- 3 - Table of Contents Table of Contents................................3 Chapter 1: Introduction..............................10 1.1 Features ................................10 1.2 Package Contents ..............................11 1.3 LEDs...................................11 1.3.1 IC35516-T ..............................11 1.3.2 IC35516-G ..............................12 1.4 Front and Back Panel Descriptions ........................12 1.4.1 IC35516-T ..............................12 1.4.2 IC35516-G ..............................13 1.5 Management and Configuration .........................13 1.5.1 Console Interface ............................13 Chapter 2: Hardware Installation and Setup ........................14...
Page 4
- 4 - 2.6.1 10/100/1000BaseT Ports Cabling Procedures .....................19 2.6.2 Gigabit Ethernet Ports Cabling Procedures ....................20 2.7 Setup ..................................20 2.7.1 Connecting to a Console..........................20 2.8 Setting Passwords..............................22 2.9 Login Security..............................23 2.9.1 The username Command ..........................23 2.9.2 The password and login Commands......................23 2.10 Configuring an IP Address..........................23 2.10.1 Setting a Default IP Gateway Address .......................24 2.11 Restoring Factory Defaults ..........................24...
Page 5
- 5 - 3.8.5 Scrolling Down a Line or a Screen .......................36 3.8.6 Redisplaying the Current Command Line ....................36 3.8.7 Transposing Mistyped Characters .......................36 3.8.8 Controlling Capitalization ..........................36 3.9 Passwords and Privileges Commands .......................36 3.9.1 Enable Password ............................37 3.9.2 Password ..............................37 3.9.3 Service Password-Encryption ........................37 Chapter 4: Managing the System and Configuration Files ...................38 4.1 Managing the System............................38...
Page 6
- 6 - 5.4.3 Specify a RIP Version ..........................56 5.4.4 Redistribute Routing Information........................57 5.4.5 Set Metrics for Redistributed Routes......................58 5.4.6 Set Administrative Distance .........................58 5.4.7 Generate a Default Route ..........................59 5.4.8 Filtering Routing Information ........................59 5.4.9 Adjust Timers ...............................60 5.4.10 Enable or Disable Split-horizon........................60 5.4.11 Manage Authentication Keys ........................61 5.4.12 Monitor and Maintain RIP...........................61 5.5 Configuring IP Multicast Routing ........................62...
Page 7
- 7 - 5.10.1 Enabling PIM Sparse Mode ........................80 5.10.2 Setting Up BSR Candidacy ........................80 5.10.3 Setting Up RP Candidacy ..........................81 5.11 Enabling Directed Broadcast-to-Physical Broadcast Translation..............81 5.12 Monitoring and Maintaining the Network ......................81 5.13 Configuring EtherAggregate ..........................82 5.13.1 Configuring L2 EtherAggregate........................82 5.13.2 EtherAggregate Limitations and Restrictions .....................83 5.13.3 EtherAggregate Configuration Example.....................84 5.14 802.1x Support ..............................85...
Page 8
- 8 - 7.3.1 Assigning the Queue List to an Interface (Optional)..................96 7.3.1 Monitoring Custom Queue Lists ........................96 7.3.1 Custom Queuing Example ...........................96 7.4 Generic Traffic Shaping............................96 7.4.1 Configuring GTS for an Interface .........................97 7.4.2 Configuring GTS for an Access List ......................97 7.4.3 Monitoring the GTS Configuration........................97 7.4.4 Generic Traffic Shaping Example ........................97 7.5 Random Early Detection.............................97...
Page 9
- 9 - Appendix D: Console Port Pin Outs ........................... 110 Appendix E. Online Warranty Registration......................... 111...
Chapter 1: Introduction Thank you for purchasing the Asanté IntraCore 35516 Series Gigabit switch. The IC35516 is from a family of multi- media and multi-protocol switches capable of supporting Layer 2 switching and Layer 3 and Layer 4 protocols. They are designed to offer industry-leading performance at a very competitive cost of ownership.
