Asante IntraCore 35516 Series User Manual

Asante IntraCore 35516 Series User Manual

Asante technologies switches user's manual,35516
Hide thumbs Also See for IntraCore 35516 Series:
Table of Contents

Advertisement

®
IntraCore
35516 Series
Layer 2/3/4 Gigabit Switches
User's Manual

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the IntraCore 35516 Series and is the answer not in the manual?

Questions and answers

Summary of Contents for Asante IntraCore 35516 Series

  • Page 1 ® IntraCore 35516 Series Layer 2/3/4 Gigabit Switches User’s Manual...
  • Page 2: Technical Support

    IntraCore 35516 Series Layer 2/3/4 Gigabit Switches User’s Manual Asanté Technologies, Inc. 821 Fox Lane San Jose, CA 95131 SALES 800-662-9686 Home/Office Solutions 800-303-9121 Enterprise Solutions 408-435-8388 TECHNICAL SUPPORT 801-566-8991: Worldwide www.asante.com/support Copyright © 2003 Asanté Technologies, Inc. All rights reserved. No part of this document, or any associated artwork, product design, or design concept may be copied or reproduced in whole or in part by any means without the express written consent of Asanté...
  • Page 3: Table Of Contents

    Table of Contents Chapter 1. Introduction 1.1 Features 1.2 Package Contents 1.3 LEDs 1.4 Front and Back Panel Descriptions 1.5 Management and Configuration Chapter 2. Hardware Installation and Setup 2.1 Installation Overview 2.2 Installation into an Equipment Rack 2.3 Gigabit Interface Converters 2.4 Installing the Optional Emergency Power Supply 2.5 Connecting Power 2.6 Connecting to the Network...
  • Page 4 Appendix D. Console Port Pin Outs Appendix E. Online Warranty Registration...
  • Page 5: Chapter 1. Introduction

    Chapter 1. Introduction Thank you for purchasing the Asanté IntraCore 35516 Series Gigabit switch. The IC35516 is from a family of multi-media and multi-protocol switches capable of supporting Layer 2 switching and Layer 3 and Layer 4 protocols. They are designed to offer industry-leading performance at a very competitive cost of ownership.
  • Page 6: Package Contents

    No link has been established on the port. 1.3.2 IC35516-G The IntraCore 35516-G has one power LED, one (optional) emergency power LED, two LED indicators for 10/100/1000BaseT status, and one LED for GBIC status. See the table below for a complete LED...
  • Page 7: Front And Back Panel Descriptions

    Color Description Power Green Power is on. Power is off, or main power supply has failed. Emergency Power Green Primary power has failed and optional power supply is powering the switch. Optional power supply is in standby mode and primary power is working. BaseT10/100/1000 Green A valid 1000 Mbps link has been established on the port.
  • Page 8: Management And Configuration

    1.4.2 IC35516-G The front panel of the IC35516-G contains the following: power and port LEDs; 12 GBIC ports; 4 dual- function Gigabit ports that support either 1000BaseT or GBIC-style Gigabit Ethernet ports; and a console port. The back panel, shown below, contains a 12 VDC jack for emergency power (optional), the primary power bay cover plate, the on/off switch, and the primary power outlet.
  • Page 9: Chapter 2. Hardware Installation And Setup

    Chapter 2. Hardware Installation and Setup The following guidelines will help the user to easily install the switch, and to ensure that it has the proper power supply and environment. 2.1 Installation Overview Follow these steps to install the IntraCore switch: Open the box and check the contents.
  • Page 10: Power Requirements

    2.1.3 Power Requirements The electrical outlet should be located near the switch and be easily accessible. It must also be properly grounded. Make sure the power source adheres to the following guidelines: • Power: Auto Switching 90-260 VAC • Frequency range: 50/60 Hz 2.1.4 Environmental Requirements The switch must be installed in a clean, dry, dust-free area with adequate air circulation to maintain the following environmental limits:...
  • Page 11: Gigabit Interface Converters

