Name for the Client The domain name of a DHCP client places the client in the general grouping of networks that make up the domain. To configure a domain name string for the client, use the following command in DHCP pool configuration mode: Router(config-dhcp)# domain-name domain Use the no form of this command to remove the configured domain name.
  • Page 101: Configuring The Address Lease Time

    - 101 - Router(config-dhcp)# default-router A.B.C.D Note: You can specify up to eight DNS server IP addresses. Use the no form of this command to remove the configured default router. 8.1.11 Configuring the Address Lease Time By default, each IP address assigned by a DHCP server comes with a one-day lease, which is the amount of time that the address is valid.
  • Page 102: Monitoring And Maintaining The Dhcp Server

    Specifies the name of the client using any standard ASCII character. (Optional) The client name should not include the domain name. For example, the name moon should not be specified as moon.asante.com. Use the no form of this command to remove the configured client name.
  • Page 103: Dns

    - 103 - To display DHCP server information, use the following commands in privileged EXEC mode, as needed: Command Purpose show ip dhcp Displays the current DHCP information. show ip dhcp binding Displays the DHCP address binding information. show ip dhcp conflict Displays the DHCP address conflict information.
  • Page 104: Design Limitation And Restrictions

    192.108.250.1 ip name-server 192.108.250.4 ip name-server 192.108.250.5 ip domain-name asante.com ip domain-list stanford.edu ip route 0.0.0.0/0 192.203.54.1 After the DNS lookup is enabled on the router, you can use the ping or traceroute command with the hostname rather than an IP address as in this example: Router# ping www.yahoo.com...
  • Page 105: Appendix A: Basic Troubleshooting

    - 105 - Appendix A: Basic Troubleshooting In the unlikely event that the switch does not operate properly, follow the troubleshooting tips below. If more help is needed, contact Asanté’s technical support at www.asante.com/support. Problem Possible Solutions The Power LED is not lit.
  • Page 106: Appendix B: Specifications

    - 106 - Appendix B: Specifications The sections below list the features and product specifications for the IntraCore 35516 Series Gigabit Ethernet switches. ™ Connectors: Gigabit Ethernet with Auto-Uplink (10/100/1000BaseTX): RJ-45 or GBIC holder for GBIC transceiver module Console: Serial (RS-232): DB9 Status Indicators: Separate link-activity, speed (10/100/Gigabit) and duplex (full or half) LEDs for each port;...
  • Page 107: Technical Support And Warranty

    - 107 - B.2 Technical Support and Warranty ™: IntraCare Free technical support and advanced warranty support for 3 years. Includes free telephone support, 24-hour support via web and ftp, complete product warranty with second business day (within the United States) advanced replacement, and software maintenance agreement.
  • Page 108: Appendix C: Fcc Compliance And Warranty Statements

    - 108 - Appendix C: FCC Compliance and Warranty Statements C.1 FCC Compliance Statement This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment.
  • Page 109: Intracare Warranty Statement

    - 109 - C.3 IntraCare Warranty Statement Products: IntraCore 35516-T IntraCore 35516-G Duration: 3 years Advanced Warranty United States: Second Business Day Replacement: Other Countries: See your local distributor or reseller. 1. Asanté Technologies warrants (to the original end-user purchaser) the covered IntraCore products against defects in materials and workmanship for the period specified above.
  • Page 110 - 110 - Appendix D: Console Port Pin Outs The console port is used to connect with a terminal using a serial modem RS-232C cable (available from Radio Shack’s website, www.radioshack.com, catalog # 26-117). The setting is 9600-N81. The table below lists the pin outs.
  • Page 111 - 111 - Appendix E. Online Warranty Registration Please register the switch online at www.asante.com/support/warranty/index.html. By doing so, you’ll be entitled to special offers, up-to-date information, and important product bulletins. You may also register the switch by using the warranty card found in the printed Setup Guide.

Table of Contents