RuggedCom RS8000 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung RuggedCom RS8000 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von RuggedCom RS8000, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung RuggedCom RS8000 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung RuggedCom RS8000. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung RuggedCom RS8000 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts RuggedCom RS8000
- Den Namen des Produzenten und das Produktionsjahr des Geräts RuggedCom RS8000
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts RuggedCom RS8000
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von RuggedCom RS8000 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von RuggedCom RS8000 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service RuggedCom finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von RuggedCom RS8000 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts RuggedCom RS8000, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von RuggedCom RS8000 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    RuggedSwitch ™ RS8000 / RS1600 / RS900 Product Family User Guide RS160 0T RS160 0T RS160 0 RS160 0 RS800 0 RS8000 RS800 0T RS8000T Ru gg edCom Inc. 64 Jardin Dr. (Unit 3G) Concord, Ontario Canada L4K 3P3 Web: www.ruggedcom.com Tel: (905) 760-7799 Fax: (905) 760-9909 Toll Free: (888) 264 – 0006[...]

  • Seite 2

    RuggedSwitch ™ User Guide R UGGED S WITCH ™ U SER G UIDE FOR USE WI TH RS8000, RS1600, AND RS900 P RODUCTS R UGGED S WITCH ™ O PERATING S YSTEM V 1.5 Version 1.5.1 – Aug. 3, 2004 RuggedCom 64 Jardin Drive, Unit 3G Concord, Ontario Canada L 4K 3P3 Voice: (905) 760-7799 1-(888) 264-0006 Fax: (905) 760-99 09 Support@Rugged Com.com http://www.R[...]

  • Seite 3

    About this User Guide A BOUT THIS U SER G UIDE This guide is concerned with aiding the user in the conf iguration and operation of the RuggedSwitch ™ using the RuggedCom User Interface. Specifically, th is guide details aspects of: • Accessing the User Interface • Security (passwords) • Configuring the switch • Status determination • Pe[...]

  • Seite 4

    RuggedSwitch ™ User Guide Rugged MediaConverter ™ Installation Guide RuggedCom Fiber Guide White paper: Rapid Spanning Tree in Industrial Networks Document Conventions This publication uses th e following conventions: Note: Means reader take note . Notes contain helpful suggestions or references to materials not contained in this guide. Quick S[...]

  • Seite 5

    About this User Guide 7. At this point the switch will ra ise links , learn addresses and fo rward traffic. By default link alarms and SNMP linkUp/linkD own traps (See Chap ter 1) are raised for all ports. The Port Configuration and Status, View Port Status co mmand will indicate the current state of the ports in real time. The Ethernet Statistics,[...]

  • Seite 6

    RuggedSwitch ™ User Guide Table Of Contents About this User Guide.......................................................................................................... .................. i Applicable Firmware Revision ................................................................................................... ........... i Who Should U[...]

  • Seite 7

    Table Of Contents MAC Address Management Parameter Ranges & Default Settings....................................................13 MAC Address Tables Management Menu...........................................................................................13 Viewing MAC Addresses .................................................................[...]

  • Seite 8

    RuggedSwitch ™ User Guide Chapter 5 – Configuring Class of Service ....................................................................................... ....44 Introduction to CoS ..............................................................................................................................44 CoS Features ......................[...]

  • Seite 9

    Table Of Contents Clearing Alarms ...................................................................................................................................92 Viewing CPU Diagnostics ...................................................................................................................93 Viewing and Clearing the System Log ....[...]

  • Seite 10

    RuggedSwitch ™ User Guide Finding The Correct Table .................................................................................................................128 Retrieving Information .......................................................................................................................128 Changing Values In A Table ......[...]

  • Seite 11

    Table Of Figures T ABLE O F F IGURES Figure 1: Main Menu With Screen Elements Identified ........................................................................3 Figure 2: Administration Menu .................................................................................................. ........... 5 Figure 3: IP Services Configuration Menu ...[...]

  • Seite 12

    RuggedSwitch ™ User Guide Figure 27: Global CoS Parameters Menu .......................................................................................... ..47 Figure 28: Port CoS Parameters Menu ............................................................................................ ....47 Figure 29: Priority to CoS Mapping Menu ............[...]

  • Seite 13

    Table Of Figures Figure 54: The History Process................................................................................................. ......... 101 Figure 55: History Control Table ............................................................................................... ........ 102 Figure 56: RMON History Samples Table ...........[...]

  • Seite 14

    [...]

  • Seite 15

    Chapter 1– Setting Up And Administering The Switch Chapter 1– Setting Up And Administering The Switch Introduction This chapter familiarize s the user with the RuggedCom user interface as well as describes the following procedures: • Configuring the IP Addr ess and Subnet Mask • Configuring the Gateway Address • Configuring for DHCP Opera[...]

  • Seite 16

    RuggedSwitch ™ User Guide The Structure of the Us er Interface The user interface is organized as a series of menus with an escape to a command line interface (CLI) shell. Each menu scr een presents the switch name (as proved by the System Identification parameter), Menu Title, Access Level, Alarms indicator, Sub-Menus and Command Bar. Sub-menus [...]

  • Seite 17

    Table Of Contents Making Configuration Changes When changing a data item the user selects the data item by the cursor keys and then pressing the enter key. The cursor will change position to allow e diting of the data item. Typing a new value after pres sing enter always erases th e old parameter value. The left and right cursor keys may be used to[...]

  • Seite 18

    RuggedSwitch ™ User Guide Administration Menu The Administration command provides the menu shown in the following Figure. Figure 2: Administration Menu Configure IP Services The Configure IP Services command provides the ability to change the IP Address/mask, Gateway address, Inacti vity Timeout, Telnet Sessions Allowed, TFTP Server and SNMP G et[...]