- 11 - • 128 KB internal packet buffer • Full duplex 1000 Mbps, full and half duplex 10/100 Mbps • Support for Jumbo Frames (up to 32 KB in length) 1.2 Package Contents The following items are included in the switch’s package: •...
- 12 - Duplex/Activity Green A full-duplex link has been established on the port. Blinking Green Activity has been detected in full-duplex mode. Yellow A half-duplex link has been established on the port. Blinking Yellow Activity has been detected in half-duplex mode. No link has been established on the port.
Users can access the switch by connecting a PC or terminal to the console port of the switch, via a serial cable. The default password set on the console line is Asante (it is case-sensitive). The default IP address is 192.168.0.1/24.
- 14 - Chapter 2: Hardware Installation and Setup The following guidelines will help you easily install the switch, ensuring that it has the proper power supply and environment. 2.1 Installation Overview Follow these steps to install the IntraCore switch: 1.
- 15 - You will need the following tools and equipment (not included) to install the switch into an equipment rack: • Flat head screwdriver • Phillips head screwdriver • Antistatic mat or foam 2.1.3 Power Requirements The electrical outlet should be located near the switch and be easily accessible. It must also be properly grounded. Make sure the power source adheres to the following guidelines: •...
- 16 - 6. Secure the switch by securing its mounting brackets onto the equipment rack with the appropriate screws (supplied). Important! Make sure the switch is supported until all the mounting screws for each bracket are secured to the equipment rack.
- 17 - 2.3.1 Installing a GBIC GBICs are hot-swappable. This means that they can be inserted and removed while the switch is powered on. However, please allow 40–60 seconds for the switch to recognize the module when it has been installed while the switch is on.
- 18 - 2.4 Installing the Optional Emergency Power Supply To ensure increased reliability for mission-critical applications, the IC35516 can be equipped with a 12 VDC emergency backup power supply (the IC35-EPS12, sold separately). When installed, the emergency power supply is in standby mode.
- 19 - 2. After the switch is connected to the network, it can be configured for management capabilities (see the following chapters for information on configuration). 2.6.1 10/100/1000BaseT Ports Cabling Procedures The 10/100/1000 ports on the switch allow for the connection of 10BaseT, 100BaseTX, or 1000BaseT network devices.
- 20 - Table 2-2 Pin Numbers and Wire Colors 2.6.2 Gigabit Ethernet Ports Cabling Procedures Cabling requirements for the optional hardware modules depend on the type of module installed. Use the following guidelines to determine the particular cabling requirements of the module(s): •...
Page 21
After connecting to the console, a prompt like the following will appear: User Access Verification Password: By default, the initial password for access via console and telnet is Asante (case-sensitive). See the following section for setting new passwords on the terminal lines.
A separate password should be set for the primary terminal line (console) and the virtual terminal lines (telnet). The default password Asante is assigned only to the virtual terminal line Vty0. Up to three other virtual terminal lines may be created, and they each will require a separate password.
- 23 - Specifies a HIDDEN line password will follow 2.9 Login Security Two methods are available on the IntraCore 35516 to configure an authentication query process for better login security: the username command or the password and login commands. 2.9.1 The username Command To establish a username-based authentication system, use the username command in global configuration mode.
- 24 - Type enable. The new prompt is Router#. Type configure terminal. The new prompt is Router(config)#. The default IP address is assigned to the veth1 interface. Type interface veth1. The new prompt is Router(config-if-veth1)#. Type ip address and the new address. Your screen will look like this example: Router>...
- 25 - Chapter 3: Understanding the Command Line Interface (CLI) The switch utilizes Command Line Interface (CLI) to provide access to several different command modes. Each command mode provides a group of related commands. After logging into the system, you are automatically in the user top (user EXEC) mode. From the user top mode you can enter into the privileged top (privileged EXEC) mode.
- 26 - To list the commands available in user top mode, enter a question mark (?). Use a space and a question mark (?) after entering a command to see all the options for that particular command. Command Purpose Lists the user EXEC commands.
- 27 - prompt, as shown in the following example. Enter a question mark (?) after a command to see all the options for that command. Router> enable Router# ? clear Reset functions clock Manage the system clock configure Enter configuration mode copy Copy from one file to another debug...
