3Com Technologies reserves the right to revise this documentation and to make changes in content from
time to time without obligation on the part of 3Com Technologies to provide notification of such revision
or change.
3Com Technologies provides this documentation without warranty of any kind, either implied or expressed,
including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose.
3Com may make improvements or changes in the product(s) and/or the program(s) described in this
documentation at any time.
UNITED STATES GOVERNMENT LEGENDS:
If you are a United States government agency, then this documentation and the software described herein
are provided to you subject to the following restricted rights:
For units of the Department of Defense:
Restricted Rights Legend:
forth in subparagraph (c) (1) (ii) for Restricted Rights in Technical Data and Computer Software Clause at 48
C.F.R. 52.227-7013. 3Com Technologies, c/o 3Com Limited, 3Com Centre, Boundary Way, Hemel
Hempstead, Herts, HP2 7YU, United Kingdom.
For civilian agencies:
Restricted Rights Legend:
(a) through (d) of the Commercial Computer Software - Restricted Rights Clause at 48 C.F.R. 52.227-19 and
the limitations set forth in 3Com Corporation’s standard commercial agreement for the software.
Unpublished rights reserved under the copyright laws of the United States.
If there is any software on removable media described in this documentation, it is furnished under a license
agreement included with the product as a separate document, in the hard copy documentation, or on the
removable media in a directory file named LICENSE.TXT. If you are unable to locate a copy, please contact
3Com and a copy will be provided to you.
Unless otherwise indicated, 3Com registered trademarks are registered in the United States and may or may
not be registered in other countries.
3Com, EtherLink, SuperStack, and Transcend are registered trademarks of 3Com Corporation and 3TECH is
a trademark of 3Com Corporation. 3ComFacts is a service mark of 3Com Corporation.
CompuServe is a registered trademark of CompuServe, Inc. Other brand and product names may be
registered trademarks or trademarks of their respective holders.
3Com Corporation, 1998.
Use, duplication, or disclosure by the Government is subject to restrictions as set
Use, reproduction, or disclosure is subject to restrictions set forth in subparagraph
All rights reserved. No part of this documentation may be
Electromagnetic
Compatibility
ii
FCC Statement
This equipment has been tested with a class A computing device and has been found to comply with part
15 of FCC Rules. Operation in a residential area may cause unacceptable interference to radio and TV
receptions, requiring the operator to take whatever steps are necessary to correct the interference.
CSA Statement
This Class A digital apparatus meets all requirements of the Canadian interference-Causing Equipment
Regulations.
Cet appareil numérique de la classe A respecte toutes les exigences du Règlement sur le matériel brouilleur
du Canada.
VCCI Statement
Information To The User
If this equipment does cause interference to radio or television reception, which can be determined by
turning the equipment off and on, the user is encouraged to try to correct the interference by one or more
of the following measures:
■
Reorient the receiving antenna.
Relocate the equipment with respect to the receiver.
■
■
Move the equipment away from the receiver.
■
Plug the equipment into a different outlet so that equipment and receiver are on different branch
circuits.
If necessary, the user should consult the dealer or an experienced radio/television technician for additional
suggestions. The user may find the following booklet prepared by the Federal Communications Commission
helpful:
How to Identify and Resolve Radio-TV Interference Problems
This booklet is available from the U.S. Government Printing Office, Washington, DC 20402, Stock No.
004-000-00345-4.
In order to meet FCC emissions limits, this equipment must be used only with cables which comply with
IEEE 802.3.
iii
iv
C
ONTENTS
A
BOUT THIS GUIDE
Introduction 1
Terminology 1
Finding Information in This Guide 2
Conventions 3
Command Syntax Symbols 4
Line-Editing Commands 5
Related Publications 5
S
1
WITCH
About the Switch 3800 1-1
Summary of Features 1-1
Network Configuration Example 1-5
Switch 3800 Front View 1-7
Switch 3800 Rear View 1-9
Factory Defaults 1-10
3800 O
Port Connections 1-3
Full-duplex 1-3
Port Redundancy 1-3
Load Sharing 1-4
Switch Operation 1-4
Virtual LANs (VLANs) 1-4
Priority Access Control Enabled (PACE) 1-5
Spanning Tree Protocol (STP) 1-5
IP Unicast Routing 1-5
Ports 1-7
LEDs 1-8
Power Socket 1-9
Serial Number 1-9
MAC Address 1-10
Console Port 1-10
VERVIEW
v
NSTALLATION AND SETUP
I
2
Following Safety Information 2-1
Determining the Switch 3800 Location 2-1
Configuration Rules for Ethernet 2-2
Installing the Switch 3800 2-2
Rack Mounting 2-2
Free-Standing 2-3
Stacking the Switch and Other Devices 2-4
Connecting Equipment to the Console Port 2-4
Powering-up the Switch 2-6
Checking the Installation 2-6
Power On Self-Test (POST) 2-6
Logging on for the First Time 2-6
Reducing the Traffic Load 9-13
RMON and the Switch 9-14
RMON Features of the Switch 9-14
About Event Actions 9-15
10
S
OFTWARE UPGRADE AND BOOT OPTIONS
Upgrading the Software 10-1
Rebooting the Switch 10-2
Saving Configuration Changes 10-2
Returning to Factory Defaults 10-3
Boot Option Commands 10-3
A
x
AFETY INFORMATION
S
Important Safety Information A-1
Power A-1
Power Cord A-2
Fuse A-3
Fiber Optic Ports A-3
Lithium Battery A-4
L’information de Sécurité Importante A-4
Power A-5
Cordon électrique A-6
Fuse A-6
Ports pour fibres optiques A-7
Batterie au lithium A-7
Wichtige Sicherheitsinformationen A-8
Power A-8
Power Cord A-9
Fuse A-9
Faseroptikanschlüsse - Optische Sicherheit A-10
Lithiumbatterie A-11
B
C
D
ECHNICAL SPECIFICATIONS
T
T
ROUBLESHOOTING
LEDs C-1
Using the Command-Line Interface C-2
VLANs C-4
STP C-5
Routing C-6
ECHNICAL SUPPORT
T
Online Technical Services D-1
World Wide Web Site D-1
3Com Bulletin Board Service D-1
Access by Analog Modem D-1
Access by Digital Modem D-2
3ComFactsSM Automated Fax Service D-2
3ComForum on CompuServe® Online Service D-3
Support from Your Network Supplier D-3
Support from 3Com D-4
Returning Products for Repair D-5
xi
G
LOSSARY
I
NDEX
3COM C
ORPORATION LIMITED WARRANTY
xii
BOUT
A
About This Guide provides an overview of this guide, describes guide
conventions, tells you where to look for specific information and lists
other publications that may be useful.
T
HIS
G
UIDE
IntroductionThis guide provides the required information to install and configure
the SuperStack
This guide is intended for use by network administrators who are
responsible for installing and setting up network equipment. It
assumes a basic working knowledge of:
■ Local Area Networks (LANs)
■ Ethernet concepts
■ Ethernet switching and bridging concepts
■ Simple Network Management Protocol (SNMP)
■ IP Routing
The Release Notes shipped with the Switch 3800 may contain
information that updates or overrides information in this guide. You
should always follow the information in the Release Notes if it is
different from the information given in this guide.
TerminologyThroughout this guide, the term Switch 3800 is used to refer to the
SuperStack II Switch 3800.
For definitions of other terms used in this guide, refer to the
“Glossary,” located at the end of the user guide.
®
II Switch 3800 (3C16910).
The terms Forwarding Database and Switch Database are
interchangeable.
2ABOUT THIS GUIDE
Finding
Information in This
Guide
This table shows where to find specific information in this guide.
TaskLocation
Learning conceptsChapter 1, “Switch 3800 Overview”
Installing the Switch 3800Chapter 2, “Installation and Setup”
Appendix A, “Safety Information”
Setting up user accountsChapter 3, “Accessing The Switch”
Understanding the
Command-Line Interface
Creating a VLANChapter 5, “Virtual LANs (VLANs)”
Understanding the Switch
Forwarding Database (FDB)
Configuring Spanning Tree
Protocol parameters
Configuring IP Unicast Routing Chapter 8, “IP Unicast Routing
MonitoringChapter 9, “Status Monitoring and Statistics”
Saving the Switch configuration Chapter 10, “Software Upgrade and Boot
Upgrading the Switch software Chapter 10, “Software Upgrade and Boot
ConventionsTable 1 and Table 2 list conventions that are used throughout this
guide.
Table 1 Notice Icons
IconNotice TypeAlerts you to...
NoteImportant features or instructions
CautionRisk of personal injury, system damage, or loss
of data
WarningRisk of severe personal injury
Table 2 Text Conventions
ConventionDescription
Screen displays This typeface represents information as it appears on the
screen.
The words “enter”
and “type”
When you see the word “enter” in this guide, you must
type something, and then press the Return or Enter key. Do
not press the Return or Enter key when an instruction
simply says “type.”
[Key] namesKey names appear in text in one of two ways:
■ Referred to by their labels, such as “the Return key” or
“the Escape key”
■ Written with brackets, such as [Return] or [Esc]
If you must press two or more keys simultaneously, the key
names are linked with a plus sign (+). Example:
Press [Ctrl]+[Alt]+[Del].
Words in italicized
type
Words in boldface
Italics emphasize a point or denote new terms at the place
where they are defined in the text.
Bold text denotes key features.
type
4ABOUT THIS GUIDE
Command Syntax
Symbols
You may see a variety of symbols shown as part of the command
syntax. These symbols explain how to enter the command, and you do
not type them as part of the command itself. Table 3 summarizes
command syntax symbols.
Table 3 Command Syntax Symbols
SymbolDescription
angle brackets < >Enclose a variable or value. You must specify the variable or value. For example, in
square brackets [ ]Enclose a required value or list of required arguments. One or more values or
vertical bar |Separates mutually exclusive items in a list, one of which must be entered. For
braces { }Enclose an optional value or a list of optional arguments. One or more values or
the syntax
config vlan <name> ipaddress <ip_address>
you must supply a VLAN name for <name> and an address for <ip_address> when
entering the command. Do not type the angle brackets.
arguments can be specified. For example, in the syntax
disable vlan [<name> | all]
you must specify either the VLAN name for <name>, or the keyword “all” when
entering the command. Do not type the square brackets.
example, in the syntax
config snmp community [read | write] <string>
you must specify either the read or write community string in the command. Do not
type the vertical bar.
arguments can be specified. For example, in the syntax
show vlan {<name> | all}
you can specify either a particular VLAN or the keyword “all.” If you do not specify
an argument, the command will show all VLANs. Do not type the braces.
