throbber
CoreBui|der® 3500
`Implementation Guide
`
`Release 3.0
`
`Pubiished November 1999
`
`http://www.3com.com/
`
`Part No. 10013506
`
`1
`
`ARISTA 1009
`
`1
`
`ARISTA 1009
`
`

`
`3Com Corporation
`5400 Bayfront Plaza
`Santa Clara, California
`95052-8145
`
`Copyright © 1999, 3Com Corporation. All rights reserved. No part of this documentation may be reproduced
`in any form or by any means or used to make any derivative work (such as translation, transformation, or
`adaptation) without written permission from 3Com Corporation.
`3Com Corporation reserves the right to revise this documentation and to make changes in content from time
`to time without obligation on the part of 3Com Corporation to provide notification of such revision or change.
`3Com Corporation provides this documentation without warranty, term, or condition of any kind, either
`implied or expressed, including, but not limited to, the implied warranties, terms, or conditions of
`merchantability, satisfactonr quality, and fitness for a particular purpose. 3Com may make improvements or
`changes in the product(s) and/or the program(s) described in this documentation at any time.
`if there is any software on removable media described in this documentation, it is furnished under a license
`agreement included with the product as a separate document, in the hardcopy documentation, or on the
`removable media in a directory file named LlCENSE.TXT or !LlCENSE.TXT. If you are unable to locate a copy,
`please contact 3Com and a copy will be provided to you.
`UNITED STATES GOVERNMENT LEGEND
`
`If you are a United States government agency then this documentation and the software described herein are
`provided to you subject to the following:
`All technical data and computer software are commercial in nature and developed solely at private expense.
`Software is delivered as "Commercial Computer Software" as defined in DFARS 252227-7014 (June 1995) or
`as a "commercial item” as defined in FAR 2.101(a) and as such is provided with only such rights as are
`provided in 3Com’s standard commercial license for the Software. Technical data is provided with limited rights
`only as provided in DFAR 252227-7015 (Nov 1995) or FAR 52227-14 (June 1987), whichever is applicable.
`You agree not to remove or deface any portion of any legend provided on any licensed program or
`documentation contained in, or delivered to you in conjunction with, this User Guide.
`Unless othen/vise indicated, 3Com registered trademarks are registered in the United States and may or may
`not be registered in other countries.
`3Com, the 3Com logo, CoreBuilder, DynamicAccess, NETBuilder ll, PACE, SmartAgent, SuperStack, and
`Transcend are registered trademarks of 3Com Corporation. 3Com Facts is a service mark of
`3Com Corporation.
`
`Postscript is a registered trademark of Adobe Systems, Inc. App|eTalk is a registered trademark of Apple
`Computer, Incorporated. Banyan and VINES are registered trademarks of Banyan Worldwide. DEC, DECnet,
`and PATHWORKS are registered trademarks of Compaq Computer Corporation. Openview is a registered
`trademark of Hewlett~Packard Company. AIX, IBM, and Netview are registered trademarks and NetBlOS is a
`trademark of International Business Machines Corporation. Internet Explorer, Microsoft, MS—DOS, Windows,
`and Windows NT are registered trademarks of Microsoft Corporation. Netscape, Netscape Navigator, and the
`Netscape N and Ship's Wheel logos are registered trademarks of Netscape Communications Corporation in the
`United States and other countries. IPX, Novell, and NetWare are registered trademarks of Novell, Inc. Sun and
`SunNet Manager are trademarks of Sun Microsystems, Inc. UNIX is a registered trademark in the United States
`and other countries, licensed exclusively through X/Open Company, Ltd. Xerox and XNS are trademarks of
`Xerox Corporation.
`
`All other company and product names may be trademarks of the respective companies with which they are
`associated.
`
`Guide written by 3Com MSD Technical Publications, Marlborough, MA, USA.
`We welcome your comments on this guide. Send e—mail to: sdtechpubs_comments@ne.3com.com
`
`2
`
`

`
`CONTENTS
`
`ABOUT THIS GUIDE
`
`Conventions
`
`22
`
`CoreBuilder 3500 Documentation
`
`24
`
`24
`Paper Documents
`Software and Documents on CD—ROM
`
`26
`
`Documentation Comments
`
`26
`
`Year 2000 Compliance
`
`26
`
`CONFIGURATION OVERVIEW
`
`System Configuration Procedure
`Procedure Summary
`27
`
`27
`
`Configuration Procedure
`
`28
`
`MANAGEMENT ACCESS
`
`31
`Management Access Overview
`Administration Console Overview
`
`32
`
`SNMP—Based Network Management Overview
`
`34
`
`Key Concepts
`OSI Protocols
`
`34
`
`34
`
`Protocols
`
`35
`
`Key Guidelines for implementation
`Access Methods
`38
`
`38
`
`Administration Console Access
`
`40
`
`Password Levels
`
`40
`
`Terminal Port Access
`
`Modem Port Access
`
`41
`
`41
`
`Web Management Access
`
`Browser Requirements
`SNMP Access
`43
`
`42
`
`42
`
`3
`
`