- 28 - Ctrl-Z EXEC mode. To list the commands available in global configuration mode, enter a question mark (?) at the prompt, as shown in the following example. Enter a question mark (?) after a command to see all the options for that command. Router# configure terminal Router(config)# ? access-list...
- 29 - configuration command, which defines the interface type as ethernet or virtual. The virtual interfaces are bound to VLANs and can be assigned IP addresses. In the following example, Ethernet interface eth1 is about to be configured. The new prompt, Router(config-if- eth1)#, indicates the interface configuration mode.
- 30 - default-metric Set a metric of redistribute routes distance Administrative distance distribute-list Filter networks in routing updates End current mode and change to enable mode exit Exit current mode and down to previous mode help Description of the interactive help system neighbor Specify a neighbor router network...
Page 31
- 31 - Command Purpose help Obtain a brief description of the help system in any command mode. List all commands available for a particular command mode. When using context-sensitive help, the space (or lack of a space) before the question mark (?) is significant. To obtain a list of commands that begin with a particular character sequence, type in those characters followed immediately by the question mark (?).
- 32 - terminal Configure from the terminal Note that in the example below, if you enter the configure command followed by the Carriage Return (Enter or Return key), you will be prompted that the command is incomplete. Router# configure % Command incomplete.
- 33 - Router(config)# router ? BGP information ospf Open Shortest Path First Routing Information Protocol (RIP) Router(config)# router Router(config)#router rip Router(config-rip-router)# 3.6 Using CLI Command History The CLI user interface provides a history or record of commands that you have entered. This feature is particularly useful for recalling long or complex commands or entries, including access lists.
- 34 - • Transposing Mistyped Characters • Controlling Capitalization 3.8.1 Moving Around on the Command Line Use the following keystrokes to move the cursor around on the command line in order to make corrections or changes: Keystrokes Purpose Press Ctrl-B or the left arrow. Move the cursor back one character.
- 35 - 3.8.3 Editing Command Lines That Wrap The enhanced editing feature provides a wraparound for commands that extend beyond a single line on the screen. When the cursor reaches the right margin, the command line shifts 8 spaces to the left. You cannot see the first eight characters of the line, but you can scroll back and check the syntax at the beginning of the command.
- 36 - 3.8.5 Scrolling Down a Line or a Screen When using a command that list more information than will fill on the screen, the prompt --More-- is displayed at the bottom of the screen. Whenever the More prompt is displayed, use the following keystrokes to view the next line or screen: Keystrokes Purpose...
Exit current mode and down to previous mode Router(config-line)# password ? LINE The UNENCRYPTED (cleartext) line password Specifies an UNENCRYPTED line password will follow Specifies a HIDDEN line password will follow Router(config-line)# password Asante Router(config-line)# end Router# write ? file Write to configuration file memory...
- 38 - Chapter 4: Managing the System and Configuration Files This chapter explains how to manage the system information, as well as how to manage the configuration files for the IC35516. 4.1 Managing the System This section discusses the following tasks needed to manage the system information of the IC35516: •...
- 39 - hostname name New host name for the network. 4.1.3 Changing the Password The switch ships with a default of no password, which allows immediate access to ANYONE on the network. In order to guard against unauthorized access, only the administrator should be allowed to change the password. A new password is prompted for twice to avoid any typing mistakes.
- 40 - To log messages, use the following command in global configuration mode. Command Purpose logging address IP address of the host to be used as a syslog server. logging facility Facility parameters for syslog messages. logging trap Set syslog server logging level. 4.1.7 Displaying the Operating Configuration The configuration file may be displayed from the EXEC (enable) mode.
- 41 - You can add comments to a configuration file describing the commands you have entered. Precede a comment with an exclamation point (!). Use the following commands to configure the software from the terminal. Command Purpose configure terminal Enters global configuration mode and select the terminal option.
