Cisco Systems BC-109 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Cisco Systems BC-109, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Cisco Systems BC-109 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Cisco Systems BC-109. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Cisco Systems BC-109 should contain:
- informations concerning technical data of Cisco Systems BC-109
- name of the manufacturer and a year of construction of the Cisco Systems BC-109 item
- rules of operation, control and maintenance of the Cisco Systems BC-109 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Cisco Systems BC-109 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Cisco Systems BC-109, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Cisco Systems service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Cisco Systems BC-109.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Cisco Systems BC-109 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    Configuring Source-Route Bri dging BC-109 Configur ing Source-Route Br idging This chapter describes source-route bridging (SRB) co nfiguration tasks. F or a discussion of remote source-route bridging (RSRB) con figuration tasks, refer to the “Configuring Remote Source-Rou te Bridging” chapter in this publi cation. For a complete description of[...]

  • Page 2

    Configure Source-Route Brid ging BC-110 Bridging and IBM N etworking Configuratio n Guide Configure Sour ce-Route Bridging Our implementation of source-route bridgi ng enables you to connect two or more T oken Ring networks using either T oken Ring or Fibe r Distrib uted Data Interface (FDDI) media. The Cisco IOS software offers the ability to en c[...]

  • Page 3

    Configure a Multiport Bridge Using a Virtual Ring Configuring Source-Route Bri dging BC-111 A dual-port bridge is a limitation imposed by IBM T oken Ring chips; the chips can process only two ring numbers. If you hav e a router with two or more T oken Ring interfaces, you can work around the two-ring number limitation. Y ou can configure your route[...]

  • Page 4

    Configure Source-Route Brid ging BC-112 Bridging and IBM N etworking Configuratio n Guide Figure 47 Multiport Bridge Using a Vir tual Ring T o take adv antage of this virtua l ring feature, each T oken Ring in terface on the router must be configured to belong to the same ring group. For information about configuring a multiport bridge using a virt[...]

  • Page 5

    Configure SRB over FDDI Configuring Source-Route Bri dging BC-113 Enable SRB and Assign a Ring Group to an Interf ace After you have def ined a ring group, yo u must as sign that ring group to thos e interfaces you plan to include in that ring gro up. An interface can only be assigned to one ring group. T o enable any-to-any connecti vity among the[...]

  • Page 6

    Configure Source-Route Brid ging BC-114 Bridging and IBM N etworking Configuratio n Guide Configure F ast-Swit ching SRB ov er FDDI Fast-Switching SRB o ver FDDI enhances performance. F or example, if you w ant to use access-lists, fast-switching SRB ov er FDDI provides fast performance and access-li st filters capability . T o configure fast-switc[...]

  • Page 7

    Enable the Auto matic Spanning-Tree Function Configuring Source-Route Bri dging BC-115 Forw arding all-routes explorer pack ets is the defa ult. Howe ver , in complicated source-route bridging topologies, using this default can generate an exponentially large number of explorers that are trav ersing the network. The numb er of explorer packets beco[...]

  • Page 8

    Configure Source-Route Brid ging BC-116 Bridging and IBM N etworking Configuratio n Guide T o create a bridge group that r uns an automatic spanning-tree fu nction compatibl e with the IB M SRB spanning-tree implementation, use the foll o wing command in global configuration mode: T o enable the automatic spanning -tree function for a specif ied gr[...]

  • Page 9

    Configure Brid ging of Routed Protoc ols Configuring Source-Route Bri dging BC-117 Configure Bridging of Routed Pr otocols Source-route bridges use Media Access Control (M A C) information, specifically the information contained in the RIF , to bridge packets. A RIF co ntains a series of ring and bridge numbers that represent the possible paths the[...]

  • Page 10

    Configure Bridging of Routed Protocol s BC-118 Bridging and IBM N etworking Configuratio n Guide • VINES • XNS Enable use of the RIF only on T o ken Ring interfaces on the route r . T o configure the Cisco IOS softwa re to append RI F information, use the follo wing command in interface conf iguration mode: For an example of ho w to configure t[...]