Line-Editing Commands5
Line-Editing
Commands
Table 4 describes the line-editing commands available using the
command-line interface.
Table 4 Line-Editing Commands
CommandDescription
BackspaceDeletes character to the left of cursor and shifts remainder of line to left.
Delete or [Ctrl] + DDeletes character under cursor and shifts remainder of line to left.
[Ctrl] + KDeletes characters from under cursor to the end of the line.
InsertToggles on and off. When toggled on, inserts text and pushes previous text to right.
Left ArrowMoves cursor to left.
Right ArrowMoves cursor to right.
Home or [Ctrl]+AMoves cursor to first character in line.
End or [Ctrl]+EMoves cursor to last character in line.
[Ctrl]+LClears the screen and moves the cursor to the beginning of the line.
Up ArrowDisplays the previous command in the command history buffer, and places cursor at
Down ArrowDisplays the next command in the command history buffer, and places cursor at end
end of command.
of command.
The command syntax is explained in Chapter 4.
Related
Publications
The Switch 3800 documentation set includes the following:
■ SuperStack II Switch 3800 Quick Reference Guide.
Part Number DQA1691-OAAA01.
■ SuperStack II Switch 3800 Quick Installation Guide.
Part Number DIA1691-OAAA01.
■ SuperStack II Switch 3800 Release Note.
Part Number DNA1691-OAAA01.
3Com’s home page can be found at the following web site:
■ http://www.3com.com/
6ABOUT THIS GUIDE
1
SWITCH 3800 OVERVIEW
This chapter describes the following:
■ Switch 3800 features
■ How to use the Switch 3800 in your network configuration
■ Switch 3800 front view
■ Switch 3800 rear view
■ Factory default settings
About the
Switch 3800
Summary of
Features
Network managers are currently faced with the challenge of creating
networks that can provide high-speed and high performance to serve
the needs of today’s network users.
Part of the 3Com SuperStack
®
II range of products, the Switch 3800
provides switching and IP Routing between multiple
10BASE-T/100BASE-TX ports and one Gigabit Ethernet port.
The Switch 3800 has the following features:
■ 24 autosensing 10BASE-T/100BASE-TX ports, one Gigabit Ethernet
port, and one redundant Gigabit Ethernet port
■ Support for 12,000 addresses in the Switch forwarding database
■ Fully nonblocking operation
■All ports transmit and receive packets at wire speed
■ Full-duplex operation
■ 2Mb packet memory
1-2CHAPTER 1: SWITCH 3800 OVERVIEW
■ Virtual LANs (VLANs)
■Support for 64 VLANs on a single Switch 3800
■Support for IEEE 802.1Q tagging
■Controls traffic (including broadcasts)
■Provides extra security
■Protocol-sensitive filtering for VLANs
■ Recognition of the Priority Access Control Enabled (PACE) bit set by
3Com Etherlink
■ Responds to 802.3x flow-control messages
■ Autonegotiation to IEEE 802.3z for Gigabit Ethernet
■ Load sharing
■ Spanning Tree Protocol (IEEE 802.1d)
■ Multiple spanning trees (64)
■ Wire speed Internet Protocol (IP) via Routing Information Protocol
®
adapters and the other devices that support PACE
(RIP) version 1 and RIP version 2
■ Wire speed Internet Protocol (IP) unicast routing
■ 3Com’s SuperStack
■Integrated network management
■19-inch rack or free-standing mounting
■ Agent support
■Simple Network Management Protocol (SNMP)
■Remote Monitoring (RMON) groups 1 to 4 — statistics, history,
®
II architecture
alarms, and events
■Repeater and Bridge Management Information Base (MIB)
■Easy software upgrades
■BOOTP for automatic Internet Protocol (IP) address configuration
■Local management
Summary of Features1-3
Port ConnectionsThe Switch 3800 has 24 autosensing 10BASE-T/100BASE-TX ports with
standard RJ-45 connectors, and supports one Gigabit Ethernet port,
and one redundant Gigabit Ethernet port with standard Gigabit
Interface Connectors (GBICs). You must have a 3Com-approved GBIC
module (such as 3C16911) inserted to make use of these ports. You
can connect other Gigabit Ethernet devices (such as 10/100 Switches
that have Gigabit Ethernet modules) to the Switch 3800. You can also
connect Switch 3800 devices to each other.
10BASE-T/100BASE-TX ports are configured as MDIX (crossover). A
crossover cable will typically be needed to connect these ports to
another 3Com Switch.
Full-duplexThe Switch 3800 provides full-duplex support for all ports. Full-duplex
allows frames to be transmitted and received simultaneously and, in
effect, doubles the bandwidth available on a link. All 10/100 Mbps
ports on the Switch 3800 autonegotiate for half- or full-duplex
operation.
Port RedundancyThe Switch 3800 has an optional redundant Gigabit Ethernet port to
provide resilient links. Using the redundant port (the redundant port is
labeled 25-Standby), you can dual-home to one or two Switches.
Figure 1-1 illustrates a Switch 3800 dual-homed to two different
Switches.
Dual-homed
Standby
Figure 1-1 Dual-homing configuration
Main
1-4CHAPTER 1: SWITCH 3800 OVERVIEW
In the event that the active main port fails or loses link status, the
standby port is automatically activated. When the main port resumes
operation, the standby port becomes inactive. This feature can be
disabled.
Load SharingLoad sharing with Switch 3800 Switches allows the user to increase
bandwidth and resilience between Switches by using a group of ports
to carry traffic in parallel between Switches. The sharing algorithm
allows the Switch to use multiple ports as a single logical port. For
example, Virtual LANs (VLANs) see the load-sharing group as a single
virtual port. The algorithm also guarantees packet sequencing between
clients.
For information on load sharing, refer to Chapter 3.
Switch OperationThe Switch 3800 uses the same algorithm as a conventional 802.1d
bridge for filtering, forwarding, and learning packets.
Virtual LANs (VLANs)
The Switch 3800 has a Virtual LAN (VLAN) feature that allows you to
build your network segments without being restricted by physical
connections. A VLAN is a group of location- and topology-independent
devices that communicate as if they are on the same physical Local Area Network (LAN). Implementing VLANs on your network has the
following three advantages:
■ It eases the change and movement of devices on networks. If a
device in VLAN marketing is moved to a port in another part of the
network, all you must do is specify that the new port belongs to
VLAN marketing.
■ It helps to control broadcast traffic. If a device in VLAN marketing
transmits a broadcast frame, only VLAN marketing devices receive
the frame.
■ It provides extra security. Devices in VLAN marketing can only
communicate with devices on VLAN sales using a device that
provides routing services.
For more information on VLANs, refer to Chapter 5.
Network Configuration Example1-5
Priority Access Control Enabled (PACE)
The Switch recognizes the PACE bit set by 3Com Etherlink
®
adapters
and other devices supporting PACE. When enabled, traffic with these
bits receives priority service from the Switch.
Spanning Tree Protocol
(STP)
The Switch 3800 supports the IEEE 802.1d Spanning Tree Protocol
(STP), which is a bridge-based mechanism for providing fault tolerance
on networks. STP allows you to implement parallel paths for network
traffic, and ensure the following:
■ Redundant paths are disabled when the main paths are operational.
■ Redundant paths are enabled if the main traffic paths fail.
For more information on STP, refer to Chapter 7.
IP Unicast Routing
The Switch 3800 can route IP traffic between the VLANs configured as
virtual router interfaces. Both dynamic and static IP routes are
maintained in the routing table. RIP version 1 and RIP version 2 are
supported.
For more information on IP unicast routing, refer to Chapter 8.
Network
Configuration
Example
This section describes where to position the Switch 3800 within your
network. One common use of the Switch 3800 is on a Gigabit Ethernet
backbone. Figure 1-2 shows an example of a Gigabit Ethernet
backbone within a building.
1-6CHAPTER 1: SWITCH 3800 OVERVIEW
Switch 1100
Switch 1100
Switch 1100
Switch 1100
Switch 3300
Switch 3800
To Backbone
Key
Ethernet
Fast Ethernet
Gigabit Ethernet
Server
Workstation
Figure 1-2 Switch 3800 used in a backbone configuration
The Switch 1100 on each floor has a 100Mbps full-duplex link to the
Switch 3800. A Switch 3300 is connected to a group of servers on one
floor of the building. The Switch 3800 routes IP traffic between the IP
subnets on each floor, and also provides bridged connectivity for non-IP
traffic. The Gigabit Ethernet port on the Switch 3800 connects into a
Gigabit Ethernet campus backbone.
Using Gigabit Ethernet as a backbone technology removes bottlenecks
by providing scalable bandwidth, low-latency, and high-speed data
switching.
Switch 3800 Front View1-7
In addition to providing a fast backbone between Ethernet LANs,
Gigabit Ethernet equipped file servers and services may be directly
attached to the Switch 3800 providing improved performance to the
Ethernet desktop.
Switch 3800 Front
View
10/100 Mbps ports
Figure 1-3 shows the Switch 3800 front view.
Unit status LEDs
10/100 Mbps ports
12345678
9101112131415 16
17 18 19 20 21 22 23 24
25 25
25 25
Gigabit Ethernet portsPort status LEDs
Figure 1-3 Switch 3800 front view
The front panel has the following features:
Ports
The Switch 3800 has 24 autosensing 10BASE-T/100BASE-TX ports using
standard RJ-45 connectors, and supports one Gigabit Ethernet port,
and one redundant Gigabit Ethernet port using standard Gigabit Interface Connectors (GBICs). You must have a GBIC transceiver module
inserted to make use of these ports.
The Switch 3800 ports support the media types and distances listed in
Table 1-1.
62.5/125 um Multimode fiber
50/125 um Multimode fiber
50/125 um Multimode fiber
62.5/125 um Multimode fiber
50/125 um Multimode fiber
50/125 um Multimode
10u Single-mode fiber
160
200
400
500
500
400
500
NA
220 Meters
275 Meters
500 Meters
550 Meters
550 Meters
550 Meters
550 Meters
5,000 Meters
For more information on 1000BASE-SX and 1000BASE-LX
characteristics refer to IEEE Draft P802.3z/D4.2 Tables 38-2 and 38-6.