  • Seite 19

    Table Of Contents Note: Changes to the IP Address take effect immedi ately upon being saved. Telnet connections in place at the time of an address change will be lost. Subnet This parameter specifies the subnet mask of the switch. Gateway This parameter specifies the gateway IP address. This is the address to use when forwarding packets to a networ[...]

  • Seite 20

    RuggedSwitch ™ User Guide Configuring System Identification The system identification is displayed in the sign-on screen an d in the upper left hand corner of all RuggedSwitch ™ menu screens. Setting the system identification can make it easier to identify the switches within your network. Setting the location and contact fields can provide inf[...]

  • Seite 21

    Table Of Contents Time Zone The time zone setting allows for the c onversion of UTC (Uni versal Coordinated Time) to local time. NTP Server Address This parameter specifies the IP addre ss of the NTP (Network Time Protocol) server used to set the on-board real time clock. Programming an address of “0.0.0.0” disables the use of NTP. The current [...]

  • Seite 22

    RuggedSwitch ™ User Guide Configure SNMP Management Stations This command identifies management st ations that may c onfigure the switch through SNMP and receive Traps from the switch. At shipping time and after factory reload s the switch is conf igured not to allow remote management or raise Traps. Identi fy a management station to the switch b[...]

  • Seite 23

    Table Of Contents Troubleshooting Problem One • I have configured the IP address a nd a gateway. I am pinging the switch but it is not responding. I am sure the switch is receiving the ping because it’s port LEDs are flashing and the statistics menu shows the pings. What is going on? Is the switch being pinged through a router? If so, the switc[...]

  • Seite 24

    RuggedSwitch ™ User Guide Chapter 2 - Configuring MAC Address Man agement Introduction This chapter familiarize s the user with: • Viewing learned MAC addresses • Purging MAC Address Entries • Configuring the switch MA C Address Aging time • Configuring static MAC addresses MAC Address Manage ment Feat ures MAC Address management provides[...]

  • Seite 25

    Chapter 2 - Configuring MAC Management Viewing MAC Addresses The View MAC Addresses command presents a real time display of learned and static MAC addresses. Figure 8: MAC Addresses Menu The display will change as MAC addresses are learned and a ged out. My Switch MAC Ad dresses Admin Access MAC Address VID Port Type CoS 00-00-85-05-9A-C4 1 6 Dynam[...]

  • Seite 26

    RuggedSwitch ™ User Guide Purge MAC Address Table This command removes all dynamic entrie s from the MAC address table. The only negative impact of this operation is th at it causes flooding while addresses are relearned. Configure MAC Address Learning Opt ions This menu allows you to configure MAC management related parameters. Figure 9: MAC Add[...]

  • Seite 27

    Chapter 2 - Configuring MAC Management that LAN segment. Prioritized addre sses function much as regular dynamic addresses, appearing in the MAC Addresse s display only while they are learned. MAC Address This parameter specifies the unicast address that is to be statically configured or prioritized. VID This parameter configures the VLAN upon whic[...]

  • Seite 28

    RuggedSwitch ™ User Guide Chapter 3 – Configuring the Ports Introduction This chapter familiarize s the user with: • Configuring port physical parameters • Configuring link alarms /traps for the port • Configuring rate limiting • Configuring port security • Using Port Mirroring • Viewing the status of ports • Resetting all or one [...]

  • Seite 29

    Chapter 3 – Configuring the Ports • Port Latency: 10 Mbps - 16 µ s + frame time, 100 Mbps - 5 µ s + frame time Port Applications Port Security Port Security provides the ability to fi lter or accept traffic from specific MAC addresses. Port Security works by inspecting the source MAC addresses of received frames and validating them against th[...]

  • Seite 30

    RuggedSwitch ™ User Guide Controller Protecti on Through Loss-of-Link Management Modern industrial controllers often feat ure backup Ethernet ports used in the event of a link failure. When these interfaces are supported by media (such as fiber) that employ separate transmit and receive paths, the interface can be vulnerable to failures that occu[...]

  • Seite 31

    Chapter 3 – Configuring the Ports Using Port Mirroring Introdu ction Port mirroring is a management tool in which all traffic on a designated port is copied (or mirrored) to a target port. If a protocol analyzer is attached to the target port, the traffic stream of valid frames on any so urce port is made available for analysis. Note: Invalid fra[...]

  • Seite 32

    RuggedSwitch ™ User Guide The main menu Port Configuration and Status command presents this menu. Commands are provided to reset, conf igure and obtain the status of ports. Figure 12: Port Configuration And Status Menu My Switch Port Co nfiguration and Status Admin Access Configu re Port Parameters Configu re Port Rate Limiting Configu re Port Se[...]

  • Seite 33

    Chapter 3 – Configuring the Ports Port Configuration Me nu The Configure Port Parameters Command will provide a summary of the settings of all ports. Selecti ng a particular port and pres sing enter will allow you to configure that port. Figure 13: Port Parameters Menu Name A mnemonic name used to identify the device connected on the port. Status[...]

  • Seite 34

    RuggedSwitch ™ User Guide Flow Control Flow Control is useful for preventing fr ame loss during times of severe network traffic. Examples of this include multiple source ports concentrating to a single destination port or a higher speed por t bursting to a lower speed port. When the port is half-duplex it is a ccomplished using “backpressure”[...]

  • Seite 35

    Chapter 3 – Configuring the Ports The Configure Port Security Command configures the ab ility to filter or accept traffic from specifi c MAC addresses. Figure 15: Port Security Menu My Switch Po rt Security Admin Access Port Security Autolearn Sh utdown Time Status 1 On 2 Un til reset Autolearnin g over, 2 addresses 2 On 1 Do n't shutdown Au[...]

