ATXUSER’S GUIDE POWER STATUSENGINE STATUSTURBO STATUSSUPPLY ASUPPLY B 1.6 Gbps RESET PACKET PROCESSING ENGINENMS PORTPOWERFastNET ATXTMOFFLINE PRO
viiiContents 3.11.4 Example #1: LOCAL Port Mirroring...3-383.11.5 Example #2: REMOTE Port Mirroring...
3-28Configuringworkgroup mktg 11,12-18 ipx 0x12343.10 CLASSIFICATIONWhen a broadcast packet is received on a workgroup defined port, the packet is clas
Configuring3-29Broadcast from C will only be seen by A, B and DBroadcast from D will only be seen by CBroadcast from E will be seen by all forwarding p
3-30ConfiguringAn ARP from:A or B destined for 100.100.1.xxx will only be seen by A, B and CA or B destined for 100.100.2.xxx will only be seen by A, B
Configuring3-313.10.3 Workgroup of Type IPXTo determine the workgroup of an IPX broadcast the destination IPX network number is used (see Example #3).
3-32ConfiguringC destined for the 0x1234 network will only be seen by DC destined for the 0x999 network will be seen by all forwarding portsC destined
Configuring3-33A SAP from:A or B destined for the 0x1234 network will only be seen by A, B and CA or B destined for the 0x999 network will only be seen
3-34ConfiguringC sends an IP packet destined for any network other than 100.100.1.0 the broadcast is forwarded out every other forwarding port. Even th
Configuring3-35ipaddress P7 134.141.200.7 255.255.255.0 Results: • Stations A, B and C IP communication will be switched between ports 3, 4 and 5 since
3-36ConfiguringThe LCM command format for Remote Port Mirroring is:Local ATX (in reference to the diagnostic port)mirror remote offoff - to turn remote
Configuring3-37Furthermore, mirroring traffic of a higher speed interface out to a lower speed interface may impose a strain on performance (e.g. captur
Contentsix CHAPTER 5 FILTERS 5.1 FILTERING AND PERFORMANCE CONSIDERATIONS ...5-25.2 USING FILTERS FOR SECURITY PURPOSES...
3-38Configuring3.11.3 Mirrored FiltersThe ATX also allows you (via the existing port filtering feature; (Chapter 5 in the ATX LAN Switch User’s Guide)
Configuring3-39Mirror Filters with LOCAL Port Mirroring: • Desired - analyze IP traffic from station A (on P2) to station B (on P3) and vice versa • Imp
3-40ConfiguringConfig on ATX #2mirror remote 2 to 134.141.100.1Mirror Filters with REMOTE Port Mirroring: • Desired - to see packets from station A (on
Configuring3-413.15 EVENT LOGGING COMMANDSThe Event Log is established using the LCM. New LCM commands have been added in order to manage the event l
3-42Configuringoption will turn off event logging. The event logging entries will be kept in a circular buffer, and the logging entries will be overwri
Configuring3-43networks like Ethernet and FDDI. RIF is not supported on Ethernet networks and is seldom used on FDDI networks. In order to merge sour
3-44ConfiguringOther - enables stripping and caching of RIF on AppleTalk, SNA and NetBIOS framesAll - enables stripping and caching of RIF on IP, IPX a
Configuring3-45TP- transparent SR- source route SRT- source route transparent (non token ring port) SRT/TR- source route transparent on a token ring po
3-46Configuringand NetBIOS frames. All other protocols will NOT have their RIF cached. Support for other protocols will be in future releases.Example #
Configuring3-47Example 2:Port 1 is configured for TransparentPort 2 is configured for Source Route TransparentPort 3 is configured for Source RouteSRTB is
xContents 5.10.1 Filtering for Security Purposes...5-20Example 1 — Blocking access to a network segmen
3-48ConfiguringScenario 2Station C sends out a broadcast for station B. The frame from station C will have a Null RIF (2 bytes). Since the ATX’s P3 is
Configuring3-49Example #4: Maximum Transmit UnitThe maximum frame size on FDDI is 4500 bytes, maximum on Ethernet is 1518 bytes and the maximum on Toke
3-50Configuringdescribe a few configurations and possible solutions that address this problem.Scenario 1: Local StationsProblem:Assume station A has alr
Configuring3-51Scenario 2: Stations across a Source Route only bridgeProblem:Assume station C has already communicated and the ATX has learned the RIF
3-52Configuring
4-1CHAPTER 4MONITORING AND MANAGING THE ATXMonitoring your ATX consists of collecting and analyzing statistics and status information. You can use LC
4-2Monitoring and Managing the ATX • General status and statistics • IP status and statistics • ICMP status and statistics • UDP status and statistics
Monitoring and Managing the ATX4-3 • Number of packets that were sourced from outside a network that were not forwarded to the network. • Number of pa
4-4Monitoring and Managing the ATX4.1.1 General Status and StatisticsThe following statistics profile the general status of the ATX. (The MIB variable
Monitoring and Managing the ATX4-5 • The total number of IP packets received from all ports (including the UART). [ipInReceives] • The number of packe
Contentsxi 8.3 MAINTENANCE...8-38.3.1 Power Fuse...