LEDs
Table 1-2 describes the LED behavior on the Switch 3800.
Table 1-2 Switch 3800 LEDs
LEDColorIndicates
10/100Mbps Port Status LEDs
Green
Yellow
Green flashing
Off
Gigabit Ethernet Port Status LEDs
PacketYellow
Off
StatusGreen
Green flashing
Off
(continued)
Link is present; port is enabled.
Frames are being transmitted/received on this
port.
Link is present; port is disabled.
Link is not present.
Frames are being transmitted/received on this
port.
No activity on this port.
Link is present; port is enabled; full-duplex
operation.
Link is present; port is disabled.
Link is not present.
Table 1-2 Switch 3800 LEDs (continued)
LEDColorIndicates
Unit Status LEDs
PowerGreen
Yellow
The Switch 3800 is powered up.
The Switch 3800 is indicating a power,
overheat, or fan failure.
MGMTGreen
Green flashing
The Switch 3800 is operating normally.
Software download is in progress.
Power On Self Test (POST) is in progress.
Yellow
The Switch 3800 has failed its POST, or is
indicating an overheat condition.
Switch 3800 Rear View1-9
Switch 3800 Rear
View
Power socket and fuseConsole port
Figure 1-4 shows the Switch 3800 rear view.
U
C
LUL
!
3C16990
SERIAL NUMBER
MAC ADDRESS
MADE IN USA
MAIN ASSEMBLY
Figure 1-4 Switch 3800 rear view
The rear panel has the following features:
Power Socket
The Switch 3800 automatically adjusts to the supply voltage. The
power supply operates down to 90 V. The fuse is suitable for both
110 V AC and 220-240 V AC operation.
Serial Number
The serial number uniquely identifies this unit. You may need this serial
number for fault-reporting purposes.
1-10CHAPTER 1: SWITCH 3800 OVERVIEW
MAC Address
This label shows the unique Ethernet MAC address assigned to this
device.
Console Port
The console port (9-pin, “D” type connector) is used to connect a
terminal and to carry out local out-of-band management.
Factory DefaultsTable 1-3 shows the factory defaults for the Switch 3800 features.
Table 1-3 Switch 3800 Factory Defaults
ItemDefault Setting
Port statusEnabled on all ports
Default user accountadmin with no password and user with no
Console port configuration9600 baud, eight data bits, one stop bit, no
SNMP read community stringPublic
SNMP write community stringPrivate
RMON history sessionEnabled
RMON alarmsEnabled
PACERecognition disabled
Virtual LANsOne VLAN named default; all ports belong to the
802.1Q taggingAll packets are untagged on the default VLAN
BOOTPEnabled on the default VLAN (default)
Spanning Tree ProtocolDisabled; one defined as “s0”
IP RoutingDisabled
Forwarding database aging
period
RIP ProtocolDisabled
AutonegotiationOn
password
parity, XON/XOFF flow control enabled
■ Send trap if load is greater than 75% of
available bandwidth
■ Send trap if there are more than 10 errors in
1,000 packets
default VLAN; no protocol filter used.
(default)
30 minutes
2
INSTALLATIONAND SETUP
This chapter describes the following:
■ How to decide where to install the Switch 3800
■ Ethernet configuration rules
■ How to install the Switch in a rack or free-standing
■ How to connect equipment to the console port
■ How to check the installation using the Power On Self-Test (POST)
Following Safety
Information
Determining the
Switch 3800
Location
Before installing or removing any components of the Switch, or before
carrying out any maintenance procedures, you must read the safety
information provided in Appendix A of this guide.
The Switch 3800 is suited for use in the office, where it can be
free-standing or mounted in a standard 19-inch equipment rack.
Alternatively, the device can be rack-mounted in a wiring closet or
equipment room. Two mounting brackets are supplied with the Switch.
CAUTION: When using a rack mounting system, the Switch must be
mounted on a shelf or runners. The rack mounting brackets alone are
not sufficient to support the weight of the Switch. The rack mounting
brackets are provided to ensure stability across the horizontal plane. If
you stack Switches, you must ensure that the shelf or runners are
strong enough to hold the combined weight. Ensure that the
ventilation holes are not obstructed.
After deciding where to install the Switch, make sure that:
■ You will be able to meet the configuration rules detailed in
Chapter 1.
■ The Switch is accessible and cables can be connected easily.
2-2CHAPTER 2: INSTALLATIONAND SETUP
■ Water or moisture cannot enter the case of the unit.
■ Temperature must be within the range of 0 to 40 degrees Celsius.
■ Air-flow around the unit and through the vents in the side of the
case is not restricted. You should provide a minimum of 25mm
(1-inch) clearance.
■ No objects are placed on top of the unit.
■ Units are not stacked more than four high if the Switch is
free-standing.
Configuration Rules
for Ethernet
Installing the
Switch 3800
Rack MountingThe Switch 3800 is 2U high and will fit in most standard 19-inch racks.
The connectors, supported media types, and maximum distances for
the Switch 3800 are described in Chapter 1.
The Switch 3800 can be mounted in a rack, or placed free-standing on
a tabletop.
CAUTION: The Switch should only be used in a rack if it is mounted on
runners, a shelf, or a tray to support the weight. The rack mount kits
alone are not sufficient to support the weight of the Switch. The rack
mount kits must not be used to suspend the Switch from under a table
or desk, or attach it to a wall.
To install the mounting brackets on the Switch, follow these steps:
1 Place the Switch the right way up on a hard flat surface, with the front
facing toward you.
2 Remove the existing screws from the sides of the chassis.
3 Locate a mounting bracket over the mounting holes on one side of the
unit.
4 Insert the four screws and fully tighten with a suitable screwdriver, as
shown in Figure 2-1.
Installing the Switch 38002-3
Figure 2-1 Fitting the mounting bracket
5 Repeat the three previous steps for the other side of the Switch.
6 Refer to the instructions that shipped with your rack, runners, shelf or
tray to complete the installation of the Switch into the mounting rack.
CAUTION: When using rack mounting runners, a shelf, or a tray, make
sure that the ventilation holes on the side of the Switch are not
obstructed.
7 Connect cables.
Free-StandingThe Switch 3800 is supplied with four self-adhesive rubber pads. Apply
the pads to the underside of the device by sticking a pad in the marked
area at each corner of the Switch.
2-4CHAPTER 2: INSTALLATIONAND SETUP
Stacking the Switch
and Other Devices
Connecting
Equipment to the
Console Port
Up to four units can be placed on top of one another. If mixing Switch
3800, Switch 3000 FX, Switch 1000, Switch 1200, and other
SuperStack
®
II hubs, the smaller units must be positioned at the top
using rubber pads.
This section relates only to physically placing the devices on top of each
other. The Switch cannot be used to form a logical stack. It cannot be
linked to other Switches using special expansion cables to form a larger
Switch.
Apply the pads to the underside of the device by sticking a pad in the
marked area at each corner of the Switch. Place the devices on top of
each other, ensuring that the pads of the upper device line up with the
recesses of the lower device.
Connection to the console port is used for direct local management.
The Switch 3800 console port settings are set as follows:
■ Baud rate — 9600
■ Data bits — 8
■ Stop bit — 1
■ Parity — None
■ Flow control — XON/XOFF
The terminal connected to the console port on the Switch must be
configured with the same settings. This procedure will be described in
the documentation supplied with the terminal.
Appropriate cables are available from your local supplier. If you make
your own cables, pin-outs for a DB-9 male console connector are
described in Table 2-1.
Figure 2-2 shows the pin-outs for a 9-pin to RS-232 25-pin null modem
cable.
Switch 3800
Cable connector: 9-pin female
Screen
TxD
RxD
Ground
RTS
CTS
DSR
DCD
DTR
Figure 2-2 Null modem cable pin-outs
Shell
3
2
5
7
8
6
1
4
PC/Terminal
Cable connector: 25-pin male/female
Screen
1
3
2
7
4
20
5
6
8
RxD
TxD
Ground
RTS
DTR
CTS
DSR
DCD
Figure 2-3 shows the pin-outs for a 9-pin to 9-pin PC-AT serial null
modem cable.
Switch 3800
Cable connector: 9-pin female
Screen
DTR
TxD
RxD
CTS
Ground
DSR
RTS
DCD
Shell
4
3
2
8
5
6
7
1
PC-AT Serial Port
Cable connector: 9-pin female
1
2
3
4
5
6
7
8
Screen
DCD
RxD
TxD
DTR
Ground
DSR
RTS
CTS
Shell
Figure 2-3 PC-AT serial cable pin-outs
2-6CHAPTER 2: INSTALLATIONAND SETUP
Powering-up the
Switch
Checking the
Installation
Power On Self-Test
(POST)
Logging on for the
First Time
To power-up the Switch, follow these steps:
1 Connect the power cable to the Switch.
2 Connect the power cable to the wall outlet.
3 If necessary, turn the on/off switch to the on position.
After turning on power to the Switch 3800, the device performs a
Power On Self-Test (POST).
During the POST, all ports are temporarily disabled, the packet LED is
off, the power LED is on, and the MGMT LED flashes green. The
MGMT LED flashes until the Switch has successfully passed the POST.
If the Switch passes the POST, the MGMT LED stops blinking and
remains green. If the Switch fails the POST, the MGMT LED shows a
solid yellow light.
After the Switch has completed the POST, it is operational. Once
operational, you can log on to the Switch and configure an IP address
for the default VLAN (named default).
To manually configure the IP settings, perform the following steps:
1 Connect a terminal or workstation running terminal emulation software
to the console port.
2 At your terminal, press [Return] until you see the logon prompt.
3 At the logon prompt, enter the default user name admin to log on
with administrator privileges. For example:
login: admin
Administrator capabilities allow you to access all Switch functions. For
more information on Switch security, refer to Chapter 3.
4 At the password prompt, press [Return].
The default name, admin, has no password assigned. When you have
successfully logged on to the Switch, the command-line prompt
displays the name of the Switch in its prompt.
Logging on for the First Time2-7
5 Assign an IP address and subnetwork mask for VLAN default. The
example below assigns an IP address of 123.45.67.8 and a subnetwork
mask of 255.255.255.0.
6 Save your configuration changes so that they will be in effect after the
next Switch reboot, by typing
save
For more information on saving configuration changes, refer to
Chapter 10.