  • Seite 36

    RuggedSwitch ™ User Guide Shutdown Time This is the length of time to shut the port down when an unauthorized frame is received in port security mode. If this option is set to “D on’t Shutdown”, the frame wi ll simply be filt ered. If this option is set to “Until Reset”, th e port will be shut down until a port reset command is issued o[...]

  • Seite 37

    Chapter 3 – Configuring the Ports Viewing Port Status The View Port Status command sh ows the port status. Figure 17: Port Status Menu My Switch Port S tatus Admin Access Port Name Link Speed Du plex 1 Maint . RTU Up 10 Ha lf 2 IED B ay 6 Up 100 Fu ll 3 IED B ay 8 Up 100 Fu ll 4 IED B ay 9 Up 100 Fu ll 5 IED B ay 12 Up 100 Fu ll 6 Local Access Do[...]

  • Seite 38

    RuggedSwitch ™ User Guide Troubleshooting Problem One • One of my links seems to be fine at low traffic levels, b ut starts to fail as traffic rates increase. • One of my links pings OK but has problems with FTP/SQL/HTTP/… A possible cause of intermittent operation is that of an autonegotiation mismatch. If one end of the link is fixed to f[...]

  • Seite 39

    Chapter 4 – Configuring VLANs Chapter 4 – Configuring VLANs Introduction This chapter familiarize s the user with: • VLAN Terminology and Issues • VLANs and their relationship to p rotocols such as IGMP • Planning VLAN networks • Configuring VLANs • Viewing VLAN status and statistics • Troubleshooting VLANs VLAN Features RuggedCom V[...]

  • Seite 40

    RuggedSwitch ™ User Guide VLAN Concepts And Issues VLANs and Tags A virtual LAN or VLAN is a group of devi ces on one or more LAN segments that communicate as if they were attached to the same physical LAN segment. VLANs are extremely flexible because they ar e based on logical instead of physic al connections. When VLANs are introduced, all traf[...]

  • Seite 41

    Chapter 4 – Configuring VLANs Edge And Trunk Port Ty pes Each port can be configured to take on a type of Edge or Trunk. An Edge port attaches to a single end device (such as a PC or IED) an d carries traffic on a single pr e-configured VLAN. Trunk ports are part of the network and carry traffic for all VLANs between switches. Trunk ports must be[...]

  • Seite 42

    RuggedSwitch ™ User Guide Sw i t ch 2 Sw itch 3 VLAN 3 VLAN 4 VLAN 5 VLAN 2 Sw i tch 1 Figure 18: Multiple and Overlapping VLANs Administrative Convenie nce VLANs enable equipment moves to be handled by software reconfiguration instead the alternative, cable management . When a host’s physical location is changed, its connection point is often [...]

  • Seite 43

    Chapter 4 – Configuring VLANs VLAN 3 VLAN 4 VLAN 2 199.85.245.1/ 25 199.85.245.128/ 26 199.85.245.192/ 26 IP A ddr esses : VL A N 2 – 199.85.245.0 - 199.85.245.127 VL A N 3 – 199.85.245.128 - 199.85 .245.191 VL A N 4 – 199.85.245.192 - 199.85 .245.255 Server, R outer or Layer 3 Switch Sw i tc h Figure 19: Inter-VLAN Commun ications Service [...]

  • Seite 44

    RuggedSwitch ™ User Guide Virtual LANs Menu The Virtual LANs menu is a ccessible from the main menu Virtual LANs command. The VLAN menu will lead you to all the other available menus fo r configuring and obtaining the status of VLANs. Figure 20: Virtual LANs Menu Static VLANs Menu The Static VLANs menu is accessi ble from the Virtual LANs menu Co[...]

  • Seite 45

    Chapter 4 – Configuring VLANs IGMP This parameter enables or disables IGMP Snooping on the VL AN in question. Note: If IGMP Snooping is not enabled for the VLAN, both IGMP messages and multicast streams from routers will be forwarded directly to all members of the VLAN. If any one member of the VLAN joins a multicast group then all members of the[...]

  • Seite 46

    RuggedSwitch ™ User Guide Edge Type An edge port is always a member of only one VLAN, the native VLAN (often called the port VLAN or PVID). Use an edge port with PVID Format set to “tagged” when you need to service VLAN aware equipments and with PVID Format set to “untagged” when you need to service non-VLAN aware equipments. Untagged fra[...]

  • Seite 47

    Chapter 4 – Configuring VLANs PVID (Native VLAN) The Port VLAN Identifier (PVID) or native VLAN specifies the VLAN id associated with untagged (and 802.1p prio rity tagged) frames r eceived on this port. Note: If the VLAN configured as the PVID does not exist in the “Configure VLANs” menu, the switch will automatically create and u se it. IGM[...]

  • Seite 48

    RuggedSwitch ™ User Guide Troubleshooting Problem One • I don’t need VLANs at all. How do I turn them off? Simply leave all ports set to type “Edge” an d leave the native VLAN set to 1. This is the default configur ation for the switch. Problem Two • I have added two VLAN s 2 and 3. I made a number of ports members of these VLANS. Now I[...]

  • Seite 49

    Chapter 5 – Configuring Class of Service Chapter 5 – Configuring Class of Service Introduction to CoS This chapter familiarize s the user with using the Class of Service feature. CoS Features RuggedSwitch ™ CoS provide you with the following features: • Ability to prioritize traffic statically by port. • Ability to prioritize traffic by t[...]

  • Seite 50

    RuggedSwitch ™ User Guide Note that a frame’s CoS will be high if any of the above f actors set it high . The frame’s CoS will be low only if all of the above factors set it low. Received frames are first examined to d etermine if they are IP frames. If the frame is IP and the TOS DS CP to CoS feature is sel ected, the CoS is determined from [...]

