3Com SuperStack 3 3250 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung 3Com SuperStack 3 3250 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von 3Com SuperStack 3 3250, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung 3Com SuperStack 3 3250 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung 3Com SuperStack 3 3250. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung 3Com SuperStack 3 3250 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts 3Com SuperStack 3 3250
- Den Namen des Produzenten und das Produktionsjahr des Geräts 3Com SuperStack 3 3250
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts 3Com SuperStack 3 3250
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von 3Com SuperStack 3 3250 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von 3Com SuperStack 3 3250 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service 3Com finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von 3Com SuperStack 3 3250 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts 3Com SuperStack 3 3250, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von 3Com SuperStack 3 3250 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    http://www.3com.com/ Part No. DU A1750-0BAA 01 Publ ished D ecembe r 2003 Su perSta ck ® 3 Swit ch 322 6 and S wit ch 3250 I mpl emen tat io n Gu i de 3CR1 750 0-91 3CR1 750 1-91[...]

  • Seite 2

    3C om Cor poratio n 35 0 Campu s Dri ve Mar lboro ugh, MA USA 0175 2-3064 Copy right © 20 03, 3C om Cor poratio n. All ri ghts reserve d. No pa rt of thi s docu mentat ion may be reproduced in any f orm or by a ny me ans or us ed to make any deriva tive wor k (such as tran slation , transfor mation, o r adapta tion) withou t wr itten permissi on f[...]

  • Seite 3

    C ONTEN TS A BOU T T HIS G UIDE Conventions 10 Related Doc umentation 1 1 Documenta tion C o mments 11 1 S WITCH F EATURES O VERVIEW Wh at i s Ma na ge men t So f twa re ? 1 3 Swi tch Featu res Expl ained 13 Aggregated L inks 14 Auto-negotiation 14 Configuration Save and Restore 15 Mu ltic ast Filt er ing 1 6 R api d Spanning T ree Protocol 1 6 Swi[...]

  • Seite 4

    Implem e n ting 802.3ad Aggregated Links 25 Aggregated L inks and Y our S witch 25 Aggregated Link — M anual Configurat ion Example 27 3 U SING M ULTIC AST F ILTERING Wha t is a n IP Mult ica st? 2 9 Benefits o f Mul t icast 30 M ult ic ast Filt er ing 3 0 Mu ltic ast F ilte ring a nd Y ou r Switc h 31 IGM P M ultic as t Filte rin g 31 How IGMP S[...]

  • Seite 5

    802.1D tra f fic c lassification 48 Dif fServ traf fic classi fication 49 IP Port tr affic c lassifi cation 50 T raff i c P r ioritization and your S witch 51 Li miting the Rate of a Port 52 T raff i c Prioritiza tion and Rate Limiting 53 7 S TATUS M ONI TORIN G AN D S TATIST ICS RMON 55 What is RMON? 55 The RMON Groups 55 Benefits o f RMON 57 RMON[...]

  • Seite 6

    10 M AKING Y OUR N ETWORK S EC URE Limiting Ma nagem ent Ac cess by IP Address 71 Securing Ac cess to the W eb Interface 72 Gett ing a Digital Certificate 7 2 Securi ng Access to the Command Line In terface 73 Ac cess Con tr o l Li sts 73 How Access Contr ol List Rules Work 74 Port Secu rity 74 What is Netw o r k Login? 75 How Network Login W orks [...]

  • Seite 7

    A C ONF IGU RA TIO N R UL ES Configuration Rules for Gigabit Et h er net 99 Configuration Rules for Fast E ther net 100 Configuration Rules w ith Full Duplex 101 B N ETWORK C O NFIGUR ATION E XAMPLES Simple Network Configuration Exam ple 104 De sktop Swit ch Exampl e 104 Advanced Network Configuration Exam ple 105 Edge Sw itch Example 105 C IP A DD[...]

  • Seite 8

    [...]

  • Seite 9

    A BOUT T HI S G UI DE This g uide desc ri bes the featu res o f the 3Com ® SuperS tack ® 3 Swi tch 322 6 (3 CR1 7500 -9 1) an d 3C om ® Supe rS tack ® 3 Swi tch 32 50 ( 3CR 17501- 91 ) . It o utlines how to u se the se fea tures to opti mize t he per forman ce of your net work. The te rms Swit ch 3226 and Switch 32 50 are used when refer ring t[...]

  • Seite 10

    10 A BO UT T HIS G UI D E Con ventions Ta b l e 1 and Ta b l e 2 list conventi o ns th at ar e u sed th ro ughout this guide. Ta b l e 1 Notice Icons Ic on Notice Ty pe Descri ption In fo rmat io n no te Info r mat ion t hat d escri bes i mporta nt fe atures or ins tr uct ion s Cauti on Info rmatio n that alert s you t o potenti al loss of d ata or[...]

  • Seite 11

    Relat ed Docu mentati on 11 Related Do cum enta tion In a ddit ion t o this guid e, e ach Switch doc um ent at ion set incl ud es th e fo llo wi ng : ■ Super Stack 3 Swi tch 32 26 and S up erSt ack 3 S wit ch 3 250 G ett ing Start ed Guide This g uide contain s: ■ al l the informati on you need to install an d se t u p the Swit ch in its defa u[...]

  • Seite 12

    12 A BO UT T HIS G UI D E Pl ease incl ude the f ollowing in format ion when cont acting us : ■ Document title ■ Do cum ent par t n um be r ( o n t he t itl e pag e) ■ Page numb er (if approp riate) Exampl e: ■ Supe rS tack ® 3 Sw it ch 3226 a nd Switch 325 0 Imp lem e ntation G ui de ■ Part num ber: D UA 17 50-0BAA 01 ■ Page 25 Please[...]

  • Seite 13

    1 S WITCH F EA T UR E S O VE RVIE W Thi s ch apter co ntain s introdu ctor y in forma ti on ab out the Sw itch m anag em ent software a nd supp orted f eatu r es. It c over s the followi ng to pi cs : ■ What is M ana gemen t So ftwa r e? ■ S wi tch Featu res Ex plained Fo r detai led de scri ptions of t he Web i nterfac e ope ration s a nd the [...]

  • Seite 14

    14 C HAPTER 1: S WITCH F EATUR ES O VER VIEW Ag gregated Lin ks Aggr egated links are c onnection s that all ow devices t o communicate using mult iple l ink s in par allel. Y our Sw itch suppor ts o ne aggrega ted l ink using the two 10/100/ 100 0 and S FP po rts (25 -26 on t he Sw itch 32 25, 49-50 on the Switch 325 0). A ggrega ted l inks prov i[...]

  • Seite 15

    S wit ch Fea tures Explai ned 15 Flow c ont rol uses b ack jamm ing on ports oper ating in ha lf d uplex mod e, and is implement ed using the IEEE Std 802.3 -2002 (in corporat ing 8 02.3x) o n ports oper ating in full duple x m ode. Fo r mor e info rm ation ab out aut o-nego tia tion and p ort c apabi lities, see Chap te r 2 “ O ptim izi ng Bandw[...]