7 When you are finished using the facility, log out of the Switch by
typing
logout
2-8CHAPTER 2: INSTALLATIONAND SETUP
3
ACCESSING THE SWITCH
This chapter describes the following information that you can use to
begin managing the Switch 3800:
■ Security access level overview
■ Configuring the Switch for management
■ Switch management methods
■ Configuring SNMP
CAUTION: For configuration changes to be retained through a Switch
power cycle or reboot, you must issue a SAVE command after you have
made the change. For more information on the SAVE command, refer
to Chapter 10.
Security Access
Levels
User Access LevelA user-level account can view all manageable parameters, with the
The Switch 3800 supports two security access levels:
■ User
■ Administrator
following exceptions:
■ User account information
■ SNMP community strings
A user-level account can use the ping command to test device
connectivity. A user-level account can also change the password
assigned to the account name. If you have logged on with a user
access level, the command-line prompt ends with a (>) sign. For
example:
3C16910>
3-2CHAPTER 3: ACCESSING THE SWITCH
Administrator Access
Level
An administrator-level account can view and change all Switch
parameters, add and delete users, and change the password
associated with any account name. The administrator can disconnect a
Telnet management session. If this happens, the user is notified that
the session has been terminated.
If you have logged on with administrator access level, the
command-line prompt ends with a (#) sign. For example:
3C16910#
If an asterisk (*) appears in front of the command-line prompt, it
indicates that you have outstanding configuration changes that have
not been saved. For example:
*3C16910#
Default AccountsBy default, the Switch is configured with two accounts, as shown in
Table 3-1.
Table 3-1 Default Accounts
User NameAccess Level
adminThis user can access and change all manageable
userThis user can view (but not change) all manageable
parameters. The admin account cannot be deleted.
parameters, with the following exceptions:
■ This user cannot view the user account database.
■ This user cannot view the SNMP community strings.
This user has access to the ping command.
The default accounts do not have passwords assigned to them.
Passwords must have a minimum of 4 characters and can have a
maximum of 12 characters.
Adding a Password to the Default admin Account
To add a password to the default admin account, follow these steps:
1 Logon to the Switch using the name admin.
2 At the password prompt, press [Return].
3 Add a default admin password by typing the following:
config account admin
4 Enter the new password at the prompt.
5 Re-enter the new password at the prompt.
6 Save your changes by typing
save
Security Access Levels3-3
Creating a
Management
Account
The Switch can have a total of three management accounts. You can
use the default names (admin and user), or you can create new names
and passwords for the accounts. Passwords must have a minimum of
four characters and can have a maximum of 12 characters.
The account name “admin” cannot be deleted.
To create a new account, follow these steps:
1 Logon to the Switch using the name admin.
2 At the password prompt, press [Return].
3 Add a new user by typing the following:
create account [admin | user] <username>
4 Enter the password at the prompt.
5 Re-enter the password at the prompt.
6 Save your changes by typing
save
Changing Account Passwords
To add a password to a user account, follow these steps:
1 At the logon prompt, enter your user name and password. Note that
they are both case-sensitive. Ensure that you have entered a user name
and password with administrator privileges.
■ If you are logging on for the first time, use the default user name
admin to log on with administrator privileges. For example:
login: admin
2 Add an account password by using the following command:
config account <name>
for example:
config account user
3-4CHAPTER 3: ACCESSING THE SWITCH
3 Enter the new password at the prompt.
4 Re-enter the new password at the prompt.
5 Save your changes by typing
save
If you forget your password contact your local technical support
representative, who will advise on your next course of action.
Viewing Switch Accounts
To view the accounts that have been created, you must have
administrator privileges. Type the following to see the accounts:
show accounts
Output from the show accounts command is displayed below.
To delete a switch account, you must have administrator privileges.
Use the following command to delete an account:
delete account <username>
You can manage the Switch 3800 using the following methods:
■ Access the command-line interface by connecting a terminal (or
workstation with terminal emulation software) to the Switch 3800
console port.
■ Access the command-line interface over a TCP/IP network using a
Telnet connection.
■ Use an SNMP Network Manager over a network running the IP
protocol.
The Switch can support up to four user sessions concurrently (for
example, one console port and three Telnet connections).
Using Telnet3-5
Using the Console
Interface
The command-line interface built into the Switch is accessible by way
of the 9-pin, RS-232 console port located on the rear of the unit.
For more information on the console port pin-outs, refer to Chapter 2.
Once the connection is established, you will see the system prompt and
you may log on.
Using TelnetAny Telnet facility should be able to communicate with the Switch over
a TCP/IP network. Up to three active Telnet sessions can access the
Switch concurrently. The Telnet connection will time out after three
minutes of inactivity. If a connection to a Telnet session is lost
inadvertently, the Switch will terminate the session within three
minutes.
Before you can start a Telnet session you must set up the IP parameters
described in “Configuring Switch IP Parameters” on page 3-5. Telnet is
enabled by default.
To open the Telnet session, you must specify the IP address of the
device that you want to manage. Check the user manual supplied with
the Telnet client you are using, if you are unsure of how to do this.
Configuring Switch IP
Parameters
Once the connection is established, you will see the system prompt and
you may log on.
In order to manage the Switch by way of a Telnet connection or by
using an SNMP Network Manager, you must configure the Switch IP
parameters. Switch IP parameters are configured on a per-VLAN basis.
Using a BOOTP Server
If you are using IP and you have a BOOTP server set up correctly on
your network, you will need to add the Switch Media Access Control
(MAC) address, the IP address, subnetwork mask, and default gateway
to the BOOTP server. The Switch MAC address is shown on the rear
label of the Switch.
Once this is done, the IP address, subnetwork mask, and default
gateway for the Switch will be downloaded automatically. You can then
start managing the Switch without further configuration.
3-6CHAPTER 3: ACCESSING THE SWITCH
You can enable BOOTP on a per-VLAN basis by using the following
command:
enable bootp vlan [<name> | all]
Manually Configuring the IP Settings
If you are using IP without a BOOTP server, you must enter the IP
parameters for the Switch in order for the SNMP Network Manager or
Telnet software to communicate with the device. To assign IP
parameters to the Switch, you must do the following:
■ Logon to the Switch with administrator access level.
■ Assign an IP address and subnetwork mask to a VLAN.
The Switch comes configured with a default VLAN named default. In
order to use Telnet or an SNMP Network Manager, you must have at
least one VLAN on the Switch, and it must be assigned an IP address
and subnetwork mask. IP addresses are always assigned to a VLAN. The
Switch 3800 can be assigned multiple IP addresses. For information on
creating and configuring VLANs, refer to Chapter 5, “Virtual LANs
(VLANs).”
To manually configure the IP settings, perform the following steps:
1 Connect a terminal or workstation running terminal emulation software
to the console port.
2 At your terminal, press [Return] one or more times until you see the
logon prompt.
3 At the logon prompt, enter your user name and password. Note that
they are both case-sensitive. Ensure that you have entered a user name
and password with administrator privileges.
■ If you are logging on for the first time, use the default user name
admin to log on with administrator privileges. For example:
login: admin
The administrator access level allow you to access all Switch
functions. The default user names have no passwords assigned. For
more information on Switch security, refer to “Security Access
Levels,” on page 3-1.
■ If you have been assigned a user name and password with
administrator privileges, enter them at the logon prompt.
Using Telnet3-7
4 At the password prompt, enter the password and press [Return].
When you have successfully logged on to the Switch, the
command-line prompt displays the name of the Switch in its prompt.
5 Assign an IP address and subnetwork mask for the default VLAN by
6 Configure the default route for the Switch using the following
command:
config iproute add default <ipaddress> {<metric>}
For example:
config iproute add default 123.0.0.1 1
Disconnecting a
Telnet Session
7 Save your configuration changes so that they will be in effect after the
next Switch reboot, by typing
save
For more information on saving configuration changes, refer to
Chapter 10.
8 When you have finished using the facility, log out of the Switch by
typing
logout
For security purposes, an administrator access level account can
disconnect a management session that has been established by way of
a Telnet connection. If this happens, the user logged on by way of the
Telnet connection is notified that the session has been terminated.
To terminate a Telnet session, follow these steps:
1 Logon to the Switch with an administrator access level.
2 Determine the session number of the session you want to terminate by
typing
show session
3-8CHAPTER 3: ACCESSING THE SWITCH
Sample output from the show session command is as follows:
0 Tue Mar 10 11:10:53 1998 admin consoleserial
4 Tue Mar 10 13:11:13 1998 usertelnet192.207.37.168
Terminate the session by typing
clear session <session_number>
Disabling Telnet
Access
By default, Telnet services are enabled on the Switch. You can choose
to disable Telnet. To do so, enter
disable telnet
To re-enable Telnet on the Switch, at the console port enter
enable telnet
You must be logged on as an administrator to enable or disable Telnet.
Using SNMPAny Network Manager running the Simple Network Management
Protocol (SNMP) can manage the Switch, provided the Management
Information Base (MIB) is installed correctly on the management
station.
Each Network Manager provides its own user interface to the
management facilities. 3Com’s Transcend
Managers all have facilities for managing the Switch.
The following sections describe how to get started if you want to use
an SNMP manager. It assumes you are already familiar with SNMP
management. If not, refer to the following publication:
“The Simple Book”
by Marshall T. Rose
ISBN 0-13-8121611-9
Published by Prentice Hall
®
range of Network
Using SNMP3-9
Accessing Switch
Agents
In order to have access to the SNMP agent residing in the Switch, at
least one VLAN on the Switch must have an IP address assigned to it.
For more information on assigning an IP address, refer to “Manually
Configuring the IP Settings,” on page 3-6.
Saving
Configuration
Changes
If you make configuration changes to the Switch using an SNMP
manager, you must save the changes so that they are not lost on the
next Switch reboot. You can save your changes by using the SNMP save
attribute, or by issuing the
save command from the command line
interface.
Supported MIBsIn addition to private MIBs, the Switch 3800 supports the standard
MIBs listed in Table 3-2.
Table 3-2 Supported MIBs
DescriptionRFC Number
MIB II1213
Bridge MIB1493
RMON1757
RMON II Probe Configuration2021
Evolution of Internet1573
Supported TrapsA trap is a message sent by an SNMP agent to an authorized trap
receiver (usually a network management station) to indicate the
occurrence of a significant event, such as an error condition or a
threshold that has been reached. The Switch 3800 supports the traps
listed in Table 3-3.
Table 3-3 Supported Traps
TrapDescription
Cold startIndicates that the device is reinitializing itself.
Link upIndicates that the device recognizes that one of its
Link downIndicates that the device recognizes a failure in one of
Rising alarmIndicates that an RMON alarm entry has crossed its
(continued)
communication links has come up.
the communication links represented in the agent’s
configuration.
rising threshold
3-10CHAPTER 3: ACCESSING THE SWITCH
Table 3-3 Supported Traps (continued)
TrapDescription
Falling alarmIndicates that an RMON alarm entry has crossed its
Fan failIndicates that one or more of the cooling fans inside
Fan okayIndicates that a fan has transitioned out of a failure
OverheatIndicates that the onboard temperature sensor has
Login attempt failureIndicates that three consecutive bad logon attempts
falling threshold.
the device has failed. A Fan okay trap will be issued
once the fan has attained normal operation.
state and is now operating correctly.
reported an overheat condition. The system will
shutdown until the device has sufficiently cooled such
that operation may begin again. A Cold start trap will
be issued when the device comes back on line.
have occurred.
Configuring SNMP
Settings
The following SNMP parameters can be configured on the Switch:
■ Authorized trap receivers — An authorized trap receiver can be
one or more network management stations on your network. The
Switch sends SNMP traps to the trap receiver. You can have a
maximum of six trap receivers configured for each Switch 3800.
■ Community strings — The community strings allow a simple
method of authentication between the Switch and the remote
Network Manager. There are two community strings on the Switch
3800. The read community string provides read-only access to the
Switch. The default read community string is public. The write
community string provides read and write access to the Switch. The
default write community string is private. The community string for
all authorized trap receivers must be configured on the Switch in
order for the trap receiver to receive Switch-generated traps.
■ System contact (optional) — The system contact is a text field that
allows you to enter the name of the person(s) responsible for
managing the Switch.
■ System name — The system name is the name that you have
assigned to this Switch. The default name is 3C16910.
■ System location (optional) — Using the system location field, you
can enter a location for this Switch.
Using SNMP3-11
Table 3-4 describes SNMP configuration commands.
Table 3-4 SNMP Configuration Commands
CommandDescription
config vlan <name> ipaddress <ip_address> {<mask>}Configures an IP address for the VLAN. This is
enable snmp accessAllows you to turn on SNMP support for the
enable snmp trapAllows you to turn on SNMP trap support.
config snmp add <ipaddress>Allows you to add the IP address of an SNMP
config snmp add trapreceiver <ipaddress> {<string>}Allows you to add the IP address of a specified
config snmp community [read | readwrite] <string>Allows you to configure the SNMP read and
config snmp delete [<ipaddress> | all]Allows you to delete the IP address of a specified
config snmp delete trapreceiver [<ip_address> | all]Allows you to delete the IP address of a specified
config snmp syscontact <string>Allows you to configure the name of the system
config snmp sysname <string>Allows you to configure the name of the
config snmp syslocation <string>Allows you to configure the location of the
required in order to use an SNMP manager.
Switch.
management station to the access list. Up to six
addresses can be specified.
trap receiver. A maximum of six trap receivers is
allowed.
write community strings. The community string
can have a maximum of 32 characters.
SNMP management station or all SNMP
management stations.
trap receiver or all authorized trap receivers. If
you delete all trap receiver addresses, any
machine can have SNMP management access to
the Switch.
contact. A maximum of 32 characters is allowed.
Switch. The sysname appears in the command
line interface prompt. A maximum of 32
characters is allowed. The default sysname is
3C16910.
Switch. A maximum of 32 characters is allowed.
3-12CHAPTER 3: ACCESSING THE SWITCH
Displaying SNMP
Settings
To display the SNMP settings configured on the Switch 3800, use the
following command:
show management
This command displays the following information:
■ Enable/disable state for telnet, SNMP, and web access
■ SNMP community strings
■ Authorized SNMP station list
■ SNMP trap receiver list
■ Logon statistics
Resetting and
To reset or disable SNMP settings, use the commands in Table 3-5.
Disabling SNMP
Table 3-5 SNMP Reset and Disable Commands
CommandDescription
disable snmp accessAllows you to disable SNMP on the Switch.
disable snmp trapAllows you to prevent SNMP traps from being sent from
unconfig managementRestores default values to all SNMP-related entries.
the Switch.
Checking Basic
Connectivity
The Switch 3800 has the following two facilities for checking basic
connectivity:
■ ping
■ traceroute
PingThe ping command allows you to send Internet Control Message
Protocol (ICMP) echo messages to a remote IP device. The ping
command is available for both the user and administrator privilege
level.
The ping command syntax is as follows:
ping {continuous} {size <n>} <ip_address>
Configuring Ports3-13
Options for the ping command are described in Table 3-6.
Table 3-6 Ping Command Parameters
ParameterDescription
continuousAllows you to specify ICMP echo messages to be sent
size <n>Allows you to specify the size of the packet.
continuously.
TracerouteThe traceroute command allows you to trace the routed path between
the Switch and a destination endstation.
The traceroute command syntax is as follows:
traceroute <ip_address>
where ip_address is the IP address of the destination endstation.
Configuring PortsPorts on the Switch 3800 can be configured in the following ways:
Enabling and
Disabling Ports
■ Enabling and disabling individual ports
■ Configuring autonegotiation
■ Creating load-sharing groups on multiple ports
By default, all ports are enabled. To enable or disable one or more
ports, use the following command:
[enable | disable] port <portlist>
For example, to disable ports 3, 5, and 6, enter the following:
disable port 3,5-6
Even though a port is disabled, the link remains enabled for diagnostic
purposes.
3-14CHAPTER 3: ACCESSING THE SWITCH
Configuring
Autonegotiation
By default, the Switch 3800 is configured to use autonegotiation for all
ports. Autonegotiation on 10/100 Mbps ports is used to automatically
determine speed and duplex settings. You can select to manually
configure the duplex and speed settings of 10/100 Mbps ports. Manual
configuration would be used when the remote device does not support
autonegotiation or when an interoperability issue exists.
The Switch 3800 Gigabit Ethernet port only supports a speed of 1,000
Mbps and full duplex. Even though these parameters are fixed,
autonegotiation on Gigabit links still allows proper link initialization and
should be used whenever possible. Manual configuration would be
used when the remote device does not support autonegotiation or
when an interoperability issue exists.
10/100 port settingsFast Ethernet ports can connect to either 10BASE-T or 100BASE-TX
networks. By default, the ports autonegotiate port speed and duplex
settings. You can manually determine these settings by turning
autonegotiation off and providing speed and duplex settings. To
configure port speed and duplex settings on 10/100 Mbps ports, use
the following command:
config port <portlist> auto off (speed [10 | 100]} duplex
[half | full]
To restore autonegotiation, use the following command:
config port <portlist> auto on
Gigabit port settingsBy default the Gigabit port on the Switch 3800 uses autonegotiation to
establish proper link initialization. Speed and duplex settings cannot be
modified. To tur n off autonegotiation, use the following command:
config port <portlist> auto off duplex full
The duplex setting must be provided even though the duplex setting
may not be modified. To restore autonegotiation, use the following
command:
config port <portlist> auto on
Load Sharing3-15
Load SharingLoad sharing with the Switch 3800 allows you to increase bandwidth
and resilience by using a group of ports to carry traffic in parallel
between Switches. The sharing algorithm allows the Switch to use
multiple ports as a single logical port. For example, VLANs see the
load-sharing group as a single virtual port. The algorithm also
guarantees packet sequencing between clients.
If a port in a load-sharing group fails, traffic is redistributed to the
remaining ports in the load-sharing group. If the failed port becomes
active again, traffic is redistributed to include that port.
Load sharing is most useful in cases where the traffic transmitted from
the Switch to the load-sharing group is sourced from an equal or
greater number of ports on the Switch. For example, traffic transmitted
to a 2-port load-sharing group should originate from a minimum of
two other ports on the same Switch.
This feature is supported between Switch 3800 Switches only, but may
be compatible with third-party trunking or sharing algorithms.
Configuring Load
Sharing
To set up the Switch 3800 to load share among ports, you must create
a load-sharing group of ports. Load-sharing groups are defined
according to the following rules:
■ Ports on the Switch are divided into groups of two or four.
■ Ports in a load-sharing group must be contiguous.
■ Valid port combinations are distinguished by the outlined boxes in
Table 3-7.
■ The first port in the load-sharing group is configured to be the
master logical port. This is the reference port used in configuration
commands. It can be thought of as the virtual port representing the
entire port group.
Table 3-7 shows the allowable load-sharing port group combinations
for the Switch 3800.
When you define a load-sharing group, you assign a group of ports to
a single, logical port number. To enable or disable a load-sharing group,
use the following commands:
The following example defines a load-sharing group that contains ports
4 through 7, and uses the first port in the group as the master logical
port 4:
enable sharing 4 grouping 4-7
In this example, logical port 4 represents physical ports 4 through 7.
When using load sharing, you should always reference the master
logical port of the load-sharing group (port 4 in the previous example)
when configuring or viewing VLANs. VLANs configured to use other
ports in the load-sharing group will have those ports deleted from the
VLAN when load sharing becomes enabled.
Verifying the Load
Sharing
Configuration
Current Limitations
of Load Sharing
The show port config output screen shows all of the ports that are
involved in load sharing, and the associated master port.
The following describes implementation restrictions that currently apply
to load sharing:
■ The load-sharing group must not participate in a spanning tree. If
the VLANs using the load-sharing group are also members of a
spanning tree, the ports associated with the load-sharing group
must have spanning tree disabled.
■ A port involved in a load-sharing group must not be disabled.
SmartRedundancy3-17
SmartRedundancySmartRedundancy for the Switch 3800 refers to fail-over behavior of
the main and standby Gigabit Ethernet ports. SmartRedundancy allows
the Switch to always use the main link if it is available. For example, if
only the standby link is available it will be used, but if the main link
becomes available again the link will switch back to the main from the
standby. With SmartRedundancy disabled, the first link available will be
used; only if that link becomes unavailable will the Switch attempt to
use the other link. By default, SmartRedundancy is enabled.
Port CommandsTable 3-8 describes port commands.
Table 3-8 Port Commands
CommandDescription
config port <portlist> auto onAllows you to enable autonegotiation on a 10/100
config port <portlist> auto off {speed
[10 | 100]} duplex [half | full]
config port <portlist> auto off duplex
full
enable port <portlist>Allows you to enable one or more ports.
enable sharing <master_port> grouping
<portlist>
enable smartredundancy <portlist>Allows you to enable the SmartRedundancy feature on
disable port <portlist>Allows you to disable one or more ports. Even when
disable sharing <master_port>Allows you to disable a load-sharing group of ports.
(continued)
Mbps or Gigabit port.
Allows you to change the configuration of a group of
10/100 Mbps ports. Specify the following:
■ auto off — The port will not autonegotiate the
settings.
■ speed — The speed of the port (for 10/100 Mbps
ports only).
■ duplex — The duplex setting (half- or full-duplex).
Allows you to disable autonegotiation on a Gigabit
port.
Allows you to define a load-sharing group of ports.
The ports specified in <portlist> are grouped to the
master port.
the redundant Gigabit Ethernet port. When the
SmartRedundancy feature is enabled, the Switch
always uses the primary link when the primary link is
available. The default setting is enabled.
disabled, the link is available for diagnostic purposes.
3-18CHAPTER 3: ACCESSING THE SWITCH
Table 3-8 Port Commands (continued)
CommandDescription
disable smartredundancy <portlist>Allows you to disable the SmartRedundancy feature. If
show port <portlist> configDisplays state, link status, speed, and autonegotiation
show port <portlist> statsDisplays port information including physical layer
show port <portlist> errorsDisplays error information for one or more ports.
show port <portlist> collisionsDisplays real-time collision statistics.
show port <portlist> packet Displays a histogram of packet statistics for one or more
show port <portlist> utilDisplays port utilization by percentage, bytes per
the feature is disabled, the Switch changes the active
link only when the current active link becomes
inoperable.
setting for each port.
configuration and statistics.
ports.
second, or packets per second. Use the space bar to
toggle between percentage, bytes per second, or
packets per second. Use the clear counters command to
reset values.
4
COMMANDS
This chapter contains a description of each command-line interface
command for the Switch 3800. It also provides the following
information related to Switch 3800 commands:
■ Command syntax
■ Line-editing commands
■ Command history substitution
If an asterisk (*) appears in front of the command-line prompt, it
indicates that you have outstanding configuration changes that have
not been saved. For example:
*3C16910#
In order for configuration changes to be retained through a Switch
power cycle or reboot, you must issue a SAVE command after you
have made the change. For more information on the SAVE command,
refer to Chapter 10.
Understanding the
Command Syntax
This section describes the steps to take when entering a command.
Refer to the sections that follow for detailed information on using the
command-line interface.
To use the command-line interface, follow these steps:
1 When entering a command at the prompt, ensure that you have the
appropriate privilege level.
Most configuration commands require you to have the Administrator
privilege level.
2 Enter the command name.
4-2CHAPTER 4: COMMANDS
3 After entering the complete command, press [Return].
Syntax HelperThe command-line interface has a built-in syntax helper. If you are
If the command does not include a parameter, skip to Step 3. If the
command requires more information, or if you want to include optional
parameters, continue to Step 2a.
a If the command has additional parameters include them after the
command name.
b If the command includes a parameter, enter the parameter name,
and its values.
The parameters values may include numerics, strings, or addresses,
depending on the parameter.
unsure of the complete syntax for a particular command, enter as
much of the command as possible. The syntax helper will provide you
with a list of options for the remainder of the command.
The syntax helper also provides assistance if you have entered an
incorrect command.
Command
Completion
The Switch provides command completion by way of the [Tab] key. If
you enter a partial command, pressing the [Tab] key fills in the
remainder of the command. If command options exist, they are
displayed. The full command is then redisplayed and the cursor is
placed at the end of the command.
Abbreviated SyntaxAbbreviated syntax is the shortest, unambiguous, allowable
abbreviation of a command, parameter, or value. Typically, this is the
first three letters of the command.
Command ShortcutsAll named components of the Switch configuration must have a unique
name. When you enter a command to configure a named component,
you do not need to use the keyword of the component. For example,
to create a VLAN, you must enter a unique VLAN name:
create vlan engineering
Once you have created the VLAN with a unique name, you can then
eliminate the keyword vlan from all other commands that require the
name to be entered. For example the following command:
Understanding the Command Syntax4-3
config vlan engineering add port 1-3,6
could use the following shortcut:
config engineering add port 1-3, 6
Numerical RangesCommands that require you to enter one or more port numbers use
the parameter,
<portlist>, in the syntax. A portlist can be a range of
numbers, for example:
port 1-3
You can add additional port numbers to the list, separated by a
comma:
port 1-3,6,8
NamesAll named components of the Switch configuration must have a unique
name. Names must begin with an alphabetical character delimited by
white space, unless enclosed in quotation marks.
SymbolsYou may see a variety of symbols shown as part of the command
syntax. These symbols explain how to enter the command, and you do
not type them as part of the command itself. Table 4-1 summarizes
command syntax symbols.
Table 4-1 Command Syntax Symbols
SymbolDescription
angled brackets < >Enclose a variable or value. You must specify the variable or value. For example, in
square brackets [ ]Enclose a required value or list of required arguments. One or more values or
(continued)
the syntax
config vlan <name> ipaddress <ip_address>
you must supply a VLAN name for <name> and an address for <ip_address> when
entering the command. Do not type the angle brackets.
arguments can be specified. For example, in the syntax
disable vlan [<name> | all]
you must specify either the VLAN name for <name>, or the keyword “all” when
entering the command. Do not type the square brackets.
4-4CHAPTER 4: COMMANDS
Table 4-1 Command Syntax Symbols (continued)
SymbolDescription
vertical bar |Separates mutually exclusive items in a list, one of which must be entered. For
braces { }Enclose an optional value or a list of optional arguments. One or more values or
Line-Editing
Commands
example, in the syntax
config snmp community [read | write] <string>
you must specify either the read or write community string in the command. Do not
type the vertical bar.
arguments can be specified. For example, in the syntax
show vlan {<name> | all}
you can specify either a particular VLAN or the keyword “all.” If you do not specify
an argument, the command will show all VLANs. Do not type the braces.
Table 4-2 describes the line-editing commands available using the
command-line interface.
Table 4-2 Line-Editing Commands
CommandDescription
BackspaceDeletes character to the left of cursor and shifts remainder of line to left.
Delete or [Ctrl] + DDeletes character under cursor and shifts remainder of line to left.
[Ctrl] + KDeletes characters from under cursor to the end of the line.
InsertToggles on and off. When toggled on, inserts text and pushes previous text to right.
Left ArrowMoves cursor to left.
Right ArrowMoves cursor to right.
Home or [Ctrl]+AMoves cursor to first character in line.
End or [Ctrl]+EMoves cursor to last character in line.
[Ctrl]+LClears the screen and moves the cursor to the beginning of the line.
Up ArrowDisplays the previous command in the command history buffer, and places cursor at
Down ArrowDisplays the next command in the command history buffer, and places cursor at end
end of command.
of command.
Command History Substitution4-5
Command History
Substitution
Common
Commands
The Switch 3800 “remembers” the last 50 commands you enter. You
can display a list of these commands by typing
history
Table 4-3 describes common commands used to manage the Switch.
Commands specific to a particular feature are described in the other
chapters of this guide.
create vlan <name>Allows you to create a VLAN. For more information
config account <username> {<password>}Allows you to configure a user account password.
config time <time>Allows you to configure the system date and time.
enable bootp vlan [<name> | all]Allows you to enable BOOTP for one or more
clear session <number>Allows you to terminate a Telnet session from the
disable bootp vlan [<name> | all]Allows you to disable BOOTP for one or more VLANs.
disable port <portlist>Allows you to disable or partition a port.
disable telnetAllows you to disable Telnet access to the Switch.
delete account <username>Allows you to delete a user account.
delete vlan <name>Allows you to delete a VLAN.
logout | quitAllows you to logout of a console or Telnet session. If
(continued)
Allows you to create a user account. For more
information on creating accounts, refer to Chapter 3.
on VLANs, refer to Chapter 5.
The format for <time> is:
mm/dd/yyyy hh:mm
The time uses a 24-hour clock format.
Allows you to configure an IP address and subnet
mask for a VLAN.
VLANs. For more information on using BOOTP, refer
to Chapter 3.
Switch.
used during a Telnet session, also closes the TCP
Telnet session.
4-6CHAPTER 4: COMMANDS
Table 4-3 Common Commands (continued)
CommandDescription
unconfig switch {all}Allows you to reset all Switch parameters (with the
exception of defined VLANs and IP addresses) to the
factory defaults. If you specify the keyword “all”, the
IP addresses are reset as well.
Switch 3800
Commands
The tables in this section list all of the commands used on the Switch
3800. The commands are organized by the following categories:
■ General Switch commands
■ User account commands
■ Switch management commands
■ VLAN commands
■ Protocol commands
■ FDB commands
■ Port commands
■ PACE commands
■ STP commands
■ Basic IP commands
■ IP Address Resolution Protocol (ARP) commands
■ IP route table commands
■ ICMP commands
■ RIP commands
■ Logging commands
■ Configuration and image commands
Switch 3800 Commands4-7
General Switch
Table 4-4 describes general Switch commands.
Commands
Table 4-4 General Switch Commands
CommandDescription
show switchDisplays the current Switch information, including:
■ sysName, sysLocation, sysContact
■ MAC address
■ current date and time, and system uptime
■ operating environment (temperature, fans, and
power supply status)
■ NVRAM image information (primary/secondary
image, date, time, size, version)
■ NVRAM configuration information
(primary/secondary configuration, date, time, size,
version)
■ Scheduled reboot information
■ System serial number and reworks indicator
■ Software platform
■ System ID
■ Power supply and fan status
show versionDisplays the hardware and software versions currently
show memoryDisplays summary system configuration and memory
reboot Allows you to reboot the Switch. The Switch will ask for
config time <time>Allows you to configure the system date and time. The
(continued)
running on the Switch. Also displays the Switch serial
number.
utilization statistics for the CPU system DRAM.
confirmation and then reboot.
format for <time> is:
mm/dd/yyyy hh:mm
The time uses a 24-hour clock format.