  • Seite 51

    Chapter 5 – Configuring Class of Service CoS Configuration CoS Paramet er Ranges & Default Settings The following set of tables lists default Co S configuration parameters for the unit. Configuration Item Default Value Supported Values CoS Wei ghting 2:1 1:1, 2:1, 4:1, 6: 1, 8:1, 10:1, 12 :1, 1: 0 Default CoS (Per Port) Normal Normal, High In[...]

  • Seite 52

    RuggedSwitch ™ User Guide 6:1 - 6 high priority frames are tr ansmitted for every normal priority frame 1:0 - transmit normal pr iority frames only after all hi gh priority frames are sent Port CoS Parameters Menu The Port CoS Parameters menu is accessi ble from the Classes Of Service menu. Figure 28: Port CoS Parameters Menu Default CoS The defa[...]

  • Seite 53

    Chapter 5 – Configuring Class of Service DSCP to CoS Mapping Me nu The DSCP to CoS M apping menu is accessi ble from the Classes Of Service menu. Figure 30: TOS DSCP to CoS Mapping CoS This menu maps the TOS DSCP from a IP frame to a CoS. CoS Access Priorities Menu The CoS Access Priorities menu is accessi ble from the Classes Of Service menu. Fi[...]

  • Seite 54

    RuggedSwitch ™ User Guide Chapter 6 – Configuring Rapid Spanning Tree Introduction This chapter familiarize s the user with: • RSTP Issues • Planning RSTP networks • Configuring RSTP • Viewing the status and statistics of RSTP • Troubleshooting RSTP RSTP Features RuggedSwitch ™ RSTP provides you with the following features: • Indu[...]

  • Seite 55

    Chapter 6 – Configuring Rapid Spanning Tree RSTP Concepts And Issues The 802.1d Spanning Tree Protocol was de veloped to allow the construction of robust networks that incor porate redundancy while pruning the active topology of the network to prevent loops. While ST P is effective, it requires that frame transfer must halt after a link outage un[...]

  • Seite 56

    RuggedSwitch ™ User Guide There are three RSTP states: Disc arding, Learning and Forwardin g. The discarding state is entered when the port is first take n into service. The port does not learn addresses in this state and does not participate in frame t ransfer. The port looks for STP traffic in order to determine its role in the network. When it[...]

  • Seite 57

    Chapter 6 – Configuring Rapid Spanning Tree Role There are four RSTP port roles: R oot, Designated, Alternate and Backup. If the bridge is designated (i.e. it is not the root bridge) it must have a single root port. The root port is the “best” (i.e. quickest) way to send traffic to the root bridge. A port is designated if it is the best port [...]

  • Seite 58

    RuggedSwitch ™ User Guide Because an edge port services only end st ations, topology change messages are not generated when its link toggles. Point To Point and Multip oint Links RSTP uses a peer-peer protocol called Pr oposing-Agreeing to ensure transitioning in the event of a link failure. This protocol is point to point and breaks down in mult[...]

  • Seite 59

    Chapter 6 – Configuring Rapid Spanning Tree IEEE 802.1d vs. IEEE 802.1w Costs The IEEE 802.1d specification limits port costs to value s of 1 to 65536. It recommends that a path cost corresponding to the 1x10 9 / link speed be used. Designed at a time when 9600 bps links wer e state of the art, this method breaks down in modern use, as the method[...]

  • Seite 60

    RuggedSwitch ™ User Guide RSTP Applications RSTP in Structured Wi ring Configurations RSTP allows you to construct structured wiring systems in which connectivity is maintained in the event of li nk failures. For example a si ngle link fail ure of any of links A through Z would leave all ports of bridges 555 thro ugh 888 connected to the network.[...]

  • Seite 61

    Chapter 6 – Configuring Rapid Spanning Tree 4. Choose the root bridge and ba ckup root bridge carefully. The root bridge should be selected to be at the concentration point of network traffic. Locate the backup root bridge adjacent to the root bridge . One strategy that may be used is to tune the bridge priority to establish the root bridge and t[...]

  • Seite 62

    RuggedSwitch ™ User Guide 2. Identify required legacy support and ports with half duplex/shared media restrictions. These bridges should not be used if netw ork failover/recovery times are to be minimized. 3. Identify edge ports Ports that connect to host computers, IEDs and controllers may be set to edge ports in order to guarantee rapid transit[...]

  • Seite 63

    Chapter 6 – Configuring Rapid Spanning Tree RSTP Configuration Bridge and Port Paramet er Ranges & Default Settings The following set of tables lists default STP configuration parameters for the unit. For each parameter the parameter name, recommended setting and possible range are included. Bridge Parameters Configuration Item Default Value [...]

  • Seite 64

    RuggedSwitch ™ User Guide Spanning Tre e Menu The Spanning Tree menu is accessible from the main menu Spanning Tree command. The Spanning Tree menu will le ad you to all the other available menus for configuring and obtaining the status of RSTP ports. Figure 37: Spanning Tree Menu Bridge RSTP Parameters Menu The Bridge RSTP Parameters me nu confi[...]

  • Seite 65

    Chapter 6 – Configuring Rapid Spanning Tree Hello Time This is the time between configuration messages issued by the root bridge. Shorter hello times may result in faster detection of topology changes at the expense of moderate incr eases in STP traffic. Max Age Time The time a configuration message remain s valid after being issued by the root b[...]

  • Seite 66

    RuggedSwitch ™ User Guide Port RSTP Parameters M enu The Port RSTP Parameters me nu configures parameters th at apply to individual ports. Figure 39: Port RSTP Parameters Menu My Switch Port R STP Parameters Admin Access Port Enabled Priority ST P Cost RSTP Cost Edge P ort Point to Point 1 Enabled 128 Au to Auto False Auto 2 Enabled 128 Au to Aut[...]