`
`SYSTEM PARAMETERS
`
`System Parameters Overview
`Features
`46
`
`46
`
`Benefits
`
`47
`
`Key Concepts
`
`47
`
`Key Guidelines for Implementation
`File Transfer
`48
`
`48
`
`Implementing FTP
`
`48
`
`Implementing TFTP
`
`49
`
`Security
`
`49
`
`Security Options
`
`50
`
`ImportantConsiderations
`
`51
`
`Software Update
`
`52
`
`ImportantConsiderations
`nvData Operations
`53
`
`52
`
`Saving nvData
`
`53
`
`Restoring nvData
`
`Resetting nvData
`
`54
`
`55
`
`Viewing nvData
`
`55
`
`Simple Network Time Protocol (SNTP)
`SNTP Overview
`56
`
`56
`
`57
`Implementing SNTP
`Standards, Protocols, and Related Reading
`
`57
`
`PHYSICAL PORT NUMBERING
`
`Port Numbering Overview
`
`59
`
`Numbering Rules
`
`59
`
`Supported Module Types
`
`60
`
`Key Guidelines for Implementation
`
`61
`
`Examples of Port Numbering
`
`62
`
`Example 1: Fully Loaded System
`
`62
`
`Example 2: Empty Slot in the System 63
`Example 3: Gigabit Ethernet Module with Other Modules
`Example 4: FDDI Module with Other Modules
`65
`Effects of Removing a Module
`66
`
`64
`
`Port—Numbering Changes
`
`66
`
`VLAN Changes
`
`Trunk Changes
`
`66
`
`67
`
`4
`
`

`
`68
`Effects of Replacing Modules
`Replacing Modules of the Same Type or Same Number of Ports
`Replacing Modules of Different Types
`68
`
`68
`
`ETHERNET
`
`Ethernet Overview
`
`72
`
`Features
`
`Benefits
`
`72
`
`73
`
`74
`Key Concepts
`Ethernet Frame Processing
`
`76
`
`Key Guidelines for Implementation
`Link Bandwidths
`78
`
`78
`
`Trunks
`
`78
`
`Port Enable and Disable (Port State)
`
`79
`
`|mportantConsiderations
`Port Labels
`79
`
`79
`
`Labeling Ports
`
`79
`
`Autonegotiation
`
`80
`
`Important Considerations
`Port Mode
`82
`
`|mportantConsiderations
`Flow Control
`83
`
`Important Considerations
`PACE Interactive Access
`84
`
`80
`
`82
`
`83
`
`84
`important Considerations
`Standards, Protocols, and Related Reading
`Ethernet Protocols
`84
`
`84
`
`Media Specifications
`
`85
`
`Related Reading
`
`85
`
`5
`
`

`
`6
`
`FIBER DISTRIBUTED DATA INTERFACE (FDDI)
`FDDI Overview
`88
`Features
`
`88
`
`Benefits
`
`88
`
`89
`Key Concepts
`Related Standards
`
`89
`
`FDDI Network Topologies
`Nodes and Attachments
`
`91
`93
`
`Dual Homing
`FDDI Stations
`
`97
`97
`
`Primary and Secondary Paths
`Media Access Control
`99
`Ports
`100
`
`99
`
`Key Guidelines for Implementation
`FDDI Stations
`102
`
`101
`
`Setting the Connection Policies
`
`102
`
`Setting Neighbor Notification Timer
`
`104
`
`Enabling and Disabling Status Reporting
`FDDI Paths
`104
`
`104
`
`Setting tvxLowerBound
`
`104
`
`Setting tmaxLowerBound
`Setting maxT—Req
`105
`FDDI MACS
`106
`
`105
`
`Setting the Frame Error Threshold
`
`Setting the Not Copied Threshold
`
`Enabling and Disabling LLC Service
`FDDI Ports
`107
`
`106
`
`106
`
`107
`
`Setting lerAlarm
`
`Setting lerCutoff
`
`107
`
`108
`
`108
`Setting Port Labels
`Station Mode (DAS and SAS)
`
`109
`
`Single Attachment Station (SAS)
`Dual Attachment Stations
`109
`
`109
`
`109
`Sample FDDI Configurations
`Standards, Protocols, and Related Reading
`
`111
`
`Requests For Comments (RFCs)
`
`111
`
`Standards Organizations
`
`111
`
`Related Reading
`
`111
`
`6
`
`

`
`BRlDGE—W|DE AND BRIDGE PORT PARAMETERS
`
`Bridging Overview
`Benefits
`114
`
`114
`
`Features
`
`115
`
`Key Bridging Concepts
`Learning Addresses
`
`116
`116
`
`116
`Aging Addresses
`Forwarding, Filtering, and Flooding Packets
`
`116
`
`117
`Spanning Tree Protocol
`How the Spanning Tree Protocol Works
`CBPDUs at Work
`119
`
`119
`
`How a Single Bridge Interprets CBPDUS
`
`How Multiple Bridges Interpret CBPDUS
`
`123
`
`124
`
`129
`Spanning Tree Port States
`Reconfiguring the Bridged Network Topology
`
`131
`
`132
`Key Guidelines for implementation
`134
`STP Bridge and Port Parameters
`Administering Bridge—wide STP Parameters
`Administering STP Parameters on Bridge Ports
`Frame Processing
`137
`MAC Address Table
`138
`
`134
`136
`
`138
`Aging Time
`Address Threshold
`
`A
`138
`
`important Considerations
`
`138
`
`IP Fragmentation
`IPX SNAP Translation
`
`139
`
`139
`
`Broadcast and Multicast Limit for Bridge Ports
`
`140
`
`Important Considerations
`140
`GARP VLAN Registration Protocol (GVRP)
`
`141
`
`|mportantConsiderations
`
`141
`
`Standards, Protocols, and Related Reading
`
`142
`
`7
`
`