4-6Monitoring and Managing the ATX • The number of IP fragments received which needed to be reassembled within this ATX. [ipReasmReqds] • The number o
Monitoring and Managing the ATX4-7 • The number of ICMP Parameter Problem messages received. [icmpInParmProbs] • The number of ICMP Source Quench mess
4-8Monitoring and Managing the ATX • The number of ICMP Parameter Problem messages sent. [icmpOutParmProbs] • The number of ICMP Source Quench message
Monitoring and Managing the ATX4-9level; all datagrams forwarded to UDP are always forwarded to the ATX's local management agent. [udpInErrors] •
4-10Monitoring and Managing the ATX • The total number of SNMP GetRequest PDUs received by the ATX, which have been processed with no errors. [snmpInG
Monitoring and Managing the ATX4-11 • Whether a topology change is currently in progress. [stTopChange] • If a topology change is in progress then th
4-12Monitoring and Managing the ATX • The time, in centiseconds, since a packet was last received from the station. • The number of packets received f
Monitoring and Managing the ATX4-13address as source address match. [filterPktCnts] • Number of packets sent from Segment A to Station B.Configure pseu
4-14Monitoring and Managing the ATXType: <CR> to display port 2 status...If you don’t want to view the status of each port, use the Ctrl-C keys
Monitoring and Managing the ATX4-15 • TempOk – indicates whether the module is overheating. Normal is displayed when the module temperature is within
xiiContents
4-16Monitoring and Managing the ATXAddress Type Port Age(secs) Frames-from Frames-to08:00:20:02:3a:44 Le
Monitoring and Managing the ATX4-17Address Type Port Age(secs) Frames-from Frames-to10 00 90 c1 d1 1d Learned 6 0
4-18Monitoring and Managing the ATX4.4.1 Disabling a PortThere may be times when you need to disable a specific port. Disabling a port effectively sto
Monitoring and Managing the ATX4-19Enabling bridging/routing functions for port 7Enabling bridging/routing functions for port 8Enabling bridging/routi
4-20Monitoring and Managing the ATX4.4.5 Setting The Baud RateYou can set the baud rate for your LCM console connection. The options for baud rate in
Monitoring and Managing the ATX4-21the MIB variable configAnyPass; you must then enter the community name to perform any gets or sets. What you type i
4-22Monitoring and Managing the ATX
5-1CHAPTER 5FILTERSOne of the most significant features of the ATX is its powerful user-configurable filtering capabilities. Flexible filtering is useful
5-2Filters5.1 FILTERING AND PERFORMANCE CONSIDERATIONSWhen filters are implemented, the ATX must process packets to determine if they should be filtere
Filters5-3Detailed examples of filter applications are presented later in this chapter. (See Filtering Application Examples.)5.3 USING FILTERS TO IMPR
1-1 CHAPTER 1INTRODUCTION Welcome to the Cabletron Systems ATX User Guide. This manual explains installation instructions, and provides specification
5-4Filtersbut it is not a filter. Multicast storm protection is described in Chapter 3, Configuring Multicast Storm Protection.5.4 ADDRESS TABLE FILT
Filters5-5to filter (ON) or not filter (OFF) packets from the specified address.With the address table entry shown in Table 5-1, you could use any of the
5-6FiltersAn example of a source address filter is shown in Table 5-3. For illustration purposes, this example uses the same format as the address tabl
Filters5-7designated MAC address will be filtered. Multicast packets are those destined for more than one address (using a multicast destination addres
5-8Filtersport filters are described in the next section.The ATX allows you to implement up to 100 combination port filters (total, for all connected po
Filters5-9 • Pseudo – allows you to create a pseudo filter to monitor traffic patterns without discarding packets. • And/Or – allows you to combine mu
5-10FiltersSource Range MaskMAC address mask to apply to the range of source MAC addresses. ff:ff:ff:ff:ff:ff is the default.Destination RangeEither N
Filters5-11Exit. NA is the default.Note: You can assign a filter to a group by entering a group number rather than a port number. You can assign a gro
5-12FiltersField OriginEither IP, MAC, or SR (see Field Offset below). The origin is the field from which the offset count starts. IP is the default.Fi
Filters5-13Values greater than 3600 (one hour) are not valid; a value of zero indicates that no alarms should be generated. Zero is the default. Thres
1-2Introduction • Chapter 2, Installing and Connecting to the Network , describes the ATX front panel, how to install the ATX, and how to connect t
5-14Filters • Monitoring traffic patterns as an aid in determining optimum network design, usage policies, etc. • Monitoring potential security threats
Filters5-15Note: If you are adding a filter to be used in conjunction with another filter and they must be ordered sequentially, use the filters displ
5-16Filters6. Enter the first MAC address in the source range.7. Enter the last MAC address in the source range.8. Enter the source range MAC address m
Filters5-1714. Enter the protocol type to match.15. Select whether the filter will use a field match.NA is the default. You don’t need to enter anything
5-18Filters If you want the filter to have another index number, enter the value you wish to use.LCM displays the filter you have just entered and promp
Filters5-195.9 DISPLAYING A FILTERTo display a filter complete the following steps:1. Type: filters display.LCM prompts you for the port number.2. Ent
5-20Filters • Using a firewall filter to prevent problems and enhance performance.For each application example, the situation is described first, and the
Filters5-21Figure 5-1. Using Filters To Restrict Access To An Adjoining SubnetThe company wishes to allow Engineering and Accounting workstations to
5-22Filterspackets from Accounting destined for Engineering (LAN 4 to LAN 3). Each filter includes: • The source LAN or port number • The destination p
Filters5-23 Figure 5-2. Using Filters To Restrict Access To Specific WorkstationsIn this example, a combination port filter is configured which instruct
Introduction1-3 • Appendix E, Big Endian to Little Endian Address Conversion , describes how to convert MAC addresses from big endian (Token Ring n
5-24Filters • Filter fields – destination address F-H (range, match) source LAN = 1 (match).Note that a Match flag is specified for both fields; this inst
Filters5-25Example 3 — Restricting access to authorized usersThe example, shown in Figure 5-3, is very similar to the previous example. The difference
5-26Filtersall traffic that does not match both fields. All packets destined for the restricted computers (F, G, or H) will be filtered unless the source
Filters5-27Note: In order for this trap to work, you must have ConfigAlarmDynamic set and your NMS must be able to process traps from the ATX.Example
5-28FiltersThis filter is configured as follows: • Filter identifier – port number of the port attached to LAN 4 as a destination • Filter fields – protoc
6-1CHAPTER 6TRAPSThe ATX sends trap PDUs to an SNMP Manager, using a pre-configured SNMP Manager IP address. (See configNMSAddress in the ATX MIB Refe
6-2Trapsfor one of the debugging attributes; those PDUs must always provide the configAnyPass. • egpNeighborLoss (5) – Not used by the ATX. • enterpri
Traps6-36.2 ATX UNIQUE TRAP IDSThe ATX possesses unique trap IDs which allow a SNMP Manager (Spectrum Element Manager, Spectrum) to have more control
6-4Traps • trunkState (10) - A trunking state change transition has occurred. The possible transitions are: • CLOSED - ONEWAY • ONEWAY - PERTURBED • P
Traps6-5topChangeEnd (20) - The spanning tree topology has stopped changing.ifErrors (21) - Sent whenever the number of hardware errors in received an
1-4Introduction 1.3 RELATED DOCUMENTATION You may need to refer to the following documentation: • ATX MIB Reference Guide – contains enterprise
6-6TrapsfddimibSMTCFState (200) - Sent whenever the FDDI port's CFM state has changed.The fddimibPORTMACIndicated (one or two instances, dependin
Traps6-7sfddiOBSFuseBad (212) - Sent whenever the fuse to the FDDI port's optical bypass becomes bad, or switches from bad to good.sfddiStationSt
6-8TrapseePromReconfig (230) - The unit's EEPROM has been reconfigured.maxNextHop (231) - Maximum number of next hops reached.ripBadNet (232) - RI
-9
6-10Traps
7-1CHAPTER 7DIAGNOSTICS AND TROUBLESHOOTINGThe main topics covered in this chapter are: • Power-up diagnostics • Diagnostics while the ATX is operati
7-2Diagnostics and Troubleshooting • Power-up • Reset using the front panel reset button • Reset via the NMS (a soft reset) • Automatic reset occurs i
Diagnostics and Troubleshooting7-3modules are on for approximately 3 seconds.b. The ENGINE STATUS LED on the PPE begins to flash. c. The ENGINE STATUS
7-4Diagnostics and Troubleshooting7.2.3 Software Checksum ComparisonWhen the ATX reboots, its operational software is verified by a checksum compariso
Diagnostics and Troubleshooting7-5Failure IndicatorsIf an FDDI or Ethernet module has failed, its front panel STATUS LED will be off. NMS Failure Trap
Introduction1-5 1.4 GETTING HELP If you need additional support related to this device, or if you have any questions, comments, or suggestions conce
7-6Diagnostics and Troubleshootingloopback tests, the ATX creates LLC Type 1 test packets for LANs, and PPP echo-request packets for WANs and UARTs.Bo
Diagnostics and Troubleshooting7-7Table 7-1. Meaning Of ATX LEDsLED MeaningPOWER STATUS On – Power is on and the voltage is within the acceptable ra
7-8Diagnostics and TroubleshootingFigure 7-1. LED Activity During Normal Operation7.5 TROUBLESHOOTINGThis section lists several problem situations t
Diagnostics and Troubleshooting7-9Because every situation is potentially unique and may involve unique external factors, the corrective actions sugges
7-10Diagnostics and Troubleshooting • Check for loose port connections. Check all connectors to the modules (especially twisted pair connectors, which
Diagnostics and Troubleshooting7-11 • Check that a pathway to the ATX exists (intermediate bridges and routers are functioning). • Verify ATX’s IP add
7-12Diagnostics and Troubleshooting
8-1CHAPTER 8ADDING/SWAPPING MODULES AND MAINTENANCEThe ATX configuration may include a total of five interface modules in various combinations. This me
8-2Adding/Swapping Modules and Maintenance4. Loosen the screws at each end of the panel that covers the interface slot and remove the protective panel
Adding/Swapping Modules and Maintenance8-33. Remove the installed interface module by pulling gently but firmly on the “ears” at the ends of the module
1-6Introduction • Any previous Return Material Authorization (RMA) numbersFor additional information about Cabletron Systems products, visit our Wor
8-4Adding/Swapping Modules and Maintenance1. Disconnect the power cord from the ATX.2. Pull the small plastic fuse drawer below the power input connec
Adding/Swapping Modules and Maintenance8-5supply into the chassis at an angle, or if you position the power supply above the tabs shown in Figure 8-1,
8-6Adding/Swapping Modules and Maintenance4. Slide the new power supply straight into the chassis under the tabs shown in Figure 8-1.The power supply
A-1APPENDIX ASPECIFICATIONS FOR THE ATXA.1 PACKET PROCESSING ENGINEDual AMD 29000 RISC processors4 MB FLASH memory8 MB main memory2 MB shared memory
A-2Specifications For The ATXA.2.3 Local Routing • IP Routing (RIP) • AppleTalk Routing • IPX Routing (RIP, SAP, Diagnostic) • IP Multicast Suppor
Specifications For The ATXA-3A.5 ELECTRICALInput voltage Auto-ranging from 100 to 120 or 200 to 240 VacFrequency 47 to 65 HzAC power 380 WMaximum AC C
A-4Specifications For The ATXPower supply BResetA.10 SOFTWARE LOADINGFLASH memory via TFTPA.11 ADDRESS TABLE SIZE8,192 dynamic (learned) entries defa
B-1APPENDIX BPACKET TRANSLATION PROCEDURESince the ATX is a multi-media unit, packets are converted from the different media into a standard canonica
B-2Packet Translation ProcedureFigure B-2. Canonical Packet FormatDA (big endian)SA (big endian)dsapssapcontrolprotocol IDdata or frame typemore data
Packet Translation ProcedureB-3Figure B-3. IP Header (After Canonical Packet Format)Figure B-4. UDP Header (After IP Header)IPversionheaderlengthser
Introduction1-7Processing Engine.The ATX offers features which allow you to easily manage and maintain your network, such as: • Protection against mul
B-4Packet Translation ProcedureFigure B-5. TCP Header (After IP Header)acknowledgment numberwindowoptions (if any)...padding(if necessary)source port
C-1APPENDIX CNULL MODEM CABLE PINOUTSTo connect LCM you need to insert a null modem cable at either the terminal end or the ATX port end. The null m
C-2Null Modem Cable Pinouts
D-1APPENDIX DGLOSSARY4B/5BPrimary data encoding scheme used for FDDI.AARP (AppleTalk Address Resolution Protocol)AppleTalk ARP performs network addre
D-2GlossaryagentNetwork management software that runs within a managed network device.alarmSee trap.ANSI American National Standards Institute – One o
GlossaryD-3attenuationThe amount of power (or light) lost as power travels through a medium, from the transmitter to the receiver. Difference between
D-4GlossaryBPDU (bridge protocol data unit)A data unit transmitted as part of the IEEE 802.1d Spanning Tree Protocol. The exchange of BPDUs allows bri
GlossaryD-5combination port filterA filter which may include several configurable fields and may be used to filter bridge traffic in a very specific manner.c
D-6GlossaryDAS (dual attachment station)An FDDI station connected to both the primary and secondary rings.data link layerLayer 2 in the OSI model. Defi
GlossaryD-7downstream from another station if it receives the token or data after the other station receives the token or data. dual homingA method of
1-8IntroductionWith an innovative, multiple RISC processor architecture, the ATX’s Packet Processing Engine is capable of filtering and forwarding at f
D-8GlossaryentityAn active element within an Open Systems Interconnection (OSI) network layer or sublayer.Ethernet input/output moduleThe ATX componen
GlossaryD-9filtering rateA measure (in packets per second) of a bridge's efficiency in examining each frame, comparing it with an address table, an
D-10GlossaryICMP (Internet control message protocol)An auxiliary protocol of IP used to convey advice and error messages about events in the IP layer.
GlossaryD-11initializationTransition of a device or network from startup state to operational state.intelligent bridgeA bridge that is able to identif
D-12Glossarymodule. I/OSee input-output module.IP (Internet protocol)IP is the basic datagram protocol used at the network layer of the TCP/IP stack.I
GlossaryD-13LLC (logical link control)A part of the data link layer of the OSI model that defines the transmission of a frame of data between two stati
D-14GlossaryMbps (megabits per second)1 million bits per second.MIB (management information base)A collection of objects unique to a specific device th
GlossaryD-15router on each of those networks. The destination router(s) then multicasts a lookup request on the destination network. A response is the
D-16Glossaryoptical transmitterA circuit that converts an electrical signal to an optical signal.OSI (Open Systems Interconnection)Refers to the OSI r
GlossaryD-17requirements and the encoding of data for transmission.physical layerLayer 1 of the OSI model. Defines and handles the electrical and physi
Introduction1-9unicast address.Name_Query_Request frames provide the ATX with the name of the source workstation, the MAC address, the port which reci
D-18Glossaryprotocol suiteA group of protocols related to a common framework.RARP (reverse address resolution protocol)A protocol that translates MAC
GlossaryD-19network and master (M) ports for the attachment of stations or other concentrators. SAS (single attachment station)An FDDI station that us
D-20Glossaryopposed to those automatically “learned” by the bridge).STP (spanning tree protocol)A protocol which ensures that only one path will be us
GlossaryD-21transmit.token ringLocal area network access mechanism and topology in which a supervisory frame (the token) is passed from station to sta
D-22GlossaryTTRT (target token rotation time)A time defined for tokens to travel around an FDDI ring; used to synchronize the clocking of traffic on the
GlossaryD-23groups must consist of ports with all the same underlying link type.WAN (wide area network)A communication network that spans a large geog
D-24Glossary
E-1APPENDIX EBIG ENDIAN TO LITTLE ENDIAN CONVERSIONThe chart below provides the bit swap values and a conversion formula.The conversion process has t
E-2Big Endian To Little Endian Conversion1. First, swap the big endian bits, use the conversion chart to find the equivalent values. For example:00 0
Index-1INDEXAaddingfilters 5-15IP addresses 3-6IPX addresses 3-13address classes, IP 3-5Address Resolution Protocol. See ARPaddress table filtersabout
1-10Introduction1.6.3 IPX with Token Ring Source RoutingToken ring networks often interconnect with source routing (SR) bridges. Although the source
Index-2Indexbridging functions 3-5IP routing 3-12IPX routing 3-15ports 4-18displayingbaud rate 4-20bridge functions 3-4ES/1 status 4-13filters 5-19IP
IndexIndex-3LLCMconnecting 2-10description of 1-39LCM command syntax 1-40LED sequencenormal operation 7-6power-up 7-2LEDs, front panel meaning 2-2Loca
Index-4IndexService Advertising Protocol. See SAPset password, defined 3-24setting baud rate 4-20statistics, monitoring 4-1status, displayingES/1 4-13
Introduction1-11preserves network bandwidth for important user data and frees up valuable end station processing. By defining virtual workgroups, broa
1-12IntroductionFigure 1-2. ATX Architecture1.6.7 Input/output ModulesThe ATX has four types of modules available. The modules slide into the face o
Introduction1-13 • 3T02-04, 3T05-04 and 3T01-04 - Four ring Token Ring modules accepting data frames from and sending data frames to four Token Ring n
1-14Introductionas the originating packet, the ATX immediately forwards the packet to the segment associated with the destination address. Local traffi
Introduction1-15multicast packets.If source routing is desired, and either Ethernet or FDDI is to be used as a backbone between Token Rings, then the
Noticei NOTICE Cabletron Systems reserves the right to make changes in specifications and other information contained in this document without prior n
1-16Introduction1.7.1 Transparent BridgingTransparent or spanning tree bridging requires no initial programming. After being installed on the network
Introduction1-17learning database to learn addresses on the incorrect ports. This could result in frames not getting forwarded and loss of communicati
1-18IntroductionFigure 1-3. Source Routing ExampleIn the example in Figure 1-3, a data packet traveling from station C on LAN 43 through bridge B to
Introduction1-19where each bridge is likely to become congested. Figure 1-4. Data Path Using Source Routing BridgingIn contrast to spanning tree brid
1-20Introduction1.7.5 TranslationThe ATX is a translating bridge; meaning it translates packets across unlike protocols. For example, if an Ethernet
Introduction1-21The ATX uses a standardized internal format called canonical format, for packet translation. (Refer to Appendix B, Packet Translation
1-22Introductionprivate/enterprise/sigma/ecs1/admin/config. The default setting for this MIB is 0. Query the MIB and change this value to the address
Introduction1-23destination device. If the device is on the network, it will respond with its hardware address. Reverse Address Resolution Protocol (R
1-24Introduction1.8.2 Multiple IP Networks Per PortThe ATX’s routing software allows you to configure a single IP network to span multiple physical ne
Introduction1-25In addition, by overlapping logical networks, a user who moves to another physical network segment can remain on the same logical netw
Noticeii DOC NOTICE This digital apparatus does not exceed the Class A limits for radio noise emissions from digital apparatus set out in the Radio I
1-26Introductionupon the operating system or TCP/IP being used. The host becomes aware of a gateway in one of three ways: • The host is manually config
Introduction1-27addressing (i.e., those IP addresses with 1110 as their high-order four bits). Using Internet standard dotted decimal notation, host g
1-28IntroductionFor example, in Figure 1-8, LANs B, C, and D are bridged to backbone LAN A. A packet originating from LAN C destined to the host group
Introduction1-29Figure 1-9. Bridged LAN With Two Host Group Members1.8.4 IP Routing Over Source RoutingToken Ring networks are often connected by so
1-30IntroductionThe architecture behind source-routing bridges is that a packet header containing a route is inserted by the source end-station. For t
Introduction1-31Figure 1-12. Packet Headers With And Without Source-routing Bit SetIn TCP/IP hosts, an explorer packet exchange is normally accomplis
1-32Introduction • Transmit IP multicast packets as single route explorer packets. • Transmit subnet-specific broadcasts as single route explorer packe
Introduction1-33Routing Information Protocol (RIP)RIP is one of the protocols that allows the ATX to build an accurate, current routing table. Routers
1-34Introduction1.8.7 Appletalk RoutingAppleTalk routing allows end-nodes to send packets to and receive packets from other end-nodes through the use
Introduction1-35to an address. In the ATX implementation, the maximum number of zones that a router may be configured is 22 ports. Each configured zone
Noticeiii EXCLUSION OF WARRANTY AND DISCLAIMER OF LIABILITY 1. EXCLUSION OF WARRANTY. Except as may be specifically provided by Cabletron in writing
1-36Introductionreceives a response, it knows its network range and then performs additional AARP probes to choose a host number. The router then send