  • Seite 67

    Chapter 6 – Configuring Rapid Spanning Tree without any listening and learning delays. The MAC tables of Edge ports do not need to be flushed when topology changes occur in the STP network. Unlike an STP disabled port, accidentally connecting an edge port to another port in the spanning tree will result in a detecta ble loop. The "edgeness&q[...]

  • Seite 68

    RuggedSwitch ™ User Guide RSTP Statistics Bridge RSTP Statistics Menu The Bridge RSTP Statistics menu is a ccessible from the Spanning Tree menu. Figure 40: Bridge RSTP Status Menu My Switch Bridge RSTP Statistics Admin Access Bridge Status Not Designated F or Any LAN Bridge ID 32768 / 00-0A-DC -00-50-00 Designated Root ID 32768 / 00-0A-DC -00-10[...]

  • Seite 69

    Chapter 6 – Configuring Rapid Spanning Tree Learned Hello Time The actual Hello time provid ed by the root bridge as learned in configuration messages. This time is use d in designated bridges. Configured Forward Delay The configured Forward Delay time fr om the Bridge RSTP Parameters menu. Learned Forward Delay The actual Forward Delay time prov[...]

  • Seite 70

    RuggedSwitch ™ User Guide Port RSTP Statistics M enu The Bridge RSTP Statistics menu is a ccessible from the Spanning Tree menu. Figure 41: Port RSTP Parameters Menu My Switch Port RSTP Statistics Admin Access Port Status Role Cost RX RSTs T X RSTs RX Configs 1 Disabled 0 0 0 0 2 Disabled 0 0 0 0 3 Disabled 0 0 0 0 4 Disabled 0 0 0 0 5 Link Down [...]

  • Seite 71

    Chapter 6 – Configuring Rapid Spanning Tree Backup The port is attached to a LAN that is serv iced by another port on the bridge. It is not used but is standing by. If a failure of the port that is currently designated for the LAN occurs the backup port will become designated for the LAN. Alter nate The port is attached to a bridge that provid es[...]

  • Seite 72

    RuggedSwitch ™ User Guide Troubleshooting Problem One • When I connect up a new port th e network locks up solid. The port status LEDs are flashing madly. • Occasionally, the network seems to experience a lot of flooding. All the ports seem to experience si gnificant traffic. The problem lasts a few seconds and then goes away. • One of my s[...]

  • Seite 73

    Chapter 6 – Configuring Rapid Spanning Tree Another possible explanation is that some links in the network run ha lf duplex. RSTP uses a peer-peer protocol called Pr oposing-Agreeing to ensure transitioning in the event of a link failur e. This protocol requires full duplex operation. When RSTP detects a non-half duplex port it cannot use the Pro[...]

  • Seite 74

    RuggedSwitch ™ User Guide flows burst continuously to 100% of the line bandwidth, STP can be disrupted. Restrict the traffic flows to below 100%. Problem Six • After I bring up a new port the root moves on to that p ort, and I don’t want it to. • The port that I want to become root won’t do so. Is it possible that the port cost is inco rr[...]

  • Seite 75

    Chapter 7 – Configuri ng Multicast Filtering Chapter 7 – Configuring M ULTICAST F ILTERING Introduction to Multicast Filtering RuggedSwitch ™ accomplishes multicast Filtering through the use of the Internet Group Management Protoc ol (IGMP) snooping. IGMP is used by IP hosts to report their host group member ships to multicast routers. As hos[...]

  • Seite 76

    RuggedSwitch ™ User Guide IGMP Concepts And Issues Router IGMP Operation The following figure pr ovides a simple ex ample of IGMP use. One “producer” IP host (P1) is generating two IP multicas t streams, M1 and M2. There are four potential “consumers” of thes e streams, C1 through C4. The multicast router discovers which host wi shes to s[...]

  • Seite 77

    Chapter 7 – Configuri ng Multicast Filtering Switch IGMP Active and P assive Operation The IGMP Snooping protocol provides a means for switches to snoop (i.e. watch) the operation of routers, respond with joins/leaves on the behalf of consumer ports and to prune multic ast streams accordingly. There are two modes of IGMP the switch ca n be config[...]

  • Seite 78

    RuggedSwitch ™ User Guide Combined Router And Switch IG MP Operation This section describes the additional cha llenges of multiple routers, VLAN support and switching. Producer P1 resides upon VLAN 2 while P2 resides upo n VLAN 3. Consumer C1 resides upon both VLANs whereas C2 and C3 reside upon VLANs 3 and 2, respectively. Router 2 resides upon [...]

  • Seite 79

    Chapter 7 – Configuri ng Multicast Filtering Note that VLAN 3 does not have an external multicast router. The s witch will operating in its “routerless” mode and issue general membership queries as if it is the router. Processing Joins If host C1 desires to subscr ibe to the multicast streams for both P1 and P2, it will generate two joins. Th[...]

  • Seite 80

    RuggedSwitch ™ User Guide Multicast Filtering Configuration Multicast Filtering Pa rameter Range s & Default Settings The following set of tables lists defaul t IGMP configuratio n parameters for the switch. Configuration Item Default Value Supported Values IGMP Mode Active Active, Passive IGMP Query Interval 60 Seconds 10 to 3600 seconds Rou[...]

  • Seite 81

    Chapter 7 – Configuri ng Multicast Filtering Note: Active mode IGMP is much to be preferred to passive mode, resulting in rapid pruning of traffic. Use passive mode only with router s that have problems id entifying IGMP enabled switches. A switch running in passive mode requir es the presence of a multicast router or it will not be able to forwa[...]