`
`8
`
`TRUNKING
`
`Trunking Overview
`Features
`144
`
`144
`
`Benefits
`
`144
`
`145
`Key Concepts
`Port Numbering in a Trunk
`145
`Trunk Control Message Protocol (TCMP)
`
`146
`
`Key Guidelines for implementation
`General Guidelines
`147
`
`147
`
`Trunk Capacity Guidelines
`
`148
`
`Defining Trunks
`
`150
`
`Important Considerations
`
`150
`
`Modifying Trunks
`152
`Important Considerations
`
`152
`
`Removing Trunks
`
`153
`
`153
`important Considerations
`Standards, Protocols, and Related Reading
`
`154
`
`9
`
`VIRTUAL LANs
`
`VLAN Overview
`
`156
`
`Need for VLANs
`
`156
`
`Benefits
`
`Features
`
`157
`
`158
`
`159
`Key Concepts
`Related Standards and Protocols
`VLAN iDS
`160
`
`159
`
`Terminology
`
`161
`
`163
`Key Guidelines for Implementation
`Network—based VLANs vs. Multiple interfaces per VLAN
`
`163
`
`VLANS Created by Router Port lP Interfaces
`Number of VLANs
`165
`
`164
`
`General Guidelines
`
`167
`
`VLAN allOpen or allClosed Mode
`
`169
`
`Important Considerations
`Modifying the VLAN Mode
`Mode Requirements
`171
`
`169
`170
`
`8
`
`

`
`172
`lgnore STP Mode
`important Considerations
`VLAN Aware Mode
`174
`
`172
`
`Port—based VLANs
`
`175
`
`The Default VLAN
`
`175
`
`Static Port~based VLANs
`178
`Dynamic Port—based VLANS Using GVRP
`Protocol-based VLANs
`186
`
`182
`
`186
`|mportantConsiderations
`187
`Selecting a Protocol Suite
`Establishing Routing Between VLANs
`Network-based IP VLANS
`192
`
`189
`
`192
`important Considerations
`Example of Netvvork—based VLANs
`Rules of VLAN Operation
`195
`
`193
`
`ingress Rules
`
`195
`
`198
`Egress Rules
`Examples of Flooding and Forwarding Decisions
`Rules for Network—based (Layer 3) VLANs
`202
`
`200
`
`Modifying and Removing VLANS
`
`206
`
`Monitoring VLAN Statistics
`
`207
`
`10
`
`PACKET FILTERING
`
`Packet Filtering Overview
`What Can You Filter?
`
`210
`210
`
`When is a Filter Applied? — Paths
`Path Assignment
`212
`
`211
`
`213
`Key Concepts
`Standard Packet Filters
`
`213
`
`Custom Packet Filters
`
`214
`
`important Considerations
`
`215
`
`Managing Packet Filters
`Tools for Writing Filters
`ASCll Text Editor
`
`215
`217
`217
`
`Built—in Line Editor
`
`217
`
`Web Management Filter Builder Tool
`
`219
`
`9
`
`

`
`Downloading Custom Packet Filters
`Download with
`Filter Builder
`
`221
`
`221
`
`Download an
`ASCll File
`222
`
`The Packet Filtering Language
`224
`Principles for Writing a Custom Filter
`How the Packet Filter Language Works
`
`224
`224
`
`Procedure for Writing a Custom Filter
`
`225
`
`228
`Packet Filter Opcodes
`Implementing Sequential Tests in a Packet Filter
`Common Syntax Errors
`235
`Custom Packet Filter Examples
`Destination Address Filter
`
`237
`237
`
`233
`
`Source Address Filter
`
`237
`
`Length Filter
`
`237
`
`238
`Type Filter
`Ethernet Type IPX and Multicast Filter
`Multiple Destination Address Filter
`Source Address and Type Filter
`239
`
`238
`238
`
`Accept XNS or IP Filter
`XNS Routing Filter
`240
`
`239
`
`Port Group Filter
`Limits to Filter Size
`
`240
`241
`
`Using Port Groups in Custom Packet Filters
`Port Group Packet Filter Example
`242
`
`242
`
`242
`Port Group Filter Operation
`Port Group Management and Control Functions
`Defining Port Groups
`245
`
`Z45
`
`Long Custom Filter Example
`Filtering Problem 247
`Packet Filter Solution
`
`247
`
`247
`
`Optimizing the Filter with Accept and Reject Commands
`
`254
`
`10
`
`10
`
`

