throbber
CoreBuilder® 9000
`Implementation Guide
`
`Release 3.0
`
`http://www.3com.com/
`
`Part No. 10012688
`Published September 1999
`
`ANI-ITC-944 945-3444425
`
`Exhibit 2004
`IPR2016-00309
`
`

`
`3Com Corporation
`5400 Bayfront Plaza
`Santa Clara, California
`95052-8145
`
`Copyright© 1999, 3Com Corporation. All rights reserved. No part of this documentation may be reproduced
`in any form or by any means or used to make any derivative work (such as translation, transformation, or
`adaptation) without written permission from 3Com Corporation.
`
`3Com Corporation reserves the right to revise this documentation and to make changes in content from time
`to time without obligation on the part of 3Com Corporation to provide notification of such revision or change
`
`3Com Corporation provides this documentation without warranty, term, or condition of any kind, either
`implied or expressed, including, but not limited to, the implied warranties, terms, or conditions of
`merchantability, satisfactory quality, and fitness for a particular purpose. 3Com may make improvements or
`changes in the product(s) and/or the program(s) described in this documentation at any time
`
`If there is any software on removable media described in this documentation, it is furnished under a license
`agreement included with the product as a separate document, in the hardcopy documentation, or on the
`removable media in a directory file named LICENSE.TXTor ILICENSE.TXT If you are unable to locate a copy,
`please contact 3Com and a copy will be provided to you.
`
`UNITED STATES GOVERNMENT LEGEND
`
`If you are a United States government agency, then this documentation and the software described herein are
`provided to you subject to the following.·
`
`All technical data and computer software are commercial in nature and developed solely at private expense.
`Software is delivered as "Commercial Computer Software" as defined in DFARS 252.227-7014 (June 1995) or
`as a "commercial item" as defined in FAR 2.101(a) and as such is provided with only such rights as are
`provided in 3Com's standard commercial license for the Software. Technical data is provided with limited rights
`only as provided in DFAR 252.227-7015 (~lov 1995) or FAR 52.227-14 (June 1987), whichever is applicable.
`You agree not to remove or deface any portion of any legend provided on any licensed program or
`documentation contained in, or delivered to you in conjunction with, this User Guide.
`
`Unless otherwise indicated, 3Com registered trademarks are registered in the United States and may or may
`not be registered in other countries.
`
`3Com, the 3Com logo, Boundary Routing, CoreBuilder, DynamicAccess, NETBuilder II, PACE, SmartAgent,
`SuperStack, and Transcend are registered trademarks of 3Com Corporation. 3Com Facts is a service mark of
`3Com Corporation.
`
`Acrobat, Acrobat Reader, and PostScript are registered trademarks of Adobe Systems, Inc. Apple Talk and
`Macintosh are registered trademarks of Apple Computer, Incorporated. VINES is a registered trademark of
`Banyan Worldwide. Cisco is a trademark of Cisco Systems. DEC and DEC net are registered trademarks of
`Compaq Computer Corporation. OpenView is a registered trademark of Hewlett-Packard Company. AIX, IBM,
`and NetView are registered trademarks and NetBIOS is a trademark of International Business IVIachines
`Corporation. Internet Explorer, Microsoft, IVIS-DOS, Windows, and Windows NT are registered trademarks of
`Microsoft Corporation. Netscape, Netscape Navigator, and the Netscape Nand Ship's Wheel logos are
`registered trademarks of Netscape Communications Corporation in the United States and other countries. IPX,
`Novell, and NetWare are registered trademarks of Novell, Inc. Java, Sun, and Sun Net Manager are trademarks
`of Sun Microsystems, Inc. Xerox is a registered trademark of Xerox Corporation. UNIX is a registered trademark
`in the United States and other countries, licensed exclusively through X/Open Company, Ltd.
`
`All other company and product names may be trademarks of the respective companies with which they are
`associated.
`
`Guide written by the Implementation Guide Team, Marlborough, MA
`
`ANI-ITC-944 945-3444426
`
`

`
`CONTENTS
`
`30
`
`ABOUT THIS GUIDE
`Conventions
`29
`CoreBuilder 9000 Documentation
`Paper Documents
`31
`32
`Documents on CD-ROM
`32
`World Wide Web Site
`3Com Facts Automated Fax Service
`Documentation Comments
`33
`Year 2000 Compliance
`33
`
`32
`
`1 CONFIGURATION OVERVIEW
`Physical Configuration Overview
`Order of Installation Activities
`System Management Summary
`System Configuration Process
`Configuration Procedure
`
`36
`37
`37
`38
`38
`
`2 MANAGEMENT ACCESS
`42
`Management Access Overview
`42
`Administration Console Overview
`SNMP-Based Network Management Overview
`Key Concepts
`45
`45
`Relationship to the EME
`Management and Data Channels
`Protocols
`46
`46
`Virtual Terminal Protocols
`Simple Network Management Protocol
`Key Guidelines for Implementation
`48
`Access Methods
`48
`IP Management Interface
`
`49
`
`46
`
`47
`
`45
`
`ANI-ITC-944 945-3444427
`
`