  • Seite 16

    16 C HAPTER 1: S WITCH F EATUR ES O VER VIEW ■ LACP autom atic aggr e gations — that is, LACP enabl ed on all po rts and th e aggreg ated l inks cr eated automatic ally . The aggr egated link shou ld be e nable d an d Span ni ng T ree P rotoco l ena bled. Param eters such as VLANs and Fast Sta rt may be set up as r equir ed. For furt her i nfor[...]

  • Seite 17

    S wit ch Fea tures Explai ned 17 ■ Enable o ne of the l ess ef fi cient pat hs if the m ost ef fi cient pat h fails. RSTP is an enhanced ver sion of STP (Spanni ng T ree Pr otocol) and is full y compati b l e w i th STP syst ems. RSTP c an r estor e a network co nnection qui cker than the legacy STP fe atur e. RSTP can de tect if i t is conn ecte[...]

  • Seite 18

    18 C HAPTER 1: S WITCH F EATUR ES O VER VIEW manage ment applic ati on, the Swit c h can tr ansfer thes e statis tics to your wor kstatio n on reque st or when a pre-define d threshold is exceede d . For more in format ion about RMON and Event No tific ation, see Cha p t er 7 “ St atus Mo nito ring a nd St atist ics ” . B roa dc as t St o rm Co[...]

  • Seite 19

    S wit ch Fea tures Explai ned 19 All cu rren tly l earnt addr esses o n the port are ma de permanent. Any packe ts co nt aining a sou r c e address n ot lear n t on t he po rt wi ll be droppe d. ■ Ne tw ork Log in Connecti o ns ar e only allowe d on a port on ce the clie nt has been authen ti cated by a RADIUS serv er . Fo r mor e info rm ation a[...]

  • Seite 20

    20 C HAPTER 1: S WITCH F EATUR ES O VER VIEW[...]

  • Seite 21

    2 O PTIM IZIN G B ANDWI DTH There a r e m any w ays yo u c an op timiz e the bandw idt h o n your net wor k and impr ove network pe rfor mance. If you utili ze cert ain Swit ch featur es yo u can provide the followi ng benef its to y our netw ork and en d use rs: ■ I n creas ed bandwidth ■ Qui cker con nections ■ Faster tr an sf er of d ata ?[...]

  • Seite 22

    22 C HAPTER 2: O PTIMIZING B ANDWIDTH a lin k do n ot supp ort au to-neg otiation, b oth e nds must be m anua lly set to fu ll d uplex o r h alf du plex a ccordin gly . Por ts operat ing at 10 00 Mb ps sup port full du ple x mode o nl y . Flo w Contr ol All Switc h ports support fl o w contr ol, wh ich is a mec hanism that pr ev ent s packe t loss [...]

  • Seite 23

    Ag g re g at ed Li nks 23 Ag grega t ed Lin ks Aggr eg ated links ar e connect ions tha t allow devi ces to communicate usin g multi p l e m ember links i n paral lel. Ag gr egat ed links prov ide the f ol lo wi ng be n efi t s : ■ They can potential ly i ncreas e the bandwi dth of a co n nec tion. The capaci ty of the multi p l e links is combin[...]

  • Seite 24

    24 C HAPTER 2: O PTIMIZING B ANDWIDTH By de fau lt, LAC P is di sable d on a ll Swi tch ports. I f a memb er link i n an aggre g ated l ink fai ls, the tra ffi c usin g that link is dynamic ally r eassigned to the r emain ing member links i n the aggr egat ed li n k. Figure 2 shows th e sim ple st cas e: two mem ber links , that i s the physic al l[...]

  • Seite 25

    Ag g re g at ed Li nks 25 Imp lemen ting 8 02.3ad A ggrega ted Links LAC P can be enabl ed or disabl ed on a pe r por t basis. Y ou c an im pleme nt 802 .3ad aggregat ed links i n two ways: ■ Ma nual Agg rega tions — Y o u can man ually add an d remov e po rts to and fr om an aggr egate d link v ia Web command s. However , if a port has L ACP e[...]

  • Seite 26

    26 C HAPTER 2: O PTIMIZING B ANDWIDTH ■ A member l ink port can only belong to one aggr egated lin k. ■ The me m ber link por ts ca n be mixed m e dia, t hat is f iber and/o r twist ed pai r por ts w ithin the sam e aggrega te d link. ■ The member l ink ports must have th e same conf iguration . When usin g an aggr egated link, note th at: ?[...]

  • Seite 27

    Ag g re g at ed Li nks 27 aggr egated li nk traf fic to th e rem aining port s. Aggr egated li nks ther efore provide built-i n resilience for y our netw ork. The Swit ch also h as a mechanism to p r event the pos sible occ urr ence of pa ck e t re -o rd er in g w h e n a l in k rec ov e rs t o o so on a ft e r a fai lu re. A g gr eg ate d Li nk ?[...]

  • Seite 28

    28 C HAPTER 2: O PTIMIZING B ANDWIDTH 3 Con nect port 5 on the c ore Switch to por t 25 o n t he Sw itc h 3226 . 4 Con nect port 7 on t he up per Switch to por t 26 o n t he Sw itch 3 226 .[...]

  • Seite 29

    3 U SING M ULTIC AST F ILTERIN G Mul ticast filteri ng improves the p erfor manc e of net works that ca rry mu lt i ca st tr a f f ic. This c h a pter explain s multica sts, multica st filter ing, and h ow mult icast filter ing c an be im plem ent ed on yo ur Sw itch . I t cover s t he f ollow ing to pi cs : ■ What is a n IP M ulticast? ■ M ult[...]

  • Seite 30

    30 C HAPTER 3: U SING M ULTIC AST F ILTERIN G A multic ast pack et is iden tified by the pr esenc e of a multi cast gr o up addr ess in the de stinat ion addr ess fiel d of the pac ket’ s IP h eader . Be nefits of M ulti cast The bene fits of using IP mult icast ar e t hat it : ■ Enable s the si multan eous d elivery of info rmation t o many re[...]

  • Seite 31

    Multi cast Filt eri ng a nd Your Swit ch 31 Figure 4 The ef fect of multic ast fil tering Mu l tic as t Filt er in g and Y our Swi tch Y o ur Switch prov ides a utoma tic m ul ticast filteri ng su pport using IGM P (Int erne t Grou p Ma nagem e nt P r o to col) Sn oopin g. I t also supp orts IG MP quer y mod e. Snoo ping Mode Snoo ping M o de al lo[...]

  • Seite 32

    32 C HAPTER 3: U SING M ULTIC AST F ILTERIN G I GM P multicast f ilteri n g works as follows: 1 The I P route r (or querier ) peri odical ly send s qu er y packet s to all th e endst ation s in t he LA Ns or V LANs th at are co nnect ed t o it . If yo ur netwo rk has mor e than one IP r ou t er , then the one wi th th e lowest IP addr ess becomes t[...]