`
`11
`
`INTERNET PROTOCOL (IP)
`
`Routing Overview
`
`258
`
`Routing in a Subnetted Environment
`
`259
`
`Integrating Bridging and Routing
`
`260
`
`IP Routing Overview
`Features and Benefits
`
`261
`262
`
`Key Concepts
`
`263
`
`263
`Multiple IP Interfaces per VLAN
`Media Access Control (MAC) Address
`
`263
`
`Network-LayerAddress
`IP Addresses
`264
`
`264
`
`Variable Length Subnet Masks (VLSMs)
`Router Interfaces
`271
`
`268
`
`Routing Table
`
`272
`
`Routing Models: Port—based and VLAN—based
`
`274
`
`Role of VLANs in IP Routing
`
`275
`
`Port—based Routing
`
`276
`
`VLAN—based Routing
`
`280
`
`Key Guidelines for Implementing IP Routing
`
`282
`
`Configure Trunks (Optional)
`
`282
`
`Configure IP VLANs (VLAN—based Routing)
`Establish Your IP Interfaces
`283
`
`282
`
`Enable IP Routing
`
`285
`
`285
`Administering IP Routing
`Address Resolution Protocol (ARP)
`
`286
`
`Important Considerations
`
`288
`
`ARP Proxy
`
`288
`
`Important Considerations
`
`288
`
`Example
`
`288
`
`Internet Control Message Protocol (ICMP)
`ICMP Redirect
`292
`
`290
`
`ImportantConsiderations
`
`292
`
`Example
`
`293
`
`ICMP Router Discovery
`
`294
`
`Important Considerations
`
`294
`
`294
`Example
`Broadcast Address
`
`295
`
`Important Considerations
`
`295
`
`11
`
`11
`
`

`
`Directed Broadcast
`
`295
`
`295
`Important Considerations
`Routing Information Protocol (RIP)
`Basic RIP Parameters
`296
`RIP l\/lode
`297
`
`296
`
`Compatibility I\/lode
`Cost
`297
`
`297
`
`298
`Poison Reverse
`AdvertisementAddress
`
`298
`
`Route Aggregation
`RIP-1 Versus RIP—2
`
`299
`299
`
`Important Considerations
`
`300
`
`300
`g Routing Policies
`How Routing Policies Work
`
`301
`
`303
`Important Considerations
`Implementing RIP Routing Policies
`Setting Up RIP Routing Policies
`
`303
`306
`
`Creating RIP Routing Policies
`
`307
`
`Example
`
`308
`
`Domain Name System (DNS)
`
`310
`
`310
`Important Considerations
`User Datagram Protocol (UDP) Helper
`Configuring Overlapped Interfaces
`
`311
`312
`
`313
`Important Considerations
`Standards, Protocols, and Related Reading
`
`313
`
`Requests For Comments (RFCs)
`Standards Organizations
`314
`
`313
`
`Related Reading
`
`314
`
`12
`
`VIRTUAL ROUTER REDUNDANCY PROTOCOL (VRRP)
`VRRP Overview
`316
`
`Router to Router
`
`316
`
`Host to Host and Host to Gateway
`
`316
`
`Example
`
`317
`
`318
`Key Concepts
`How VRRP Works
`
`319
`
`Virtual Router Decision—making
`
`320
`
`Important Considerations
`
`322
`
`12
`
`12
`
`

`
`Implementing VRRP
`Create VLANs
`
`323
`324
`
`Configure IP Interfaces
`324
`Configure the Router Protocol
`Enable Routing
`325
`
`325
`
`Configure VRRP
`Enable VRRP
`
`325
`326
`
`VRRP and Other Networking Operations
`
`326
`
`327
`Spanning Tree Protocol (STP)
`Dynamic Routing Protocols (RIP, RIP—2, OSPF)
`IGMP Queries
`328
`ICMP Redirect
`329
`
`327
`
`Quality of Service
`
`329
`
`IP Routing Policies
`329
`Dynamic Host Configuration Protocol (DHCP)
`Standards, Protocols, and Related Reading
`329
`
`329
`
`13
`
`IP M ULTICAST ROUTING
`
`IP Multicast Overview
`
`332
`
`Unicast Model
`
`332
`
`Broadcast Model
`
`Multicast Model
`
`332
`
`332
`
`Benefits of IP Multicast
`
`333
`
`How a Network Supports IP Multicast
`
`334
`
`IP Multicast Routing
`IP Multicast Tunnels
`
`334
`335
`
`IP Multicast Filtering
`
`336
`
`Internet Support for IP Multicast
`
`337
`
`338
`Key Concepts
`Traffic Movement
`
`338
`
`IP Multicast Groups
`
`Source—Group Pairs
`Multicast Addresses
`
`338
`
`338
`339
`
`How IGMP Supports IP Multicast
`
`Electing the Querier
`
`341
`
`341
`
`341
`Host Messages
`Role of IGMP in IP Multicast Filtering
`
`342
`
`13
`
`13
`
`