`
`49
`
`Administration Console Access
`Access Levels
`49
`Terminal Port Access
`Modem Port Access
`Web Management Access
`Browser Requirements
`SNMP Access
`52
`
`50
`50
`51
`51
`
`54
`
`3 MODUlE PARAMETERS
`Module Parameters Overview
`Features
`54
`Benefits
`55
`Key Concepts
`55
`How to Set and Modify Module Parameters
`Terminology
`55
`Redundancy
`56
`Important Consideration
`Implementing Redundancy
`57
`nvData
`
`56
`56
`
`55
`
`60
`64
`
`69
`69
`
`71
`
`4 PHYSICAl PORT NUMBERING
`Basic Port Attributes
`60
`Role of the 24-port Switch Fabric Module in the Chassis
`Role of the 9-port Switch Fabric Module in the Chassis
`Configuring GEN Interface Module Ports
`65
`Default Port Settings
`66
`Configuring Port Status
`69
`9-port GEN Switch Fabric Module Configurations
`24-port GEN Switch Fabric Module Configurations
`16-slot Chassis Backplane Configuration
`69
`7-slot Chassis and 8-slot Chassis Backplane Configuration
`Module Port Numbering
`73
`74
`Example of Port Numbering
`Key Guidelines for Implementation
`75
`Effects of Removing a Module
`VLAN Changes
`75
`Trunk Changes
`76
`
`75
`
`ANI-ITC-944 945-3444428
`
`

`
`76
`Effects of Replacing Modules
`Replacing Modules of the Same Type
`Replacing Modules of Different Types
`
`76
`77
`
`80
`
`81
`81
`81
`
`5 ETHERNET
`Ethernet Overview
`Features
`80
`Benefits
`81
`Link Bandwidths
`Link Availability
`Other Benefits
`Key Concepts
`82
`84
`Ethernet Packet Processing
`Key Guidelines for Implementation
`Link Bandwidths
`86
`Trunks
`86
`Port Enable and Disable (Port State)
`Important Considerations
`87
`87
`Port Labels
`Implementing Port Labels
`Autonegotiation
`88
`Important Considerations
`Port Mode
`90
`Important Considerations
`91
`Flow Control
`Important Considerations
`PACE Interactive Access
`92
`Important Considerations
`Port Monitoring
`92
`Standards, Protocols, and Related Reading
`Ethernet Protocol
`93
`Media Specifications
`Related Reading
`94
`
`86
`
`87
`
`87
`
`88
`
`90
`
`91
`
`92
`
`93
`
`93
`
`6
`
`fiBER DISTRIBUTED DATA INTERFACE (FDDI)
`FDDI Overview
`96
`Features
`96
`Benefits
`96
`
`ANI-ITC-944 945-3444429
`
`

`
`99
`101
`
`105
`
`1 05
`106
`
`97
`Key Concepts
`97
`Related Standards
`98
`FDDI Network Topologies
`Physical Topology: A Ring of Trees
`Logical Topology: The Dual Ring
`Nodes and Attachments
`101
`Nodes
`101
`1 02
`Attachments
`1 02
`Node Types
`1 04
`Dual Homing
`1 04
`FDDI Stations
`SMT Operation
`FDDI MIB
`105
`Frame-based Protocols
`Primary and Secondary Paths
`106
`Media Access Control
`MAC Services
`1 07
`MAC Operation
`1 07
`Ports
`107
`Key Guidelines for Implementation
`FDDI Stations
`1 09
`1 09
`Setting the Connection Policies
`109
`Effects and Consequences
`Setting Neighbor Notification Timer
`Effects and Consequences
`110
`Enabling and Disabling Status Reporting
`FDDI Paths
`111
`111
`Setting tvxlowerBound
`Effects and Consequences
`Setting tmaxlowerBound
`111
`Setting maxT-Req
`112
`Effects and Consequences
`FDDI MACs
`112
`112
`Setting the Frame Error Threshold
`Effects and Consequences
`112
`Setting the Not Copied Threshold
`113
`Enabling and Disabling LLC Service
`113
`
`108
`
`11 0
`
`111
`
`112
`
`111
`
`ANI-ITC-944 945-3444430
`
`