  • Seite 33

    Multi cast Filt eri ng a nd Your Swit ch 33 wish to join or to which th ey alr eady belong. Th e querier i s always the dev ice with the lowes t IP addr ess in the subnetwork. It can be a rout er or a Layer 2 switch. T he network traf f ic flows mos t effi c i ently if th e querier is th e cl ose s t de vi c e to th e so urce s o f IP m u lti ca s [...]

  • Seite 34

    34 C HAPTER 3: U SING M ULTIC AST F ILTERIN G ro uter s on the su bnetwor k. Upon rec eivin g such a mess age, th e querier dete rmines whet her th at hos t is th e las t gr oup membe r on the subn etwo rk by issuing a group -sp ecific quer y . Leav e-gr oup mes sages r ed uc e leave latency — that is, the ti me betwee n when t he la st group mem[...]

  • Seite 35

    4 U SING R ESILIEN CE F EA TUR ES Sett ing up resilience o n y our ne twor k he lps protect critic al link s agai nst failure, prote cts a gainst net work loops, and reduc es ne tw ork down time to a mi nimu m . The Switch p ro vides r e silient lin ks using the R apid Sp anning T r ee Pr otoc ol (RSTP ). Th e protoco l configures itself aut omati [...]

  • Seite 36

    36 C HAPTER 4: U SING R ESILIENCE F EATUR ES The pr otoc ol is a pa rt of t he IE EE Std 802. 1 w- 200 1, bridge sp ecificat ion. T o ex plain RSTP more effec t ively , you r Switch will b e refer red to as a brid ge. Rapi d Spa nning T re e Pr oto col (R STP ) The Rapid Spann ing T re e ( RSTP) i s an enh anc ed Spannin g T r ee featur e. RSTP imp[...]

  • Seite 37

    What is STP? 37 As an e xamp l e, Figure 5 show s a network con taining three LAN segme nts separat ed b y three brid ges. W it h thi s co nfig uration, e ach seg ment can c omm uni ca te wi th t he othe r s u si ng t wo pat hs . Wit hou t S TP en ab led , th is conf igurati o n cr eates loo ps that ca use the netwo rk to ov erload. Figure 5 A netw[...]

  • Seite 38

    38 C HAPTER 4: U SING R ESILIENCE F EATUR ES I f a link failur e is detecte d, as shown in F igure 7 , the S TP pr oces s rec onf i gu res t he ne t wo r k s o t ha t tr a ffic fro m LA N s eg me n t 2 fl ow s through Brid ge B. Figure 7 T raf fic flowing thr ough Bri dge B STP determ ines w hic h is the mo st efficient path betw een each b ridg ed[...]

  • Seite 39

    How STP Wor ks 39 ■ Each port to have a cost . This spec ifi es the ef fi ciency of ea c h lin k, usuall y de termi ned b y the ba n dwidt h of t he l ink — the higher the cost , th e l ess ef fici ent the li n k . Ta b l e 3 sh o ws th e de f a ul t po rt co st s fo r a Swi tch. Ta b l e 3 Def aul t p ort co sts S TP Cal culatio n The fi rst s[...]

  • Seite 40

    40 C HAPTER 4: U SING R ESILIENCE F EATUR ES brid ge is c onf igured to fo rward traffic o nly betwee n its Root Por t a nd th e Desi gnate d Bridge Por ts fo r the respec tive n e twork se gm ents. A ll oth er ports ar e bloc ked, which means that t hey ar e prev ented fr o m r eceiv ing o r fo rw ard in g tr affi c. STP Reco nfi gura ti on Once t[...]

  • Seite 41

    How STP Wor ks 41 Figure 8 Port costs in a ne t work ■ Bri dge A has the l owest Brid ge Ident ifier in the netwo rk, and has ther efor e been selec ted as th e Root Bridg e. ■ Becau se Brid ge A is the Ro ot Brid ge, it is also the Desig nated Brid ge for LAN seg ment 1. Port 1 on Brid ge A is ther efore sele cted as the Desi gnate d Bridge Po[...]

  • Seite 42

    42 C HAPTER 4: U SING R ESILIENCE F EATUR ES ■ the r o ut e through Brid ges C a nd B cost s 20 0 (C to B =1 00, B to A =1 00) ■ the rout e through Bridge s Y a nd B c ost s 300 ( Y to B=2 00, B to A =1 00). Port 2 on Brid ge C is th erefor e selec ted as th e Designated Bridg e Port fo r L AN S eg m e nt 3. S TP Co n f ig ura t io ns Figu r e [...]

  • Seite 43

    How STP Wor ks 43 Figure 9 STP configur ations[...]

  • Seite 44

    44 C HAPTER 4: U SING R ESILIENCE F EATUR ES Using STP on a Net work with Mu ltip le V LAN s The IEE E Std 8 02 .1D, 1998 Edit ion does not t ake into account V LANs when it c al culat es STP inform ation — the c alcula tions ar e only p erfor med on the basis of physical conne ctions. For thi s reason, some net work co nfigurat ions c an resul t[...]

  • Seite 45

    5 U SING THE S WITCH D ATA B AS E What is the Sw it ch Dat abase ? The Swit ch Database is used by th e Switch to determin e wher e a packe t shou ld be fo rwarded to, an d w hich por t shoul d tran smit the pac ket if it is to b e forwar ded. The da taba se co ntains a list of ent ries — each e n try cont ains three ite ms: ■ MAC (Ethe rn et) [...]

  • Seite 46

    46 C HAPTER 5: U SING THE S WITCH D ATAB ASE Swit ch Da tabase En tr y Sta te s Da ta b as es en tr i es c an ha ve th ree s ta t es : ■ Lear ned — The Swit c h has plac ed the ent ry into the Swit ch Databas e when a pac ket was r ec ei ved fr o m an ends tatio n. Note that: ■ Learne d entries are r emoved (ag ed out) fr om the Switc h Datab[...]

  • Seite 47

    6 U SING T RAF FIC M ANAGE MENT Using t he t raffic man a gement c apabi lities o f your S wi tch al lows your net work tr affic to b e controlle d and prio ritized t o ensu r e t hat high pr io ri ty da ta i s tr a ns m it ted w i th mi ni m u m d el a y . The Swit ch 3226 and Swit c h 3250 hav e two feat ur es that all o w you to manag e the traf[...]

  • Seite 48

    48 C HAPTER 6: U SING T RA F FI C M ANAGEMENT ■ Fin ancial ap plica tio ns — Use d b y Ac co unts de par tment s tha t ne ed i mmed i ate acc ess to l arge fi les and sp read sheets. ■ CAD/ CAM d e s ign appl icati ons — U se d by desi gn depa rtments that need prio rity c onnec tion s to se rver fa rms and ot her d evices for tran sferri n[...]