Introduction1-37A router that learns its network address from a seed router shows a status of garnered; meaning you did not configure it.1.9 TRUNKINGI
1-38IntroductionFigure 1-13. Trunk ConnectionsTrunk GroupsEach set of connections between ATXs is called a trunk group. You can configure several trun
Introduction1-39To solve this problem, you could connect A to B with one trunk group, and connect B to C with a second trunk group.Figure 1-14. Trunk
1-40Introduction1.10.1 Command Syntax ConventionsThe following conventions apply as you use LCM commands: • Press the Return key to execute a comman
Introduction1-411.10.2 Basic LCM CommandsThe basic LCM commands allow you to get help and log out. LCM commands used for configuring your ATX are desc
1-42Introduction[clear|[overwrite|stopwhenfull][add|del][FILTERS]]to set or display event filter eventtrap {on | off} to manage event/SNMP trap mappin
Introduction1-43Usage: bridge [PORT-RANGE [{off | transparent | sr | srt} [noBPDU]]]ATX> idSoftware Currently Running: Release ATX 3.3.09 12-Mar-9
1-44IntroductionUsage: nbcache [PORT-RANGE [{off | on}]]Usage: nbname {display|delete} [big] {<NB_NAME>|any}Usage: ping [-rvsx] host [datasize
Introduction1-45[{arp|bootp|srArp|ipx|ipxsr|apple|none|netbios|sna|all} OPTION]] Port 2 is not configured for token ring. Port 3 is not configured f
Noticeiv DECLARATION OF CONFORMITY Application of Council Directive(s): 89/336/EEC73/23/EEC Manufacturer’s Name: Cabletron Systems, Inc. Manufacturer
1-46Introduction
2-1CHAPTER 2INSTALLING AND CONNECTING TO THE NETWORKCarefully unpack the ATX from the shipping carton and inspect it for possible damage. If any dama
2-2Installing and Connecting to the NetworkFigure 2-1. ATX Front PanelATX LEDs and their functions are described in Table 2-1. Refer to the module do
Installing and Connecting to the Network2-3ATX switches and their functions are described in Table 2-2. Refer to the module documentation for a descri
2-4Installing and Connecting to the NetworkFigure 2-2. Rack-Mounting The ATX2.3 CONNECTING THE POWER SUPPLYThe ATX utilizes a two power supply syste
Installing and Connecting to the Network2-5The ATX should now be ready for operation after completing its automatic power-up diagnostics sequence and
2-6Installing and Connecting to the NetworkFigure 2-3. LED Activity During Normal OperationPower-up Diagnostics SequenceTo observe the power-up seque
Installing and Connecting to the Network2-7supplies. LEDs are described in Table 2-1.When you power up your ATX, the following occurs:1. All LEDs turn
2-8Installing and Connecting to the Network2. Observe the power-up sequence again.3. If the power-up sequence is still abnormal, contact Cabletron Sys
Installing and Connecting to the Network2-9Figure 2-4. Chassis With Power Supply A Positioning Tabs And Supporting Shelf IndicatedTo replace the powe
v CONTENTS CHAPTER 1 INTRODUCTION 1.1 USING THIS MANUAL ...1-11.2 DOCUMENT C
2-10Installing and Connecting to the NetworkFigure 2-5. ATX With Power Supply A Position Indicated2.4 CONNECTING THE LOCAL CONSOLE MANAGER The Local
Installing and Connecting to the Network2-113. Set the terminal to 9600 baud, 8 data bits, 1 stop bit, and no parity. 4. Press the Return key a few ti
2-12Installing and Connecting to the Network
3-1CHAPTER 3CONFIGURINGThe ATX does not require any additional configuration to operate as a standard transparent bridge. However, if you want it to c
3-2ConfiguringFigure 3-1. Typical Bridging ApplicationBridges regulate network traffic on the basis of the source and destination addresses that are in
Configuring3-3As a bridge reads addresses from the packets it processes, it builds an address table. In this way, it learns the addresses of connected
3-4Configuringtransparent bridging on port 2. LCM responds:Port 2 bridging: SRT (segment = 1 bridge = 9)To change the bridging functions for a port, re
Configuring3-5[noBPDU]]]Port 2 bridging: Transparent/TranslatingPort 3 bridging: SRT (segment = 1 bridge = 9)Port 4 bridging: SR (segment = 41 bridge =
3-6Configuring • Class A addresses are used in very large networks that support many nodes. The first byte identifies the network and the other three byt
Configuring3-73.2.3 Changing a Subnet MaskYou can optionally set the subnet mask for a port. If the subnet mask is 0.0.0.0, the ATX will automatically
viContents 1.8.7 Appletalk Routing...1-34AppleTalk addressing...
3-8Configuring3.2.5 Enabling IP Routing FunctionsThe IP routing functions you can enable for ports on the ATX may be any combination of the following:
Configuring3-9Type: iproute <port range> <functions>For example, iproute 5-6 rip bootp would enable routing on ports 5 and 6 with the RIP a
3-10ConfiguringNote: All IP addresses sharing a common subnet must use the same subnet mask. In addition, two IP addresses assigned to the same physica
Configuring3-11addresses on port 2. LCM responds by prompting for the next command. To display the current IP Address Table, type ipaddr with no argume
3-12Configuring3.2.10 Displaying IP Routing FunctionsTo display the IP routing functions that are enabled for all ports: Type: iprouteLCM responds wit
Configuring3-133.3.1 Assigning an IPX Address IPX addresses for each port must be unique and non-zero. When you assign an address, you can also design
3-14ConfiguringType: ipxaddressTable 3-2. Displaying IPX Addresses3.3.3 Enabling IPX Routing FunctionsThe IPX routing functions you can enable for p
Configuring3-153.3.4 Displaying IPX Routing FunctionsTo display the IPX routing functions that are enabled for all ports: Type: ipxrouteLCM responds w
3-16Configuringtheir network number. Refer to Chapter 1, Appletalk Routing for a conceptual overview of AppleTalk routing, including the concept of a s
Configuring3-17Port 8 AppleTalk routing: enabled...Port 21 AppleTalk routing: disabled3.4.3 Disabling AppleTalk RoutingAppleTalk routing can be disabl
Contentsvii 3.2.11 Disabling Routing Functions...3-123.3 CONFIGURING IPX ROUTING...
3-18Configuringthe previously seeded information.You can create a new network range by using the ataddr command to assign a new range. However, if the
Configuring3-193.4.5 Displaying the Network NumberYou can find the current network range for any port on which AppleTalk routing is enabled by using LC
3-20ConfiguringPort 6 EngineeringTo make the zone name you are adding the designated default zone name:Type: atzone <port number> <“zon
Configuring3-21additional hardware on your network. You can use LCM to configure trunking. You can enable trunking between ATXs or between an ATX and a
3-22Configuringgroup is momentarily halted to guarantee the first-in, first-out ordering of the Ethernet packets.Note: The ATX-to-ATX connections must be
Configuring3-23For example, if you configure port 3 to accept no more than 5 multicasts per 60 seconds, any multicasts destined for port 3 are discarded
3-24Configuring3.7.2 System NameThe system name is a name assigned to the ATX by the network administrator. By convention, the system name is the full
Configuring3-25Note: configAnyPass permits read-write access. configGetPass permits read only access.Get PasswordThe get password variable (configGetPa
3-26ConfiguringConfiguration Alarm DynamicWhen the ATX learns a new address or ages (deletes) an old address it may or may not send a trap based on the
Configuring3-27value of the Netbios aging timer. The age-timeout argument can be modified and is interpreted in terms of seconds. This timer is the amou
Commentaires sur ces manuels