    Instructions for installing, removing, and maintaining GBIC modules are provided in following sections. Important! The 35516-G has 12 GBIC ports that are paired— port numbers 1/2, 3/4, 5/6, 7/8, 10/12, and 14/16. DO NOT use more than one copper GBIC module per pair (maximum 8 modules).
  • Page 12: Removing A Gbic

    2.3.2 Removing a GBIC Caution: GBIC 1000T modules run hot under normal operating conditions. When it has been removed from the system, place it on a heat-resistant surface and allow the module to cool before handling. Note: Unnecessary removals/insertions of a GBIC module will lead to premature failure of the GBIC connector.
  • Page 13: Connecting Power

    2.5 Connecting Power Important: Carefully review the power requirements (Chapter 2.1.3) before connecting power to the switch. Use the following procedure to connect power to the switch: Plug one end of the supplied power cord into the power connector on the back of the switch. Plug the other end into a grounded AC outlet.
  • Page 14: Gigabit Ethernet Ports Cabling Procedures

    1000BaseT requires that all four pairs (8 wires) be connected correctly, using Category 5 or better Unshielded Twisted Pair (UTP) cable (to a distance of 100 meters). Table 2-2 shows the correct pairing of all eight wires. Pin Number Table 2-2 Pin Numbers and Wire Colors 2.6.2 Gigabit Ethernet Ports Cabling Procedures Cabling requirements for the optional hardware modules depend on the type of module installed.
  • Page 15 • Under the Settings tab, choose VT100 for Emulation mode • Select Terminal keys for Function, Arrow, and Ctrl keys. Be sure the setting is for Terminal keys, NOT Windows keys • Back under the Connect To tab, press the Configuration button •...
  • Page 16: Setting Passwords

    2.8 Setting Passwords The switch ships with a default of no enable password, which allows anyone on the network access to various privilege levels. To prevent unauthorized changes to the switch’s configuration, you should set an enable password for access to switch management. Follow the example below to assign a privileged password.
  • Page 17: Configuring An Ip Address

    2.9 Configuring an IP Address The switch ships with the default IP address 192.168.0.1/24. Connect via the serial port in order to assign the switch an IP address on your network. The physical ports (or switchports) of the IC35516 are L2 ports, and cannot have an IP address assigned to them.
  • Page 18: Restoring Factory Defaults

    2.10 Restoring Factory Defaults If you ever need to restore the switch to its factory default settings, follow the commands shown in the following screen. Router> enable Router# reload ? factory-default Reset ALL system parameters to factory default <cr> Router# reload factory-default The switch is now ready for configuration.
  • Page 19: Chapter 3. Understanding The Command Line Interface (Cli)

    Chapter 3. Understanding the Command Line Interface (CLI) The switch utilizes Command Line Interface (CLI) to provide access to several different command modes. Each command mode provides a group of related commands. After logging into the system, the user is automatically in the user top (user EXEC) mode. From the user top mode you can enter into the privileged top (privileged EXEC) mode.
  • Page 20: Privileged Top (Privileged Exec) Mode

    User top commands: Router> ? enable Turn on privileged mode command exit Exit current mode and down to previous mode help Description of the interactive help system ping Send echo messages quit Exit current mode and down to previous mode show Show running system information tracert...
  • Page 21: Global Configuration Mode

    Router> enable Router# ? clear Reset functions clock Manage the system clock configure Enter configuration mode copy Copy from one file to another debug Debugging functions disable Turn off privileged mode command erase Erase a filesystem exit Exit current mode and down to previous mode help Description of the interactive help system Negate a command or set its defaults...
  • Page 22: Interface Configuration Mode

    Router# configure terminal Router(config)# ? access-list Add an access list entry Set static arp entry boot Modify system boot parameters duplicate-ip Duplicate IP Address detection Global Commands enable Modify enable password parameters End current mode and change to enable mode exit Exit current mode and down to previous mode help...
  • Page 23: Router Configuration Mode