  • Seite 82

    RuggedSwitch ™ User Guide Source Port This is the port receiving the multicast stre am as described by this entry. Source port information will be aged out after about two query intervals. Note: The switch can detect only one multicast traf fic source at any one time. The switch will display information about the first source it dete cts. If a de[...]

  • Seite 83

    Chapter 7 – Configuri ng Multicast Filtering Troubleshooting Problem One • When I start a multicast traffic feed it is alwa ys distri buted to all members of the VLAN. Is IGMP enabled for th e VLAN? Multicasts will be distributed to all members of the VLAN unless IGMP is enabled. Problem Two • Computers on my switch receive the multicast traf[...]

  • Seite 84

    RuggedSwitch ™ User Guide Problem Four • Multicast streams of some group s are not forwarded properly. Some segments without subscribers receive the traffic while some segments with subscribers don’t. Ensure there are you do have a situation where differing multicast groups have multicast IP addresses that map to the same multicast MAC Addres[...]

  • Seite 85

    Chapter 8 – Diagnostics Chapter 8 – Diagnostics Introduction This chapter familiarize s the user with: • Using The Alarm System to view and clear Alarms • Viewing and clearing the System Log • Viewing CPU Diagnostics • Loading the Factory Default Configuration • Viewing the Product Identification • Resetting the switch Using The Ala[...]

  • Seite 86

    RuggedSwitch ™ User Guide Active alarms are removed (cleared) either by solving the orig inal cause of the alarm or by disabling the alarm itself. Passive Alarms Passive alarms are historic in nature . They signify events that represented abnormal conditions in the past, and do not affect the current operational status. Examples of passive alarms[...]

  • Seite 87

    Chapter 8 – Diagnostics Each alarm has an associated description string. The string will include a port number if it is relevant. The descripti on may also provide an indication of the recent rate at which this alar m is occurring (if the alar m has occurred previously). Alarms And The Critical Failure Relay All active alarms will immediately de-[...]

  • Seite 88

    RuggedSwitch ™ User Guide Viewing CPU Diagnostics The CPU Diagnostics Menu is ava ilable from the Diagnostics menu View CPU Diagnostics command. The parameters presented in this menu are read-only. Figure 49: CPU Diagnostics Menu My Switch CP U Diagnostics Admin Access Running Time 265 days, 22:38: 05 Total Powere d Time 488 days, 12:15: 07 CPU U[...]

  • Seite 89

    Chapter 8 – Diagnostics Viewing and Clearing the System Log The View System Log command displays entries made in the system log. The system log records various events in cluding reboots, user sign-ons, alarms and configuration saves. Figure 50: Viewing the System Log The system log will continue to accumula te information until becomes full. Ther[...]

  • Seite 90

    RuggedSwitch ™ User Guide Load Factory Default Configuration The Load Factory Default Configuration command will re-loa d all configuration parameters to factory default values. Configuration parameters that affect the connection to the switch (as provided by the Configure IP Servi ces menu) will not be modified. A prompt will be displayed reques[...]

  • Seite 91

    Chapter 9 - Using Ethernet And RMON Statistics Chapter 9 – Using Ethernet And RMON Statistics Introduction This chapter familiarize s the user with: • Viewing Ethernet Statistics • Viewing and Clearing Et hernet Port Statistics • Configuring RMON History Control • Viewing RMON History Samples • Configuring RMON Alarms • Configuring RM[...]

  • Seite 92

    RuggedSwitch ™ User Guide View Ethernet Statistics Ethernet statistics provides a continuousl y updated (once per second) view of the traffic on all ports. Figure 52: Ethernet Statistics Menu This traffic view is useful wh en the origin and destinati on of a traffic flow needs to be determined. The ErrorPkts field pr ovides a sum total of all the[...]

  • Seite 93

    Chapter 9 - Using Ethernet And RMON Statistics InPkts This counter is incremented once fo r every good packet (Unicast + Multicast + Broadcast) received. OutPkts This counter is incremented once for every transmitted good packet. TotalInOctets This counter is incremented once for every data octet of all received packets, including packets that (for[...]

  • Seite 94

    RuggedSwitch ™ User Guide • The ability to collect historical statisti cs in order to review performance and operation of Ethernet ports. • The ability to record a log entry an d/or generate an SNMP trap when the rate of occurrence of a specified event is exceeded. These capabilities are provided through the following menus: • RMON History [...]

  • Seite 95

    Chapter 9 - Using Ethernet And RMON Statistics RMON Historical Statistics Concepts And Issues Historical statistics allow users to program the switch to take “snapshots” of the RMON-MIB history statistics of a port at regular inte rvals. Each user creates a record that describes: • The port to capture the statistics for • The interval betwe[...]

  • Seite 96

    RuggedSwitch ™ User Guide Configure RMON History Control Table Menu The History Control Table stores configurat ion records that define a users sample collection. Collected samples can be viewed by using the arrow keys to select a particular record and pressing <CT RL> V. Figure 55: History Control Table My Switch RMON Hi story Control Tabl[...]

  • Seite 97

    Chapter 9 - Using Ethernet And RMON Statistics RMON History Samples T able Menu History samples for a particular record in the RMON History Control Table are displayed by selecting a particular record there and pressing <CTRL> V. The index of the record will be included in the resu lting menu title of the sample screen. The table will present[...]

  • Seite 98

    RuggedSwitch ™ User Guide RMON Alarms And Events Concepts And Issues The Alarm Process The RMON Alarms Table allows the user to create records that configure the switch to examine the state of a specific statistic variable. The record contains an upper and a lower th reshold for legal valu es of the statistic in a given interval. This provides th[...]

  • Seite 99

    Chapter 9 - Using Ethernet And RMON Statistics Alarm Generation And Hy steresis The ability to configure u pper and lower thresholds on the value of a measured statistic provide for the ability to add hys teresis to the alarm generation process. If the value of the measured statistic over time is compar ed to a single threshold, alarms will be gene[...]

  • Seite 100

    RuggedSwitch ™ User Guide Configure RMON Alarms The Alarms Table stores configuration reco rds that define stat istics, their polling periods and threshold parameters. Figure 59: RMON Alarm Configuration Table screens My Switch RMON Al arms Admin Access Index Variable Rising Thr Falling Thr 1 ifInOctets.5 10000 100000 2 ifOutOctets.5 10000 100000[...]

  • Seite 101

    Chapter 9 - Using Ethernet And RMON Statistics Startup Alarm The alarm that may be sent after the first measurement period. If the first sample is greater than or equal to the rising threshold and Startup Alarm is equal to “rising” or “risingOrFallin g”, then a rising alarm will be generated. If the first is less than or equal to the fallin[...]

  • Seite 102

    RuggedSwitch ™ User Guide Configure RMON Events The RMON Events Table stores profiles of behaviour used in event logging. These profiles are used by RMON Alarm r ecords to send traps and log events. Collected logs can be viewed by using the ar row keys to select a particular profile’s record and pressing <CTRL> V. Each record may specify [...]

  • Seite 103

    Chapter 9 - Using Ethernet And RMON Statistics RMON Event Logs Event logs for a particular record in the RMON Events Table are displayed by selecting a particular record there and pressing <CTRL> V. The index of the record will be included in the result ing menu title of the logs screen. The table will present a series of logs. The log number[...]

  • Seite 104

    RuggedSwitch ™ User Guide Troubleshooting Problem One • What do I need to do in order ge t a trap when the frame rate on port 1 exceeds 1000 fps? We will start by assuming that the frames are unicasts, the rate is to be measured in both directions and that the me asurement period is 1 second. 1) Verify that an SNMP management stati on is config[...]

  • Seite 105

    Chapter 10 - Using The CLI Shell Chapter 10 - Using The CLI Shell Introduction This chapter familiarize s the user with: • Entering and leaving the CLI shell • Viewing files containe d in the RuggedSwitch ™ File System • Viewing and clearing log files • Running a Loopback test • Pinging remote devices • Tracing the operation of certai[...]

  • Seite 106

    RuggedSwitch ™ User Guide Summary Of Commands The shell makes available the following commands. Command Accessible By Description Alarms Guest, Operator, Admin Displa ys alarms available in the switch. Cls Guest, Operator, Admin Clears the screen. Dir Guest, Operator, Admin Pr ints file directory listing. Echo Guest, Operator, Admin Echoes the sp[...]

  • Seite 107

    Chapter 10 - Using The CLI Shell Viewing Files The RuggedSwitch ™ maintains a number of volatile and nonvolatile files. These files can aid in the resolution of proble ms and serve as a useful gauge of the switch’s health. Dir command Enter “dir<CR>” to obtain a complete lis t of files and a de scription of each. Note: Each file has a[...]

  • Seite 108

    RuggedSwitch ™ User Guide Running Loopback Tests The CLI loop command provides a means to validate the operation of the physical port hardware of the switch by running a loopback test. The test works by taking the port offlin e and transmitting a number of “loopback” frames out the port. If th e hardware is functioning correctly the frames wi[...]

  • Seite 109

    Chapter 10 - Using The CLI Shell Pinging A Remote Device The ping command sends an ICMP echo re quest to a remotely connected device. For each reply received the ro und trip time is displayed. The ping command can be used to ensure connectivity to the next connected device. The command “ping 192.168.0.1” w ill send a small number of pings to th[...]

  • Seite 110

    RuggedSwitch ™ User Guide Tracing Events The CLI trace command provides a mean s to trace the operation of various protocols. The trace provides detail ed information incl uding RSTP packet decodes, IGMP activity an d MAC address displays. Notes: Tracing has been designed to provide de tailed information to expert users. Note that all tracing is [...]

  • Seite 111

    Chapter 10 - Using The CLI Shell Starting The Trace The trace is be started by entering “trace<C R>”. All historical trace messages will be displayed. Since this may include many messages it may be more desirable to use the “trace clear<CR>” command instead. This command will a utomatically clear the trace buffer as it starts th[...]

  • Seite 112

    RuggedSwitch ™ User Guide Executing Commands Remotely Through RSH The Unix/Dos Remote Shell Facility can be used at the workstation to cause the product to act upon commands as if they were entered at the CLI prompt. The syntax of the RSH command is usually of the form: rsh ipadd –l password command_string where i p a d d = The address or resol[...]

  • Seite 113

    Chapter 11 – Upgrading Firmware And Managing Configurations Chapter 11 – Upgrading Firmware And Managing Configurations Introduction This chapter familiarize s the user with: • Upgrading firmware using the XModem protocol and Trivial File Transfer Protocol (TFTP) • Capturing and restoring the switch c onfiguration using XModem and TFTP • [...]

  • Seite 114

    RuggedSwitch ™ User Guide Upgrading Firmware With Xmodem Connect to the switch, either through the RS232 port or through a Telnet connection. Press <CTRL S> to enter th e shell. Enter the command “xmodem receive main.bin<CR>”. Open the XModem utility in your termi nal package. If possible select the XModem1K protocol, ot herwise s[...]

  • Seite 115

    Chapter 11 – Upgrading Firmware And Managing Configurations Checking The Status OF The Download. The utility will provide an indication that the file was trans ferred properly, but you must also query the switch in order to determine if it was correctly programmed. Use the command “rsh hostname –l passw ord version” to obtain the revision l[...]