  • Page 11

    Configure Tra nslation betw een SRB an d Transparent Bridging Environments Configuring Source-Route Bri dging BC-119 Configure T ranslation between SRB and T ransparent Bridging En vironments Source-route translati onal bridging (SR/TLB) is a Cisco IOS software feature that allows you to combine SRB and transparent bridging networks with out the ne[...]

  • Page 12

    Configure Trans lation between SRB and Transparent Brid ging Environments BC-120 Bridging and IBM N etworking Configuratio n Guide Figure 50 Example of a Simple SR/T LB T opol ogy Note The Spanning-Tree Protocol messages used to pre vent loops in the transparent bridging domain are not passed between the SRB domain and the transparent bridging doma[...]

  • Page 13

    Enable Bridging between Tran sparent Bridging and SRB Configuring Source-Route Bri dging BC-121 W e currently know that problems occur wi th the following protocols when bridged between T oken Ring and other media: Nov ell IPX, DECnet Phas e IV , AppleT alk, VINES, XNS, and IP . Further , problems can occur with the Novell IPX and XNS protocols whe[...]

  • Page 14

    Configure Trans lation between SRB and Transparent Brid ging Environments BC-122 Bridging and IBM N etworking Configuratio n Guide Enab le T ok en Ring LLC2-to-Ether net Conv ersion The Cisco IOS software supports the following types of T oken Ring-to-Ethernet frame con versions using Logical Link Control, type 2 (LLC2) Protocol: • T oken Ring LL[...]

  • Page 15

    Configure NetBIOS Support Configuring Source-Route Bri dging BC-123 Configure NetBIOS Suppor t NetBIOS is a nonroutable protocol that was originally designed to transmit messages between stations, typically IBM PCs, on a T oken Ring networ k. NetBIOS allows messages to be e xchanged between the stations using a name rather than a station address. E[...]

  • Page 16

    Configure NetBIOS Support BC-124 Bridging and IBM N etworking Configuratio n Guide • Create Static Entries in the NetBIOS Name Cache • Specify Dead-T ime Interv als for NetBIOS Pack ets Enab le the Pro xy Explorers F eature on the Appropriate Interf ace In order to enable NetBIOS name caching on an in terface, the proxy explorer s feature must [...]

  • Page 17

    Configure the NetBIOS Cache Name Length Configuring Source-Route Bri dging BC-125 Configure the NetBIOS Cache Name Length T o specify ho w many characters of the NetBIOS type name that the name cache will v alidate, enter the following command in global configuration mode: Enab le NetBIOS Pro xying The Cisco IOS software can act as a proxy and send[...]

  • Page 18

    Configure LNM Support BC-126 Bridging and IBM N etworking Configuratio n Guide The Cisco IOS software also con verts pair s of FIND_N AME and NAME_RECOGNIZED pack ets recei ved from explorers, which tra v erse all rings, to specif ic route frames that are sent only between the two machines that need to see these packets. Y ou can specify a query-t [...]

  • Page 19

    Configure LNM Support Configuring Source-Route Bri dging BC-127 Figure 51 LNM Linking to a Sour ce-Route Bridge on Each Local Ring If LNM requires info rmation about a stati on some where on a T oken Ring, it uses a proprietary IBM protocol to query to one of the source-route bridge s connected to that ring. If th e bridge can provide the requested[...]

  • Page 20

    Configure LNM Support BC-128 Bridging and IBM N etworking Configuratio n Guide Figure 52 LAN Network Manager Monitorin g an d T ranslating Notice that the proprietary protocol LNM uses to communicate with the source-route bridge is an LLC2 connection. Although its protoco l cannot be routed, LNM can monitor or manage anything within the SRB netwo r[...]

  • Page 21

    Configure LNM Software on th e Management Stations to Communicate with the Router Configuring Source-Route Bri dging BC-129 When SRB is enabled on the router, conf iguring the Cisco IOS software to perform the functions of an IBM Bridge for communication with LNM occu rs automatically . Theref ore, if SRB has been enabled, you do not need to perfor[...]

  • Page 22

    Configure LNM Support BC-130 Bridging and IBM N etworking Configuratio n Guide The command can be used to terminate all LN M server input and reporting links. In normal circumstances, this command should not be necessary because it is a superset of the functions normally performed on indi vidual interfaces b y the no lnm r em and no lnm rps command[...]

  • Page 23

    Apply a Password to an LNM Reporting Link Configuring Source-Route Bri dging BC-131 T o enable other LR Ms to change router parameters, use th e following command in interface configuration mode: Apply a P ass word to an LNM Repor ting Link Each reporting link has its o wn password that is us ed not only to prev ent unauthorized access from an LRM [...]

  • Page 24

    Configure LNM Support BC-132 Bridging and IBM N etworking Configuratio n Guide Change an LNM Repor ting Inter val All stations on a T oken Ring notify the Ring Error Monitor (REM) when they detect errors on the ring. In order to prev ent excessi ve messages, er ror reports are not sent immediately , but are accumulated for a short interval and then[...]

  • Page 25

    Secure the SRB Network Configuring Source-Route Bri dging BC-133 Secure the SRB Netw ork This section describes how to conf igure three features that are us ed primarily to provide network security: NetBIOS access filters, administrati ve filt ers, and access expressions that can be combined with administrative f ilters. In addi tion, these feat ur[...]

  • Page 26

    Secure the SRB Network BC-134 Bridging and IBM N etworking Configuratio n Guide The NetBIOS station access list contains the station name to match, along with a permit or deny condition. Y ou must assign the name of the access list to a station or set of stations on the network. T o assign a station access list name, use the fo llowing command in g[...]

  • Page 27

    Configure Admi nistrative Filte rs for Token Ring Traffic Configuring Source-Route Bri dging BC-135 Configure Administrativ e Fi lters f or T ok en Ring T raffic Source-route bridges normally f i lter frames according to the routi ng information contained in the frame. That is, a bridge will not forward a frame b ack to its originating network segm[...]

  • Page 28

    Secure the SRB Network BC-136 Bridging and IBM N etworking Configuratio n Guide T o enable filtering on input or ou tput, use one of the follo wing co mmands in interface configuration mode: Y ou can filter SN AP-encapsulated packets on either input or output. The a ccess list you specify is the one you created that include s the protocol type code[...]

  • Page 29

    Configure Access Expressions that Combine Administrative Filters Configuring Source-Route Bri dging BC-137 Configure Access Expressions that Co mbine Administrativ e Filters Y ou can use access expressions to combine access f ilters to establish co mple x conditions under which bridged frames can enter or lea ve an in terf ace. Using access express[...]

  • Page 30

    Secure the SRB Network BC-138 Bridging and IBM N etworking Configuratio n Guide Configure Access Expressions T o configure an access e x pression perform the following tasks: • Design the access expression. • Configure the access lists used by the e xpression. • Configure the access e xpres sion into the router . When designing an access expr[...]

  • Page 31

    Tune the SRB Network Configuring Source-Route Bri dging BC-139 The access lists defined in the pre vious section create the foll owing configuration: interface tokenring 0 access-expression in ~lsap(202) | dmac(701) ! access-list 202 permit 0x0404 0x0001 ! Permits SNA frames (command or response) access-list 202 permit 0x0004 0x0001 ! Permits SNA E[...]

  • Page 32

    Tune the SRB N etwork BC-140 Bridging and IBM N etworking Configuratio n Guide Enab le or Disab le the Sour ce-Route F ast-Switching Cache Rather than processing packets at the process lev el, the fast-switching feat ure enables the Cisco IOS software to process pack ets at the interrupt lev el. Each packet is transferred from the input interface t[...]

  • Page 33

    Enable or Disable the SSE Configuring Source-Route Bri dging BC-141 Enab le or Disab le the SSE The Silicon Switch Engine (SSE) acts as a programmable cache to sp eed the switching of packets. T o enable or disable the SSE, use one of the fo llo wing commands in inte rface conf iguration mode: Estab lish the Connection Timeout Inter val It may be n[...]

  • Page 34

    Tune the SRB N etwork BC-142 Bridging and IBM N etworking Configuratio n Guide Figure 54 Controlling Explor er Storms in Re dundant Network T opolog ies The source-bridge explor er -dup-AR E-f ilter command can be used to reduce explorer traf fic by filtering e x plorer frames. T o optimize explorer processin g, use one or more of the following com[...]

  • Page 35

    Configure Proxy Explorers Configuring Source-Route Bri dging BC-143 Configure Pro xy Explorers Y ou can use the proxy explorers f eature to limit the amo unt of explorer traff ic propagatin g through the source-bridge network. T o configure proxy explorers, use the follo w ing command in interface conf iguration mode: The Cisco IOS software does no[...]

  • Page 36

    Monitor and Maintain the SRB Network BC-144 Bridging and IBM N etworking Configuratio n Guide Repor t Spur ious F rame-Copied Errors An IBM 3174 cluster controller can be configur ed to report frame-copi ed errors to IBM LAN Network Manager software. These errors indicate that another host is responding to the MAC address of the 3174 cluster contro[...]

  • Page 37

    SRB Configuration Examples Configuring Source-Route Bri dging BC-145 T o maintain th e SRB network, use any of the follo wing commands in privile ged EXEC mode: In addition to the EXEC-mode comman ds to maintain the SRB network, you can use the following command in global configuration mode: SRB Configuration Examples The following sections prov id[...]

  • Page 38

    SRB Configuration Examples BC-146 Bridging and IBM N etworking Configuratio n Guide • NetBIOS Support with a Stat ic NetBIOS Cache Entry Example • LNM for a Simple Network Example • LNM for a More Complex Network Example • NetBIOS Access Filters Example • Filtering Bridged T oken Ring Pack ets to IBM Machines Example • Administrativ e A[...]

  • Page 39

    SRB with Automatic Span ning-Tree Function Configuration Example Configuring Source-Route Bri dging BC-147 SRB with A utomatic Spanning-T ree Function Configuration Example The following e xample of a Cisco series 7000 router configuration illustrates how to enable the automatic spanning tree function on an SRB network: source-bridge ring-group 100[...]

  • Page 40

    SRB Configuration Examples BC-148 Bridging and IBM N etworking Configuratio n Guide SRB and Routing Cer tain Protocols Example In the following configuration, IP , XNS, and IPX are routed, while all other protoco ls are bridged between rings. While not strictly necessary , the Novell IPX and XNS network numbers are set consistently with the IP subn[...]

  • Page 41

    SRB with Multiple Virtu al Ring Groups Exampl e Configuring Source-Route Bri dging BC-149 The following is a sample conf i guration file: source-bridge ring-group 7 ! interface tokenring 0 source-bridge 1000 1 7 source-bridge spanning ! interface tokenring 1 source-bridge 1001 1 7 source-bridge spanning ! interface tokenring 2 source-bridge 1002 1 [...]

  • Page 42

    SRB Configuration Examples BC-150 Bridging and IBM N etworking Configuratio n Guide Configuration f or Router B source-bridge ring-group 200 ! interface tokenring 0 source-bridge 3 1 200 source-bridge spanning ! interface tokenring 2 source-bridge 2 1 200 source-bridge spanning SRB ov er FDDI Conf iguration Examples The following e xamples sho w th[...]

  • Page 43

    SRB over Frame Relay Configuration Example Configuring Source-Route Bri dging BC-151 SRB ov er F rame Rela y Configuration Example Figure 59 illustrates a network with the following characteristics: • V irtual Ring N umber of Router A = 100 • V irtual Ring Number of FRAD B = 200 • V irtual Ring Number of FRAD C = 300 • DLCI number for PVC b[...]

  • Page 44

    SRB Configuration Examples BC-152 Bridging and IBM N etworking Configuratio n Guide Configuration of Router A source-bridge ring-group 100 ! interface Serial1 encapsulation frame-relay ! interface Serial1.1 point-to-point frame-relay interface-dlci 30 ietf source-bridge 200 1 100 conserve-ring source-bridge spanning ! interface Serial1.2 point-to-p[...]

  • Page 45

    Adding a Static RIF Cache Entr y for a Two-Hop Path Example Configuring Source-Route Bri dging BC-153 Figure 60 Assigning a RIF t o a Source-Route Bridge The static RIF entry would be submitted to the router on the left as follows: rif 1000.5A12.3456 0630.0081.0090 Adding a Static RIF Cache Entr y for a T w o-Hop P ath Example In Figure 61, assu me[...]