`
`How DVMRP Supports IP I\/Iulticast
`
`343
`
`Spanning Tree Delivery
`
`343
`
`Managing the Spanning Tree
`DVMRP Interface Characteristics
`
`Key Guidelines for Implementation
`Configuration Procedure
`347
`
`344
`
`346
`
`347
`
`348
`Impact of Multicast Limits
`Impact of IEEE 802.1 Q on Multicasts
`Protocol Interoperability
`348
`
`348
`
`349
`Configuring IGIVIP Options
`Querying and Snooping Modes
`349
`
`Important Considerations
`Configuring DVMRP Interfaces
`Important Considerations
`350
`Configuring DVMRP Tunnels
`350
`Important Considerations
`Configuring DVMRP Default Routes
`How Default Routes Work
`352
`
`349
`
`349
`
`349
`
`352
`
`352
`
`How to Configure A Default Route
`Viewing the DVMRP Routing Table
`353
`Viewing the DVMRP Cache
`353
`Using IP Multicast Traceroute
`354
`Standards, Protocols, and Related Reading
`
`355
`
`14
`
`OPEN SHORTEST PATH FIRST (OSPF)
`
`OSPF Overview
`Features
`
`358
`358
`
`Benefits
`
`360
`
`363
`Key Concepts
`Autonomous Systems
`Areas
`363
`
`363
`
`Neighbors and Adjacency
`RouterTypes
`364
`Protocol Packets
`365
`
`363
`
`How OSPF Routing Works
`
`366
`
`Key Guidelines for Implementing OSPF
`Autonomous System Boundary Routers
`
`Configuring an ASBR
`
`370
`
`369
`
`370
`
`14
`
`14
`
`

`
`Areas
`
`372
`
`373
`Types of Areas
`Area Border Routers
`
`375
`
`A
`375
`Routing Databases
`Configuring Route Summarization in ABRs
`important Considerations
`376
`379
`Default Route Metric
`380
`
`OSPF Interfaces
`380
`
`Mode
`
`376
`
`Priority
`Area lD
`
`380
`
`381
`
`Cost
`
`381
`
`382
`Delay
`Hello Interval
`
`383
`
`Retransmit interval
`
`383
`
`Dead Interval
`
`384
`
`Password
`
`384
`
`Statistics
`
`384
`
`important Considerations
`Link State Databases
`387
`
`385
`
`Router Link State Advertisements
`
`387
`
`Network Link State Advertisements
`
`388
`
`Summary Link State Advertisements
`External Link State Advertisements
`
`389
`389
`
`lmportantConsiderations
`
`391
`
`Neighbors
`
`392
`
`Neighbor Information
`Static Neighbors
`395
`
`392
`
`Important Considerations
`Router lDs
`396
`
`important Considerations
`OSPF Memory Partition
`397
`
`395
`
`396
`
`Default Memory Allocation
`397
`Running Out of Memory — Soft Restarts
`Manual Memory Allocation
`399
`
`398
`
`System Memory Allocation
`Stub Default Metrics
`400
`
`399
`
`Important Considerations
`
`400
`
`15
`
`15
`
`

`
`Virtual Links
`
`401
`
`Important Considerations
`
`OSPF Routing Policies
`
`403
`
`Important Considerations
`
`402
`
`404
`
`Implementing Import Policies
`
`Implementing Export Policies
`OSPF Statistics
`416
`
`405
`
`408
`
`Standards, Protocols, and Related Reading
`
`417
`
`15
`
`IPX ROUTING
`
`IPX Routing Overview
`Features
`420
`
`419
`
`Benefits
`
`420
`
`Key Concepts
`
`421
`
`How IPX Routing Works
`
`421
`
`Terminology
`
`426
`
`Key Guidelines for Implementation
`427
`Procedural Guidelines
`
`General Guidelines
`
`427
`
`IPX Interfaces
`
`428
`
`Important Considerations
`
`428
`
`Per—Inten°ace Options
`IPX Routes
`430
`
`429
`
`427
`
`Important Considerations
`
`430
`
`Primary and Secondary Routes
`Static Routes
`431
`
`431
`
`Dynamic Routes Using RIP
`
`431
`
`Routing Tables
`
`432
`
`Selecting the Best Route
`IPX Servers
`434
`
`433
`
`Important Considerations
`
`434
`
`Primary and Secondary Servers
`Static Servers
`435
`
`435
`
`Dynamic Servers Using SAP
`
`435
`
`Maintaining Server Information
`Server Tables
`436
`
`435
`
`IPX Fon/varding
`
`437
`
`Important Considerations
`
`437
`
`16
`
`16
`
`

`
`IPX RIP Mode
`
`438
`
`Important Considerations
`RIP Policies
`439
`
`438
`
`IPX SAP Mode
`
`441
`
`ImportantConsiderations
`SAP Policies
`441
`
`441
`
`IPX Statistics
`
`443
`
`Standards, Protocols, and Related Reading
`
`444
`
`16
`
`APPLETALK
`
`AppIeTaIk Overview
`Features
`446
`
`445
`
`Benefits
`
`447
`
`Key Concepts
`
`448
`
`AppleTa|k Protocols
`
`448
`
`AppleTall< Network Elements
`Terminology
`455
`
`Key Implementation Guidelines
`AppleTalk Interfaces
`458
`
`454
`
`457
`
`Important Considerations
`
`459
`
`AppleTall< Routes
`
`460
`
`460
`Important Considerations
`AppleTall< Address Resolution Protocol (AARP) Cache
`AppleTalk Zones
`464
`
`462
`
`Important Considerations
`
`465
`
`Changing Zone Names
`
`466
`
`Forwarding AppleTalk Traffic
`
`468
`
`Enabling Forwarding
`
`468
`
`Disabling Forwarding
`
`468
`
`ImportantConsiderations
`Checksum Error Detection
`
`468
`469
`
`ImportantConsiderations
`
`469
`
`AppleTaIk Echo Protocol (AEP)
`
`469
`
`App|eTalk Statistics
`
`470
`
`Datagram Delivery Protocol
`470
`Routing Table Maintenance Protocol
`
`471
`
`17
`
`17
`
`