    3.3.2 Router Configuration Mode Router configuration commands are used to configure an IP routing protocol and always follow a router command. To list the available router configuration keywords, enter the router command followed by a space and a question mark (?) at the global configuration prompt. Router(config)# router ? ospf Open Shortest Path First...
  • Page 24: Advanced Features Supported Within The Command Mode

    3.4 Advanced Features Supported within the Command Mode Entering a question mark (?) at the system prompt displays a list of commands available for each command mode. You can also get a list of any command's associated keywords and arguments with the context- sensitive help feature.
  • Page 25: Checking Command Syntax

    Example of Context Sensitive Help The following example illustrates how the context-sensitive help feature creates an access list from the configuration mode. Enter the letters “co” at the system prompt followed by a question mark (?). Do not leave a space between the last letter and the question mark (?).
  • Page 26: Using Cli Command History

    In the example above, a command has been issued that is unknown or ambiguous. Router(config)# router % Command incomplete. Router(config)# In the example above a command has been issued that is incomplete. In the following examples, various correct commands (using route) are displayed. Router(config)# route? route-map Create route-map or enter route-map command mode...
  • Page 27: Completing A Partial Command Name

    • Editing Command Lines that Wrap • Deleting Entries • Scrolling Down a Line or a Screen • Redisplaying the Current Command Line • Transposing Mistyped Characters • Controlling Capitalization 3.8.1 Moving Around on the Command Line Use the following commands to move the cursor around on the command line in order to make corrections or changes: Command Press Ctrl-B or press the left...
  • Page 28: Editing Command Lines That Wrap

    The command is not immediately executed, so that you may modify the command if necessary. If you enter a set of characters that could indicate more than one command, the system simply lists all possible commands. You may also enter a question mark (?) to obtain a list of commands that begin with that set of characters. Do not leave a space between the last letter entered and the question mark (?).
  • Page 29: Redisplaying The Current Command Line

    Press Ctrl-U or Ctrl-X. Press Ctrl-W. Press Esc D. 3.8.5 Scrolling Down a Line or a Screen When using a command that list more information than will fill on the screen, the prompt --More-- is displayed at the bottom of the screen. Whenever the More prompt is displayed, use the following keystrokes to view the next line or screen: Keystrokes Press the Return key.
  • Page 30: Passwords And Privileges Commands

    3.9 Passwords and Privileges Commands The following sections describe the password and privileges commands used to control access to different levels of the router: • enable password • password • service password-encryption 3.9.1 Enable Password To set a local password to control access to various privilege levels, use the enable password command in global configuration mode.
  • Page 31: Service Password-Encryption

    3.9.3 Service Password-Encryption To encrypt passwords, use the service password-encryption command in global configuration mode. Use the no form of this command to restore the default. Router(config)# service password-encryption Router(config)# no service password-encryption...
  • Page 32: Chapter 4. Managing The System And Configuration Files

    Chapter 4. Managing the System and Configuration Files This chapter explains how to manage the system information, as well as how to manage the configuration files for the IC35516. 4.1 Managing the System This section discusses the following tasks needed to manage the system information of the IC35516: •...
  • Page 33: Displaying The Operating Configuration

    4.1.4 Trace Packet Routes To discover the routes that packets will actually take when traveling to their destinations, use the following command in top mode. Command tracert address 4.1.5 Test Connections with Ping Tests The switch supports IP ping, which can be used to test connectivity to remote hosts, via their IP addresses. Ping sends an echo request packet to an address and “listens”...
  • Page 34: Managing Configuration Files

    4.2 Managing Configuration Files This section discusses how to download configuration files from remote servers, and store configuration files on the router at system startup. Configuration files contain the commands the router uses to customize the function of the IC35516. The setup command facility helps you create a basic configuration file.
  • Page 35: Copying Configuration Files To A Network Server

    4.2.2 Copying Configuration Files to a Network Server You can copy configuration files from the router to a file server using TFTP. You might wish to back up a current configuration file to a server before changing its contents, thereby allowing you to later restore the original configuration file from the server.
  • Page 36: Configuring Snmp And Spanning Tree

    In order to restore a configuration file to an exact copy of a file stored on a server, you need to copy the configuration file directly to the startup configuration (using the copy tftp startup-config command) and reload the router. To copy a configuration file from a TFTP server to the router, use the following commands in EXEC mode: Command copy tftp[[[//location]/directory]/filename]...
  • Page 37: Configuring Spanning Tree Protocol (Stp)

    Command snmp-server host address The 35516 can send an SNMP trap to its configured trap receivers if it detects a duplicate IP address. To turn on duplicate IP detection, use the following command in global configuration mode: Router(config)# duplicate-ip detect...
  • Page 38: Spanning Tree Parameters

    but where there is only one path between any two points (the connections span the entire network, and the paths are branched, like a tree). All of the bridges (a switch is a complex bridge) on the network communicate with each other using special packets of data called Bridge Protocol Data Units (BPDUs).
  • Page 39: Spanning Tree Port Configuration

    Spanning Tree Port Configuration You can configure the following parameters from interface configuration mode: Router(config)# interface eth1 Router(config-if-eth1)# spanning-tree ? path-cost Set interface path cost port-priority Set interface priority Router(config-if-eth1)# Port Priority The port priority is a spanning tree parameter that ranks each port, so that if two or more ports have the same path cost, the STP selects the path with the highest priority (the lowest numerical value).
  • Page 40: Chapter 5. Configuring Ip

    Chapter 5. Configuring IP The Internet Protocol (IP) is a packet-based protocol used to exchange data over computer networks. It is the foundation on which all other IP protocols are built. IP is a network-layer protocol that contains addressing and control information that allows data packets to be routed. This section describes how to configure the Internet Protocol (IP).
  • Page 41: Assign Multiple Ip Addresses To Network Interfaces

    CIDR Prefix Class C Equivalent 1/8 Class C 1/4 Class C 1/2 Class C 1 Class C 2 Class C 4 Class C 8 Class C 16 Class C 32 Class C 64 Class C 128 Class C 256 Class C OR 1 Class B 2,048 Class C An interface can have one primary IP address.
  • Page 42: Establish Address Resolution

    To assign multiple IP addresses to network interfaces, use the following command in interface configuration mode: Command ip address address I mask secondary 5.2 Establish Address Resolution A device in the IP can have both a local address (which uniquely identifies the device on its local segment or LAN) and a network address (which identifies the network to which the device belongs).
  • Page 43: Configuring Static Routes

    Interior gateway protocols are used to exchange routing information among routers in an autonomous network, such as a company’s LAN. A routing protocol determines how routers in a network share and update information and report changes, enabling a network to be dynamic instead of static. All IP interior gateway protocols must be specified with a list of associated networks before routing activities can begin on the switch.
  • Page 44: Configuring Rip

    5.4 Configuring RIP The Routing Information Protocol (RIP) is a commonly used interior gateway protocol (IGP) created for use in small, homogeneous networks. It is a distance-vector routing protocol, documented in RFC 1058. RIP uses broadcast User Datagram Protocol (UDP) data packets to exchange routing information. The IC35516 sends, or advertises, routing information updates every 30 seconds.
  • Page 45: Redistribute Routing Information

    5.4.3 Specify a RIP Version By default, the software receives RIP Version 1 and Version 2 packets, but sends only Version 1 packets. You can configure the software to receive and send only Version 1 packets or only Version 2 packets. To do so, perform the following task in router configuration mode.
  • Page 46: Set Metrics For Redistributed Routes