`
`113
`
`114
`
`113
`FDDI Ports
`113
`Setting lerAiarm
`Effects and Consequences
`Setting lerC utoff
`114
`Effects and Consequences
`Setting Port Labels
`114
`114
`Station Mode (DAS and SAS)
`Single Attachment Station (SAS)
`Dual Attachment Station (DAS)
`Effects and Consequences
`Sample FDDI Configurations
`115
`Standards, Protocols, and Related Reading
`Requests For Comments (RFCs)
`117
`Standards Organizations
`117
`Related Reading
`117
`
`114
`114
`115
`
`117
`
`7 BRIDGE-WIDE AND BRIDGE PORT PARAMETERS
`Bridging Overview
`120
`Benefits
`120
`Features
`1 21
`122
`Key Bridging Concepts
`122
`Learning Addresses
`122
`Aging Addresses
`Forwarding, Filtering, and Flooding Packets
`123
`Spanning Tree Protocol
`How the Spanning Tree Protocol Works
`CBPDUs at Work
`125
`12 5
`Bridge Hierarchy
`Actions That Result from CBPDU Information
`Contents of CBPDUs
`128
`Comparing CBPDUs
`128
`How a Single Bridge Interprets CBPDUs
`How Multiple Bridges Interpret CBPDUs
`Determining the Root Bridge
`133
`Determining the Root Ports
`133
`Determining the Designated Bridge and Designated Ports
`13 5
`Spanning Tree Port States
`
`129
`130
`
`123
`
`125
`
`126
`
`133
`
`ANI-ITC-944 945-3444431
`
`

`
`Reconfiguring the Bridged Network Topology
`Resulting Actions
`137
`138
`Key Guidelines for Implementation
`STP Bridge and Port Parameters
`140
`Administering Bridge-wide STP
`140
`Controlling STP on a Port
`142
`Effects and Consequences
`142
`Frame Processing
`MAC Address Table
`143
`Aging Time
`143
`143
`Address Threshold
`Important Considerations
`IP Fragmentation
`144
`IPX SNAP Translation
`145
`Broadcast and Multicast Limit for Bridge Ports
`Important Considerations
`146
`GARP VLAN Registration Protocol (GVRP)
`Important Considerations
`147
`Standards, Protocols, and Related Reading
`
`142
`
`144
`
`137
`
`145
`
`146
`
`148
`
`1 51
`1 52
`1 52
`
`8 CLASS OF SERVICE (CoS)
`Overview
`1 50
`151
`Key Concepts
`Basic Elements of the Standard
`Format of Prioritized Packets
`Queues and Priority Levels
`CoS in Your System
`153
`CoS Architecture
`153
`154
`Important Considerations
`Configuring Priority Levels
`1 54
`Configuring a Rate Limit on Queue 1
`Important Considerations
`155
`Handling Tagged and Untagged Packets
`Standards, Protocols, and Related Reading
`
`154
`
`156
`156
`
`ANI-ITC-944 945-3444432
`
`

`
`9
`
`161
`161
`
`162
`
`IP MULTICAST fiLTERING WITH IGMP
`Overview
`1 58
`Benefits
`1 58
`Key Concepts
`159
`159
`Devices That Generate IP Multicast Packets
`Group Addresses and Group Members
`160
`160
`Communication Protocols
`IP Multicast Delivery Process
`161
`How Routers and Switches Use IG M P
`Tracking Group Member Locations
`How Hosts Use IGMP
`162
`Host Membership Reports
`Join Message
`162
`162
`Leave-Group Messages
`Report Suppression and Effect on Switch Activity
`163
`Configuring IGMP in Your System
`Key Implementation Guidelines
`164
`Processing IP Multicast Packets
`166
`Effects of MAC Address Aliasing
`167
`Important Considerations
`168
`169
`Operating as the Querier
`Locating Multicast Routers
`169
`170
`Aging the IGMP Tables
`Standards, Protocols, and Related Reading
`
`163
`
`170
`
`172
`
`10 TRUNKING
`Trunking Overview
`Features
`172
`Benefits
`172
`173
`Key Concepts
`Port Numbering in a Trunk
`173
`Trunk Control Message Protocol (TCMP)
`Key Guidelines for Implementation
`175
`General Guidelines
`175
`Trunk Capacity Guidelines
`Automatic Backplane Trunking
`Important Considerations
`
`177
`178
`178
`
`174
`
`ANI-ITC-944 945-3444433
`
`

`
`179
`
`179
`Defining Trunks
`Important Considerations
`181
`Modifying Trunks
`Important Considerations
`Removing Trunks
`181
`181
`Important Consideration
`Standards, Protocols, and Related Reading
`
`181
`
`182
`
`184
`
`186
`
`11 RESiliENT liNKS
`Resilient Links Overview
`Features
`185
`Benefits
`185
`Key Concepts
`185
`Key Guidelines for Implementation
`General Guidelines
`186
`186
`Resilient Link Define and Modify
`Important Considerations
`186
`Resilient Link State
`187
`Important Considerations
`Resilient Link Active Port
`187
`Important Considerations
`Resilient Link Remove
`187
`Important Consideration
`
`187
`
`187
`
`187
`
`12 VIRTUAllANs (VLANs)
`VLAN Overview
`190
`Need for VLANs
`190
`191
`Benefits
`VLANs on the CoreBuilder 9000
`Features
`195
`Key Concepts
`197
`Related Standards and Protocols
`Tagging Types
`198
`VLAN IDs
`199
`200
`Terminology
`
`191
`
`197
`
`ANI-ITC-944 945-3444434
`
`

