- •About This Guide
- •Finding Information in this Guide
- •Summary of TR-in-FE Module Features
- •TR-in-FE Concepts
- •What is Token Ring-in-Fast Ethernet (TR-in-FE)?
- •TR-in-FE Compared to Traditional Methods
- •3Com Token Ring-in-Fast Ethernet System
- •Token Ring-in-Fast Ethernet Module
- •How TR-in-FE Works
- •Token Ring Frames
- •Virtual LANs (VLANS)
- •What is a VLAN
- •Advantages of VLAN
- •Port-Based Distribution
- •Installing And Setting Up The Module
- •Following Safety Information
- •Pre-installation Procedure
- •Post-Installation Checks
- •LED Summary
- •Checking the Power Supply
- •Checking the Physical Connections
- •Jumper Settings
- •Accessing Management Features
- •The VT100 Console
- •Choice Field
- •Entry Field
- •List Boxes
- •Key Board Shortcuts
- •Correcting Text Entries
- •Default Users
- •Console Menu Map
- •The LCD Console
- •Logging On
- •Logging Off
- •Automatic Logout
- •Configuring The TR-in-FE Module
- •Setting Up a Module
- •Bridge Parameters
- •Spanning Tree
- •Source Routing
- •Setting Up a VLAN
- •TR VLAN Info Setup Screen
- •TR VLAN Setup Screen
- •Monitoring The TR-in-FE Module
- •TR-in-FE Module Statistics Map
- •Statistics Overview
- •Clearing Screen Counters
- •Safety Information
- •Important Safety Information
- •L’information de Sécurité Importante
- •Wichtige Sicherheitsinformationen
- •TR-in-FE Module Technical Specifications
- •Online Technical Services
- •3Com Bulletin Board Service
- •Access by Modem
- •Access by ISDN
- •World Wide Web Site
- •3ComForum on CompuServe
- •3ComFacts Automated Fax Service
- •Support from Your Network Supplier
- •Support from 3Com
- •Returning Products for Repair
- •3Com Corporation Limited Warranty
Part No. 99045
Published October 1997
SUPERSTACKII SWITCH2000 TR
For SuperStack II Switch 2000 TR
3Com Corporation ■ 5400 Bayfront Plaza■ Santa Clara, California■
© 3Com Corporation, 1997. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without permission from 3Com Corporation.
3Com Corporation reserves the right to revise this documentation and to make changes in content from time to time without obligation on the part of 3Com Corporation to provide notiﬁcation of such revision or change.
3Com Corporation provides this documentation without warranty of any kind, either implied or expressed, including, but not limited to, the implied warranties of merchantability and ﬁtness for a particular purpose. 3Com may make improvements or changes in the product(s) and/or the program(s) described in this documentation at any time.
UNITED STATES GOVERNMENT LEGENDS:
If you are a United States government agency, then this documentation and the software described herein are provided to you subject to the following restricted rights:
For units of the Department of Defense:
Restricted Rights Legend: Use, duplication or disclosure by the Government is subject to restrictions as set forth in subparagraph (c) (1) (ii) for restricted Rights in Technical Data and Computer Software clause at 48 C.F.R.
For civilian agencies:
Restricted Rights Legend: Use, reproduction or disclosure is subject to restrictions set forth in subparagraph (a) through (d) of the Commercial Computer Software - Restricted Rights Clause at 48 C.F.R.
If there is any software on removable media described in this documentation, it is furnished under a license agreement included with the product as a separate document, in the hard copy documentation, or on the removable media in a directory ﬁle named LICENSE.TXT. If you are unable to locate a copy, please contact 3Com and a copy will be provided to you.
Unless otherwise indicated, 3Com registered trademarks are registered in the United States and may or may not be registered in other countries.
3Com, AccessBuilder, Boundary Routing, CardFacts, LanScanner, LinkBuilder, NETBuilder, NETBuilder II, NetFacts, Parallel Tasking, ViewBuilder, EtherDisk, EtherLink, EtherLink Plus, EtherLink II, SmartAgent, SuperStack II, TokenLink, TokenLink Plus, TokenDisk and Transcend are registered trademarks of 3Com Corporation. 3TECH, CacheCard, FDDILink, FMS, NetProbe and
CompuServe is a registered trademark of CompuServe, Inc.
Other brand and product names may be registered trademarks or trademarks of their respective holders
Guide written by Ken Wisman.
ABOUT THIS GUIDE
Checking the Power Supply
Finding Information in this Guide 2
Checking that the
Checking the Physical Connections
About the SuperStack II Switch 2000 TR
The VT100 Console
Key Board Shortcuts
What is Token
Correcting Text Entries
Console Menu Map
The LCD Console
Token Ring Frames
Virtual LANs (VLANS)
What is a VLAN
Advantages of VLAN
Setting Up a Module
INSTALLING AND SETTINGUPTHEMODULE
Following Safety Information
Setting Up a VLAN
TR VLAN Info Setup Screen
TR VLAN Setup Screen
6 MONITORING THE
Port Statistics (Trafﬁc)
Clearing Screen Counters
A SAFETY INFORMATION
Important Safety Information
L’information de Sécurité Importante
BSCREEN ACCESS RIGHTS
Does the Cable Provide Sufﬁcient Bandwidth?
D TECHNICAL SUPPORT
Online Technical Services
3Com Bulletin Board Service
Access by Modem
Access by ISDN
World Wide Web Site
3ComForum on CompuServe
3ComFacts Automated Fax Service
Support from Your Network Supplier
Support from 3Com
Returning Products for Repair
3COM CORPORATION LIMITEDWARRANTY
This guide provides the information needed to install and conﬁgure the SuperStack II Switch 2000 TR Token
SuperStack II Switch 2000 TR User Guide.
The SuperStack II Switch 2000 TR Token
The Release Notes shipped with the
In this manual the term
The device into which the
Name used in guide:
Switch 2000 TR
SuperStack II Switch 2000 TR
2 CHAPTER: ABOUTTHISGUIDE
Finding Information in this Guide
The following table shows you where to ﬁnd spe- ciﬁc information within this guide.
Chapter 1, “Overview”
beneﬁts, and con-
Planning your net-
Chapter 1, “Overview”
Chapter 3, “Installing And Setting Up The Mod-
Chapter 3, “Installing And Setting Up The Mod-
Chapter 5, “Conﬁguring The
Appendix A, “Safety Information”
Chapter 4, “Accessing Management Features”
Appendix B, “Screen Access Rights”
Chapter 6, “Monitoring The
Appendix D, “Technical Support”
Table 1 and Table 2 list icon and text conventions that are used throughout this guide.
Table 1 Notice Icons
Important features or instructions.
Alerts you to personal safety risks, system
damage, or loss of data.
Risk of severe personal injury.
This typeface is used to represent information as it
appears on the screen.
The word “enter” means type something and then
press the Return or Enter key. Do not press the
Return or Enter key when an instruction simply says
Key names appear in text in one of two ways:
Referred to by their labels, such as “the Return
key” or “the Escape key”.
Enclosed within brackets, such as [Return] or [Esc].
If you must press two or more keys simultaneously,
the key names are linked with a plus sign (+). For
Bold text denotes key features.