3COM 2000 TR User Manual

Size:
671.65 Kb
Download

®

http://www.3com.com/

Part No. 99045

Published October 1997

SUPERSTACKII SWITCH2000 TR

TOKENRING-IN-FASTETHERNETMODULE

For SuperStack II Switch 2000 TR

3Com Corporation 5400 Bayfront PlazaSanta Clara, California95052-8154

© 3Com Corporation, 1997. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without permission from 3Com Corporation.

3Com Corporation reserves the right to revise this documentation and to make changes in content from time to time without obligation on the part of 3Com Corporation to provide notification of such revision or change.

3Com Corporation provides this documentation without warranty of any kind, either implied or expressed, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. 3Com may make improvements or changes in the product(s) and/or the program(s) described in this documentation at any time.

UNITED STATES GOVERNMENT LEGENDS:

If you are a United States government agency, then this documentation and the software described herein are provided to you subject to the following restricted rights:

For units of the Department of Defense:

Restricted Rights Legend: Use, duplication or disclosure by the Government is subject to restrictions as set forth in subparagraph (c) (1) (ii) for restricted Rights in Technical Data and Computer Software clause at 48 C.F.R.52.227-7013.3Com Corporation, 5400 Bayfront Plaza, Santa Clara, California95052-8145.

For civilian agencies:

Restricted Rights Legend: Use, reproduction or disclosure is subject to restrictions set forth in subparagraph (a) through (d) of the Commercial Computer Software - Restricted Rights Clause at 48 C.F.R.52.227-19and the limitations set forth in 3Com Corporation’s standard commercial agreement for the software. Unpublished rights reserved under the copyright laws of the United States.

If there is any software on removable media described in this documentation, it is furnished under a license agreement included with the product as a separate document, in the hard copy documentation, or on the removable media in a directory file named LICENSE.TXT. If you are unable to locate a copy, please contact 3Com and a copy will be provided to you.

Unless otherwise indicated, 3Com registered trademarks are registered in the United States and may or may not be registered in other countries.

3Com, AccessBuilder, Boundary Routing, CardFacts, LanScanner, LinkBuilder, NETBuilder, NETBuilder II, NetFacts, Parallel Tasking, ViewBuilder, EtherDisk, EtherLink, EtherLink Plus, EtherLink II, SmartAgent, SuperStack II, TokenLink, TokenLink Plus, TokenDisk and Transcend are registered trademarks of 3Com Corporation. 3TECH, CacheCard, FDDILink, FMS, NetProbe and Star-Tekare trademarks of 3Com Corporation. 3ComFacts, is a service mark of 3Com Corporation.

CompuServe is a registered trademark of CompuServe, Inc.

Other brand and product names may be registered trademarks or trademarks of their respective holders

Guide written by Ken Wisman.

 

 

 

 

 

 

 

 

 

 

Installation 3-2

 

 

 

 

 

 

ABOUT THIS GUIDE

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Post-Installation Checks

3-3

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Introduction

1

 

 

 

 

 

 

LED Summary

3-3

 

 

 

Terminology

1

 

 

 

 

 

 

Checking the Power Supply

3-4

 

 

Finding Information in this Guide 2

 

 

 

Checking that the TR-in-FEModule is Installed

 

Conventions

2

 

 

 

 

 

 

Correctly

 

3-5

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Checking the Physical Connections

3-5

1

 

 

 

 

 

 

 

 

 

Jumper Settings

3-6

 

 

 

 

OVERVIEW

 

 

 

 

 

 

 

 

 

 

 

 

About the SuperStack II Switch 2000 TR

 

4

 

 

 

 

 

 

 

 

 

ACCESSING MANAGEMENTFEATURES

 

 

TR-in-FE Module

1-1

 

 

 

TR-in-FE Benefits

1-2

 

 

 

 

The VT100 Console

4-1

 

 

 

Summary of TR-in-FE Module Features

1-3

 

 

Choice Field

4-1

 

 

 

 

Hardware

1-3

 

 

 

 

 

Entry Field

4-1

 

 

 

 

Software

1-3

 

 

 

 

 

 

Button

4-2

 

 

 

 

 

 

 

 

 

 

 

 

 

 

List Boxes

4-2

 

 

 

2

TR-IN-FE CONCEPTS

 

 

 

 

Key Board Shortcuts4-2

 

 

What is Token Ring-in-FastEthernet(TR-in-FE)? 2-1

Correcting Text Entries

4-2

 

 

Default Users

 

4-3

 

 

 

TR-in-FE Compared to Traditional Methods

2-2

 

 

 

 

 

 

Console Menu Map

4-3

 

 

 

3Com Token Ring-in-FastEthernet System

2-2

 

 

 

 

 

The LCD Console

4-5

 

 

 

 

 

Token Ring-in-Fast Ethernet Module

2-2

 

 

 

 

 

 

 

Logging On

4-6

 

 

 

 

 

How TR-in-FE Works

2-3

 

 

 

 

 

 

 

 

 

 

 

 

 

Logging Off

4-7

 

 

 

 

 

Tunneling 2-5

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Automatic Logout

 

4-7

 

 

 

 

Requirements

2-5

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Token Ring Frames

2-5

 

5

 

 

 

 

 

 

 

 

Virtual LANs (VLANS)

2-7

 

 

CONFIGURING THE TR-IN-FE MODULE

 

 

What is a VLAN

 

2-7

 

 

 

 

TR-in-FE Module Configuration Map

5-1

 

 

Advantages of VLAN

2-7

 

 

 

Setting Up a Module

 

5-2

 

 

 

 

Port-Based Distribution

2-7

 

 

 

Bridge Parameters

 

5-3

 

 

3

 

 

 

 

 

 

 

 

 

Spanning Tree

5-3

 

 

INSTALLING AND SETTINGUPTHEMODULE

Source Routing

 

5-4

 

 

Following Safety Information3-1

Setting Up a VLAN 5-5

TR VLAN Info Setup Screen5-5

Pre-installation Procedure 3-1

 

TR VLAN Setup Screen5-5

6 MONITORING THE TR-IN-FE MODULE

TR-in-FE Module Statistics Map

6-1

 

Statistics Overview

6-2

 

 

Port Statistics (Traffic)

6-3

 

 

 

Clearing Screen Counters

6-4

 

 

 

 

 

A SAFETY INFORMATION

 

 

Important Safety Information

A-1

 

L’information de Sécurité Importante

A-1

Wichtige Sicherheitsinformationen

A-2

BSCREEN ACCESS RIGHTS

CTR-IN-FE MODULE TECHNICALSPECIFICATIONS

Environmental SpecificationsC-1

 

TR-in-FE Cable Specification

C-1

 

 

 

Does the Cable Provide Sufficient Bandwidth?C-2

 

Example C-2

 

 

 

 

 

 

 

 

 

D TECHNICAL SUPPORT

 

 

 

Online Technical Services

D-1

 

 

 

3Com Bulletin Board Service

D-1

 

 

Access by Modem

D-1

 

 

 

Access by ISDN

D-1

 

 

 

World Wide Web Site

D-1

 

 

 

3ComForum on CompuServe

D-2

 

 

3ComFacts Automated Fax Service

D-2

Support from Your Network Supplier

D-2

Support from 3Com

D-3

 

 

 

Returning Products for RepairD-3

3COM CORPORATION LIMITEDWARRANTY

ABOUTTHISGUIDE

Introduction

This guide provides the information needed to install and configure the SuperStack II Switch 2000 TR Token Ring-in-FastEthernet(TR-in-FE)Module. For more information about the switch itself, see the

SuperStack II Switch 2000 TR User Guide.

The SuperStack II Switch 2000 TR TokenRing-in-FastEthernet Module Guideis intended for use by network administrators responsible for installing and setting up networking equipment. It assumes a basic working knowledge of Local Area Networks, Token Ring Networks, and Ethernet. Basic TR-in-FE concepts are explained within this guide.

The Release Notes shipped with the TR-in-FEModule may contain information that updates or overrides information in this guide. You should always follow the information in the Release Notes if it is different from the information given in this guide.

Terminology

In this manual the term TR-in-FE Module is used when referring to the SuperStack II Switch 2000 TR TokenRing-in-FastEthernet Module.

The device into which the TR-in-FEModule is fitted, is known simply as theSwitch. An example of a Switch is 3Com’s SuperStack II Switch 2000 TR. This type of switch is often referred to as anedge-device, edge-switch orboundary switch.

Name used in guide:

Includes:

 

 

Switch 2000 TR

SuperStack II Switch 2000 TR

 

 

2 CHAPTER: ABOUTTHISGUIDE

Finding Information in this Guide

The following table shows you where to find spe- cific information within this guide.

Task

Location

 

 

Learning features,

Chapter 1, “Overview”

benefits, and con-

Chapter 2, “TR-in-FEConcepts”

cepts

 

Planning your net-

Chapter 1, “Overview”

work

Chapter 2, “TR-in-FEConcepts”

 

Chapter 3, “Installing And Setting Up The Mod-

 

ule”

 

Appendix C,“TR-in-FEModule Technical Specifi-

 

cations”

Installing the

Chapter 3, “Installing And Setting Up The Mod-

TR-in-FEModule

ule”

 

Chapter 5, “Configuring TheTR-in-FEModule”

 

Appendix A, “Safety Information”

Accessing screens

Chapter 4, “Accessing Management Features”

 

Appendix B, “Screen Access Rights”

Monitoring

Chapter 6, “Monitoring TheTR-in-FEModule”

the Module

 

Getting Technical

Appendix D, “Technical Support”

Support

 

 

 

Conventions

Table 1 and Table 2 list icon and text conventions that are used throughout this guide.

Table 1 Notice Icons

 

Icon

Type

 

 

Description

 

 

 

 

 

 

 

 

Information

Important features or instructions.