`
`201
`203
`
`206
`
`223
`225
`
`215
`216
`216
`
`201
`Key Guidelines for Implementation
`Migration Path for Network-based VLANs
`VLANs Created by Router Port IP Interfaces
`Design Guidelines
`204
`Procedural Guidelines
`205
`Number of VLANs
`206
`Equation for VLANs on Layer 3 Switching Modules
`208
`VLAN Aware Mode
`General Guidelines
`210
`212
`VLAN aiiOpen or aiiCiosed Mode
`Important Considerations
`212
`Modifying the
`214
`VLAN Mode
`Mode Requirements
`Using aiiOpen Mode
`Using aiiC lased Mode
`Port-based VLANs
`217
`The Default VLAN
`217
`Modifying the Default VLAN
`Trunking and the Default VLAN
`User-Configured Port-based VLANs
`Important Considerations
`221
`222
`Example 1: A Single VLAN Configuration
`Example 2: VLANs with Tagged Backplane Ports
`Example 3: VLANs with Tagged Front-Panel Ports
`228
`Dynamic Port-based VLANs Using GVRP
`Important Considerations
`228
`Example: GVRP
`230
`Protocol-based VLANs
`231
`231
`Important Considerations
`232
`Selecting a Protocol Suite
`Establishing Routing Between VLANs
`Important Considerations
`233
`Example 1: Routing Between Layer 3 Modules
`Example 2: One-Armed Routing Configuration
`Network-based IP VLANs
`240
`Important Considerations
`240
`Example: Network-based VLANs
`
`218
`219
`221
`
`233
`
`234
`236
`
`241
`
`ANI-ITC-944 945-3444435
`
`

`
`244
`244
`
`249
`
`244
`Ignore STP Mode
`Important Considerations
`Example: Ignore STP Mode
`Rules of VLAN Operation
`246
`Ingress Rules
`246
`Egress Rules
`249
`Standard Bridging Rules for Outgoing Frames
`Tag Status Rules
`249
`2 50
`Examples of Flooding and Forwarding Decisions
`Example 1: Flooding Decisions for Protocol-based VLANs
`251
`Example 2: VLAN Exception Flooding
`Rules for Network-based (Layer 3) VLANs
`251
`2 52
`Example 3: Decisions for One Network-based VLAN
`Example 4: Forwarding and Flooding for Network-based VLANs
`Modifying and Removing VLANs
`254
`255
`Monitoring VLAN Statistics
`
`2 50
`
`2 53
`
`13 PACKET FilTERING
`258
`Packet Filtering Overview
`258
`What Can You Filter?
`When Is a Filter Applied?- Paths
`259
`Input Packet Filtering: Receive Path
`2 59
`Output Packet Filtering: Transmit Path
`259
`Internal Packet Filtering: Receive Internal Path
`Path Assignment
`260
`Key Concepts
`261
`261
`Standard Packet Filters
`262
`Custom Packet Filters
`263
`Important Considerations
`Managing Packet Filters
`263
`265
`Tools for Writing Filters
`ASCII Text Editor
`265
`Built-in Line Editor
`265
`267
`Web Management Filter Builder Tool
`269
`Downloading Custom Packet Filters
`Setting Up Your Environment
`269
`Loading a Custom Filter on the CoreBuilder 9000
`
`259
`
`270
`
`ANI-ITC-944 945-3444436
`
`

`
`271
`271
`272
`
`280
`
`284
`284
`
`271
`The Packet Filtering Language
`Principles for Writing a Custom Filter
`How the Packet Filter Language Works
`Procedure for Writing a Custom Filter
`Packet Filter Opcodes
`274
`Implementing Sequential Tests in a Packet Filter
`282
`Common Syntax Errors
`Custom Packet Filter Examples
`Destination Address Filter
`Source Address Filter
`284
`284
`Length Filter
`Type Filter
`285
`285
`Ethernet Type IPX and Multicast Filter
`Multiple Destination Address Filter
`285
`Source Address and Type Filter
`286
`286
`Accept XNS or IP Filter
`XNS Routing Filter
`286
`Port Group Filter
`287
`Limits to Filter Size
`287
`Using Port Groups in Custom Packet Filters
`Port Group Packet Filter Example
`288
`Port Group Filter Operation
`288
`Port Group Management and Control Functions
`Defining Port Groups
`291
`Important Considerations
`Long Custom Filter Example
`292
`Filtering Problem
`292
`Packet Filter Solution
`293
`Packet Filter One
`295
`Packet Filter Two
`296
`Combining a Subset of the Filters
`298
`Combining All the Filters
`Optimizing the Filter with Accept and Reject Commands
`
`288
`
`291
`
`291
`
`297
`
`299
`
`14
`
`IP ROUTING
`302
`Routing Overview
`Routing in a Subnetworked Environment
`305
`Integrating Bridging and Routing
`
`304
`
`ANI-ITC-944 945-3444437
`
`