`
`Zone information Protocol
`
`472
`
`473
`Name Binding Protocol
`Standards, Protocols, and Related Reading
`
`474
`
`17
`
`Q05 AND RSVP
`
`QoS Overview
`Features
`
`476
`476
`
`Benefits
`
`476
`
`Methods of Using QoS
`
`477
`
`478
`Key Concepts
`Related Standards and Protocols
`
`Terminology
`
`479
`
`Key Guidelines for Implementation
`Procedural Guidelines
`482
`
`General Guidelines
`
`482
`
`QoS Classifiers
`
`483
`
`Important Considerations
`
`483
`
`478
`
`482
`
`483
`Using Predefined Classifiers
`Assigning Flow and Nonflow Classifier Numbers
`Defining Flow Classifiers
`485
`
`484
`
`Defining Nonflow Classifiers
`
`QoS Controls
`
`489
`
`Important Considerations
`
`Assigning Control Numbers
`
`488
`
`489
`
`490
`
`494
`
`492
`Specifying Rate Limits
`493
`Specifying Service Levels
`Specifying TCP Drop Control
`495
`Setting the QoS Timer Control
`497
`Examples of Classifiers and Controls
`Example 1: Traffic to and from a Specific Server
`Example 2: Filtering Traffic to a Destination
`499
`501
`Example 3: Using Two Classifiers to Filter Traffic
`Example 4: Assigning High Priority to Specific Traffic
`Example 5: Nonflow Multimedia Tagged Traffic
`506
`Example 6: Bridged Nonflow lP Unicast Traffic
`508
`Modifying and Removing Classifiers and Controls
`510
`important Considerations
`510
`
`497
`
`504
`
`18
`
`18
`
`

`
`QoS Excess Tagging
`511
`Example of QoS Excess Tagging
`Transmit Queues and QOS Bandwidth
`LDAP
`514
`
`511
`513
`
`Important Considerations
`
`514
`
`Operation
`RSVP
`516
`
`515
`
`RSVP Terminology
`
`517
`
`Example of RSVP
`
`518
`
`Setting RSVP Parameters
`
`S20
`
`18
`
`DEVICE MONITORING
`
`Device Monitoring Overview
`
`522
`
`Key Concepts and Tools
`Administration Console
`
`522
`522
`
`522
`Web Management Tools
`Network Management Platform
`
`S23
`
`SmartAgent Embedded Software
`Other Commonly Used Tools
`523
`
`523
`
`Event Logging
`
`524
`
`524
`|mportantConsideration
`Displaying the Event Log Configuration
`Configuring the Output Devices
`524
`
`524
`
`Configuring the Services
`
`524
`
`Baselining
`
`525
`
`525
`Important Considerations
`Displaying the Current Baseline
`
`525
`Setting a Baseline
`Enabling or Disabling Baselines
`
`525
`
`525
`
`526
`Roving Analysis
`Key Guidelines for Implementation
`Important Considerations
`527
`Ping
`530
`Important Consideration
`Using Ping
`530
`
`530
`
`530
`Ping Responses
`Strategies for Using ping
`
`531
`
`527
`
`19
`
`19
`
`

`
`traceRoute
`
`532
`
`Using traceRoute
`
`532
`
`traceRoute Operation
`SNMP
`533
`
`SNMP Overview 533
`
`532
`
`Setting Up SNMP on Your System
`
`Remote Monitoring (RMON)
`Overview of RMON
`542
`
`541
`
`RMON Benefits
`
`543
`
`538
`
`544
`RMON in Your System
`3Com Transcend RMON Agents
`
`545
`
`lmportantConsiderations
`RMON—1 Groups
`547
`
`546
`
`Rl\/lON—2 Groups
`
`552
`
`Management Information Base (MIB)
`MIB Files
`556
`
`556
`
`558
`
`Compiler Support
`
`MIB Objects
`MIB Tree
`
`559
`560
`
`MIB-ll
`
`562
`
`RMON-1 MIB
`
`RMON—2 MlB
`
`563
`
`564
`
`3Com Enterprise MlBs
`
`565
`
`A
`
`TECHNICAL SUPPORT
`
`Online Technical Services
`
`World Wide Web Site
`
`567
`
`567
`
`3Com Knowledgebase Web Services
`3Com FFP Site
`568
`
`3Com Bulletin Board Service
`
`568
`
`3Com Facts Automated Fax Service
`
`Support from Your Network Supplier
`
`Support from 3Com 569
`
`Returning Products for Repair
`
`571
`
`567
`
`569
`
`569
`
`INDEX
`
`20
`
`20
`
`