- 42 - Router# copy running-config ? startup-config Copy to startup configuration tftp:[//A.B.C.D/filename] Copy to tftp: file system Router# copy running-config tftp Enter TFTP Server IP Address [A.B.C.D]? Enter file name 'my-config' to copy? Reply to any prompts for additional information or confirmation. The prompts will depend on how much information has been provided in the copy command and the current setting of the file prompt command.
- 43 - Reply to any router prompts for additional information or confirmation. Additional prompts will depend on how much information is provided in the copy command and the current setting of the file prompt command. In the following example, the software is configured from the file my-config at IP address 192.168.123.59: Router# copy tftp://192.168.123.59/my-confg running-config Download file ‘my-config’...
Page 44
- 44 - Important! Be sure to change the SNMP default community strings in order to prevent unauthorized access to management information. To set up the community access string to permit access to the SNMP, use the following command from the global command mode.
- 45 - of the SNMP agent. 4.3.2 Other SNMP Configuration Command Purpose snmp-server Enable the SNMP agent. The first snmp-server global configuration command enables SNMP. snmp-server engineID {local engineid- Set Engine ID for local or remote devices. The remote engine string|remote host-ip-address [udp-port ID is used to create users that can send SNMPv3 traps.
- 46 - 4.3.3 Configuring Spanning Tree Protocol (STP) The Spanning Tree Protocol (STP) is part of the IEEE 802.1D standard. It provides for a redundant network without the redundant traffic through closed paths. For example, in a network without spanning tree protocol, the same message will be broadcast through multiple paths, which may start an unending packet-passing cycle.
- 47 - Priority Setting the bridge priority to a low value will increase the likelihood that the current bridge will become the root bridge. If the current bridge is located physically near the center of the network, decrease the Bridge Priority from its default value of 32768 to make it become the root bridge.
Page 48
- 48 - • Root port—provides the best path (lowest cost) when the bridge forwards packets to the root switch. • Designated port—connects to the designated switch, which has the lowest path cost when forwarding packets from that LAN to the root bridge. The port through which the designated switch is attached to the LAN is called the designated port.
Page 49
- 49 - Valid priority values are 0, 4096, 8192, 12288, 16384, 20480, 24576, 28672, 32768, 36864, 40960, 45056, 49152, 53248, 57344, and 61440. All other values are rejected. To return the switch to its default setting, use the no spanning-tree priority configuration command. Restarting the Protocol Migration Process A switch when running RSTP supports a built-in protocol migration mechanism that enables it to interoperate with legacy 802.1D switches.
- 50 - Configuring port priority Use the following interface mode command to configure port priority: Router(config)# interface eth1 Router(config-if-eth1)#spanning-tree port-priority <port-priority> For <port-priority>, the range is 0–240 in increments of 16; the default is 128. The lower the number, the higher the priority.
- 51 - Chapter 5: Configuring IP The Internet Protocol (IP) is a packet-based protocol used to exchange data over computer networks. It is the foundation on which all other IP protocols are built. IP is a network-layer protocol that contains addressing and control information that allows data packets to be routed.
- 52 - The following table describes the Class C equivalent of CIDR prefixes. CIDR Prefix Class C Equivalent Host Addresses 1/8 Class C 32 Hosts 1/4 Class C 64 Hosts 1/2 Class C 128 Hosts 1 Class C 256 Hosts 2 Class C 512 Hosts 4 Class C...
- 53 - Note: If any router on a network segment uses a secondary address, all other routers on that same segment must also use a secondary address from the same network or subnet. To assign multiple IP addresses to network interfaces, use the following command in interface configuration mode: Command Purpose ip address address I mask secondary...
- 54 - Configuring IP Routing IP routing protocols are divided into two classes: Interior Gateway Protocols (IGPs) and Exterior Gateway Protocols (EGPs). Note: The word gateway is often a part of a routing protocol’s name, since many routing protocol specifications refer to routers as gateways.
- 55 - Connected interface Static route External BGP OSPF Internal BGP Unknown Table 5-3: Dynamic Routing Protocol Default Administrative Distances 5.4 Configuring RIP The Routing Information Protocol (RIP) is a commonly used interior gateway protocol (IGP) created for use in small, homogeneous networks.
- 56 - network {IP prefix} Associate a network with a RIP routing process. 5.4.2 Allow Unicast Updates for RIP Because RIP is normally a broadcast protocol, in order for RIP routing updates to reach non-broadcast networks, it is necessary to establish a direct link between routers. Use the following command in router configuration mode. Command Purpose neighbor ip-address...
- 57 - 5.4.4 Redistribute Routing Information The router can redistribute routing information from a source route entry into the RIP tables. For example, you can instruct the router to re-advertise connected, kernel, or static routes as well as routing protocol-derived routes. This capability applies to all the IP-based routing protocols.
- 58 - To define conditions for redistributing routes from a source route entry into the RIP tables, perform at least one of the following tasks in route-map configuration mode: Command Purpose match interface interface-name Match the specified interface. match ip address {access-list-name | Match a standard access list or prefix list.
- 59 - To set an administrative RIP distance to a specified value, use the distance router configuration command. Command Purpose distance distance-value [prefix] [access- Assign an administrative distance. list-name] 5.4.7 Generate a Default Route You can force an autonomous system boundary router to generate a default route into an RIP routing domain. Whenever you specifically configure the redistribution of routes into an RIP routing domain, the router automatically becomes an autonomous system boundary router.
- 60 - To do this, perform the following task in router configuration mode. Command Purpose distribute-list {access-list-name | prefix Suppress routes from being advertised and processed in prefix-list-name} in | out} routing updates depending upon the action listed in the [interface-name] access list or prefix list.
- 61 - To enable or disable split horizon, perform the following tasks in interface configuration mode. Command Purpose ip rip poison reverse Enable split horizon with poison reverse. no ip rip poison reverse Disable split horizon with poison reverse. 5.4.11 Manage Authentication Keys If you are sending and receiving RIP Version 2 packets, you can enable RIP authentication on an interface.
- 62 - debug ip rip packet [recv | send] detail Display detailed information about the RIP packets. The information includes the origin and port number of the packet as well as a packet dump. show debugging rip Show all information currently set for RIP debug. 5.5 Configuring IP Multicast Routing Multicast traffic is a means to transmit a multimedia stream from the Internet (a video conference, for example) without requiring a TCP connection from every remote host that wants to receive the stream.
Page 63
- 63 - Multicast routers elect designated router (DR) for the LAN (subnet). The DR is the router with the highest IP address. The DR is responsible for sending IGMP host-query messages to all hosts on the LAN. By default, the DR sends IGMP host-query messages every 60 seconds in order to keep the IGMP overhead on hosts and networks very low.
- 64 - Configuring the TTL Threshold The time-to-live (TTL) value controls whether packets are forwarded out of an interface. The TTL value is specified in hops. Only multicast packets with a TTL value greater than the interface TTL threshold are forwarded on the interface.
Page 65
- 65 - Graft-retransmit-interval This value defines the interval of time that a DVMRP router sending a graft message will wait for a graft acknowledgment from an upstream router before re-transmitting that message. Subsequent re-transmissions will be sent at an interval of twice that of the preceding interval. DVMRP must be enabled on the router for this command to be operational.
- 66 - Command Purpose prune-age <20–8000 seconds> Defines how long a prune state will remain in effect for a source-routed multicast tree. After the prune age period expires, flooding will resume. Default value: 180 seconds Report-interval This value defines how often routers will propagate their complete routing tables to other neighbor DVMRP routers. DVMRP must be enabled on the router for this command to be operational.
- 67 - When configuring an access list, you can add multiple statements by adding criteria to the same numbered list. The order of the statements is important, as the switch tests addresses against the criteria in an access list one by one (in the order the statements are entered) until it finds a match.
- 68 - deny statement would follow the last entry, if no match was found before the end of the list. In this case, however, we are permitting any other IP address other than 192.168.123.254, and a deny statement isn’t necessary. Router(config)# access-list 1 deny 192.168.123.254 ? A.B.C.D Source wildcard.
- 70 - 5.6.4 Applying an Access List to an Interface After creating your access lists, you must apply them to an interface in order to enable the access list. Enter the interface configuration mode for the desired interface. Each interface may have only one access list applied to it at one time.
- 71 - 5.7.2 Configure ABR Type The IC35516 OSPF conforms to the specifications in standard RFC2328. Because a variety of implementations support OSPF, the OSPF configuration depends on different types of routers. To configure OSPF on an Area Border Router (ABR), specify what type the router belongs to.
- 72 - ip ospf dead-interval seconds Set the number of seconds that a device's hello packets must not have been seen before its neighbors declare the OSPF router down. This value must be the same for all routers attached to a common network. The default value is 40 seconds.
- 73 - Authentication allows password-based protection against unauthorized access to an area. Stub areas are areas into which information on external routes is not sent. Instead, there is a default external route (generated by the area border router) into the stub area for destinations outside the autonomous system. To further reduce the number of link state advertisements sent into a stub area, no-summary configuration on the ABR is allowed to prevent it from sending summary link advertisement into the stub area.
- 74 - If you configure an NSSA totally stub area using no summary command, inter-area routes are not allowed in the NSSA area. When redistribution takes place in the situations where there is no need to inject external routes into the NSSA, you can prevent the router from creating Type 7 LSAs for NSSA using the translate-never command.
- 75 - Command Purpose auto-cost reference-bandwidth ref-bw Differentiate high bandwidth links. 5.7.12 Configure Route Calculation Timers You can configure the delay time between when OSPF receives a topology change and when it starts a shortest path first (SPF) calculation. To do this, perform the following task in router configuration mode.
- 76 - To force the autonomous system boundary router to generate a default route, perform the following task in router configuration mode. Command Purpose redistribute {kernel | connected | Redistribute routes into OSPF routing domain. static | rip | bgp} [metric metric-value] [metric-type {1|2}][route-map map-tag] 5.7.16 Change the OSPF Administrative Distances An administrative distance is a value that rates the trustworthiness of a routing information source, such as an...
- 77 - 5.7.19 Monitor and Maintain OSPF You can display specific statistics such as the contents of IP routing tables and databases. The information provided can be used to determine resource utilization and solve network problems. You can also display information about node availability and discover the routing path that packets are taking through the network.
- 78 - show ip ospf neighbor [neighbor-id | Display OSPF-neighbor information. interface-name ] The debugging commands are useful to quickly diagnose problems. Use the following commands to display OSPF information in top mode. Command Purpose debug ospf packet {hello | dd | ls-ack | Display one set of information for each packet.
- 79 - ip vrrp VRID priority level Sets the priority level of the router within a VRRP VRID group. The default value is 100. ip vrrp VRID timers [advertise interval] Configures the interval between successive advertisements by the master virtual router in a VRRP VRID group. ip vrrp VRID authentication string Authenticates VRRP packets received from other routers in the VRID group.
- 80 - 5.9.2 Change IRDP Parameters When IRDP processing is enabled, the default parameters will apply. You may change any of the following default parameters. Use the following commands in interface configuration mode. Command Purpose ip irdp multicast Send IRDP advertisements to the all-systems multicast address (224.0.0.1) on a specified interface.
- 81 - • Priority—Priority of the bootstrap router in the range 0–255, with the larger priority being preferred. If the priority values are the same, the router with the larger IP address will be the preferred bootstrap router. To delete this router as a candidate for being a bootstrap router, use the no form of this command: 5.10.3 Setting Up RP Candidacy To configure the router to advertise itself as PIM candidate rendezvous point (RP) to the bootstrap router, use the following global configuration command:...
- 82 - ping {host | address} Test network node reach-ability. traceroute {host | destination} Trace packet routes through the network. 5.13 Configuring EtherAggregate An EtherAggregate consists of individual Gigabit Ethernet links bundled into a single logical link. The EtherAggregate feature allows you to manually configure multiple high-speed load-sharing links between two switch/routers or a switch/router and a server.
- 83 - default is no port member. speed [100 | 1000] Set the operating speed of the port aggregate to 100 or 1000 Mbps. Note that the speed will be applied only when the negotiation is disabled (that is, no auto-negotiation). By default, all added ports are configured to 1000 Mbps.