`
`310
`
`311
`
`314
`
`314
`
`305
`306
`
`Bridging and Routing Models
`3Com Bridging and Routing
`IP Routing Overview
`308
`Features and Benefits
`309
`Key Concepts
`309
`Multiple IP Interfaces per VLAN
`309
`Media Access Control (MAC) Address
`Network-Layer Address
`310
`IP Addresses
`310
`Dotted Decimal Notation
`Network Portion
`311
`Subnetwork Portion
`312
`313
`Subnet Mask Numbering
`Variable Length Subnet Masks (VLSMs)
`How VLSMs Work
`314
`Guidelines for Using VLSMs
`315
`Router Interfaces
`Routing Table
`316
`Default Route
`318
`Routing Models: Port-based and VLAN-based
`Key Guidelines for Implementing IP Routing
`Configure Trunks (Optional)
`319
`Configure IP VLANs
`320
`320
`Establish Your IP Interfaces
`320
`Interface Parameters
`321
`Important Consideration
`Defining an IP Interface
`321
`Enable IP Routing
`321
`322
`Administering IP Routing
`Address Resolution Protocol (ARP)
`Important Considerations
`324
`ARP Proxy
`325
`Important Considerations
`Example
`325
`Internet Control Message Protocol (ICMP)
`ICMP Router Discovery
`327
`Important Considerations
`327
`Example
`328
`
`318
`319
`
`322
`
`325
`
`326
`
`ANI-ITC-944 945-3444438
`
`

`
`329
`
`330
`
`330
`
`333
`
`333
`
`332
`
`328
`ICMP Redirect
`Important Considerations
`Broadcast Address
`330
`Important Considerations
`Directed Broadcast
`330
`330
`Important Considerations
`Routing Information Protocol (RIP)
`Basic Rl P Parameters
`331
`RIP Mode
`331
`Compatibility Mode
`Cost
`332
`Poison Reverse
`332
`333
`Advertisement Address
`Effects and Consequences
`RIP-1 Versus RIP-2
`333
`Important Considerations
`334
`Routing Policies
`335
`How Routing Policies Work
`336
`Important Considerations
`Implementing RIP Routing Policies
`RIP Metric Adjustments
`337
`RIP Import Policy Conditions for Specified Interfaces
`RIP Export Policy Conditions for Specified Interfaces
`Multiple Matched Routing Policies
`339
`340
`Setting Up RIP Routing Policies
`Effects and Consequences
`340
`Creating RIP Routing Policies
`341
`Domain Name System (DNS)
`342
`Important Considerations
`342
`User Datagram Protocol (UDP) Helper
`Implementing UDP Helper
`343
`Configuring Overlapped Interfaces
`Important Considerations
`344
`Standards, Protocols, and Related Reading
`Requests For Comments (RFCs)
`345
`Standards Organizations
`345
`Related Reading
`346
`
`344
`
`338
`339
`
`336
`
`343
`
`345
`
`ANI-ITC-944 945-3444439
`
`

`
`352
`
`354
`
`355
`
`3 57
`
`15 VIRTUAl ROUTER REDUNDANCY PROTOCOl (VRRP)
`VRRP Overview
`348
`348
`Router to Router
`Host to Host and Host to Gateway
`348
`Routing Protocols
`IC M P Router Discovery
`Static Route
`349
`Default Gateway
`Example
`349
`Key Concepts
`350
`3 51
`How VRRP Works
`Virtual Router Decision-making
`Important Considerations
`353
`VRRP and Other Networking Operations
`Spanning Tree Protocol (STP)
`355
`Dynamic Routing Protocols (RIP, RIP-2, OSPF)
`IGMP Queries
`356
`ICMP Redirect
`357
`Quality of Service
`357
`IP Routing Policies
`357
`Dynamic Host Configuration Protocol (DHC P)
`Using VRRP On Your CoreBuilder 9000
`357
`VRRP with Multiple Virtual Routers
`357
`Spanning Tree Considerations
`360
`End Station Configuration
`360
`VRRP Activity
`361
`Sequence of Failover Events
`VRRP with a Single Virtual Router
`364
`Configuring VRRP
`364
`Configuring Router 1 as the Master Router
`Configuring the Protocol (IP) VLAN of the Master Router
`Configuring the IP Interfaces
`366
`Configuring the Master Router
`367
`Configuring Router 2 as the Backup Router
`367
`Configuring the Protocol (IP) VLAN of the Backup Router
`Configuring the IP Interfaces
`369
`Configuring the Backup Router
`370
`
`361
`362
`
`348
`
`348
`
`349
`
`365
`
`368
`
`ANI-ITC-944 945-3444440
`
`

`
`16
`
`Switching from Master Router to Backup Router
`371
`Disabling the Master Router
`Displaying the Results of the Master Router Change
`Standards, Protocols, and Related Reading
`372
`
`370
`
`371
`
`376
`
`377
`
`378
`
`378
`
`IP MUlTICAST ROUTING
`IP Multicast Overview
`374
`374
`Unicast Model
`Broadcast Model
`374
`Multicast Model
`374
`375
`Benefits of IP Multicast
`How a Network Supports IP Multicast
`IP Multicast Routing
`376
`Supporting Protocols in Your Module
`IP Multicast Tunnels
`377
`Supporting Protocol in Your Module
`IP Multicast Filtering
`378
`Supporting Protocol in Your Layer 3 Switching Module
`Internet Support for IP Multicast
`379
`Key Concepts
`379
`379
`Traffic Movement
`380
`IP Multicast Groups
`380
`Source-Group Pairs
`Multicast Addresses
`380
`380
`Registered Groups
`Reserved MAC Addresses
`How IGMP Supports IP Multicast
`Electing the Querier
`382
`Query Messages
`382
`Host Messages
`382
`Response to Queries
`Join Message
`383
`383
`Leave-Group Messages
`Role of IGMP in IP Multicast Filtering
`
`381
`382
`
`382
`
`383
`
`ANI-ITC-944 945-3444441
`
`

`
`384
`
`387
`388
`
`389
`
`390
`
`393
`
`393
`
`How DVMRP Supports IP Multicast
`Spanning Tree Delivery
`384
`385
`Managing the Spanning Tree
`Interface Relationships
`386
`Broadcasting
`386
`Pruning
`386
`Grafting
`387
`DVMRP Interface Characteristics
`Key Guidelines for Implementation
`Configuration Procedure
`388
`Impact of Multicast Limits
`389
`Impact of IEEE 802.1 Q on Multicasts
`Protocollnteroperability
`389
`Configuring IGMP Options
`390
`Querying and Snooping Modes
`390
`Important Considerations
`Configuring DVMRP Interfaces
`390
`Important Considerations
`390
`Configuring DVMRP Tunnels
`391
`Important Considerations
`391
`Configuring DVMRP Default Routes
`393
`How Default Routes Work
`How to Configure A Default Route
`Important Considerations
`393
`Viewing the DVMRP Routing Table
`394
`Viewing the DVMRP Cache
`394
`Using IP Multicast Traceroute
`395
`Important Considerations
`396
`Standards, Protocols, and Related Reading
`
`396
`
`17 OPEN SHORTEST PATH fiRST (OSPF) ROUTING
`OSPF Overview
`398
`Features
`398
`Benefits
`400
`Key Concepts
`403
`Autonomous Systems
`Areas
`403
`
`403
`
`ANI-ITC-944 945-3444442
`
`

`
`403
`
`406
`
`408
`409
`
`406
`
`415
`
`Neighbors and Adjacency
`Router Types
`404
`Router IDs
`405
`Protocol Packets
`405
`How OSPF Routing Works
`Starting Up
`406
`406
`Finding Neighbors
`406
`Establishing Adjacencies
`Electing the Backup Designated Router
`Electing the Designated Router
`407
`Calculating Shortest Path Trees
`407
`Routing Packets
`407
`Key Guidelines for Implementing OSPF
`Autonomous System Boundary Routers
`Configuring an ASBR
`409
`Areas
`411
`412
`Types of Areas
`Area Border Routers
`414
`414
`Routing Databases
`Configuring Route Summarization in ABRs
`Important Considerations
`415
`Default Route Metric
`418
`OSPF Interfaces
`418
`Mode
`418
`419
`Priority
`Using Priority to Select a Designated Router
`Area ID
`420
`Cost
`420
`Specifying Cost Metrics for Preferred Paths
`Delay
`421
`421
`Hello Interval
`Retransmit Interval
`Dead Interval
`422
`Password
`422
`Statistics
`423
`Important Considerations
`Link State Databases
`425
`Router Link State Advertisements
`Network Link State Advertisements
`
`419
`
`420
`
`ANI-ITC-944 945-3444443
`
`422
`
`423
`
`42 5
`426
`
`

`
`431
`
`433
`
`434
`
`438
`
`440
`
`435
`
`436
`
`427
`428
`
`Summary Link State Advertisements
`External Link State Advertisements
`Important Considerations
`429
`430
`Neighbors
`Neighbor Information
`Static Neighbors
`433
`Important Considerations
`434
`Router IDs
`Important Considerations
`OSPF Memory Partition
`43 5
`435
`Default Memory Allocation
`Current Partition Maximum Size
`Allocated Memory Size
`436
`Running Out of Memory- Soft Restarts
`Manual Memory Allocation
`437
`System Memory Allocation
`437
`437
`Stub Default Metrics
`Important Considerations
`Virtual Links
`438
`Important Considerations
`OSPF Routing Policies
`440
`441
`Important Considerations
`Implementing Import Policies
`443
`Import Policies at a Glance
`445
`Import Example 1: Accept Route
`Import Example 2: Reject Route
`Implementing Export Policies
`446
`Export Policies for RIP and Static Routes
`Export Policies for Direct Interfaces
`450
`Export Example 1: Prohibit Advertisement of non-OSPF
`Interfaces
`450
`451
`Export Example 2: Prohibit Advertisement of Static Address
`Export Example 3: Prohibit Advertisement of RIP Routes
`451
`Export Example 4: Advertisement of Direct Interfaces
`452
`452
`Export Example 5: Advertisement of Static Routes
`Export Example 6: Advertisement of RIP Routes
`453
`OSPF Statistics
`454
`Standards, Protocols, and Related Reading
`
`446
`446
`
`449
`
`455
`
`ANI-ITC-944 945-3444444
`
`