`
`ABOUT THIS GUIDE
`
`This guide describes information that you need to use features of the
`CoreBuilder® 3500 system after you install it and attach the system to
`your network. Before you use this guide:
`0
`
`- Verify that your system is installed and set up using the
`CoreBui/der 3500 Getting Started Guide.
`
`- Become familiar with the Command Reference Guide, which
`
`documents the commands that are used to configure and manage
`your system.
`
`I Read Chapter 1 for an overview of the configuration process.
`
`This guide is intended for the system or network administrator who is
`responsible for configuring, using, and managing the CoreBuilder 3500
`system. It assumes a working knowledge of local area network (LAN)
`operations and familiarity with communications protocols that are used
`on interconnected LANS.
`
`/f the information in the release notes differs from the information in this
`
`guide, follow the instructions in the release notes.
`
`The most current versions of guides and release notes are available in
`Adobe Acrobat Reader Portable Document Format (PDF) or HTML from
`the 3Com World Wide Web site:
`
`http://www.3com.com
`
`21
`
`21
`
`

`
`22
`
`ABOUT THIS GUIDE
`
`Conventions
`
`Table i and Table 2 list conventions that are used throughout this guide.
`
`Table 1 Notice icons
`
`Description
`
`Notice Type
`
`icon
`
`§ information note
`E
`Caution
`f
`Warning
`
`information that describes important features or
`instructions
`
`information that alerts you to potential loss of data or
`potential damage to an application, system, or device
`
`information that alerts you to potential personal injury
`
`Layer 2 switch
`
`in figures, a switch that can perform Layer 2 functions
`
`Layer 3 switch
`
`in figures, a switch that can perform both Layer 2 and
`Layer 3 functions
`
`
`Table 2 Text Conventions
`
`Convention
`
`Description
`
`Screen displays This typeface represents information as it appears on the
`screen.
`
`Syntax
`
`Commands
`
`The words "enter”
`and "type”
`
`Keyboard key names
`
`The word "syntax" means that you evaluate the syntax
`provided and then supply the appropriate values for the
`placeholders that appear in angle brackets. Example:
`
`To set the system date and time, use the following syntax:
`CCYY—MM-DDThh:mm:ss
`
`The word "command” means that you must enter the
`command exactly as shown and then press Return or Enter.
`Commands appear in bold. Example:
`
`To remove an IP interface, enter the following command:
`
`ip interface remove
`
`When you see the word ”enter" in this guide, you must type
`something, and then press Return or Enter. Do not press
`Return or Enter when an instruction simply says ”type.”
`
`if you must press two or more keys simultaneously, the key
`names are linked with a plus sign (+). Example:
`Press Ctr|+Alt+Del.
`
`22
`
`22
`
`

`
`Conventions
`
`23
`
`Table 2 Text Conventions (continued)
`
`
`Convention
`
`Description
`
`Words in italics
`
`Italics are used to:
`
`. Emphasize a point
`
`- Denote a new term at the place where it is defined in the
`text
`
`-
`
`Identify menu names, menu commands, and software
`button names. Examples:
`
`From the Help menu, select Contents.
`Click OK.
`
`
`23
`
`23
`
`

`
`! 24
`
`ABOUT THIS GUIDE
`
`CoreBui|der 3500
`Documentation
`
`The following documents comprise the CoreBuilder 3500 documentation
`set. Documents are available in one of two forms:
`
`- Paper Documents
`
`The paper documents that are shipped with your system and
`components are listed in the next section.
`
`- Software and Documents on CD—ROM
`
`The System Software and Documentation CD contains online versions
`of the paper documents, this Implementation Guide, and the
`Command Reference Guide, as well as the CoreBuilder 3500 system
`software.
`
`To order additional copies of the paper documents and the CD—ROM,
`contact your sales representative.
`
`Paper Documents
`
`These documents are shipped with your system:
`
`- CoreBui/der 3500 Unpacking Instructions
`
`How to unpack your system. Also, an inventory list of all the items that
`are shipped with yoursystem.
`
`- CoreBui/der 3500 Software Installation and Release Notes
`
`Information about the software release, including new features,
`software corrections, and known problems. It also describes any
`changes to the documentation.
`
`- CoreBui/der 3500 Quick /nsta//ation Guide
`
`Quick reminders and information for system installation. For greater
`detail on installation procedures, see the CoreBui/der 3500 Getting
`Started Guide.
`
`- CoreBui/der 3500 Getting Started Guide
`
`All the procedures necessary for getting your system up and running,
`including information on installing, cabling, powering up, configuring,
`and troubleshooting the system.
`
`I CoreBui/der 3500 Command Quick Reference
`
`All of the Administration Console commands for the system.
`
`- Web Management User Guide for the CoreBui/der 3500
`
`Overview, installation, and troubleshooting information for the suite
`of applications that help you manage your system over the Internet.
`
`24
`
`24
`
`