4-8CHAPTER 4: COMMANDS
Table 4-4 General Switch Commands (continued)
CommandDescription
config devicemode [bridging | iprouting] Allows you to configure the operating mode of the
Switch. Specify:
■ bridging — Layer 2 bridging functions only
■ iprouting — Bridging and IP unicast routing
functions
If this command is used while the Switch 3800 is up
and running, the Switch saves the configuration and
reboots. The default operating mode is “iprouting.”
unconfig switch {all}Allows you to reset all Switch parameters (with the
exception of defined VLANs and IP addresses) to the
factory defaults. If you specify the keyword “all”, the
IP addresses are reset as well.
ping {continuous} {size <number>}
<ipaddress>
Allows you to send ICMP echo messages to a remote IP
device. Specify:
■ continuous — ICMP echo messages should be sent
continuously.
■ size <n> — The size of the packet.
traceroute <ipaddress>Allows you to trace the routed path between the
Switch and a destination endstation.
clear countersAllows you to clear all statistical counters for the Switch
and ports.
User Account
Table 4-5 describes user account commands.
Commands
Table 4-5 User Account Commands
CommandDescription
show accountDisplays the account names, access level, number of
delete account <username>Allows you to delete a user account.
config account <username> {<password>}Allows you to change the password of an existing
successful and failed logon attempts, and the number
of active sessions in the user database. This command is
available only to admin level users.
Allows you to create a user account.
account.
Switch 3800 Commands4-9
Switch Management
Table 4-6 describes Switch management commands
Commands
Table 4-6 Switch Management Commands
CommandDescription
show managementDisplays network management configuration and
show sessionDisplays the currently active Telnet and console
clear session <number>Allows you to terminate a Telnet session from the
logout | quitAllows you to logout of a console or Telnet session. If
enable telnetAllows you to enable Telnet access to the Switch.
disable telnetAllows you to disable Telnet access to the Switch.
enable snmp accessAllows you to use SNMP to manage the Switch.
disable snmp accessAllows you to disable SNMP on the Switch.
enable snmp trapAllows you to turn on SNMP trap support.
disable snmp trapAllows you to prevent SNMP traps from being sent
config snmp add <ipaddress>Allows you to add the IP address of an SNMP
config snmp delete [<ipaddress> | all]Allows you to delete the IP address of a specified SNMP
statistics including enable/disable states for Telnet and
SNMP, SNMP community strings, authorized SNMP
station list, SNMP trap receiver list, and login statistics.
sessions communicating with the Switch. Provides the
user name, IP address of the incoming Telnet session,
whether a console session is currently active, and logon
time. Sessions are numbered.
Switch.
used during a Telnet session, also closes the TCP Telnet
session.
from the Switch.
management station to the access list. Up to six
addresses can be specified.
management station or all SNMP management stations.
Allows you to add the IP address of a specified trap
receiver. A maximum of six trap receivers is allowed.
Allows you to delete the IP address of a specified trap
receiver or all authorized trap receivers. If you delete all
trap receiver addresses, any machine can have SNMP
management access to the Switch.
Allows you to configure the SNMP read and write
community strings. The community string can have a
maximum of 32 characters.
4-10CHAPTER 4: COMMANDS
Table 4-6 Switch Management Commands (continued)
CommandDescription
config snmp syscontact <string>Allows you to configure the name of the system
config snmp sysname <string>Allows you to configure the name of the Switch. The
config snmp syslocation <string>Allows you to configure the location of the Switch. A
unconfig managementRestores default values to all SNMP-related entries.
contact. A maximum of 32 characters is allowed.
sysname appears in the command line interface prompt.
A maximum of 32 characters is allowed. The default
sysname is 3C16910.
maximum of 32 characters is allowed.
VLAN CommandsTable 4-7 describes VLAN commands.
Table 4-7 VLAN Commands
CommandDescription
show vlan {<name> | all}When used with the keyword “all”, or with no named
create vlan <name>Allows you to create a named VLAN.
delete vlan <name>Allows you to remove a VLAN.
config vlan <name> [add | delete]
<portlist> {tagged | untagged}
config vlan <name> tag <vlanid>Allows you to assign a numerical VLANid. The valid
config dot1q ethertype <ethertype>Allows you to configure an IEEE 802.1Q EtherType. Use
unconfig vlan <name> ipaddressAllows you to remove the IP address associated with a
VLANs, displays a summary list of VLAN names with a
portlist and associated status of each. When used with
a named identifier, displays port information including
port membership list, IP address, tag information.
Allows you to add and delete ports. You can specify
tagged and untagged port(s). By default, ports are
untagged.
range is from 1 to 4095.
Allows you to configure a protocol based VLAN. If the
keyword “any” is specified, then it becomes the default
VLAN. All packets that cannot be classified into other
protocol-based VLANs are assigned to the default
VLAN of that port.
Allows you to assign an IP address and an optional
mask to the VLAN.
this command if you have another switch that supports
802.1Q, but uses a different EtherType. The default
value used by the Switch is 8100.
show protocol {<protocol_name> | all}Allows you to display protocol-related information,
create protocol <protocol_name>Allows you to create a user-defined protocol.
delete protocol <protocol_name>Allows you to remove a protocol.
config protocol <protocol_name> add
<protocol_type> <hex_value>
including:
■ Protocol name
■ List of protocol fields
■ List of VLANs that use this protocol
Allows you to configure a protocol filter. Supported
protocol types include:
Displays the forwarding database contents including
MAC address, associated VLAN, port, age of entry
configuration method, and status. Providing one of the
options acts as a filter on the display. Providing a VLAN
name displays all entries for the VLAN. Use the MAC
address to locate a specific entry in the FDB.
Allows you to clear dynamic FDB entries that match
the filter. Use the keyword “all” to clear all dynamic
entries.
Allows you to create a permanent FDB entry. Specify
the following:
■ mac_address — Device MAC address, using colon
separated bytes.
■ name — VLAN associated with MAC address.
■ portlist — Port number associated with MAC
address.
If more than one port number is associated with a
permanent MAC entry, packets will be multicast to the
multiple destinations.
delete fdbentry <mac_address> vlan <name> Allows you to delete a permanent FDB entry.
config fdb agingtime <number>Allows you to configure the FDB ageing time. The
range is 15 through 1,000,000 seconds. The default
value is 1800 seconds. A value of 0 indicates that the
entry should never be aged out.
Port CommandsTable 4-10 describes port commands.
Table 4-10 Port Commands
CommandDescription
show port <portlist> configDisplays state, link status, speed, and autonegotiation
setting for each port.
show port <portlist> statsDisplays port information including physical layer
configuration and statistics.
show port <portlist> errorsDisplays error information for one or more ports.
show port <portlist> collisionsDisplays real-time collision statistics.
show port <portlist> packet Displays a histogram of packet statistics for one or more
ports.
show port <portlist> utilDisplays port utilization by percentage, bytes per
second, or packets per second. Use the space bar to
toggle between percentage, bytes per second, or
packets per second. Use the clear counters command to
reset values.
config port <portlist> auto onAllows you to enable autonegotiation on a 10/100
Mbps or Gigabit port.
(continued)
Switch 3800 Commands4-13
Table 4-10 Port Commands
CommandDescription
config port <portlist> auto off {speed
[10 | 100]} duplex [half | full]
Allows you to change the configuration of a group of
10/100 Mbps ports. Specify the following:
■ auto off — The port will not autonegotiate the
settings.
■ speed — The speed of the port (for 10/100 Mbps
ports only).
■ duplex — The duplex setting (half- or full-duplex).
config port <portlist> auto off duplex
full
Allows you to disable autonegotiation on a Gigabit
port.
enable port <portlist>Allows you to enable one or more ports.
enable sharing <master_port> grouping
<portlist>
Allows you to define a load-sharing group of ports.
The ports specified in <portlist> are grouped to the
master port.
enable smartredundancy <portlist>Allows you to enable the SmartRedundancy feature on
the redundant Gigabit Ethernet port. When the
SmartRedundancy feature is enabled, the Switch
always uses the primary link when the primary link is
available. The default setting is enabled.
disable port <portlist>Allows you to disable one or more ports.
disable sharing <master_port>Allows you to disable a load-sharing group of ports.
disable smartredundancy <portlist>Allows you to disable the SmartRedundancy feature. If
the feature is disabled, the Switch changes the main
link only when the current main link becomes
inoperable.
PACE CommandsTable 4-11 describes PACE commands.
Table 4-11 PACE Commands
CommandDescription
enable paceAllows you to enable recognition of the PACE bit.
disable paceAllows you to disable recognition of the PACE bit.
4-14CHAPTER 4: COMMANDS
STP CommandsTable 4-12 describes STP commands.
Table 4-12 STP Commands
CommandDescription
show stpd {<stpd_name> | all}Displays STP information for one or all STPDs on the
show stpd <stpd_name> port <portlist>Displays port-specific STP information, including the
create stpd <stpd_name> Allows you to create an STPD. When created, an STPD
delete stpd <stpd_name>Allows you to remove an STPD. An STPD can only be
config stpd <stpd_name> add vlan <name> Allows you to add a VLAN to the STPD.
config stpd <stpd_name> delete vlan
[<name> | all]
config stpd <stpd_name> hellotime <value> Allows you to specify the time delay (in seconds)
config stpd <stpd_name> forwarddelay
<value>
config stpd <stpd_name> maxage <value>Allows you to specify the maximum age of a BPDU in
config stpd <stpd_name> priority
<value>
(continued)
Switch.
forwarding state of each port.
has the following default parameters:
■ Bridge priority — 32,768
■ Hello time — 2 seconds
■ Forward delay — 15 seconds
removed if all VLANs have been deleted from it.
Allows you to remove one or all VLANs from an STPD.
If all is specified, the association between the STPD
and VLAN is removed, but both still exist.
between the transmission of BPDUs from this STPD
when it is the Root Bridge.
The range is 1 through 10. The default setting is 2
seconds.
Allows you to specify the time (in seconds) that the
ports on this STPD spend in the listening and learning
states when the Switch is the Root Bridge.
The range is 4 through 30. The default setting is 15
seconds.
this STPD.
The range is 6 through 40. The default setting is 20
seconds.
Note that the time must be greater than, or equal to
2 x (Hello Time + 1) and less than, or equal to 2 x
(Forward Delay –1).
Allows you to specify the priority of the STPD. By
changing the priority of the Switch, you can make it
more or less likely to become the Root Bridge.
The range is 0–65,535. The default setting is 32,768. A
setting of 0 indicates the highest priority.