 

 

 

Note

 

 

 

 

 

 

Caution

Alerts you to personal safety risks, system

 

 

 

 

 

 

damage, or loss of data.

 

 

 

Warning

Risk of severe personal injury.

 

 

 

 

 

 

 

 

 

 

 

 

Table 2

 

Text Conventions

 

 

 

 

 

Convention

Description

 

 

 

 

 

 

Screen

 

This typeface is used to represent information as it

 

display

 

appears on the screen.

 

The words

The word “enter” means type something and then

 

“Enter” and

press the Return or Enter key. Do not press the

 

“Type”

 

Return or Enter key when an instruction simply says

 

 

 

 

“type.”

 

 

[Key] names

Key names appear in text in one of two ways:

 

 

 

 

Referred to by their labels, such as “the Return

 

 

 

 

 

key” or “the Escape key”.

 

 

 

 

Enclosed within brackets, such as [Return] or [Esc].

 

 

 

 

If you must press two or more keys simultaneously,

 

 

 

 

the key names are linked with a plus sign (+). For

 

 

 

 

example:

 

 

 

 

 

Press [Ctrl]+[Alt]+[Del].

 

Words in

 

Bold text denotes key features.

 

bold

 

 

 

 

 

 

 

 

 

 

 

OVERVIEW

1

This chapter describes the major features and benefits of the SuperStack II Switch 2000 TR TR-in-FEModule, including:

About the SuperStack II Switch 2000 TRTR-in-FEModule

TR-in-FEBenefits

Summary of TR-in-FEModule Features

About the SuperStack II Switch 2000 TR

TR-in-FEModule

The SuperStack II Switch 2000 TR TR-in-FEmodule combines Token Ring and Fast Ethernet (FE) for the purpose of utilizing FE as a backbone and method ofhigh-speedserver attachment for TR networks.TR-in-FEcomplements ATM and FDDI methods ofhigh-speedintegration by providing an option to help TR users evolve their network’s core infrastructure while preserving their existing equipment and applications.

TR-in-FEuses Fast Ethernet to transport natively formatted Token Ring frames. Both source route and transparent TR frame addressing information is maintained through the FE infrastructure. This allows standard TR workstations and servers to use the fast transport without modification, or special FE servers to communicate to the native TR community.

1-2 CHAPTER1: OVERVIEW

TR-in-FEBenefits

Increasingly, Token Ring users are deploying switches to segment their networks and to increase available bandwidth to their workgroups. This has resulted in a demand for more server bandwidth as well as high-speedaggregation and switching. Previously, those users wanting their Token Ring server bandwidth increased beyond 32 Mbps faced limited options. They could add either FDDI or ATM downlinks to their Token Ringswitches–optionsthat proved costly and complex. The TokenRing-in-FastEthernet(TR-in-FE)system offers a new, simpler option at a much lower cost.TR-in-FEoffers improvement in the following areas:

Scalability

TR switching

High-speedtechnologies

Wire-speedperformance

Flexibility

High-speedflexibility (choice of D/L technology)

Desktop flexibility (TR, Ethernet)

Common high-speedinfrastructure

Managability

Simple to configure and administer

Cost effective

TR-in-FEallows both Token Ring and Ethernet to share the same Fast Ethernet physical wiring infrastructure and server base without impacting network

performance. TR-in-FEaccomplishes this by introducing routing orSource-Routeto Transparent translational bridging.

Fast Ethernet is relatively well understood and easy to configure. The TR-in-FEoperates in both copper or fiber optic environments. Additionally, many tools exist to manage and administer Fast Ethernet due to its wide acceptance in the industry and its similarity to Ethernet.

TR-in-FEbenefits those MIS managers most interested in:

Preserving existing investments in TR infrastructure

Seeking low-cost,high-speedconnectivity

Combining Ethernet and Token Ring for common server access

Fast Ethernet is less expensive than other options, such as FDDI and ATM. Using FE, the price per port for server attachment is 20% that of ATM and FDDI.

TR switching allows the install base of TR equipment and its configuration to remain intact and operational while allowing for an upgrade to higher performance through microsegmentation and interfaces to higher speed technologies. TR-in-FErepresents one option for integrating Fast Ethernet into the TR switched environment.

Summary of TR-in-FEModule Features

1-3

Summary of TR-in-FEModule Features

The following lists summarize the features of the

SuperStack II Switch 2000 TR TR-in-FEmodule.

Hardware

Multimode fiber attachment using duplex connectors or copper cable attachment using standard RJ-45

Full duplex operation

Flow control

LEDs to indicate link integrity and link activity

Compliance with FCC Class A, CISPR A, and CE

4544 byte frame size for improved performance

Easy jumper-settingfor crossover switch (copper version only)

Software

Software configurable hardware

16 VLAN hardware support

IEEE 802.1q compatible

Frame size limiter of 1500 bytes for standard infrastructure

1-4 CHAPTER1: OVERVIEW