  • Seite 49

    Ho w Traf fi c Pr io r iti za ti on W ork s 49 The 80 2.1D s tan dard spec ifie s eig ht di stinct le vel s o f prior ity (0 t o 7 ), each of wh ich relates to a part icular type of traffic. The pri ority leve ls and th e ir t ra ffic ty pes a re s ho wn i n Fi gu re 11 in order of increas ing p rior ity . Y ou cann ot alter t he m appi ng of pri o[...]

  • Seite 50

    50 C HAPTER 6: U SING T RA F FI C M ANAGEMENT Figure 12 D SCP Se rvice Le vel Mapping Figu r e 1 2 illust rates how Diff Serv code poin t (DSCP) servic e levels ar e mapp ed t o the four traffic que ues. IP Port traf fic cla ssif i cat ion The Swit c h su pports class i ficati o n o f traf fic f ro m legac y device s by classi fying traffic using i[...]

  • Seite 51

    Tr af fi c Pr io ri ti za ti on an d yo u r Sw itc h 51 Figure 13 IP Port Mapping Figu r e 1 3 il lustra tes h ow IP port num ber s are ma pped to the four traffic queu es. T raf fic P ri oriti zation and y our S witch Y o ur Switch sor ts tra f f ic b ased on Class of Service . It do e s not m ark or re m ark a pac ket with a tag , but priorit ize[...]

  • Seite 52

    52 C HAPTER 6: U SING T RA F FI C M ANAGEMENT 802 .1D pa ck ets are c a te go ri ze d in to th e e ig ht t r affi c c l as se s d e fi ne d by I EEE 802.1D; th e hig her the cl ass the hi gher the pri o rit y giv en to the pac ket on trans missio n. See Figure 1 1 . DSCP packe ts are c atego rized in to the si x serv ice leve ls as shown i n Figu r[...]

  • Seite 53

    Li m iti ng th e R a te o f a Po rt 53 Co nfigur in g rate l imiti n g Rat e limitin g ca n be c onfi gured on y our Swi tch usin g t he Web interfac e or t he Com mand Lin e Inter face (CLI). Rat e limitin g ca n be ap plied in step s of 1 M b on 1 0/100 p or ts and i n step s of 8 M b on 1 0/1 00/1 000 port s. Fo r a d etailed descript ion of the[...]

  • Seite 54

    54 C HAPTER 6: U SING T RA F FI C M ANAGEMENT[...]

  • Seite 55

    7 S TA TU S M ONITORIN G AND S TA TIS TICS This ch apter cont ain s detai ls of the Rem ote M o nito ring ( RM O N ) feature that assi sts you with status m onit oring a nd stat istics. Fo r detai led de scri ptions of t he Web interfac e ope ra tions a nd the Comm a nd Li ne Int erface (CLI) c omm ands th at you r equ ire to man age the Swi tch pl[...]

  • Seite 56

    56 C HAPTER 7: S TATUS M ONI TOR I N G AND S TATISTICS Statistic s The St atist ics gr oup pr ovi des traf fic an d erro r stat isti cs showing p ackets, bytes, b roadca sts , mul ticast s and errors on a LAN segme nt o r VLA N. I nformatio n fr om the Stati stics gr o up i s used to de tect c hanges in traf fic and err or pat tern s i n crit ical [...]

  • Seite 57

    B enefits of R M ON 57 Bene fits of RMO N Using the RMON featur es of yo ur Switch has thre e main adva ntages: ■ It im proves you r efficie nc y Using R M ON allows you to r e m ain a t one wo rkstati on an d c ollect inform ation from wide ly disp ersed L AN segm e nts or VLANs. This means that the t ime t aken to r eac h a p r o blem s ite, se[...]

  • Seite 58

    58 C HAPTER 7: S TATUS M ONI TOR I N G AND S TATISTICS When usi ng the RM ON feat ures of the Switch , no te t he f ollow ing: ■ After the defa ult sessions are created, t hey hav e no special sta tus. Y ou can delet e or ch ange t hem a s r eq ui r e d . ■ The gr eater the number of RMON sessions, the grea ter t he b ur den on the manag em ent[...]

  • Seite 59

    8 S E TTI NG U P V IRTUAL LAN S Setti n g up Virtual L ANs (V L ANs) o n your Switch incr eases th e ef ficiency of y our ne t wor k by di vi ding the LAN in to l og ica l, ra th er tha n ph ysi cal , segm ents whi ch are eas ie r to manage. This c hapter explains mor e about th e concep t of VLANs an d exp lains h ow the y can be im plem e nted on[...]

  • Seite 60

    60 C HAPTER 8: S ETTING U P V IRTUAL LAN S Figure 14 A network setup showing thr ee VL ANs Benefit s of VLANs The main benef it of VLANs is that th ey pr o vid e a n e twork seg m ent ation sys tem that is far more fle x ible than any trad iti onal network. Us ing VLANs al so p ro vi des y ou w it h t hr ee ot he r be nef it s: ■ VLAN s eas e the[...]

  • Seite 61

    VLAN s and Your Swit ch 61 ■ VLANs help to c ontrol traf fic W ith tradi tio nal ne two rks, c on gestion can be cau sed by broadc as t tr affi c tha t i s d ire ct e d t o al l ne tw o rk d ev ic e s w h et he r th ey re qu ire i t or not. VLANs inc rease th e eff iciency of your netwo rk because each VLAN c an b e set up t o co nta in only thos[...]

  • Seite 62

    62 C HAPTER 8: S ETTING U P V IRTUAL LAN S Figu r e 1 5 sh ows a ho w a Lay er 3 switch can be used to route bet ween VLAN s o n the sw it ch an d ho w an a dd itional VLAN ca n be used to aggr egate two VLANs. Figure 15 T wo VL ANs co nnected to a core s witch us ing a thir d VLAN The Swi t ch can also b e used to ro ute t raff ic be tween VLANs o[...]

  • Seite 63

    VLAN s and Your Swit ch 63 Figure 16 T wo VLANs con nected via a l ayer 3 swit ch Cr eatin g N ew V LANs If yo u wa nt to m ove a port f rom t he De fau lt VLA N to a nothe r VL AN, yo u mu st first de fin e info rmati on about t he ne w V LA N on your Sw itch . VLA Ns: T agged and Unt agge d Mem bership Y o ur Switch sup por ts 802 .1Q VLAN taggi [...]

  • Seite 64

    64 C HAPTER 8: S ETTING U P V IRTUAL LAN S T o carry m ult iple VLANs acr oss a single physi cal (bac kbone) link, each pac ket must be t agged with a VLAN ident ifi er so that th e Switch es can ident ify whic h pack et s belong i n wh ich VLA Ns. T o com mu nicate be tw een VLANs a router m ust be use d. VLAN Con fi g uration E xamp les This sect[...]