`
`18
`
`458
`
`463
`
`466
`
`467
`
`469
`
`470
`
`IPX ROUTING
`IPX Routing Overview
`Features
`459
`Benefits
`459
`Key Concepts
`460
`460
`How IPX Routing Works
`460
`IPX Packet Format
`462
`IPX Packet Delivery
`Sending Node's Responsibility
`Router's Responsibility
`464
`Terminology
`465
`Key Guidelines for Implementation
`Procedural Guidelines
`466
`General Guidelines
`466
`IPX Interfaces
`467
`Important Considerations
`Per-Interface Options
`469
`NetBIOS Option
`469
`OddLengthPadding Option
`IPX Routes
`469
`469
`Important Considerations
`Primary and Secondary Routes
`Static Routes
`470
`Dynamic Routes Using RIP
`Routing Tables
`471
`Selecting the Best Route
`IPX Servers
`473
`473
`Important Considerations
`Primary and Secondary Servers
`Static Servers
`474
`474
`Dynamic Servers Using SAP
`Maintaining Server Information
`475
`SAP Aging
`475
`SAP Request Handling
`475
`Server Tables
`IPX Forwarding
`476
`Important Considerations
`
`474
`
`470
`
`472
`
`475
`
`476
`
`ANI-ITC-944 945-3444445
`
`

`
`477
`
`477
`IPX RIP Mode
`Important Considerations
`RIP Policies
`478
`478
`RIP Import Policies
`478
`RIP Export Policies
`RIP Policy Parameters
`479
`IPX SAP Mode
`480
`Important Considerations
`SAP Policies
`480
`481
`SAP Import Polices
`481
`SAP Export Policies
`SAP Policy Parameters
`481
`IPX Statistics
`482
`Standards, Protocols, and Related Reading
`
`480
`
`19 APPLETALK ROUTING
`AppleTalk Overview
`484
`Features
`484
`Benefits
`485
`Key Concepts
`486
`486
`AppleTalk Protocols
`487
`Physical Layer Protocols
`487
`Link Layer Protocols
`487
`Network Layer Protocols
`488
`Transport Layer Protocols
`491
`Session Layer Protocols
`492
`Presentation Layer Protocols
`AppleTalk Network Elements
`493
`AppleTalk Networks
`493
`AppleTalk Nodes
`493
`494
`Named Entities
`AppleTalk Zones
`494
`Seed Routers
`494
`Terminology
`494
`Key Implementation Guidelines
`AppleTalk Interfaces
`496
`Important Considerations
`
`497
`
`495
`
`482
`
`ANI-ITC-944 945-3444446
`
`

`
`500
`
`498
`AppleTalk Routes
`499
`Important Considerations
`AppleTalk Address Resolution Protocol (AARP) Cache
`AppleTalk Zones
`502
`503
`Important Considerations
`Changing Zone Names
`504
`Aging Out the Network Range
`Forwarding AppleTalk Traffic
`506
`Enabling Forwarding
`506
`Disabling Forwarding
`506
`Important Considerations
`Checksum Error Detection
`Important Considerations
`AppleTalk Echo Protocol (AEP)
`AppleTalk Statistics
`508
`Datagram Delivery Protocol (DDP)
`Routing Table Maintenance Protocol
`Zone Information Protocol
`51 0
`Name Binding Protocol
`511
`Standards, Protocols, and Related Reading
`
`504
`
`508
`509
`
`512
`
`506
`507
`507
`507
`
`20 QoS AND RSVP
`QoS Overview
`514
`Features
`514
`Benefits
`51 5
`Methods of Using QoS
`Key Concepts
`516
`Related Standards and Protocols
`IEEE 802.1p
`516
`Resource Reservation Protocol (RSVP)
`Terminology
`517
`Key Guidelines for Implementation
`Procedural Guidelines
`521
`General Guidelines
`521
`QoS Classifiers
`522
`Important Considerations
`Using Predefined Classifiers
`
`515
`
`516
`
`521
`
`522
`522
`
`517
`
`ANI-ITC-944 945-3444447
`
`

`
`523
`
`52 5
`
`527
`
`529
`530
`
`534
`536
`
`Assigning Flow and Nonflow Classifier Numbers
`524
`Defining Flow Classifiers
`525
`Flow Classifier Information
`Specifying Addresses and Address Masks
`526
`Specifying Ports and Port Ranges
`Defining NonFiow Classifiers
`527
`NonFiow Classifier Information
`QoS Controls
`528
`Important Considerations
`Assigning Control Numbers
`Specifying Rate Limits
`532
`Specifying Service Levels
`533
`Specifying TCP Drop Control
`Setting the QoS Timer Control
`Timer Options
`537
`538
`Examples of Classifiers and Controls
`538
`Example 1: Traffic To/From a Specific Server
`540
`Example 2: Filtering Traffic to a Destination
`542
`Example 3: Using Two Classifiers to Filter Traffic
`Example 4: Assigning High Priority to Specific Traffic
`Example 5: Nonflow Multimedia Tagged Traffic
`546
`Example 6: Bridged Nonflow IP Unicast Traffic
`548
`Modifying and Removing Classifiers and Controls
`550
`Important Considerations
`550
`QoS Excess Tagging
`550
`551
`Example: QoS Excess Tagging
`Transmit Queues and QoS Bandwidth
`RSVP
`554
`554
`RSVP Terminology
`Example: RSVP
`556
`Setting RSVP Parameters
`
`553
`
`557
`
`21 DEVICE MONITORING
`Device Monitoring Overview
`Key Concepts and Tools
`561
`Administration Console
`561
`Web Management Tools
`561
`
`561
`
`545
`
`ANI-ITC-944 945-3444448
`
`

`
`563
`
`563
`
`565
`
`567
`
`568
`
`569
`
`575
`
`570
`
`578
`
`562
`562
`
`Network Management Platform
`SmartAgent Embedded Software
`Event Logging
`563
`Baselining
`563
`563
`Important Considerations
`Displaying the Current Baseline
`563
`Setting a Baseline
`Enabling or Disabling Baselines
`Roving Analysis
`564
`Key Guidelines for Implementation
`Important Considerations
`565
`Ping
`567
`Important Consideration
`567
`Using Ping
`567
`Ping Responses
`Strategies for Using Ping
`traceRoute
`568
`568
`Using traceRoute
`traceRoute Operation
`SNMP
`569
`570
`SNMP Overview
`Manager/Agent Operation
`SNMP Messages
`570
`Trap Reporting
`571
`575
`Setting Up SNMP on Your System
`Administering SNMP Trap Reporting
`Remote Monitoring (RMON)
`576
`576
`Overview of RMON
`RMON Benefits
`577
`578
`RMON in Your System
`3Com Transcend RMON Agents
`Important Considerations
`579
`580
`RMON-1 Groups
`581
`Statistics and axFddiStatistics Groups
`History and axFDDIHistory Groups
`582
`Alarm Group
`582
`Host Group
`585
`HostTopN Group
`
`585
`
`ANI-ITC-944 945-3444449
`
`

`
`587
`587
`
`585
`Matrix Group
`586
`Event Group
`586
`RMON-2 Groups
`Protocol Directory Group
`Protocol Distribution Group
`Address Map Group
`588
`588
`Network-Layer Host Group
`588
`Network-Layer Matrix Group
`588
`Application-Layer Host Group
`589
`Application-Layer Matrix Group
`Probe Configuration Group Capabilities
`589
`Management Information Base (MIB)
`MIB Files
`590
`Compiler Support
`MIB Objects
`592
`MIB Tree
`593
`MIB-11
`596
`RMON-1 MIB
`597
`598
`RMON-2 MIB
`3Com Enterprise MIBs
`
`592
`
`599
`
`589
`
`601
`601
`
`A TECHNICAl SUPPORT
`Online Technical Services
`World Wide Web Site
`3Com FTP Site
`601
`602
`3Com Bulletin Board Service
`Access by Analog Modem
`602
`602
`Access by Digital Modem
`3Com Facts Automated Fax Service
`Support from Your Network Supplier
`603
`Support from 3Com
`Returning Products for Repair
`
`603
`603
`
`605
`
`INDEX
`
`ANI-ITC-944 945-3444450
`
`

`
`ABOUT THIS GUIDE
`
`The CoreBuilder 9000 Implementation Guide provides information that
`you need to use features of the CoreBuilder® 9000 Enterprise Switch
`after you install it and attach the Switch to your network. Before you use
`this guide:
`
`Install and set up your Switch. See the CoreBuilder 9000 Enterprise
`Switch Getting Started Guide and the module Quick Start guides for
`the modules installed in your Switch.
`
`Become familiar with the Command Reference Guide and the
`CoreBuilder 9000 Enterprise Management Engine User Guide, which
`document the commands that you use to configure and manage your
`Switch.
`
`Read Chapter 1, which provides an overview of the configuration
`process.
`This guide is intended for the system or network administrator who is
`responsible for configuring, using, and managing the CoreBuilder 9000
`Enterprise Switch. It assumes a working knowledge of local area network
`(LAN) operations and familiarity with communications protocols that are
`used on interconnected LANs.
`
`If the information in the release notes that are shipped with your product
`differs from the information in this guide, follow the instructions in the
`release notes.
`
`To help you recognize CoreBuilder 9000 modules, Table 1 describes the
`character string (in the Identifying Name column) that the Enterprise
`Management Engine (EME) displays when you enter a show module all
`command.
`
`ANI-ITC-944 945-3444451
`
`

`
`1 ... ~~.... ABOUT THIS GUIDE
`
`Table 1 CoreBuilder 9000 Modules
`
`Model Number Module Type
`
`4-Port Gigabit Ethernet Layer 3
`Switching Modul

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket