Table of Contents Chapter 1. Introduction 1.1 Features 1.2 Package Contents 1.3 LEDs 1.4 Front and Back Panel Descriptions 1.5 Management and Configuration Chapter 2. Hardware Installation and Setup 2.1 Installation Overview 2.2 Installation into an Equipment Rack 2.3 Gigabit Interface Converters 2.4 Installing the Optional Emergency Power Supply 2.5 Connecting Power 2.6 Connecting to the Network...
Page 4
Appendix D. Console Port Pin Outs Appendix E. Online Warranty Registration...
Chapter 1. Introduction Thank you for purchasing the Asanté IntraCore 35516 Series Gigabit switch. The IC35516 is from a family of multi-media and multi-protocol switches capable of supporting Layer 2 switching and Layer 3 and Layer 4 protocols. They are designed to offer industry-leading performance at a very competitive cost of ownership.
No link has been established on the port. 1.3.2 IC35516-G The IntraCore 35516-G has one power LED, one (optional) emergency power LED, two LED indicators for 10/100/1000BaseT status, and one LED for GBIC status. See the table below for a complete LED...
Color Description Power Green Power is on. Power is off, or main power supply has failed. Emergency Power Green Primary power has failed and optional power supply is powering the switch. Optional power supply is in standby mode and primary power is working. BaseT10/100/1000 Green A valid 1000 Mbps link has been established on the port.
1.4.2 IC35516-G The front panel of the IC35516-G contains the following: power and port LEDs; 12 GBIC ports; 4 dual- function Gigabit ports that support either 1000BaseT or GBIC-style Gigabit Ethernet ports; and a console port. The back panel, shown below, contains a 12 VDC jack for emergency power (optional), the primary power bay cover plate, the on/off switch, and the primary power outlet.
Chapter 2. Hardware Installation and Setup The following guidelines will help the user to easily install the switch, and to ensure that it has the proper power supply and environment. 2.1 Installation Overview Follow these steps to install the IntraCore switch: Open the box and check the contents.
2.1.3 Power Requirements The electrical outlet should be located near the switch and be easily accessible. It must also be properly grounded. Make sure the power source adheres to the following guidelines: • Power: Auto Switching 90-260 VAC • Frequency range: 50/60 Hz 2.1.4 Environmental Requirements The switch must be installed in a clean, dry, dust-free area with adequate air circulation to maintain the following environmental limits:...
Instructions for installing, removing, and maintaining GBIC modules are provided in following sections. Important! The 35516-G has 12 GBIC ports that are paired— port numbers 1/2, 3/4, 5/6, 7/8, 10/12, and 14/16. DO NOT use more than one copper GBIC module per pair (maximum 8 modules).
2.3.2 Removing a GBIC Caution: GBIC 1000T modules run hot under normal operating conditions. When it has been removed from the system, place it on a heat-resistant surface and allow the module to cool before handling. Note: Unnecessary removals/insertions of a GBIC module will lead to premature failure of the GBIC connector.
2.5 Connecting Power Important: Carefully review the power requirements (Chapter 2.1.3) before connecting power to the switch. Use the following procedure to connect power to the switch: Plug one end of the supplied power cord into the power connector on the back of the switch. Plug the other end into a grounded AC outlet.
1000BaseT requires that all four pairs (8 wires) be connected correctly, using Category 5 or better Unshielded Twisted Pair (UTP) cable (to a distance of 100 meters). Table 2-2 shows the correct pairing of all eight wires. Pin Number Table 2-2 Pin Numbers and Wire Colors 2.6.2 Gigabit Ethernet Ports Cabling Procedures Cabling requirements for the optional hardware modules depend on the type of module installed.
Page 15
• Under the Settings tab, choose VT100 for Emulation mode • Select Terminal keys for Function, Arrow, and Ctrl keys. Be sure the setting is for Terminal keys, NOT Windows keys • Back under the Connect To tab, press the Configuration button •...
2.8 Setting Passwords The switch ships with a default of no enable password, which allows anyone on the network access to various privilege levels. To prevent unauthorized changes to the switch’s configuration, you should set an enable password for access to switch management. Follow the example below to assign a privileged password.
2.9 Configuring an IP Address The switch ships with the default IP address 192.168.0.1/24. Connect via the serial port in order to assign the switch an IP address on your network. The physical ports (or switchports) of the IC35516 are L2 ports, and cannot have an IP address assigned to them.
2.10 Restoring Factory Defaults If you ever need to restore the switch to its factory default settings, follow the commands shown in the following screen. Router> enable Router# reload ? factory-default Reset ALL system parameters to factory default <cr> Router# reload factory-default The switch is now ready for configuration.
Chapter 3. Understanding the Command Line Interface (CLI) The switch utilizes Command Line Interface (CLI) to provide access to several different command modes. Each command mode provides a group of related commands. After logging into the system, the user is automatically in the user top (user EXEC) mode. From the user top mode you can enter into the privileged top (privileged EXEC) mode.
User top commands: Router> ? enable Turn on privileged mode command exit Exit current mode and down to previous mode help Description of the interactive help system ping Send echo messages quit Exit current mode and down to previous mode show Show running system information tracert...
Router> enable Router# ? clear Reset functions clock Manage the system clock configure Enter configuration mode copy Copy from one file to another debug Debugging functions disable Turn off privileged mode command erase Erase a filesystem exit Exit current mode and down to previous mode help Description of the interactive help system Negate a command or set its defaults...
Router# configure terminal Router(config)# ? access-list Add an access list entry Set static arp entry boot Modify system boot parameters duplicate-ip Duplicate IP Address detection Global Commands enable Modify enable password parameters End current mode and change to enable mode exit Exit current mode and down to previous mode help...
3.3.2 Router Configuration Mode Router configuration commands are used to configure an IP routing protocol and always follow a router command. To list the available router configuration keywords, enter the router command followed by a space and a question mark (?) at the global configuration prompt. Router(config)# router ? ospf Open Shortest Path First...
3.4 Advanced Features Supported within the Command Mode Entering a question mark (?) at the system prompt displays a list of commands available for each command mode. You can also get a list of any command's associated keywords and arguments with the context- sensitive help feature.
Example of Context Sensitive Help The following example illustrates how the context-sensitive help feature creates an access list from the configuration mode. Enter the letters “co” at the system prompt followed by a question mark (?). Do not leave a space between the last letter and the question mark (?).
In the example above, a command has been issued that is unknown or ambiguous. Router(config)# router % Command incomplete. Router(config)# In the example above a command has been issued that is incomplete. In the following examples, various correct commands (using route) are displayed. Router(config)# route? route-map Create route-map or enter route-map command mode...
• Editing Command Lines that Wrap • Deleting Entries • Scrolling Down a Line or a Screen • Redisplaying the Current Command Line • Transposing Mistyped Characters • Controlling Capitalization 3.8.1 Moving Around on the Command Line Use the following commands to move the cursor around on the command line in order to make corrections or changes: Command Press Ctrl-B or press the left...
The command is not immediately executed, so that you may modify the command if necessary. If you enter a set of characters that could indicate more than one command, the system simply lists all possible commands. You may also enter a question mark (?) to obtain a list of commands that begin with that set of characters. Do not leave a space between the last letter entered and the question mark (?).
Press Ctrl-U or Ctrl-X. Press Ctrl-W. Press Esc D. 3.8.5 Scrolling Down a Line or a Screen When using a command that list more information than will fill on the screen, the prompt --More-- is displayed at the bottom of the screen. Whenever the More prompt is displayed, use the following keystrokes to view the next line or screen: Keystrokes Press the Return key.
3.9 Passwords and Privileges Commands The following sections describe the password and privileges commands used to control access to different levels of the router: • enable password • password • service password-encryption 3.9.1 Enable Password To set a local password to control access to various privilege levels, use the enable password command in global configuration mode.
3.9.3 Service Password-Encryption To encrypt passwords, use the service password-encryption command in global configuration mode. Use the no form of this command to restore the default. Router(config)# service password-encryption Router(config)# no service password-encryption...
Chapter 4. Managing the System and Configuration Files This chapter explains how to manage the system information, as well as how to manage the configuration files for the IC35516. 4.1 Managing the System This section discusses the following tasks needed to manage the system information of the IC35516: •...
4.1.4 Trace Packet Routes To discover the routes that packets will actually take when traveling to their destinations, use the following command in top mode. Command tracert address 4.1.5 Test Connections with Ping Tests The switch supports IP ping, which can be used to test connectivity to remote hosts, via their IP addresses. Ping sends an echo request packet to an address and “listens”...
4.2 Managing Configuration Files This section discusses how to download configuration files from remote servers, and store configuration files on the router at system startup. Configuration files contain the commands the router uses to customize the function of the IC35516. The setup command facility helps you create a basic configuration file.
4.2.2 Copying Configuration Files to a Network Server You can copy configuration files from the router to a file server using TFTP. You might wish to back up a current configuration file to a server before changing its contents, thereby allowing you to later restore the original configuration file from the server.
In order to restore a configuration file to an exact copy of a file stored on a server, you need to copy the configuration file directly to the startup configuration (using the copy tftp startup-config command) and reload the router. To copy a configuration file from a TFTP server to the router, use the following commands in EXEC mode: Command copy tftp[[[//location]/directory]/filename]...
Command snmp-server host address The 35516 can send an SNMP trap to its configured trap receivers if it detects a duplicate IP address. To turn on duplicate IP detection, use the following command in global configuration mode: Router(config)# duplicate-ip detect...
but where there is only one path between any two points (the connections span the entire network, and the paths are branched, like a tree). All of the bridges (a switch is a complex bridge) on the network communicate with each other using special packets of data called Bridge Protocol Data Units (BPDUs).
Spanning Tree Port Configuration You can configure the following parameters from interface configuration mode: Router(config)# interface eth1 Router(config-if-eth1)# spanning-tree ? path-cost Set interface path cost port-priority Set interface priority Router(config-if-eth1)# Port Priority The port priority is a spanning tree parameter that ranks each port, so that if two or more ports have the same path cost, the STP selects the path with the highest priority (the lowest numerical value).
Chapter 5. Configuring IP The Internet Protocol (IP) is a packet-based protocol used to exchange data over computer networks. It is the foundation on which all other IP protocols are built. IP is a network-layer protocol that contains addressing and control information that allows data packets to be routed. This section describes how to configure the Internet Protocol (IP).
CIDR Prefix Class C Equivalent 1/8 Class C 1/4 Class C 1/2 Class C 1 Class C 2 Class C 4 Class C 8 Class C 16 Class C 32 Class C 64 Class C 128 Class C 256 Class C OR 1 Class B 2,048 Class C An interface can have one primary IP address.
To assign multiple IP addresses to network interfaces, use the following command in interface configuration mode: Command ip address address I mask secondary 5.2 Establish Address Resolution A device in the IP can have both a local address (which uniquely identifies the device on its local segment or LAN) and a network address (which identifies the network to which the device belongs).
Interior gateway protocols are used to exchange routing information among routers in an autonomous network, such as a company’s LAN. A routing protocol determines how routers in a network share and update information and report changes, enabling a network to be dynamic instead of static. All IP interior gateway protocols must be specified with a list of associated networks before routing activities can begin on the switch.
5.4 Configuring RIP The Routing Information Protocol (RIP) is a commonly used interior gateway protocol (IGP) created for use in small, homogeneous networks. It is a distance-vector routing protocol, documented in RFC 1058. RIP uses broadcast User Datagram Protocol (UDP) data packets to exchange routing information. The IC35516 sends, or advertises, routing information updates every 30 seconds.
5.4.3 Specify a RIP Version By default, the software receives RIP Version 1 and Version 2 packets, but sends only Version 1 packets. You can configure the software to receive and send only Version 1 packets or only Version 2 packets. To do so, perform the following task in router configuration mode.
Router(config)# route-map map-tag permit 10 Router(config-route-map)# ? End current mode and change to enable mode. exit Exit current mode and down to previous mode help Description of the interactive help system match Match values from routing table Negate a command or set its defaults on-match Exit policy on matches quit...
process. By specifying administrative distance values, you enable the router to intelligently discriminate between sources of routing information. The router will always pick the route whose routing protocol has the lowest administrative distance. There are no general guidelines for assigning administrative distances, because each network has its own requirements.
Apply Offsets to Routing Metrics An offset list is the mechanism for increasing incoming and outgoing metrics to routes learned via RIP. You can limit the offset list with an access list. To increase the value of routing metrics, perform the following task in router configuration mode.