    Router(config)# route-map map-tag permit 10 Router(config-route-map)# ? End current mode and change to enable mode. exit Exit current mode and down to previous mode help Description of the interactive help system match Match values from routing table Negate a command or set its defaults on-match Exit policy on matches quit...
  • Page 47: Filtering Routing Information

    process. By specifying administrative distance values, you enable the router to intelligently discriminate between sources of routing information. The router will always pick the route whose routing protocol has the lowest administrative distance. There are no general guidelines for assigning administrative distances, because each network has its own requirements.
  • Page 48: Adjust Timers

    Apply Offsets to Routing Metrics An offset list is the mechanism for increasing incoming and outgoing metrics to routes learned via RIP. You can limit the offset list with an access list. To increase the value of routing metrics, perform the following task in router configuration mode.
  • Page 49: Monitor And Maintain Rip

    Important! Do not use plain text authentication in RIP packets for security purposes, because the unencrypted authentication key is sent in every RIP Version 2 packet. Use plain text authentication when security is not an issue (for example, to ensure that incorrectly configured hosts do not participate in routing).
  • Page 50: Configuring Igmp

    IGMP The Internet Group Management Protocol (IGMP) manages the multicast groups on a LAN. IP hosts use IGMP to report their group membership to directly connected multicast routers. Routers executing a multicast routing protocol maintain forwarding tables to forward multicast datagrams. Routers use the IGMP to learn whether members of a group are present on their directly attached sub-nets.
  • Page 51 Changing the IGMP Version By default, the router uses IGMP Version 2, which allows such features as the IGMP query timeout and the maximum query response time. All systems on the subnet must support the same version. The router does not automatically detect Version 1 systems and switch to Version 1.
  • Page 52: Configuring Dvmrp

    5.5.2 Configuring DVMRP This section presents the commands for configuring DVMRP IP Multicast Routing Protocol. The following commands are available from global configuration mode: Router(config)# ip dvmrp ? enable graft-retransmit-interval nbr-timeout probe-interval prune-age report-interval route-discard-timeout route-expire-timeout route-holddown-time Router(config)# ip dvmrp Important! Remember that a no command (i.e no ip dvmrp enable) negates a previously entered command.
  • Page 53 DVMRP must be enabled on the router for this command to be operational. Command probe-interval <5–30 seconds> Prune-age This value defines how long a prune state will remain in effect for a source-routed multicast tree. After the prune age period expires, flooding will resume. DVMRP must be enabled on the router for this command to be operational.
  • Page 54: Using Access Lists

    5.6 Using Access Lists An access list is a collection of criteria statements that the switch uses to determine whether to allow or block traffic based on IP addresses. Access lists can be configured to provide basic security on your network, and to prevent unnecessary traffic between network segments.
  • Page 55: Create An Expanded Access List

    Router(config)# access-list 1 deny 192.168.123.254 ? A.B.C.D Source wildcard. e.g. 0.0.0.255 <cr> Router(config)# access-list 1 deny 192.168.123.254 Router(config)# access-list 1 permit any {0.0.0.0 255.255.255.255} Router(config)# exit Router# show access-list After entering the access list, use the show command from privileged mode, as shown above in the last line. Any lists you’ve created, as well as any remark entered for a list, will be displayed.
  • Page 56: Applying An Access List To An Interface

    Operator - equal to Operator - greater then Operator - less then Operator - NOT equal to <cr> Router(config)# $ list 101 deny tcp 192.168.123.0 0.0.0.255 192.168.124.0 eq ? <0-65535> Protocol port number Router(config)# $ eny tcp 192.168.123.0 0.0.0.255 192.168.124.0 0.0.0.255 eq 21 Router(config)# $ eny tcp 192.168.123.0 0.0.0.255 192.168.124.0 0.0.0.255 eq 20 Router(config)# $ permit ip 192.168.123.0 0.0.0.255 0.0.0.0 255.255.255.255 Router(config)# exit...
  • Page 57: Configuring Ospf

