3COM 2000 TR User Manual
Size:
671.65 Kb
Download

®

http://www.3com.com/

Part No. 99045

Published October 1997

SUPERSTACKII SWITCH2000 TR

TOKENRING-IN-FASTETHERNETMODULE

For SuperStack II Switch 2000 TR

3Com Corporation 5400 Bayfront PlazaSanta Clara, California95052-8154

© 3Com Corporation, 1997. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without permission from 3Com Corporation.

3Com Corporation reserves the right to revise this documentation and to make changes in content from time to time without obligation on the part of 3Com Corporation to provide notification of such revision or change.

3Com Corporation provides this documentation without warranty of any kind, either implied or expressed, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. 3Com may make improvements or changes in the product(s) and/or the program(s) described in this documentation at any time.

UNITED STATES GOVERNMENT LEGENDS:

If you are a United States government agency, then this documentation and the software described herein are provided to you subject to the following restricted rights:

For units of the Department of Defense:

Restricted Rights Legend: Use, duplication or disclosure by the Government is subject to restrictions as set forth in subparagraph (c) (1) (ii) for restricted Rights in Technical Data and Computer Software clause at 48 C.F.R.52.227-7013.3Com Corporation, 5400 Bayfront Plaza, Santa Clara, California95052-8145.

For civilian agencies:

Restricted Rights Legend: Use, reproduction or disclosure is subject to restrictions set forth in subparagraph (a) through (d) of the Commercial Computer Software - Restricted Rights Clause at 48 C.F.R.52.227-19and the limitations set forth in 3Com Corporation’s standard commercial agreement for the software. Unpublished rights reserved under the copyright laws of the United States.

If there is any software on removable media described in this documentation, it is furnished under a license agreement included with the product as a separate document, in the hard copy documentation, or on the removable media in a directory file named LICENSE.TXT. If you are unable to locate a copy, please contact 3Com and a copy will be provided to you.

Unless otherwise indicated, 3Com registered trademarks are registered in the United States and may or may not be registered in other countries.

3Com, AccessBuilder, Boundary Routing, CardFacts, LanScanner, LinkBuilder, NETBuilder, NETBuilder II, NetFacts, Parallel Tasking, ViewBuilder, EtherDisk, EtherLink, EtherLink Plus, EtherLink II, SmartAgent, SuperStack II, TokenLink, TokenLink Plus, TokenDisk and Transcend are registered trademarks of 3Com Corporation. 3TECH, CacheCard, FDDILink, FMS, NetProbe and Star-Tekare trademarks of 3Com Corporation. 3ComFacts, is a service mark of 3Com Corporation.

CompuServe is a registered trademark of CompuServe, Inc.

Other brand and product names may be registered trademarks or trademarks of their respective holders

Guide written by Ken Wisman.

 

 

 

 

 

 

 

 

 

 

Installation 3-2

 

 

 

 

 

 

ABOUT THIS GUIDE

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Post-Installation Checks

3-3

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Introduction

1

 

 

 

 

 

 

LED Summary

3-3

 

 

 

Terminology

1

 

 

 

 

 

 

Checking the Power Supply

3-4

 

 

Finding Information in this Guide 2

 

 

 

Checking that the TR-in-FEModule is Installed

 

Conventions

2

 

 

 

 

 

 

Correctly

 

3-5

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Checking the Physical Connections

3-5

1

 

 

 

 

 

 

 

 

 

Jumper Settings

3-6

 

 

 

 

OVERVIEW

 

 

 

 

 

 

 

 

 

 

 

 

About the SuperStack II Switch 2000 TR

 

4

 

 

 

 

 

 

 

 

 

ACCESSING MANAGEMENTFEATURES

 

 

TR-in-FE Module

1-1

 

 

 

TR-in-FE Benefits

1-2

 

 

 

 

The VT100 Console

4-1

 

 

 

Summary of TR-in-FE Module Features

1-3

 

 

Choice Field

4-1

 

 

 

 

Hardware

1-3

 

 

 

 

 

Entry Field

4-1

 

 

 

 

Software

1-3

 

 

 

 

 

 

Button

4-2

 

 

 

 

 

 

 

 

 

 

 

 

 

 

List Boxes

4-2

 

 

 

2

TR-IN-FE CONCEPTS

 

 

 

 

Key Board Shortcuts4-2

 

 

What is Token Ring-in-FastEthernet(TR-in-FE)? 2-1

Correcting Text Entries

4-2

 

 

Default Users

 

4-3

 

 

 

TR-in-FE Compared to Traditional Methods

2-2

 

 

 

 

 

 

Console Menu Map

4-3

 

 

 

3Com Token Ring-in-FastEthernet System

2-2

 

 

 

 

 

The LCD Console

4-5

 

 

 

 

 

Token Ring-in-Fast Ethernet Module

2-2

 

 

 

 

 

 

 

Logging On

4-6

 

 

 

 

 

How TR-in-FE Works

2-3

 

 

 

 

 

 

 

 

 

 

 

 

 

Logging Off

4-7

 

 

 

 

 

Tunneling 2-5

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Automatic Logout

 

4-7

 

 

 

 

Requirements

2-5

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Token Ring Frames

2-5

 

5

 

 

 

 

 

 

 

 

Virtual LANs (VLANS)

2-7

 

 

CONFIGURING THE TR-IN-FE MODULE

 

 

What is a VLAN

 

2-7

 

 

 

 

TR-in-FE Module Configuration Map

5-1

 

 

Advantages of VLAN

2-7

 

 

 

Setting Up a Module

 

5-2

 

 

 

 

Port-Based Distribution

2-7

 

 

 

Bridge Parameters

 

5-3

 

 

3

 

 

 

 

 

 

 

 

 

Spanning Tree

5-3

 

 

INSTALLING AND SETTINGUPTHEMODULE

Source Routing

 

5-4

 

 

Following Safety Information3-1

Setting Up a VLAN 5-5

TR VLAN Info Setup Screen5-5

Pre-installation Procedure 3-1

 

TR VLAN Setup Screen5-5

6 MONITORING THE TR-IN-FE MODULE

TR-in-FE Module Statistics Map

6-1

 

Statistics Overview

6-2

 

 

Port Statistics (Traffic)

6-3

 

 

 

Clearing Screen Counters

6-4

 

 

 

 

 

A SAFETY INFORMATION

 

 

Important Safety Information

A-1

 

L’information de Sécurité Importante

A-1

Wichtige Sicherheitsinformationen

A-2

BSCREEN ACCESS RIGHTS

CTR-IN-FE MODULE TECHNICALSPECIFICATIONS

Environmental SpecificationsC-1

 

TR-in-FE Cable Specification

C-1

 

 

 

Does the Cable Provide Sufficient Bandwidth?C-2

 

Example C-2

 

 

 

 

 

 

 

 

 

D TECHNICAL SUPPORT

 

 

 

Online Technical Services

D-1

 

 

 

3Com Bulletin Board Service

D-1

 

 

Access by Modem

D-1

 

 

 

Access by ISDN

D-1

 

 

 

World Wide Web Site

D-1

 

 

 

3ComForum on CompuServe

D-2

 

 

3ComFacts Automated Fax Service

D-2

Support from Your Network Supplier

D-2

Support from 3Com

D-3

 

 

 

Returning Products for RepairD-3

3COM CORPORATION LIMITEDWARRANTY

ABOUTTHISGUIDE

Introduction

This guide provides the information needed to install and configure the SuperStack II Switch 2000 TR Token Ring-in-FastEthernet(TR-in-FE)Module. For more information about the switch itself, see the

SuperStack II Switch 2000 TR User Guide.

The SuperStack II Switch 2000 TR TokenRing-in-FastEthernet Module Guideis intended for use by network administrators responsible for installing and setting up networking equipment. It assumes a basic working knowledge of Local Area Networks, Token Ring Networks, and Ethernet. Basic TR-in-FE concepts are explained within this guide.

The Release Notes shipped with the TR-in-FEModule may contain information that updates or overrides information in this guide. You should always follow the information in the Release Notes if it is different from the information given in this guide.

Terminology

In this manual the term TR-in-FE Module is used when referring to the SuperStack II Switch 2000 TR TokenRing-in-FastEthernet Module.

The device into which the TR-in-FEModule is fitted, is known simply as theSwitch. An example of a Switch is 3Com’s SuperStack II Switch 2000 TR. This type of switch is often referred to as anedge-device, edge-switch orboundary switch.

Name used in guide:

Includes:

 

 

Switch 2000 TR

SuperStack II Switch 2000 TR

 

 

2 CHAPTER: ABOUTTHISGUIDE

Finding Information in this Guide

The following table shows you where to find spe- cific information within this guide.

Task

Location

 

 

Learning features,

Chapter 1, “Overview”

benefits, and con-

Chapter 2, “TR-in-FEConcepts”

cepts

 

Planning your net-

Chapter 1, “Overview”

work

Chapter 2, “TR-in-FEConcepts”

 

Chapter 3, “Installing And Setting Up The Mod-

 

ule”

 

Appendix C,“TR-in-FEModule Technical Specifi-

 

cations”

Installing the

Chapter 3, “Installing And Setting Up The Mod-

TR-in-FEModule

ule”

 

Chapter 5, “Configuring TheTR-in-FEModule”

 

Appendix A, “Safety Information”

Accessing screens

Chapter 4, “Accessing Management Features”

 

Appendix B, “Screen Access Rights”

Monitoring

Chapter 6, “Monitoring TheTR-in-FEModule”

the Module

 

Getting Technical

Appendix D, “Technical Support”

Support

 

 

 

Conventions

Table 1 and Table 2 list icon and text conventions that are used throughout this guide.

Table 1 Notice Icons

 

Icon

Type

 

 

Description

 

 

 

 

 

 

 

 

Information

Important features or instructions.

 

 

 

Note

 

 

 

 

 

 

Caution

Alerts you to personal safety risks, system

 

 

 

 

 

 

damage, or loss of data.

 

 

 

Warning

Risk of severe personal injury.

 

 

 

 

 

 

 

 

 

 

 

 

Table 2

 

Text Conventions

 

 

 

 

 

Convention

Description

 

 

 

 

 

 

Screen

 

This typeface is used to represent information as it

 

display

 

appears on the screen.

 

The words

The word “enter” means type something and then

 

“Enter” and

press the Return or Enter key. Do not press the

 

“Type”

 

Return or Enter key when an instruction simply says

 

 

 

 

“type.”

 

 

[Key] names

Key names appear in text in one of two ways:

 

 

 

 

Referred to by their labels, such as “the Return

 

 

 

 

 

key” or “the Escape key”.

 

 

 

 

Enclosed within brackets, such as [Return] or [Esc].

 

 

 

 

If you must press two or more keys simultaneously,

 

 

 

 

the key names are linked with a plus sign (+). For

 

 

 

 

example:

 

 

 

 

 

Press [Ctrl]+[Alt]+[Del].

 

Words in

 

Bold text denotes key features.

 

bold