Important! Do not use plain text authentication in RIP packets for security purposes, because the unencrypted authentication key is sent in every RIP Version 2 packet. Use plain text authentication when security is not an issue (for example, to ensure that incorrectly configured hosts do not participate in routing).
IGMP The Internet Group Management Protocol (IGMP) manages the multicast groups on a LAN. IP hosts use IGMP to report their group membership to directly connected multicast routers. Routers executing a multicast routing protocol maintain forwarding tables to forward multicast datagrams. Routers use the IGMP to learn whether members of a group are present on their directly attached sub-nets.
Page 51
Changing the IGMP Version By default, the router uses IGMP Version 2, which allows such features as the IGMP query timeout and the maximum query response time. All systems on the subnet must support the same version. The router does not automatically detect Version 1 systems and switch to Version 1.
5.5.2 Configuring DVMRP This section presents the commands for configuring DVMRP IP Multicast Routing Protocol. The following commands are available from global configuration mode: Router(config)# ip dvmrp ? enable graft-retransmit-interval nbr-timeout probe-interval prune-age report-interval route-discard-timeout route-expire-timeout route-holddown-time Router(config)# ip dvmrp Important! Remember that a no command (i.e no ip dvmrp enable) negates a previously entered command.
Page 53
DVMRP must be enabled on the router for this command to be operational. Command probe-interval <5–30 seconds> Prune-age This value defines how long a prune state will remain in effect for a source-routed multicast tree. After the prune age period expires, flooding will resume. DVMRP must be enabled on the router for this command to be operational.
5.6 Using Access Lists An access list is a collection of criteria statements that the switch uses to determine whether to allow or block traffic based on IP addresses. Access lists can be configured to provide basic security on your network, and to prevent unnecessary traffic between network segments.
Router(config)# access-list 1 deny 192.168.123.254 ? A.B.C.D Source wildcard. e.g. 0.0.0.255 <cr> Router(config)# access-list 1 deny 192.168.123.254 Router(config)# access-list 1 permit any {0.0.0.0 255.255.255.255} Router(config)# exit Router# show access-list After entering the access list, use the show command from privileged mode, as shown above in the last line. Any lists you’ve created, as well as any remark entered for a list, will be displayed.
Router(config)# access-list 101 permit tcp 192.168.123.0 0.0.0.255 any eq 25 Router(config)# access-list 101 deny any Router(config)# interface eth1 Router(config-if-eth1)# ip ? access-group Apply an access-group entry Router(config-if-eth1)# ip access-group ? WORD access-list number or name Router(config-if-eth1)# ip access-group 101 ? inbound direction outbound direction Router(config-if-eth1)# ip access-group 101 out...
5.7.3 Configure Compatibility Compatibility configuration enables the router to be compatible with a variety of RFCs that deal with OSPF. Perform the following task to support many different features within the OSPF protocol. Command compatible rfc1583compatibility 5.7.4 Configure OSPF Interface Parameters The user can alter certain interface-specific OSPF parameters as needed.
To configure the OSPF network type, use the following command in interface configuration mode. Command ip ospf network {broadcast | non-broadcast | point-to-multipoint | point-to-point} 5.7.6 Configure OSPF for Non-broadcast Networks To configure routers that interconnect to non-broadcast networks, perform the following task in router configuration mode.
specific external routes as Type 7 LSAs into the NSSA. In addition, when translating Type 7 LSAs into Type 5 LSAs by NSSA ABR, summarization and filtering are supported during the translation. Use NSSA to simplify administration if you are an Internet Service Provider (ISP) or a network administrator that must connect a central site using OSPF to a remote site that is using a different routing protocol such as RIP.
5.7.11 Control Default Metrics OSPF calculates the OSPF metric for an interface according to the bandwidth of the interface. For example, a 64K link gets a metric of 1562, while a T1 link gets a metric of 64. If you have multiple links with high bandwidth, you might want to specify a larger number to differentiate the cost on those links.
To force the autonomous system boundary router to generate a default route, perform the following task in router configuration mode. Command redistribute {kernel | connected | static | rip | bgp} [metric metric-value] [metric- type {1|2}][route-map map-tag] 5.7.16 Change the OSPF Administrative Distances An administrative distance is a value that rates the trustworthiness of a routing information source, such as an individual router or a group of routers.
Page 63
To display various routing statistics, use the following commands in top mode. Command show ip ospf show ip ospf database show ip ospf database {asbr-summary | external | network | nssa-external | router | summary} show ip ospf database {asbr-summary | external | network | nssa-external | router | summary} link -state-id show ip ospf database {asbr-summary |...
The following commands are available under EXEC or Enable mode: Command show vrrp [brief | VRID] show vrrp interface IFNAME [brief] debug ip vrrp 5.9 Configuring ICMP Router Discovery Protocol (IRDP) When IP routing is disabled, you can configure router discovery. The ICMP Router Discovery Protocol (IRDP) allows the router to dynamically learn about routes to other networks.
Page 66
Use any of the following commands in top mode. Command show arp [interface] show access-lists [access-list- name] show ip prefix-list [prefix-list-name] show ip protocols show ip irdp show ip route [bgp | rip | ospf | connected | kernel | static | address | prefix] ping {host | address} traceroute {host | destination}...
Switch ports are used for managing the physical interface and associated Layer 2 protocols and do not handle routing or bridging. Ports 1 through 16 on the 35516 are Ethernet ports. The following example demonstrates how to enter the interface configuration mode for port 16:...
Page 68
First, a VLAN is created and named tester. Router# configure terminal Router(config)# vlan 2 Router(config-vlan)# name tester Router(config-vlan)# exit Router(config)# exit Router# show vlan From the show vlan command, the new VLAN will be listed, but will not yet be active. Next, a switchport is chosen to belong to VLAN 2.
6.2 VLAN Port Membership Modes A switchport can be assigned to a VLAN by designating a membership mode. The membership mode determines the kind of traffic the port carries and the number of VLANs to which it can belong. The membership modes are as follows: •...
Use the following commands to configure the VLAN Allowed List for the trunk port: Command Router(config)# interface IFNAME Router(config-if-IFNAME)# switchport mode trunk Router(config-if-IFNAME)# switchport trunk allowed vlan {add | all | except | remove} vlan-list Router(config-if-IFNAME)# end The trunk port accepts tagged and untagged frames. All the untagged frames are classified to the trunk port’s native VLAN (the VLAN whose VID matches the port’s VLAN ID).
Page 71
Use the following commands to configure an interface as an IEEE 802.1q tunnel port: Command Router(config)# interface IFNAME Router(config-if-IFNAME)# switchport mode dot1q-tunnel Router(config-if-IFNAME)# switchport access vlan vid Router(config-if-IFNAME)# end Purpose Enter the interface name to access the interface configuration node. This command will put the interface into IEEE 802.1q dot1q-tunnel access mode.
Appendix A. Basic Troubleshooting In the unlikely event the switch does not operate properly, follow the troubleshooting tips below. If more help is needed, contact Asanté’s technical support at www.asante.com/support. Problem The Power LED is not lit. The Emergency Power LED is not lit. The 10/100/1000 port Link LEDs are not lit.
Appendix B. Specifications The sections below list the features and product specifications for the IntraCore 35516 Series Gigabit Ethernet switches. Connectors: Gigabit Ethernet with Auto-Uplink for GBIC transceiver module Console: Serial (RS-232): DB9 Status Indicators: Separate link-activity, speed (10/100/Gigabit) and duplex (full or half) LEDs for each port;...
13. Do not attempt to service this product yourself, as opening or removing covers may expose you to dangerous voltage points or other risks. Refer all servicing to service personnel. IntraCare Warranty Statement Products: IntraCore 35516-T IntraCore 35516-G Duration: 3 years...
Page 75
and used. If Asanté receives notice of such defects during the warranty period, Asanté will replace software media that does not execute its programming instructions due to such defects. Asanté does not warrant that the operation of Asanté products will be uninterrupted or error free. If Asanté...
Appendix D. Console Port Pin Outs The console port is used to connect with a terminal using a serial modem RS-232C cable (available from Radio Shack’s website, www.radioshack.com, catalog # 26-117). The setting is 9600-N81. The table below lists the pin outs. Pin Number Signal Name...
Appendix E. Online Warranty Registration Please register the switch online at www.asante.com/support/registration.html. By doing so, you’ll be entitled to special offers, up-to-date information, and important product bulletins. You may also register the switch by using the warranty card found in the printed Setup Guide.
Need help?
Do you have a question about the IntraCore 35516 Series and is the answer not in the manual?
Questions and answers