    Router(config)# access-list 101 permit tcp 192.168.123.0 0.0.0.255 any eq 25 Router(config)# access-list 101 deny any Router(config)# interface eth1 Router(config-if-eth1)# ip ? access-group Apply an access-group entry Router(config-if-eth1)# ip access-group ? WORD access-list number or name Router(config-if-eth1)# ip access-group 101 ? inbound direction outbound direction Router(config-if-eth1)# ip access-group 101 out...
  • Page 58: Configure Ospf Interface Parameters

    5.7.3 Configure Compatibility Compatibility configuration enables the router to be compatible with a variety of RFCs that deal with OSPF. Perform the following task to support many different features within the OSPF protocol. Command compatible rfc1583compatibility 5.7.4 Configure OSPF Interface Parameters The user can alter certain interface-specific OSPF parameters as needed.
  • Page 59: Configure Area Parameters

    To configure the OSPF network type, use the following command in interface configuration mode. Command ip ospf network {broadcast | non-broadcast | point-to-multipoint | point-to-point} 5.7.6 Configure OSPF for Non-broadcast Networks To configure routers that interconnect to non-broadcast networks, perform the following task in router configuration mode.
  • Page 60: Configure Route Summarization Between Ospf Areas

    specific external routes as Type 7 LSAs into the NSSA. In addition, when translating Type 7 LSAs into Type 5 LSAs by NSSA ABR, summarization and filtering are supported during the translation. Use NSSA to simplify administration if you are an Internet Service Provider (ISP) or a network administrator that must connect a central site using OSPF to a remote site that is using a different routing protocol such as RIP.
  • Page 61: Configure Route Calculation Timers

    5.7.11 Control Default Metrics OSPF calculates the OSPF metric for an interface according to the bandwidth of the interface. For example, a 64K link gets a metric of 1562, while a T1 link gets a metric of 64. If you have multiple links with high bandwidth, you might want to specify a larger number to differentiate the cost on those links.
  • Page 62: Prevent Routes From Being Advertised In Routing Updates

    To force the autonomous system boundary router to generate a default route, perform the following task in router configuration mode. Command redistribute {kernel | connected | static | rip | bgp} [metric metric-value] [metric- type {1|2}][route-map map-tag] 5.7.16 Change the OSPF Administrative Distances An administrative distance is a value that rates the trustworthiness of a routing information source, such as an individual router or a group of routers.
  • Page 63 To display various routing statistics, use the following commands in top mode. Command show ip ospf show ip ospf database show ip ospf database {asbr-summary | external | network | nssa-external | router | summary} show ip ospf database {asbr-summary | external | network | nssa-external | router | summary} link -state-id show ip ospf database {asbr-summary |...
  • Page 64: Virtual Router Redundancy Protocol (Vrrp)

    debug ospf event debug ospf ism [events | status | timers] debug ospf lsa [flooding | refresh] debug ospf nsm [events | status| timers] debug ospf nssa show debugging ospf 5.8 Virtual Router Redundancy Protocol (VRRP) Virtual Router Redundancy Protocol (VRRP) specifies a protocol that dynamically elects a gateway router from among virtual routers running VRRP on a LAN.
  • Page 65: Configuring Icmp Router Discovery Protocol (Irdp)

    The following commands are available under EXEC or Enable mode: Command show vrrp [brief | VRID] show vrrp interface IFNAME [brief] debug ip vrrp 5.9 Configuring ICMP Router Discovery Protocol (IRDP) When IP routing is disabled, you can configure router discovery. The ICMP Router Discovery Protocol (IRDP) allows the router to dynamically learn about routes to other networks.
  • Page 66 Use any of the following commands in top mode. Command show arp [interface] show access-lists [access-list- name] show ip prefix-list [prefix-list-name] show ip protocols show ip irdp show ip route [bgp | rip | ospf | connected | kernel | static | address | prefix] ping {host | address} traceroute {host | destination}...
  • Page 67: Chapter 6. Vlan Configuration

    Switch ports are used for managing the physical interface and associated Layer 2 protocols and do not handle routing or bridging. Ports 1 through 16 on the 35516 are Ethernet ports. The following example demonstrates how to enter the interface configuration mode for port 16:...
  • Page 68 First, a VLAN is created and named tester. Router# configure terminal Router(config)# vlan 2 Router(config-vlan)# name tester Router(config-vlan)# exit Router(config)# exit Router# show vlan From the show vlan command, the new VLAN will be listed, but will not yet be active. Next, a switchport is chosen to belong to VLAN 2.
  • Page 69: Vlan Port Membership Modes

    6.2 VLAN Port Membership Modes A switchport can be assigned to a VLAN by designating a membership mode. The membership mode determines the kind of traffic the port carries and the number of VLANs to which it can belong. The membership modes are as follows: •...
  • Page 70: Dot1Q Tunnel

    Use the following commands to configure the VLAN Allowed List for the trunk port: Command Router(config)# interface IFNAME Router(config-if-IFNAME)# switchport mode trunk Router(config-if-IFNAME)# switchport trunk allowed vlan {add | all | except | remove} vlan-list Router(config-if-IFNAME)# end The trunk port accepts tagged and untagged frames. All the untagged frames are classified to the trunk port’s native VLAN (the VLAN whose VID matches the port’s VLAN ID).
  • Page 71 Use the following commands to configure an interface as an IEEE 802.1q tunnel port: Command Router(config)# interface IFNAME Router(config-if-IFNAME)# switchport mode dot1q-tunnel Router(config-if-IFNAME)# switchport access vlan vid Router(config-if-IFNAME)# end Purpose Enter the interface name to access the interface configuration node. This command will put the interface into IEEE 802.1q dot1q-tunnel access mode.
  • Page 72: Appendix A. Basic Troubleshooting

    Appendix A. Basic Troubleshooting In the unlikely event the switch does not operate properly, follow the troubleshooting tips below. If more help is needed, contact Asanté’s technical support at www.asante.com/support. Problem The Power LED is not lit. The Emergency Power LED is not lit. The 10/100/1000 port Link LEDs are not lit.
  • Page 73: Appendix B. Specifications

    Appendix B. Specifications The sections below list the features and product specifications for the IntraCore 35516 Series Gigabit Ethernet switches. Connectors: Gigabit Ethernet with Auto-Uplink for GBIC transceiver module Console: Serial (RS-232): DB9 Status Indicators: Separate link-activity, speed (10/100/Gigabit) and duplex (full or half) LEDs for each port;...
  • Page 74: Appendix C. Fcc Compliance And Warranty Statements

    13. Do not attempt to service this product yourself, as opening or removing covers may expose you to dangerous voltage points or other risks. Refer all servicing to service personnel. IntraCare Warranty Statement Products: IntraCore 35516-T IntraCore 35516-G Duration: 3 years...
  • Page 75 and used. If Asanté receives notice of such defects during the warranty period, Asanté will replace software media that does not execute its programming instructions due to such defects. Asanté does not warrant that the operation of Asanté products will be uninterrupted or error free. If Asanté...
  • Page 76: Appendix D. Console Port Pin Outs

    Appendix D. Console Port Pin Outs The console port is used to connect with a terminal using a serial modem RS-232C cable (available from Radio Shack’s website, www.radioshack.com, catalog # 26-117). The setting is 9600-N81. The table below lists the pin outs. Pin Number Signal Name...
  • Page 77: Appendix E. Online Warranty Registration

    Appendix E. Online Warranty Registration Please register the switch online at www.asante.com/support/registration.html. By doing so, you’ll be entitled to special offers, up-to-date information, and important product bulletins. You may also register the switch by using the warranty card found in the printed Setup Guide.

Table of Contents

Save PDF