  • Seite 116

    RuggedSwitch ™ User Guide Capturing Configurations The RuggedSwitch ™ provides a means to capture th e configuration of the switch in an ASCII formatted text file. The same file can be downloaded to the sw itch at a later date in order to restore the switch to its previous configuration. Different versions of conf iguration file can be comp are[...]

  • Seite 117

    Chapter 11 – Upgrading Firmware And Managing Configurations Using SQL Commands The RuggedSwitch ™ provides an “SQL like” command facility that allows expert users to perform several operations not po ssible under the user interface, namely: • Restoring the contents of a specific ta ble, but not the whole configuration, to their factory de[...]

  • Seite 118

    RuggedSwitch ™ User Guide Finding The Correct Table Many sql commands operate upon specific ta bles in the database, and require the table name to be specified. The name can easily be determined by navigating the menu system to the desired menu and pr essing <CTRL Z>. The menu name and the corresponding database table na me will be cited. A[...]

  • Seite 119

    Chapter 11 – Upgrading Firmware And Managing Configurations Retrieving A Table With The Where Clause It is useful to be able to display spe cif ic rows of a table predicated upon the row having parameters of a speci fic value. The addition of a “where” clause to the select will limit the returned results. As an example, suppose that it desira[...]

  • Seite 120

    RuggedSwitch ™ User Guide Using RSH And SQL The combination of remote shell script ing and sql commands offer a means to interrogate and maintain large numbers of switches. Consisten cy of configuration across sites may be verified by this m ethod. The following presents a simple example where the switches to interrogate are drawn fr om the file [...]

  • Seite 121

    Appendices Appendix A - Menu Tree Main Me nu Administration Configure IP Services Configure System Identi fication Configure Passwords Configure Time and Date Configure SNMP M anagement Stations Configure Ports Parameters Configure Port Rate Limiting Configure Port Security Configure Port Mirroring View Por t Status Reset Port(s) Port Configuration[...]

  • Seite 122

    RuggedSwitch ™ User Guide A PPENDIX B - SNMP MIB S UPPORT RFC MIB Name Items supported RFC 1907 SNMPv2-MIB SNMP Group SNMP Community Group SNMP Set Group System Gr oup SNMP Basic Noti f ications Group RFC 2863 IF-MIB General Information Group VHC Packet Group Counter Discontinuity Group Link Up/Down Notification Group RFC 2012 TCP-MIB TCP Group R[...]

  • Seite 123

    Appendices GenericTrap (String “MAC address is learne d on secure port”) GenericTrap (Intermittent link) A PPENDIX D – RMON A CCEPTABLE MIB P ARAMETERS The following tables present the MIB pa rameters that may be used to generate RMON alarms. IF-MIB (RFC 2863) ifInOctets The total number of bytes received o n the interface, includin g framing[...]

  • Seite 124

    RuggedSwitch ™ User Guide RMON-MIB (RFC 2819) etherStatsDropEvents The number of received p ackets that are dropped due to lack of receive buffers. etherStatsOctets The num ber of bytes in good packets (Unicast+Multicast+Broadcast) and dropped packets received. etherStatsPkts The number of good packet s (Unicast+Multicast+Broadcast) and dropped p[...]

  • Seite 125

    Appendices TCP-MIB (RFC 2012) tcpActiveOpens The number of times TC P connections have m ade a direct transition to the SYN-SENT st ate from the CLOSED state. tcpPassiveOpens The number of times TCP connections have made a direct transition to the SYN-RCVD state from the LISTEN state. tcpAttemptFails The number of times TCP connections have made a [...]

  • Seite 126

    RuggedSwitch ™ User Guide BRIDGE-MIB (draft-ietf-bridge-bridgemib-smiv2-03) dot1dBasePortDelayExceededDiscards The number of frames discarded by this port due to excessive transit delay through the bridge. dot1dBasePortMtuExceededDiscards The number of frames discarded by this port due to an excessive size. dot1dTpPortInFrames The number of frame[...]

  • Seite 127

    Index I NDEX Alarms Indicator 3 Features, Port 18 Features, VLAN 31 Gateway Address, Configuring 6 Loss-of-Link Management 21 MAC Table, Configuring 13 Password, Default 1 RS232 port 1 RSTP Ring Backbone Configurations 59 RSTP Structured Wiring Configurations 58 RSTP, Edge ports 55 VLAN, Management 33 Aging Time, Configuring 15 Alarms, Active 89 Al[...]

  • Seite 128

    RuggedSwitch ™ User Guide IGMP Configuration 82 IGMP Consumers and Producers 77 IGMP general membership queries 77 IGMP group specific membership queries 78 IGMP leave group message 78 IGMP membership reports 77 IGMP Operation 77 IGMP Query Interval, Configuring 83 IGMP Router Ports, Configuring 83 IGMP Snooping 34 IGMP, Statistics 83 IGMP, Troub[...]

  • Seite 129

    Index Menu, Time and Date 8 Menu, Virtual LANs 37 Multicast Filtering 75 NTP Server Address, Configuring 9 NTP Update Period, Configuring 9 Password, Configuring 8 Port Mirroring 22 Port Mirroring, Configuring 28 Port Rate Limiting 25 Port Security 19, 26 Port Statistics, Viewing 98 Ports, Configuring 23 Ports, Resetting 29 Ports, Troubleshooting 3[...]

  • Seite 130

    RuggedSwitch ™ User Guide SQL, Default Command 130 SQL, Info Command 128 SQL, Select Command 128 SQL, Update Command 129 Statistics 66 Subnet, Configuring 6 System Identification, Configuring 8 System Log, Clearing 95 System Log, Viewing 95 Telnet Sessions, Configuring 6 TFTP Client, Upgradi ng Firmware With 124 TFTP Server ,Configuring 7 TFTP Se[...]