  • Seite 65

    VLAN Confi gurati on Exam ples 65 T o s et up t he c o nf ig ura ti on s h own in F igure 17 : 1 Configu r e the VLAN s Define VL AN 2 on t he S wit ch. VLAN 1 is th e defaul t V LAN and a lread y exist s. 2 Add ports to the VL ANs Ad d po rt s 10 , 11 a n d 12 of t he Sw it ch a s un ta gg ed mem ber s t o VL AN 2. Y ou can u se the Sw itch Web In[...]

  • Seite 66

    66 C HAPTER 8: S ETTING U P V IRTUAL LAN S[...]

  • Seite 67

    9 U SING A UTO M AT IC IP C ONFIGURATIO N This c hapter ex p lain s mor e about I P addre sses and how the auto matic conf igurati o n opt ion works . It co vers the fo llowin g topi c s: ■ How Y our Switch Obtain s IP Informatio n ■ H ow Auto mati c IP Co nfig urati o n W or ks ■ I m portan t Con siderat ions Fo r detai led in form ation on [...]

  • Seite 68

    68 C HAPTER 9: U SING A UTOMA TIC IP C ONF IGU RATI ON How Aut oma ti c I P Con fi g uration Wor ks Wh e n you r Sw i t ch is p ow e re d u p fo r th e firs t t im e th e IP co n fi gu ra t io n setting is set to auto — th is is the d e fa ul t s e tti ng . If your Sw itch ha s be en po we r e d up b efore, w hichev er o f the t hree opti ons for[...]

  • Seite 69

    Imp ortant Consi derat ions 69 I f you want DHCP to be th e method fo r autom atic con figurat ion, make sur e that y our DHCP ser vers ar e op er ating normally befor e you power on yo ur Swit ch.[...]

  • Seite 70

    70 C HAPTER 9: U SING A UTOMA TIC IP C ONF IGU RATI ON[...]

  • Seite 71

    10 M AKI NG Y OUR N ETW O RK S ECU R E This c hapter o utlines the Port Secur ity and Swit ch Management Login featu res , ex plains the key benefi ts of usin g these featu res , and giv es examp les o f how an d w hy yo u w o uld use t hem in your net work. Fo r detai led de scri ptions of t he Web i nterfac e ope ration s a nd the Comm and L ine [...]

  • Seite 72

    72 C HAPTER 10: M AKING Y OUR N ETWORK S ECURE inter face of th e S witch using con sole port , even if yo u ha ve denie d al l acc ess t o the S witch u sing th e trust ed I P feat ure. Secu rin g A ccess to th e Web Int e rfac e The Switc h 3226 and Switch 3250 support HTTPS, allowing sec ur e acc ess to the Web in te r fa c e of th e Sw i t ch. [...]

  • Seite 73

    Securi ng Access to the Co m mand L ine Inter face 73 has not been c e rtifie d by a Certif icate Authori ty (CA) but securit y will no t be ot her wis e affect ed. If you c anno t g ene rate a n X.50 9 c ert ificate you rself, you ca n buy on e from one of the Cer tifying Aut ho rities or you r ISP . Each S witch requires its own X. 509 certi fica[...]

  • Seite 74

    74 C HAPTER 10: M AKING Y OUR N ETWORK S ECURE A m aximu m o f 32 a ccess lists can b e appli ed u nder the c ur r e n t oper ating system. A ccess list ru les can be a pplied and tr af fic is f orwarded at wire speed u sing l ayer 3 d estinat ion IP a ddresses and netw ork p orts . How Acc ess Contr ol L ist Rul es Wo rk When a packet is r eceived[...]

  • Seite 75

    What is Netw ork L ogin? 75 the po rt. The sour ce M AC addre s s in r eceived packets is used to de t erm in e t h is ; a l l tr a ffic from ot h er n etw o rk d e vi ce s i s f il t ered . What is Net w or k Login? Ne two rk Logi n con tr ols u ser a cce ss at the n etwo rk edg e by bl ocking or unb locking ac cess o n a p er -po rt basis. When a[...]

  • Seite 76

    76 C HAPTER 10: M AKING Y OUR N ETWORK S ECURE Swi tch, as shown in Figu re 1 9 . The Switch does not int erpr et or stor e t his in fo rm a ti on. Figure 19 Ne twork Login Operation When the clie n t devic e and RADIUS se rver have e xchanged auth enti catio n infor mation , the Switc h re ceives ei ther an au thentic ati on succ eeded or fail ed [...]

  • Seite 77

    Wh at is Swit ch Mana gement Logi n? 77 ■ The RA D IUS serve r in y our netw ork is oper ation al. ■ If the RA DIUS ser ver fails or is una vaila ble, cl ient devic es wil l be unab le to acc es s th e n etw o r k. ■ Netwo rk L ogin is not sup ported on p orts conf igured to opera te as members of a n aggr egated lin k. ■ Some cli ent devic[...]

  • Seite 78

    78 C HAPTER 10: M AKING Y OUR N ETWORK S ECURE manage able net work devi ce is a commonpl ace securi ty measu re. If th e l ocal Switch databas e is enab led, th e network ad m i nistra tor must hav e l ocal access t o each Switc h to secur ely chan ge user name an d pass wor d i nfor mat io n. T h is c an be t ime c ons um in g, te di ous an d o f[...]

  • Seite 79

    Wh at is Swit ch Mana gement Logi n? 79 Figure 20 RA DIU S A uthe nt ication O peration Impor tant Con sidera tio ns This sec t ion contain s some importan t co n si d erati o ns when using RADIUS aut hent ication of S witch M anage men t Logi n on the S wi tch 3 226 and Sw itch 32 50. ■ Be f ore yo u e na bl e RA D IU S au th en tic at i on you [...]

  • Seite 80

    80 C HAPTER 10: M AKING Y OUR N ETWORK S ECURE What is RA DIUS ? R emote Authent icatio n Dial-I n User Serv ice (RADIUS) is an i ndustr y stan dard protoc ol for carryi ng aut hentic ation , aut hori zatio n and conf igurati o n in formati o n b etween a netwo rk devi ce and a shar ed auth enti catio n serv er . T ransactio ns be tween eac h netwo[...]

  • Seite 81

    11 IP R OUTIN G Rou ting is a me thod for dist ributing traffic th r o ugh out a n IP ne two rk. It is used to joi n LANs at the ne twork lay er (Lay er 3) of t he Open System s Interconne ction (O SI) mode l. A r o uter p rovides b ot h fi ltering and brid ging funct ions across the ne twor k. This c hapter ex plain s ro uters, pr otocols, and how[...]

  • Seite 82

    82 C HAPTER 11: IP R OUTIN G W ha t is R out ing ? Rou ting di stribute s pac kets ov er pot ential ly dissimi lar n etwork s. A ro uter i s t he devic e that acc ompli shes thi s task. Y o ur Swi tch, as a L ayer 3 devi ce, can act as a r o ute r . Rout ers typi cally : ■ Connec t network s. ■ Connec t subnetwor ks (or c lient / se r ve r netw[...]

  • Seite 83

    What is IP Routi ng? 83 Wha t i s IP Rou ting? An IP ro uter , u nlike a bridg e, oper ates at th e network layer o f the OSI Ref er enc e M odel . The ne two rk la yer i s also re f erred to as Layer 3. An IP ro uter ro utes packet s by examining th e network lay er addr ess ( IP address). B ridg es use da ta link layer M AC addresse s (a t La yer[...]

  • Seite 84

    84 C HAPTER 11: IP R OUTIN G Benefits of IP Rou ti n g IP rout ing provi des t he follo win g feat ures and bene fits: ■ Econ om y — Be cau se yo u can co nnec t sev eral se gmen ts to t he sa me subn etwo rk wi th routi ng, you ca n increas e the level o f seg ment ation in yo ur ne tw ork w ithout c reating new subne two rks or assi gnin g ne[...]

  • Seite 85

    IP Ro ut ing Concept s 85 Figure 23 Rout i ng Interfaces Routi ng T able s W ith a routing t abl e, a rou ter or host de term ine s ho w to se nd a p ack et tow ar d its ulti mate destinat ion. T he r o ut ing t able contai ns an entry fo r ever y le arne d and loc ally define d netw ork. The size of the routing t able is dyna mic an d c an ho ld a[...]

  • Seite 86

    86 C HAPTER 11: IP R OUTIN G Ro ut in g ta bl e dat a is u pda t ed st ati cal l y or d yna mi c al ly : ■ Statical ly — Y ou man ually ent er st atic r outes in the r outin g table. Y o u c an def ine up to 10 ( maxim um) stat ic routes. S tatic rou tes are usef ul in e nvironme nts w here no routing p rotocol is u sed or whe re yo u want to o[...]

  • Seite 87

    Mu lti ple IP Inte rf ace s per VLA N 87 This m odel allo ws the Switc h to r oute th e pac ket fir st, and then if t he pack et ca nno t be rou ted, g ive the pac ket to Laye r 2 to be bridg e d by the VLAN . Th is sche me give s you the f lexi bility t o d efine rou ter interfac e s on top of sev eral br idge po rts. The “rou ting over br idgin[...]

  • Seite 88

    88 C HAPTER 11: IP R OUTIN G Im ple me nt ing IP Rou ti n g T o r oute ne twork tr af fic us ing IP , yo u mu st perform these task s i n the followi ng order : 1 Conf ig ur e V L ANs . 2 Establi sh IP nterf aces o n t hose VL ANS . Co nfigur ing I P V LANs If you want to use IP routing, yo u must first c onfigure th e VLAN t o u se IP . Y o u c an[...]

  • Seite 89

    Implement ing IP Routi ng 89 De fining a n IP In terf ace After y ou decide t he VLAN index, I P addre ss, and su bnet mask fo r each IP i nterface y ou want to cr eate, you can def ine each in terfac e using t he Command Lin e Interfac e or the Web inter face. Bef ore you assign I P addr esse s, map out t he ent ire n etwork and subn etwo rk IP ad[...]

  • Seite 90

    90 C HAPTER 11: IP R OUTIN G ■ Stati c routes take pr ecedence over d ynamic ally learned r outes t o the same d estinatio n. ■ Stat ic routes are incl uded in per iodi c R IP upda tes se nt by yo ur Laye r 3 Swit ch . IP R outing Protocol s IP protoco ls are a set of uniq ue ly def ined i nteract ions that a llow dat a co mmuni catio ns to occ[...]

  • Seite 91

    IP Ro ut ing Proto cols 91 Ro uter Mode The av ailabl e setti n gs fo r r o uter mode are as foll ows: ■ Di sabled — The Swit ch ignor es all inc oming RIP packets and does not gener ate any RIP pac kets of i ts ow n. ■ Enab led — The Swit ch b roadcasts RIP u pdat es and p r o cesses inco ming RIP pack et s. Upda te Ti me This S witch send[...]

  • Seite 92

    92 C HAPTER 11: IP R OUTIN G ■ RIPv1 – Rout e info rmati on is broad cast p eriod ically to o ther routers o n the ne two rk usin g the a dve rtiseme nt list fo r RIP-1 u pda tes. ■ RIPv2 – Rou te inf orma tio n is mu lticast perio dical ly to ot her r out ers o n the netwo rk u sing t he m ulticast address o f 2 24.0.0.9 . T his m etho d r[...]

  • Seite 93

    IP Ro ut ing Proto cols 93 Adv erti s ement A ddr ess The Swit ch uses the adver tisement ad dr ess to advertise r outes t o other st ations on the same network. Eac h inte rfa ce that you def ine uses a dir e cted br o adc ast a ddres s as the adver tisement a d dr ess. The Switch u ses this address f or sendi ng update s. RIP- 1 V ers us R IP-2 L[...]

  • Seite 94

    94 C HAPTER 11: IP R OUTIN G networ k. UDP packe ts that r ely on the BOOTP r elay a gent ar e mo dified and th en f orwarded throug h the router . ■ Dy na m ic H o st C o nfi gur ati on P rot oc ol (D HC P ) A ho st ca n retrie ve its own c onfi guration i nform ation incl ud ing IP addr ess, fr om a DHCP ser ver thr o ugh the I P n etwork. DH C[...]

  • Seite 95

    IP Ro ut ing Proto cols 95 Figure 25 Example of an ARP C ache If the IP a ddress doe s n ot ha ve a cor respon ding MA C add r ess, the ho st or ro uter br oadcasts an A RP reques t packet t o all th e devi ces on the networ k. The ARP r equest contain s info rmatio n about th e target and sou rce add ress es for th e prot ocol (I P addre sses). Se[...]

  • Seite 96

    96 C HAPTER 11: IP R OUTIN G Figure 27 Example of ARP Ca c he Updated wi th ARP Reply After t h e MAC addr ess is known, th e host or ro uter can send the pac ket directly to th e ne xt ho p. AR P P r ox y ARP proxy a llow s a host tha t has no routi ng abil ity to det ermin e the M AC address of a h ost on an oth er ne twork or su bnet. When ARP p[...]

  • Seite 97

    Ad vanced IP Routi ng Opt i o ns 97 Figure 28 ARP P r ox y Int ernet Contr ol M ess age P rotoc ol (ICM P) Becau se a router kno w s o nly about the next n etwo rk hop , it is n ot awa r e of prob lems that m ay be closer to th e destina tion. D e stinat ions m ay be unreach able if: ■ Ha rdw a re is te mp o r ar ily o u t o f s erv ic e. ■ Y o[...]

  • Seite 98

    98 C HAPTER 11: IP R OUTIN G[...]

  • Seite 99

    A C ONFIGURATIO N R ULES Con fi g uration Rules fo r Gi g ab it Eth e rn et Gigab it Eth er net i s desi gned to ru n ove r seve ral med ia: ■ Singl e-m ode f iber o ptic ca b le, w ith conn e ctions up to 5 km (3.1 miles). S up port for d istances o ver 5 km is supp or ted de pendin g on t he module spec ificat ion. ■ Mul timo de fib er o ptic[...]

  • Seite 100

    10 0 A PPENDIX A: C O N FI GUR A TI ON R ULES Con fi g uration Rules fo r F ast Et her ne t The t opo logy rul es f or 100 Mbps Fa st Ether net are slight ly different t o those for 10 M b ps Et herne t. Fi gur e 29 i ll ustrate s the k ey topolo gy r ules and pr ov ides exampl es of how they allow for l arge-scale F ast Ethernet net works. Figure [...]

  • Seite 101

    Confi gur ation Rules for Fast Ethe rnet 101 ■ A tot al ne twork span of 325 m ( 106 6 ft) is allow ed in singl e-repeater topol ogies ( one h ub st ack p er wi ring cl os et with a f iber li nk to the co llapsed back bo ne). F or exa mp le, a 225 m (738 ft) f ibe r link f r o m a re p eater to a router o r swit ch, pl us a 1 00 m (3 28 ft) UTP l[...]

  • Seite 102

    10 2 A PPENDIX A: C O N FI GUR A TI ON R ULES[...]

  • Seite 103

    B N ET WOR K C ONFIGURATI ON E XAMPLES T hi s c h ap te r co n t ai n s th e fol lo w in g s e ct io n s: ■ Si m ple Net w or k Configurat ion Exampl e ■ Deskt op Switch Example ■ A dva nced Ne two rk Co nfig uration Ex ample ■ Edge Switc h Example[...]

  • Seite 104

    10 4 A PPENDIX B: N ETWORK C O N FI GUR A TI ON E XAM PLE S S imple Netwo rk Con fi g uration E xamp le The f ollo wing i llustr ation show s h ow t he Sw it ch 3 226 a nd Switch 325 0 can be used in your ne two rk. D esk top S wit ch Exa mple The ex am ple i n Figu r e 3 0 sh ows ho w a Switc h 32 26 can b e used for a group o f use rs t hat requi[...]

  • Seite 105

    Advan ced Net work Confi gurat ion E xample 105 Ad va nced Ne twor k Con fi g uration E xamp le The followi ng illust ratio n sho ws a n etwork examp le th at illu strates how yo u can set u p your net work for o ptim um pe rforma nce using som e of the features suppor ted by y our Sw itch. Edg e Switc h Exam ple The example i n Figu re 31 sh ows h[...]

  • Seite 106

    10 6 A PPENDIX B: N ETWORK C O N FI GUR A TI ON E XAM PLE S[...]

  • Seite 107

    C IP A DD R ESSING This ch apter prov ide s som e backg r ound de tail on th e IP inf or mat ion tha t needs to be assi g ned to your Swit ch to ena ble you to man age it ac ro ss a net work. The to pics c ov er ed are: ■ IP Addresses ■ Subn ets and S ubn et Ma sk s ■ D efaul t Gateway s IP ad dress ing i s a va st t opic an d t here are w hi[...]

  • Seite 108

    10 8 A PPENDIX C: I P A DDR ESSI NG 192 .168.10 0. X (w here X is a nu mber be tw een 1 an d 254) w ith a su bnet mask 25 5.2 55.2 55. 0. These s uggest ed IP addre sses are part of a group of I P address es that have b e en set asid e speci ally fo r us e “in h ouse” only . CA UTI ON: If your network h as a connecti o n to the exter n al I P n[...]

  • Seite 109

    IP Ad dre sses 109 ref erre d to as a fie ld or an octe t . D ecima l no tat ion co nv ert s th e val ue of each field i nto a deci mal number , and the fi elds ar e separat ed by dots. Figure 33 D otte d Dec imal No tati on for I P Add resse s The deci m al valu e of an octe t wh ose b its are all 1s is 2 55. Netw ork Portio n The l ocat ion o f t[...]

  • Seite 110

    11 0 A PPENDIX C: I P A DDR ESSI NG Subne ts and Subnet Masks Y o u can di vide yo ur IP n etwor k into sub -netw ork s also known as subn ets. Supp ort for sub nets is imp or tant bec ause the nu mber of bi ts a ssigned t o the dev ice p art of an IP addr ess limit s the num ber of devi c es t hat may be addr essed on any given net work. For ex am[...]

  • Seite 111

    Sub nets and Subn et Masks 111 As sho wn i n this e xam ple, t he 32 bits of a n IP addr ess a nd subnet m ask are u sually written using a n i nteger sh ortha nd. T his n otation t ran slates f ou r c on se c ut iv e 8- bit gr o ups (oc te t s) i nt o f ou r i nt ege rs t ha t r ang e f r om 0 thro ugh 255 . T he su bnet mask in t he e xam ple is [...]

  • Seite 112

    11 2 A PPENDIX C: I P A DDR ESSI NG The su bnet mask 255.2 55.255. 255 identifi es a specific host. Th e IP addr ess 25 5.255.25 5.2 55 is r ese rved as th e de fault br oad cast addre ss. D e f aul t G a te w ay s A gate wa y is a de vic e on you r ne two rk wh ich is used to fo rward IP pac kets t o a remote d esti nation. An a lternati ve name f[...]

  • Seite 113

    D A DV AN CE D IP R OUT IN G C ONCEPTS This ch apter provi des som e addi tiona l backgrou nd detail on the IP inform ation th at ca n be assi gne d to y our S witc h to en ab le you to ma n age i t acr oss a network. The se ar e a dvanced feat ur es and are not re quire d for oper ating yo ur sw itch in yo ur ne tw ork. The to pics c ov er ed are:[...]

  • Seite 114

    11 4 A PPENDIX D: A DVANCED IP R OUTI NG C O NCEPTS maint enance an d the risk of crea ting err oneo us add resses un l ess y ou plan t he a d dr es si ng sch eme pr op er ly . Guideli nes for U sing VL SM s Consi der the fo llowing guideli nes when you implem ent VLSMs: ■ Wh en y ou d esi g n t he su bne tw or k s c hem e f or y our n et wor k, [...]

  • Seite 115

    Su pernet ting 115 ro uti n g table en tr y . (See R FC 1519 for d etai led info rmati o n about Super netti ng.) T o d o thi s, supe rnet addressing doe s some thing v ery different from t ra di t iona l TCP /I P r out in g ( wh ic h all ows on ly o ne net ma sk per net wor k) . In sup er net rout ing, ea ch sup er net can be a ssigned its own ne [...]

  • Seite 116

    11 6 A PPENDIX D: A DVANCED IP R OUTI NG C O NCEPTS sup er net twic e as large. So, a supernet compo sed of 8 Class C networks would a ctua lly have 3 zeroes (8 = 2 3 ). This w ould seem v ery limited si nce it restricts you to usi ng grou ps tha t nicel y fi t into a pow er of 2 (1 , 2, 4, 8 , 16 ...). Howe ver , i nconvenien tly-si z ed supern et[...]

  • Seite 117

    Su pernet ting 117 Figure 37 Selecting a Range of A ddr esses Sup er net Exam ple The f our ne tw orks in Figu re 38 are all c onnec ted to th e same In ternet ser vice pr ovi der (ISP) . The I SP has decid ed to use supernett ing to re duce the size of the rout ing ta bles a nd improve through put. Figure 38 Supernet example ■ Super nets 1 a nd [...]

  • Seite 118

    11 8 A PPENDIX D: A DVANCED IP R OUTI NG C O NCEPTS ■ Super net 3 requires 7 Class C address spac es. Since 7 isn't a powe r of 2, we h a ve t o round i t up to e ight. This gives i t a netma sk of 255 .255.24 8.0. ■ Supernet 4 is a sin gle Class C netwo rk, making it ’ s netmask 255 .255.25 5.0 Now , assign rang es of addresses. As sume[...]

  • Seite 119

    G LOSSARY 3Com N etwo rk Supe rv isor The 3C om ne twork m a nageme nt ap plica tion use d to mana ge 3Com ’ s net working solut ions. 10 BA SE - T The IEE E speci ficati on for 10 M bp s Eth er net over Ca te gory 3, 4 or 5 twist ed pa ir cable . 1 00BA SE-F X The I EEE specific ation f or 100 Mbps Fast Ethernet over fibe r -opt ic cable. 100 BA[...]

  • Seite 120

    120 G LOSSARY b andwi dth The in format ion ca pacity , measur ed i n bits per sec ond, th at a channel can tra nsmit. Th e bandw idth o f E the r net is 10 Mbps, the bandw idth of Fast Ether ne t is 100 M bps, and the b andwi dth o f Gigabi t Eth er net is 1 000 M bps . baud Th e sign alli ng rate of a l ine, th at is, th e number o f transi tions[...]

  • Seite 121

    12 1 device s tran smit simultaneou sly , a collisio n occurs and the coll id ing devic es de lay the ir retransm issions f or a random len gth of time . DH CP Dyna mic H ost Control P rotoco l. A pro tocol t hat lets yo u c entra lly manag e a nd au toma te the a ssign ment of Int er net P rotocol ( IP) addresses i n an orga nizat ion's n etw[...]

  • Seite 122

    122 G LOSSARY FT P File T ransfer Protocol . A protoco l based on TCP/IP for r el iable file tran sfer . fu ll du plex A s y ste m th at a l l ow s p ac ket s t o b e tr a ns mi t ted an d re c ei v ed a t the same t ime a nd, in effect, doub les the pot ential t hroughpu t o f a link . gat ewa y See rou te r . Gi gabi t Ethe rnet IEEE stan dar d 8[...]

  • Seite 123

    12 3 IEE E St d 802.1w -2001 A stan dar d that d efi nes Rapid Spann ing T r ee Proto col (RSTP) behavio r . IEE E Std 8 02.1 X-2001 A sta ndard that def ines por t-based net work access c ontrol be hav ior . IE TF Inter ne t Engi neering T a sk Fo r c e. An orga nizat ion respo nsibl e for providin g eng inee ring sol utions f or T CP/IP netwo rks[...]

  • Seite 124

    124 G LOSSARY LAN Local Area Ne two rk. A net work of en dstation s (suc h as P Cs, prin ters, ser vers) and network d evic es (hubs an d switches) that cove r a rel ativel y small geog raph ic area ( usually n ot larger than a flo or or buildi ng) . LAN s ar e charac te rized by high tr ansmission speeds over short distances ( up to 10 00 m ). LLC[...]

  • Seite 125

    12 5 mu lt ica st A pa cke t sent t o a sp ecific group of e nd stations on a ne twor k. mu ltic ast fi lterin g A sy st em that allows a network devi c e to on ly forwar d mult icast tr affi c to an en dstation if it has r egister ed that i t would li ke to r eceiv e th at tr affi c. NIC Net wo rk In terfac e C a rd. A ci rcuit b oar d ins talled [...]

  • Seite 126

    126 G LOSSARY RIP Rou ting Info rma tion P r o tocol. A n I nte rior G atew ay Prot ocol for TCP /IP networ ks. RIP uses di stanc e-vector algorit hms (DV A) to calc ulate least-h ops r out es to a de stinati on. RMON IETF Re mo te Mo nito ring MIB. A MI B that al lows yo u t o remo tely mo nitor L ANs b y add r e ssing up to nine d if ferent g r o[...]

  • Seite 127

    12 7 SS L Se cure Soc kets L ayer . A pro tocol use d fo r en crypt ing netwo rk t raffic. I t i s co mmonly used to en crypt HTTP t raff ic bet ween and br owser and a We b s e rv er . st andby port The port in a resi lient lin k that t akes over data tr ansmissi on if the mai n po rt i n the li nk fails . STP See Spanni ng T ree P rot ocol (STP) [...]

  • Seite 128

    128 G LOSSARY uni cas t A pac ke t sent t o a sing le en dstation on a ne twork. V ari able Le ngth Subne t Mas k (VLSM ) A suf f ix to an IP addr ess t hat indi cates th e size of t he subnet th at cont ains it. T aking th e address 192.1 68.1.1/2 4 as an example, the VLS M i s /24 an d in dic ates t hat th e firs t 24 bits o f the add r ess for m[...]

  • Seite 129

    I NDEX 129 I NDEX Numbers 802 .1D pr io rity level s 48 tr af fic clas sifi ca tion 48 A Acc ess Contr ol List s 73 add res ses clas ses 109 IP 88, 107 adver t ise RI P mo de 91 a dve rt is em en t ad d re ss 9 3 agg rega t ed links 14, 23 aging t ime , defini tion 46 alar m events 5 8 Alarms (RMON gr oup) 56, 5 7 ARP (Addr ess Resolu tion Pr otoco[...]

  • Seite 130

    13 0 I NDEX I ICM P (Int ernet Cont rol Mess age P rot ocol) de scri ption 97 loca tion in OSI Refer ence Mod el 83 IEEE St d 802.1Q-1 998 61 IEEE St d 802.3-2 002 f low cont rol 15, 2 2 IGM P mu l tic ast fi lter in g 3 1 in dex , VL AN i nte rf ace 88 in terf aces IP 89 In tern et ad dres ses 107 In te rNI C 108 IP ( Interne t Pr ot ocol ) ad dre[...]

  • Seite 131

    I NDEX 131 R RADIUS 77, 80 authen ticat ion 77 Rap id Spann ing T re e Pr otocol (RSTP) 16, 3 6 reg ister ed IP addr ess, obt aining 108 Remot e Monito ring. See RMON Resto re 15 RIP ( Routin g I n formati on Prot ocol) a dve rt is em en t ad d re ss 9 3 defi ned 90 locat ion in OSI Refer e nce Mode l 83 poiso n rev erse 92 ro ut e con fi gur a ti [...]

  • Seite 132

    13 2 I NDEX[...]