`
`CoreBuilder 3500 Documentation
`
`25
`
`In addition, each module and field—replaceab|e component contains a
`guide:
`CoreBuilder 3500 System Processor Removal and Replacement Guide
`
`Provides overview information and removal and replacement
`instructions for the CoreBuilder system processor.
`
`Module Installation Guides
`
`An overview, LED status information, and installation instructions for
`each module.
`
`GBIC Transceiver Installation Guide
`
`Installation instructions for the Gigabit Ethernet Interface Converter
`transceiver.
`
`CoreBuilder 3500 Power Supply Assembly Removal and Replacement
`Guide
`
`Overview information and removal and replacement instructions for
`the CoreBuilder power supplies.
`
`CoreBuilder 3500 Fan Tray Removal and Replacement Guide
`
`Overview information and removal and replacement instructions for
`the fan tray.
`
`PC/I/ICIA Flash Card User Guide
`
`Information on using the PCIVICIA card to save and restore system
`configuration settings.
`
`Blank Faceplate Installation Guide
`
`Instructions for covering empty slots with the blank faceplate.
`
`25
`
`25
`
`

`
`‘ 26
`
`ABOUT THIS Guroe
`
`Software and
`Documents on
`CD—ROM
`
`The compact disc that comes with your system contains:
`
`I System software
`
`in: Online versions of the paper guides that are shipped with your system,
`modules, and field—replaceable components
`
`- CoreBui/der 3500 Implementation Guide (this guide)
`
`I Multiplatform Command Reference Guide
`
`Information about the commands used to configure the system. This
`guide documents commands for the CoreBuilder 3500 as well as
`other 3Com systems.
`
`- Help system for the Web Management suite of applications
`
`Online Help system for the CoreBuilder 3500 Web Management
`software. See the Web Management User Guide for information
`about Web Management and the related Help system.
`
`Documentation
`Comments
`
`Your suggestions are very important to us. They help us to make our
`documentation more useful to you.
`
`Please send email comments about this guide to:
`
`sdtechpubs_comments@ne.3com.com
`
`Please include the following information when commenting:
`
`- Document title
`
`I Document part number (found on the inside title page of this guide)
`
`- Page number
`
`Exa mp le:
`
`CoreBuilder 3500 /mp/ementation Guide
`
`Part Number 70013506
`
`Page 25
`
`Year 2000
`
`Compliance
`
`For information on Year 2000 compliance and 3Com products, visit the
`3Com Year 2000 Web page:
`
`http://www.3com.com/products/yr2000.html
`
`26
`
`26
`
`

`
`CONFIGURATION OVERVIEW
`
`
`
`This chapter provides the configuration procedure for the first time that
`you install a CoreBuilder® 3500 Layer 3 High—Function Switch.
`
`E
`
`To upgrade the software on an existing switch, see the Software
`Installation and Release Notes for configuration information.
`
`System
`Configuration
`Procedure
`
`Software is installed on each system at the factory. Because the software
`boots from flash memory when you power on the system, the system is
`immediately ready to configure according to your network needs.
`
`3Com recommends that you use the following procedures the first time
`that you set up your system and every time that you modify its
`configuration.
`
`Procedure Summary
`
`These steps are described in detail in the next section:
`
`Establish management access.
`
`Choose a subsequent management access method.
`
`Choose a subsequent management interface.
`
`Configure parameters related to the network infrastructure. These
`include system, bridge—wide and bridge—port, Ethernet, FDDI, and
`trunking parameters.
`
`Define all VLANs.
`
`Define routing protocol interfaces and set related parameters.
`Configure more advanced traffic control features, such as packet filters
`and Quality of Service (QoS).
`
`Monitor the system and analyze network activity.
`
`These steps are described in detail in the next section.
`
`27
`
`27
`
`

`
`I 28
`
`CHAPTER 1: CONFIGURATION OVERVIEW
`
`Configuration
`Procedure
`
`Follow the steps that apply to your network needs and ignore the steps
`that do not apply.
`
`1
`
`Establish management access.
`
`To perform configuration or management tasks, you must initially:
`
`a Connect to the system through its terminal serial port or modern serial
`port.
`
`For information about the required settings for the serial ports, see
`Chapter 2 in this guide.
`
`b Use the Administration Console as the management interface.
`
`The Administration Console is a menu—driven command line interface
`
`that is embedded in the system software. For specific menu and
`command information, see the Command Reference Guide.
`
`Choose a subsequent management access method.
`
`You can continue to access your system through a local serial connection,
`or you can use one of two other local access methods — any in—band
`port on a media module or the out—of—band 1OBASE—T port on the system
`processor module. To manage the system through either access method,
`you must first configure an IP address:
`
`- To configure an IP address for an out-of-band port — Using the
`serial port connection from step 1, configure an IP address through
`the management
`ip interface menu. For more information, see
`Chapter 2.
`
`- To configure an IP address for an in-band port — Using the serial
`port connection from step 1, configure an IP address by defining an IP
`VLAN (through the bridge vlan menu; see Chapter 9) and an
`associated IP interface (through the ip interface menu; see
`Chapter 11).
`
`28
`
`28
`
`

`
`System Configuration Procedure
`
`3 Choose a subsequent management interface.
`
`After you configure an IP address, you have additional management
`interface options:
`Administration Console —— You can now access this interface from a
`remote Telnet connection.
`
`Web Management software ~ From your Web browser, you can
`access a suite of HTl\/lL~based applications that are embedded in the
`software. For more information, see the Web Management User
`Guide.
`
`SNMP-based applications - One example is 3Com Transcend®
`Network Control Services software. To manage the system in—band
`from SNMP-based applications, set the SNMP parameters through the
`snmp m

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket