Cisco Systems BC-109 инструкция обслуживания

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56

Идти на страницу of

Хорошее руководство по эксплуатации

Законодательство обязывает продавца передать покупателю, вместе с товаром, руководство по эксплуатации Cisco Systems BC-109. Отсутствие инструкции либо неправильная информация, переданная потребителю, составляют основание для рекламации в связи с несоответствием устройства с договором. В законодательстве допускается предоставлении руководства в другой, чем бумажная форме, что, в последнее время, часто используется, предоставляя графическую или электронную форму инструкции Cisco Systems BC-109 или обучающее видео для пользователей. Условием остается четкая и понятная форма.

Что такое руководство?

Слово происходит от латинского "instructio", тоесть привести в порядок. Следовательно в инструкции Cisco Systems BC-109 можно найти описание этапов поведения. Цель инструкции заключается в облегчении запуска, использования оборудования либо выполнения определенной деятельности. Инструкция является набором информации о предмете/услуге, подсказкой.

К сожалению немного пользователей находит время для чтения инструкций Cisco Systems BC-109, и хорошая инструкция позволяет не только узнать ряд дополнительных функций приобретенного устройства, но и позволяет избежать возникновения большинства поломок.

Из чего должно состоять идеальное руководство по эксплуатации?

Прежде всего в инструкции Cisco Systems BC-109 должна находится:
- информация относительно технических данных устройства Cisco Systems BC-109
- название производителя и год производства оборудования Cisco Systems BC-109
- правила обслуживания, настройки и ухода за оборудованием Cisco Systems BC-109
- знаки безопасности и сертификаты, подтверждающие соответствие стандартам

Почему мы не читаем инструкций?

Как правило из-за нехватки времени и уверенности в отдельных функциональностях приобретенных устройств. К сожалению само подсоединение и запуск Cisco Systems BC-109 это слишком мало. Инструкция заключает ряд отдельных указаний, касающихся функциональности, принципов безопасности, способов ухода (даже то, какие средства стоит использовать), возможных поломок Cisco Systems BC-109 и способов решения проблем, возникающих во время использования. И наконец то, в инструкции можно найти адресные данные сайта Cisco Systems, в случае отсутствия эффективности предлагаемых решений. Сейчас очень большой популярностью пользуются инструкции в форме интересных анимаций или видео материалов, которое лучше, чем брошюра воспринимаются пользователем. Такой вид инструкции позволяет пользователю просмотреть весь фильм, не пропуская спецификацию и сложные технические описания Cisco Systems BC-109, как это часто бывает в случае бумажной версии.

Почему стоит читать инструкции?

Прежде всего здесь мы найдем ответы касательно конструкции, возможностей устройства Cisco Systems BC-109, использования отдельных аксессуаров и ряд информации, позволяющей вполне использовать все функции и упрощения.

После удачной покупки оборудования/устройства стоит посвятить несколько минут для ознакомления с каждой частью инструкции Cisco Systems BC-109. Сейчас их старательно готовят или переводят, чтобы они были не только понятными для пользователя, но и чтобы выполняли свою основную информационно-поддерживающую функцию.

Содержание руководства

  • Страница 1

    Configuring Source-Route Bri dging BC-109 Configur ing Source-Route Br idging This chapter describes source-route bridging (SRB) co nfiguration tasks. F or a discussion of remote source-route bridging (RSRB) con figuration tasks, refer to the “Configuring Remote Source-Rou te Bridging” chapter in this publi cation. For a complete description of[...]

  • Страница 2

    Configure Source-Route Brid ging BC-110 Bridging and IBM N etworking Configuratio n Guide Configure Sour ce-Route Bridging Our implementation of source-route bridgi ng enables you to connect two or more T oken Ring networks using either T oken Ring or Fibe r Distrib uted Data Interface (FDDI) media. The Cisco IOS software offers the ability to en c[...]

  • Страница 3

    Configure a Multiport Bridge Using a Virtual Ring Configuring Source-Route Bri dging BC-111 A dual-port bridge is a limitation imposed by IBM T oken Ring chips; the chips can process only two ring numbers. If you hav e a router with two or more T oken Ring interfaces, you can work around the two-ring number limitation. Y ou can configure your route[...]

  • Страница 4

    Configure Source-Route Brid ging BC-112 Bridging and IBM N etworking Configuratio n Guide Figure 47 Multiport Bridge Using a Vir tual Ring T o take adv antage of this virtua l ring feature, each T oken Ring in terface on the router must be configured to belong to the same ring group. For information about configuring a multiport bridge using a virt[...]

  • Страница 5

    Configure SRB over FDDI Configuring Source-Route Bri dging BC-113 Enable SRB and Assign a Ring Group to an Interf ace After you have def ined a ring group, yo u must as sign that ring group to thos e interfaces you plan to include in that ring gro up. An interface can only be assigned to one ring group. T o enable any-to-any connecti vity among the[...]

  • Страница 6

    Configure Source-Route Brid ging BC-114 Bridging and IBM N etworking Configuratio n Guide Configure F ast-Swit ching SRB ov er FDDI Fast-Switching SRB o ver FDDI enhances performance. F or example, if you w ant to use access-lists, fast-switching SRB ov er FDDI provides fast performance and access-li st filters capability . T o configure fast-switc[...]

  • Страница 7

    Enable the Auto matic Spanning-Tree Function Configuring Source-Route Bri dging BC-115 Forw arding all-routes explorer pack ets is the defa ult. Howe ver , in complicated source-route bridging topologies, using this default can generate an exponentially large number of explorers that are trav ersing the network. The numb er of explorer packets beco[...]

  • Страница 8

    Configure Source-Route Brid ging BC-116 Bridging and IBM N etworking Configuratio n Guide T o create a bridge group that r uns an automatic spanning-tree fu nction compatibl e with the IB M SRB spanning-tree implementation, use the foll o wing command in global configuration mode: T o enable the automatic spanning -tree function for a specif ied gr[...]

  • Страница 9

    Configure Brid ging of Routed Protoc ols Configuring Source-Route Bri dging BC-117 Configure Bridging of Routed Pr otocols Source-route bridges use Media Access Control (M A C) information, specifically the information contained in the RIF , to bridge packets. A RIF co ntains a series of ring and bridge numbers that represent the possible paths the[...]

  • Страница 10

    Configure Bridging of Routed Protocol s BC-118 Bridging and IBM N etworking Configuratio n Guide • VINES • XNS Enable use of the RIF only on T o ken Ring interfaces on the route r . T o configure the Cisco IOS softwa re to append RI F information, use the follo wing command in interface conf iguration mode: For an example of ho w to configure t[...]

  • Страница 11

    Configure Tra nslation betw een SRB an d Transparent Bridging Environments Configuring Source-Route Bri dging BC-119 Configure T ranslation between SRB and T ransparent Bridging En vironments Source-route translati onal bridging (SR/TLB) is a Cisco IOS software feature that allows you to combine SRB and transparent bridging networks with out the ne[...]

  • Страница 12

    Configure Trans lation between SRB and Transparent Brid ging Environments BC-120 Bridging and IBM N etworking Configuratio n Guide Figure 50 Example of a Simple SR/T LB T opol ogy Note The Spanning-Tree Protocol messages used to pre vent loops in the transparent bridging domain are not passed between the SRB domain and the transparent bridging doma[...]

  • Страница 13

    Enable Bridging between Tran sparent Bridging and SRB Configuring Source-Route Bri dging BC-121 W e currently know that problems occur wi th the following protocols when bridged between T oken Ring and other media: Nov ell IPX, DECnet Phas e IV , AppleT alk, VINES, XNS, and IP . Further , problems can occur with the Novell IPX and XNS protocols whe[...]

  • Страница 14

    Configure Trans lation between SRB and Transparent Brid ging Environments BC-122 Bridging and IBM N etworking Configuratio n Guide Enab le T ok en Ring LLC2-to-Ether net Conv ersion The Cisco IOS software supports the following types of T oken Ring-to-Ethernet frame con versions using Logical Link Control, type 2 (LLC2) Protocol: • T oken Ring LL[...]

  • Страница 15

    Configure NetBIOS Support Configuring Source-Route Bri dging BC-123 Configure NetBIOS Suppor t NetBIOS is a nonroutable protocol that was originally designed to transmit messages between stations, typically IBM PCs, on a T oken Ring networ k. NetBIOS allows messages to be e xchanged between the stations using a name rather than a station address. E[...]

  • Страница 16

    Configure NetBIOS Support BC-124 Bridging and IBM N etworking Configuratio n Guide • Create Static Entries in the NetBIOS Name Cache • Specify Dead-T ime Interv als for NetBIOS Pack ets Enab le the Pro xy Explorers F eature on the Appropriate Interf ace In order to enable NetBIOS name caching on an in terface, the proxy explorer s feature must [...]

  • Страница 17

    Configure the NetBIOS Cache Name Length Configuring Source-Route Bri dging BC-125 Configure the NetBIOS Cache Name Length T o specify ho w many characters of the NetBIOS type name that the name cache will v alidate, enter the following command in global configuration mode: Enab le NetBIOS Pro xying The Cisco IOS software can act as a proxy and send[...]

  • Страница 18

    Configure LNM Support BC-126 Bridging and IBM N etworking Configuratio n Guide The Cisco IOS software also con verts pair s of FIND_N AME and NAME_RECOGNIZED pack ets recei ved from explorers, which tra v erse all rings, to specif ic route frames that are sent only between the two machines that need to see these packets. Y ou can specify a query-t [...]

  • Страница 19

    Configure LNM Support Configuring Source-Route Bri dging BC-127 Figure 51 LNM Linking to a Sour ce-Route Bridge on Each Local Ring If LNM requires info rmation about a stati on some where on a T oken Ring, it uses a proprietary IBM protocol to query to one of the source-route bridge s connected to that ring. If th e bridge can provide the requested[...]

  • Страница 20

    Configure LNM Support BC-128 Bridging and IBM N etworking Configuratio n Guide Figure 52 LAN Network Manager Monitorin g an d T ranslating Notice that the proprietary protocol LNM uses to communicate with the source-route bridge is an LLC2 connection. Although its protoco l cannot be routed, LNM can monitor or manage anything within the SRB netwo r[...]

  • Страница 21

    Configure LNM Software on th e Management Stations to Communicate with the Router Configuring Source-Route Bri dging BC-129 When SRB is enabled on the router, conf iguring the Cisco IOS software to perform the functions of an IBM Bridge for communication with LNM occu rs automatically . Theref ore, if SRB has been enabled, you do not need to perfor[...]

  • Страница 22

    Configure LNM Support BC-130 Bridging and IBM N etworking Configuratio n Guide The command can be used to terminate all LN M server input and reporting links. In normal circumstances, this command should not be necessary because it is a superset of the functions normally performed on indi vidual interfaces b y the no lnm r em and no lnm rps command[...]

  • Страница 23

    Apply a Password to an LNM Reporting Link Configuring Source-Route Bri dging BC-131 T o enable other LR Ms to change router parameters, use th e following command in interface configuration mode: Apply a P ass word to an LNM Repor ting Link Each reporting link has its o wn password that is us ed not only to prev ent unauthorized access from an LRM [...]

  • Страница 24

    Configure LNM Support BC-132 Bridging and IBM N etworking Configuratio n Guide Change an LNM Repor ting Inter val All stations on a T oken Ring notify the Ring Error Monitor (REM) when they detect errors on the ring. In order to prev ent excessi ve messages, er ror reports are not sent immediately , but are accumulated for a short interval and then[...]

  • Страница 25

    Secure the SRB Network Configuring Source-Route Bri dging BC-133 Secure the SRB Netw ork This section describes how to conf igure three features that are us ed primarily to provide network security: NetBIOS access filters, administrati ve filt ers, and access expressions that can be combined with administrative f ilters. In addi tion, these feat ur[...]

  • Страница 26

    Secure the SRB Network BC-134 Bridging and IBM N etworking Configuratio n Guide The NetBIOS station access list contains the station name to match, along with a permit or deny condition. Y ou must assign the name of the access list to a station or set of stations on the network. T o assign a station access list name, use the fo llowing command in g[...]

  • Страница 27

    Configure Admi nistrative Filte rs for Token Ring Traffic Configuring Source-Route Bri dging BC-135 Configure Administrativ e Fi lters f or T ok en Ring T raffic Source-route bridges normally f i lter frames according to the routi ng information contained in the frame. That is, a bridge will not forward a frame b ack to its originating network segm[...]

  • Страница 28

    Secure the SRB Network BC-136 Bridging and IBM N etworking Configuratio n Guide T o enable filtering on input or ou tput, use one of the follo wing co mmands in interface configuration mode: Y ou can filter SN AP-encapsulated packets on either input or output. The a ccess list you specify is the one you created that include s the protocol type code[...]

  • Страница 29

    Configure Access Expressions that Combine Administrative Filters Configuring Source-Route Bri dging BC-137 Configure Access Expressions that Co mbine Administrativ e Filters Y ou can use access expressions to combine access f ilters to establish co mple x conditions under which bridged frames can enter or lea ve an in terf ace. Using access express[...]

  • Страница 30

    Secure the SRB Network BC-138 Bridging and IBM N etworking Configuratio n Guide Configure Access Expressions T o configure an access e x pression perform the following tasks: • Design the access expression. • Configure the access lists used by the e xpression. • Configure the access e xpres sion into the router . When designing an access expr[...]

  • Страница 31

    Tune the SRB Network Configuring Source-Route Bri dging BC-139 The access lists defined in the pre vious section create the foll owing configuration: interface tokenring 0 access-expression in ~lsap(202) | dmac(701) ! access-list 202 permit 0x0404 0x0001 ! Permits SNA frames (command or response) access-list 202 permit 0x0004 0x0001 ! Permits SNA E[...]

  • Страница 32

    Tune the SRB N etwork BC-140 Bridging and IBM N etworking Configuratio n Guide Enab le or Disab le the Sour ce-Route F ast-Switching Cache Rather than processing packets at the process lev el, the fast-switching feat ure enables the Cisco IOS software to process pack ets at the interrupt lev el. Each packet is transferred from the input interface t[...]

  • Страница 33

    Enable or Disable the SSE Configuring Source-Route Bri dging BC-141 Enab le or Disab le the SSE The Silicon Switch Engine (SSE) acts as a programmable cache to sp eed the switching of packets. T o enable or disable the SSE, use one of the fo llo wing commands in inte rface conf iguration mode: Estab lish the Connection Timeout Inter val It may be n[...]

  • Страница 34

    Tune the SRB N etwork BC-142 Bridging and IBM N etworking Configuratio n Guide Figure 54 Controlling Explor er Storms in Re dundant Network T opolog ies The source-bridge explor er -dup-AR E-f ilter command can be used to reduce explorer traf fic by filtering e x plorer frames. T o optimize explorer processin g, use one or more of the following com[...]

  • Страница 35

    Configure Proxy Explorers Configuring Source-Route Bri dging BC-143 Configure Pro xy Explorers Y ou can use the proxy explorers f eature to limit the amo unt of explorer traff ic propagatin g through the source-bridge network. T o configure proxy explorers, use the follo w ing command in interface conf iguration mode: The Cisco IOS software does no[...]

  • Страница 36

    Monitor and Maintain the SRB Network BC-144 Bridging and IBM N etworking Configuratio n Guide Repor t Spur ious F rame-Copied Errors An IBM 3174 cluster controller can be configur ed to report frame-copi ed errors to IBM LAN Network Manager software. These errors indicate that another host is responding to the MAC address of the 3174 cluster contro[...]

  • Страница 37

    SRB Configuration Examples Configuring Source-Route Bri dging BC-145 T o maintain th e SRB network, use any of the follo wing commands in privile ged EXEC mode: In addition to the EXEC-mode comman ds to maintain the SRB network, you can use the following command in global configuration mode: SRB Configuration Examples The following sections prov id[...]

  • Страница 38

    SRB Configuration Examples BC-146 Bridging and IBM N etworking Configuratio n Guide • NetBIOS Support with a Stat ic NetBIOS Cache Entry Example • LNM for a Simple Network Example • LNM for a More Complex Network Example • NetBIOS Access Filters Example • Filtering Bridged T oken Ring Pack ets to IBM Machines Example • Administrativ e A[...]

  • Страница 39

    SRB with Automatic Span ning-Tree Function Configuration Example Configuring Source-Route Bri dging BC-147 SRB with A utomatic Spanning-T ree Function Configuration Example The following e xample of a Cisco series 7000 router configuration illustrates how to enable the automatic spanning tree function on an SRB network: source-bridge ring-group 100[...]

  • Страница 40

    SRB Configuration Examples BC-148 Bridging and IBM N etworking Configuratio n Guide SRB and Routing Cer tain Protocols Example In the following configuration, IP , XNS, and IPX are routed, while all other protoco ls are bridged between rings. While not strictly necessary , the Novell IPX and XNS network numbers are set consistently with the IP subn[...]

  • Страница 41

    SRB with Multiple Virtu al Ring Groups Exampl e Configuring Source-Route Bri dging BC-149 The following is a sample conf i guration file: source-bridge ring-group 7 ! interface tokenring 0 source-bridge 1000 1 7 source-bridge spanning ! interface tokenring 1 source-bridge 1001 1 7 source-bridge spanning ! interface tokenring 2 source-bridge 1002 1 [...]

  • Страница 42

    SRB Configuration Examples BC-150 Bridging and IBM N etworking Configuratio n Guide Configuration f or Router B source-bridge ring-group 200 ! interface tokenring 0 source-bridge 3 1 200 source-bridge spanning ! interface tokenring 2 source-bridge 2 1 200 source-bridge spanning SRB ov er FDDI Conf iguration Examples The following e xamples sho w th[...]

  • Страница 43

    SRB over Frame Relay Configuration Example Configuring Source-Route Bri dging BC-151 SRB ov er F rame Rela y Configuration Example Figure 59 illustrates a network with the following characteristics: • V irtual Ring N umber of Router A = 100 • V irtual Ring Number of FRAD B = 200 • V irtual Ring Number of FRAD C = 300 • DLCI number for PVC b[...]

  • Страница 44

    SRB Configuration Examples BC-152 Bridging and IBM N etworking Configuratio n Guide Configuration of Router A source-bridge ring-group 100 ! interface Serial1 encapsulation frame-relay ! interface Serial1.1 point-to-point frame-relay interface-dlci 30 ietf source-bridge 200 1 100 conserve-ring source-bridge spanning ! interface Serial1.2 point-to-p[...]

  • Страница 45

    Adding a Static RIF Cache Entr y for a Two-Hop Path Example Configuring Source-Route Bri dging BC-153 Figure 60 Assigning a RIF t o a Source-Route Bridge The static RIF entry would be submitted to the router on the left as follows: rif 1000.5A12.3456 0630.0081.0090 Adding a Static RIF Cache Entr y for a T w o-Hop P ath Example In Figure 61, assu me[...]

  • Страница 46

    SRB Configuration Examples BC-154 Bridging and IBM N etworking Configuratio n Guide Assume that the following configuration for SRB and transparent bridging existed before you wanted to enable SR/TLB: interface tokenring 0 source-bridge 1 1 2 ! interface tokenring 1 source-bridge 2 1 1 ! interface ethernet 0 bridge-group 1 ! interface ethernet 0 br[...]

  • Страница 47

    SR/TLB with Access Filtering Example Configuring Source-Route Bri dging BC-155 Once you have determined the ring number and t he bridge number , you can add the source-bridge transparent command to the f ile, including these two va lues as parameters for the command. The following partial configuration includes this source-bridge transparent entry:[...]

  • Страница 48

    SRB Configuration Examples BC-156 Bridging and IBM N etworking Configuratio n Guide The command for the T oken Ring interface specif ies that the access list 701 be applied on the source address of frames going out to the T oken Ring, a nd the command for the Ethe rnet interface specifies that this access list be applied on the source address frame[...]

  • Страница 49

    LNM for a Simple Network Example Configuring Source-Route Bri dging BC-157 LNM f or a Simple Network Example Figure 65 shows a router with two T oken Rings configured as a local source-route bridge. Figure 65 Router with T wo T oken Rings Co nfigured as a Local Sour ce-Route Bridge The associated configuration f ile follows: interface tokenring 0 s[...]

  • Страница 50

    SRB Configuration Examples BC-158 Bridging and IBM N etworking Configuratio n Guide LNM f or a More Comple x Network Example Figure 66 shows a router with three T oken Rings configured as a multiport bridge, thus employing the concept of the virtual ri ng. Figure 66 Router with T hree T oken Ring s Configured as a Multiport Bridg e The associated c[...]

  • Страница 51

    NetBIOS Access Filters Example Configuring Source-Route Bri dging BC-159 The show lnm config command displays the logical configuration of this bridge, including all the pertinent information for configuring this router into LNM: Wayfarer# show lnm config Bridge(s) currently configured: From ring 001, address 0000.0028.abcd Across bridge 001 To rin[...]

  • Страница 52

    SRB Configuration Examples BC-160 Bridging and IBM N etworking Configuratio n Guide Access lists are scanned in order . In the foll owing e xample, the first list denies all entries beginning with the letters ABC, including one named ABCD . This voids the second command, because the entry permitting a name with ABCD com es after the entry denying i[...]

  • Страница 53

    Administrative Access Fi lters—Filtering SNAP Fr ames on Output Example Configuring Source-Route Bri dging BC-161 Administrativ e Access Filters—Filter i ng SNAP F rames on Output Example Figure 68 shows a router connecting four T oken Rings. Figure 68 Router Filtering SNAP Fra mes on Output The follo wing example allo ws only AppleT alk Phas e[...]

  • Страница 54

    SRB Configuration Examples BC-162 Bridging and IBM N etworking Configuratio n Guide access-list 203 permit 0xE0E0 0x0101 access-list 203 deny 0x0000 0xFFFF Note that it is not necessary to check for an LSAP of 0xAAAA when f ilt ering SN AP-encapsulated AppleT alk packets, because for source-route bri dging, the use of type f ilters implies SN AP en[...]

  • Страница 55

    Access Filters Example Configuring Source-Route Bri dging BC-163 Access Filters Example Figure 69 shows two routers connecting two T oken Rings to an FDDI backbone. Figure 69 Network Configuration Using NetBI OS Access Filters Suppose you want to pe rmit the IBM 3174 cluster controll ers to access the FEP at address 0110.2222.3333 , and also want t[...]

  • Страница 56

    SRB Configuration Examples BC-164 Bridging and IBM N etworking Configuratio n Guide A utonomous Switching Example The following e xample enables use of autonomous switching between two ciscoBus T oken Ring interfaces in the same router . Frames entering T oken Ring interf aces 0 or 1 will be autonomously switched to the other interface. ! global co[...]