- 84 - 5.13.3 EtherAggregate Configuration Example The following example creates four L3 EtherAggregates. EtherAggregate example configuration file // The below configures port-aggregate 1 with 1-4 eth ports with speed 1000 Mbps // The Vlan Mode is default Access mode //Access vlan is 1 interface port-aggregate 1 name EtherAggregate 1...
- 85 - 5.14 802.1x Support 802.1x is a standard for passing Extensible Authentication Protocol (EAP) information over a network. This enables you to restrict network access on a per-port basis. This section lists the commands needed to configure the IntraCore 35516 to act as an EAP authentication server. Please refer to the IEEE 802.1X standard (available on the web at standards.ieee.org/getieee802/) for details of the terminology.
- 87 - Chapter 6: VLAN Configuration Up to 4094 Virtual LANs (VLANs) are supported on the IC35516. The switch is shipped with a default VLAN with VLAN ID (VID) 1. All switchports (eth1–eth16) are included in the default VID 1. The default VID 1 cannot be deleted.
- 88 - First, a VLAN is created and named tester. Router# configure terminal Router(config)# vlan 2 Router(config-vlan)# name tester Router(config-vlan)# exit Router(config)# exit Router# show vlan In the output of the show vlan command, the new VLAN will be listed, but will not yet be active. Next, a switchport is chosen to belong to VLAN 2.
- 89 - 6.2 VLAN Port Membership Modes A switchport can be assigned to a VLAN by designating a membership mode. The membership mode determines the kind of traffic the port carries and the number of VLANs to which it can belong. The membership modes are as follows: •...
Page 90
- 90 - Router(config-if-IFNAME)# end Return to Enable mode. Use the following commands, beginning in config mode, to configure the VLAN Allowed List for the trunk port: Command Purpose interface IFNAME Enter the interface name to access the interface configuration mode. switchport mode trunk This command designates the interface as IEEE 802.1q trunk-access mode.
- 91 - 6.2.3 Dot1q Tunnel 802.1Q tunnel ports are used to maintain customer VLAN integrity across a service provider network. You can configure a tunnel port on an edge switch in the service provider network and connect it to an 802.1Q trunk port on a customer interface, creating an asymmetric link.
- 92 - Chapter 7: Quality of Service (QoS) Configuration Quality of Service (QoS) is a general term referring to various methods of traffic management you can employ on your network to ensure that traffic you identify as high-priority can use a sufficient share of the available bandwidth. The IC35516 supports the following QoS methods: •...
- 93 - 7.1.3 Monitoring Weighted Fair Queuing Lists To display information about the input and output queues, use the following command in EXEC mode: Command Purpose show queuing fair Displays the status of the weighted fair queuing. 7.1.4 Weighted Fair Queuing Example This example shows eth10 has 10% bandwidth for class 3, 20% for class 2, 30% for class 1, and 40% for class 0.
- 94 - {list | tcp | udp} access-list-number/layer4-port-number priority-list list-number interface Establishes queuing priorities for packets entering from a interface-type-number given interface. {high | medium | normal | low} priority-list list-number default Assigns a priority queue for those packets that do not match {high | medium | normal | low} any other rule in the priority list.
- 95 - You must follow certain required, basic steps to enable CQ for your network. In addition, you can choose to assign packets to custom queues based on protocol type, interface where the packets enter the router, or other criteria you specify.
- 96 - matching protocol or interface type. When a match is found, the packet is assigned to the appropriate queue. The list is searched in the order it is specified, and the first matching rule terminates the search. 7.3.1 Assigning the Queue List to an Interface (Optional) You can assign a custom queue list number to an interface.
- 97 - 7.4.1 Configuring GTS for an Interface To configure GTS for outbound traffic on an interface, use the following command in interface configuration mode: Router(config-if)# traffic-shape rate bit-rate 7.4.2 Configuring GTS for an Access List To configure GTS for outbound traffic on an access list, use the following commands beginning in global configuration mode: Command Purpose...
- 98 - 7.5.1 Configuring RED to Use IP Precedence To configure RED to use the IP precedence value when it calculates the drop probability, use the following commands in interface configuration mode: Command Purpose random-detect prec-based Indicates that RED is to use the ip precedence value when it calculates the drop probability for the packet.
- 99 - Chapter 8: Configuring DHCP and DNS 8.1 DHCP Dynamic Host Control Protocol (DHCP) allows users to automatically assign re-usable IP addresses to DHCP clients. The router software supports a full DHCP server implementation that assigns and manages IP addresses from specified address pools within the router to DHCP clients.
- 100 - 8.1.5 Configuring the Domain Name for the Client The domain name of a DHCP client places the client in the general grouping of networks that make up the domain. To configure a domain name string for the client, use the following command in DHCP pool configuration mode: Router(config-dhcp)# domain-name domain Use the no form of this command to remove the configured domain name.
- 101 - Router(config-dhcp)# default-router A.B.C.D Note: You can specify up to eight DNS server IP addresses. Use the no form of this command to remove the configured default router. 8.1.11 Configuring the Address Lease Time By default, each IP address assigned by a DHCP server comes with a one-day lease, which is the amount of time that the address is valid.
Specifies the name of the client using any standard ASCII character. (Optional) The client name should not include the domain name. For example, the name moon should not be specified as moon.asante.com. Use the no form of this command to remove the configured client name.
- 103 - To display DHCP server information, use the following commands in privileged EXEC mode, as needed: Command Purpose show ip dhcp Displays the current DHCP information. show ip dhcp binding Displays the DHCP address binding information. show ip dhcp conflict Displays the DHCP address conflict information.
192.108.250.1 ip name-server 192.108.250.4 ip name-server 192.108.250.5 ip domain-name asante.com ip domain-list stanford.edu ip route 0.0.0.0/0 192.203.54.1 After the DNS lookup is enabled on the router, you can use the ping or traceroute command with the hostname rather than an IP address as in this example: Router# ping www.yahoo.com...
- 105 - Appendix A: Basic Troubleshooting In the unlikely event that the switch does not operate properly, follow the troubleshooting tips below. If more help is needed, contact Asanté’s technical support at www.asante.com/support. Problem Possible Solutions The Power LED is not lit.
- 106 - Appendix B: Specifications The sections below list the features and product specifications for the IntraCore 35516 Series Gigabit Ethernet switches. ™ Connectors: Gigabit Ethernet with Auto-Uplink (10/100/1000BaseTX): RJ-45 or GBIC holder for GBIC transceiver module Console: Serial (RS-232): DB9 Status Indicators: Separate link-activity, speed (10/100/Gigabit) and duplex (full or half) LEDs for each port;...
- 107 - B.2 Technical Support and Warranty ™: IntraCare Free technical support and advanced warranty support for 3 years. Includes free telephone support, 24-hour support via web and ftp, complete product warranty with second business day (within the United States) advanced replacement, and software maintenance agreement.
- 108 - Appendix C: FCC Compliance and Warranty Statements C.1 FCC Compliance Statement This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment.
- 109 - C.3 IntraCare Warranty Statement Products: IntraCore 35516-T IntraCore 35516-G Duration: 3 years Advanced Warranty United States: Second Business Day Replacement: Other Countries: See your local distributor or reseller. 1. Asanté Technologies warrants (to the original end-user purchaser) the covered IntraCore products against defects in materials and workmanship for the period specified above.
Page 110
- 110 - Appendix D: Console Port Pin Outs The console port is used to connect with a terminal using a serial modem RS-232C cable (available from Radio Shack’s website, www.radioshack.com, catalog # 26-117). The setting is 9600-N81. The table below lists the pin outs.
Page 111
- 111 - Appendix E. Online Warranty Registration Please register the switch online at www.asante.com/support/warranty/index.html. By doing so, you’ll be entitled to special offers, up-to-date information, and important product bulletins. You may also register the switch by using the warranty card found in the printed Setup Guide.
Need help?
Do you have a question about the IntraCore 35516 Series and is the answer not in the manual?
Questions and answers