  • Page 46

    SRB Configuration Examples BC-154 Bridging and IBM N etworking Configuratio n Guide Assume that the following configuration for SRB and transparent bridging existed before you wanted to enable SR/TLB: interface tokenring 0 source-bridge 1 1 2 ! interface tokenring 1 source-bridge 2 1 1 ! interface ethernet 0 bridge-group 1 ! interface ethernet 0 br[...]

  • Page 47

    SR/TLB with Access Filtering Example Configuring Source-Route Bri dging BC-155 Once you have determined the ring number and t he bridge number , you can add the source-bridge transparent command to the f ile, including these two va lues as parameters for the command. The following partial configuration includes this source-bridge transparent entry:[...]

  • Page 48

    SRB Configuration Examples BC-156 Bridging and IBM N etworking Configuratio n Guide The command for the T oken Ring interface specif ies that the access list 701 be applied on the source address of frames going out to the T oken Ring, a nd the command for the Ethe rnet interface specifies that this access list be applied on the source address frame[...]

  • Page 49

    LNM for a Simple Network Example Configuring Source-Route Bri dging BC-157 LNM f or a Simple Network Example Figure 65 shows a router with two T oken Rings configured as a local source-route bridge. Figure 65 Router with T wo T oken Rings Co nfigured as a Local Sour ce-Route Bridge The associated configuration f ile follows: interface tokenring 0 s[...]

  • Page 50

    SRB Configuration Examples BC-158 Bridging and IBM N etworking Configuratio n Guide LNM f or a More Comple x Network Example Figure 66 shows a router with three T oken Rings configured as a multiport bridge, thus employing the concept of the virtual ri ng. Figure 66 Router with T hree T oken Ring s Configured as a Multiport Bridg e The associated c[...]

  • Page 51

    NetBIOS Access Filters Example Configuring Source-Route Bri dging BC-159 The show lnm config command displays the logical configuration of this bridge, including all the pertinent information for configuring this router into LNM: Wayfarer# show lnm config Bridge(s) currently configured: From ring 001, address 0000.0028.abcd Across bridge 001 To rin[...]

  • Page 52

    SRB Configuration Examples BC-160 Bridging and IBM N etworking Configuratio n Guide Access lists are scanned in order . In the foll owing e xample, the first list denies all entries beginning with the letters ABC, including one named ABCD . This voids the second command, because the entry permitting a name with ABCD com es after the entry denying i[...]

  • Page 53

    Administrative Access Fi lters—Filtering SNAP Fr ames on Output Example Configuring Source-Route Bri dging BC-161 Administrativ e Access Filters—Filter i ng SNAP F rames on Output Example Figure 68 shows a router connecting four T oken Rings. Figure 68 Router Filtering SNAP Fra mes on Output The follo wing example allo ws only AppleT alk Phas e[...]

  • Page 54

    SRB Configuration Examples BC-162 Bridging and IBM N etworking Configuratio n Guide access-list 203 permit 0xE0E0 0x0101 access-list 203 deny 0x0000 0xFFFF Note that it is not necessary to check for an LSAP of 0xAAAA when f ilt ering SN AP-encapsulated AppleT alk packets, because for source-route bri dging, the use of type f ilters implies SN AP en[...]

  • Page 55

    Access Filters Example Configuring Source-Route Bri dging BC-163 Access Filters Example Figure 69 shows two routers connecting two T oken Rings to an FDDI backbone. Figure 69 Network Configuration Using NetBI OS Access Filters Suppose you want to pe rmit the IBM 3174 cluster controll ers to access the FEP at address 0110.2222.3333 , and also want t[...]

  • Page 56

    SRB Configuration Examples BC-164 Bridging and IBM N etworking Configuratio n Guide A utonomous Switching Example The following e xample enables use of autonomous switching between two ciscoBus T oken Ring interfaces in the same router . Frames entering T oken Ring interf aces 0 or 1 will be autonomously switched to the other interface. ! global co[...]