Switch 3800 Commands4-15
Table 4-12 STP Commands (continued)
CommandDescription
config stpd <stpd_name> port cost <value>
<portlist>
config stpd <stpd_name> port priority
<value> <portlist>
enable stpd [<stpd_name> | all]Allows you to enable STP for one or more STPDs. The
disable stpd [<stpd_name> | all]Allows you to disable the STP mechanism on a
enable stpd port <portlist>Allows you to enable the STP protocol on one or more
disable stpd port <portlist>Allows you to disable STP on one or more ports.
unconfig stpd {<stpd_name> | all}Allows you to restore default STP values to a particular
Allows you to specify the path cost of the port in this
STPD.
The range is 1–65,535. The Switch automatically assigns
a default path cost of 1.
Allows you to specify the priority of the port in this
STPD. By changing the priority of the port, you can
make it more or less likely to become the Root Port.
The range is 0–255. The default setting is 128. A
setting of 0 indicates the lowest priority.
default setting is disabled.
particular STPD, or for all STPDs.
ports. If the STPD is enabled for a port, BPDUs will be
generated on that port if STP is enabled for the
associated STPD. The default setting is enabled.
Disabling STP on one or more ports puts those ports in
FORWARDING state; all BPDUs received on those ports
will be disregarded.
STPD or to all STPDs.
4-16CHAPTER 4: COMMANDS
Basic IP CommandsTable 4-13 describes basic IP commands.
Table 4-13 Basic IP Commands
CommandDescription
show ipconfig {vlan [<name> | all]}Displays configuration information for one or more
show ipstats {vlan [<name | all]}Displays statistics of packets handled by the CPU,
show ipfdb {<ipaddress> <netmask> | vlan
<name> | all}
enable bootp vlan [<name> | all]Allows you to enable the generation and processing
(continued)
VLANs, including the following:
■ IP address, subnet mask
■ IP forwarding information
■ BOOTP configuration
■ VLAN name, VLANid
including the following:
■ inpackets, outpackets
■ ICMP/IGMP statistics
■ IRDP statistics
Displays the contents of the IP forwarding database
table. Use for technical support purposes.
Allows you to clear the dynamic entries in the IP
forwarding database table.
interface. If “all” is specified, then all the
configured IP interfaces are affected. If no optional
argument is provided, the “all” is assumed. Other IP
configuration is not affected. When new IP
interfaces are added, the interface is configured to
have ipforwarding disabled by default.
interfaces.
Allows you to enable forwarding of IP broadcast
traffic on an IP interface. If “all” is specified, then all
the configured IP interfaces are affected. If no
optional argument is provided, then “all” is
assumed. Other IP configuration is not affected.
When new IP interfaces are added, the default is to
have broadcast enabled.
Allows you to disable IP broadcast forwarding on
one or all IP interfaces.
of BOOTP packets on a VLAN. The default setting is
enabled for all VLANs.
Switch 3800 Commands4-17
Table 4-13 Basic IP Commands (continued)
CommandDescription
disable bootp vlan [<name> | all]Allows you to disable the generation and processing
enable bootprelayAllows you to enable the BOOTP relay function on
disable bootprelayAllows you to disable the BOOTP relay function on
config bootprelay add <ipaddress>Allows you to add IP addresses to be used as IP
config bootprelay delete [<ipaddress> | all] Allows you to delete one or all IP addresses that
of BOOTP packets.
the router.
the router.
destinations to forward BOOTP packets.
were used as IP destinations to forward BOOTP
packets.
IP ARP CommandsTable 4-14 describes IP ARP commands.
Table 4-14 IP ARP Commands
CommandDescription
show iparp {<ipaddress> | vlan <name> |
all | permanent}
clear iparp [<ipaddress> | vlan <name> |
all]
config iparp add <ipaddress> <mac_address>Allows you to add a permanent IP ARP entry to
config iparp delete <ipaddress>Allows you to delete an IP ARP entry from the
Displays the current Address Resolution Protocol
(ARP) cache for a selected IP address, VLAN, or all
entries. With no options, information for all
VLANs is displayed.
Information displayed includes IP address, MAC
address, aging timer value, VLAN name, VLANid,
and port number.
Allows you to remove dynamic entries in the IP
ARP table.
the system. The IP address is used to match the
IP interface address to locate a suitable interface.
table.
4-18CHAPTER 4: COMMANDS
IP Route Table
Table 4-15 describes IP route table commands.
Commands
Table 4-15 IP Route Table Commands
CommandDescription
show iproute {vlan {<name> | all |
permanent | <ipaddress> <netmask>}
config iproute add default <gateway>
{<metric>}
config iproute delete default <gateway> Allows you to delete a default gateway.
config iproute add <ipaddress> <mask>
Allows you to display the contents of the IP routing
table.
Allows you to add a default gateway to the routing
table. A default gateway must be located on a
configured IP interface. If no metric is specified, the
default metric of 1 is used.
Allows you to add a static address to the routing table.
Use a value of 255.255.255.255 for mask to indicate a
host entry.
Allows you to delete a static address from the routing
table.
Allows you to add a blackhole address to the routing
table. All traffic destined for the configured IP address
is dropped, and no Internet Control Message Protocol
(ICMP) message is generated.
Allows you to delete a blackhole address from the
routing table.
ICMP CommandsTable 4-16 describes the commands used to configure the ICMP
protocol.
Table 4-16 ICMP Commands
CommandDescription
enable icmp redirects {vlan <name> | all} Allows you to enable generation of ICMP redirect
disable icmp redirects {vlan <name> |
all}
enable icmp unreachables {vlan <name> |
all}
disable icmp unreachablesAllows you to disable the generation of ICMP
(continued)
messages on one or more VLANs. The default setting is
enabled.
Allows you to disable the generation of ICMP redirects
on one or more VLANs.
Allows you to enable the generation of ICMP
unreachable messages on one or more VLANs. The
default setting is enabled.
unreachable messages on one or more VLANs.
Switch 3800 Commands4-19
Table 4-16 ICMP Commands (continued)
CommandDescription
enable icmp useredirectsAllows you to enable the modification of route table
information when an ICMP redirect message is received.
The default setting is disabled.
disable icmp useredirectsAllows you to disable the changing of routing table
information when an ICMP redirect message is received.
enable irdp {vlan <name> | all}Allows you to enable the generation of ICMP router
advertisement messages on one or more VLANs. The
default setting is enabled.
disable irdp {vlan <name> | all}Allows you to disable the generation of router
advertisement messages on one or more VLANs.
config irdp [multicast | broadcast]Allows you to configure the destination address of the
router advertisement messages. The default setting is
broadcast.
Allows you to configure the router advertisement
message timers, using seconds. Specify:
■ mininterval — The minimum amount of time
between router advertisements. The default setting
is 450 seconds.
■ maxinterval — The maximum time between router
advertisements. The default setting is 600 seconds.
■ lifetime — The default setting is 1,800 seconds.
■ preference — The preference level of the router. An
IRDP client always uses the router with the highest
preference level. Change this setting to encourage
or discourage the use of this router. The default
setting is 0.
unconfig icmpAllows you to reset all ICMP settings to the default
values.
unconfig irdpAllows you to reset all router advertisement settings to
the default values.
disable irdp {vlan <name> | all}Allows you to disable the generation of router
advertisement messages on one or more VLANs.
4-20CHAPTER 4: COMMANDS
RIP CommandsTable 4-17 describes the commands used to configure the RIP protocol.
Table 4-17 RIP Commands
CommandDescription
show rip {vlan <name> | all}Displays RIP configuration and statistics for one or more
enable rip Allows you to enable RIP.
disable ripAllows you to disable RIP.
config rip add {vlan <name> | all}Allows you to configure RIP on an IP interface. If no
config rip delete {vlan <name> | all}Allows you to disable RIP on an IP interface. When RIP
enable rip aggregationAllows you to enable RIP aggregation of subnet
disable rip aggregationAllows you to disable the RIP aggregation of subnet
enable rip splithorizonAllows you to enable the split horizon algorithm for
disable rip splithorizonAllows you to disable split horizon.
enable rip poisonreverseAllows you to enable the split horizon with
disable rip poisonreverseAllows you to disable poison reverse.
enable rip triggerupdateAllows you to enable triggered updates. Triggered
disable rip triggerupdateAllows you to disable triggered updates.
(continued)
VLANs. Display includes the state for RIP settings, and
interface states. Statistics include the following:
■ Packets transmitted
■ Packets received
■ Bad packets received
■ Bad routes received
■ Number of RIP peers
■ Peer information
VLAN is specified, then “all” is assumed. When an IP
interface is created, per interface RIP configuration is
enabled by default.
is disabled on the interface, the parameters are not
reset to their defaults.
information on a RIP version 2 interface. The default
setting is enabled.
information on a RIP version 2 interface.
RIP. Default setting is enabled.
poison-reverse algorithm for RIP. The default setting is
enabled.
updates are a mechanism for immediately notifying a
router’s neighbors when the router adds or deletes
routes, or changes the metric of a route. The default
setting is enabled.
Switch 3800 Commands4-21
Table 4-17 RIP Commands (continued)
CommandDescription
enable rip exportstaticAllows you to enable the advertisement of static
routes using RIP. The default setting is enabled.
disable rip exportstaticAllows you to disable the filtering of static routes.
config rip updatetime {<delay>}Allows you to change the periodic RIP update timer.
The default setting is 30 seconds.
config rip routetimeout {<delay>}Allows you to configure the route timeout. The default
setting is 180 seconds.
config rip garbagetime {<delay>}Allows you to configure the RIP garbage time. The
show log configDisplays the log configuration, including the syslog
show log {<priority>} {<subsystem>}Displays the current snapshot of the log. Options
clear logAllows you to clear the log.
config log display {<priority>}
{<subsystem>}
(continued)
host IP address, the priority level of messages being
logged locally, and the priority level of messages being
sent to the syslog host.
include:
■ priority — Filters the log to display message with the
selected priority or higher (more critical). Priorities
include critical, warning, and informational. If not
specified, informational priority messages and
higher are displayed.
■ subsystem — Filters the log to display messages
associated with the selected Switch subsystem.
Subsystems include Syst, STP Brdg, SNMP, Telnet,
VLAN, and Port. If not specified, all subsystems are
displayed.
Allows you to configure the real-time log display.
Options include:
■ priority — Filters the log to display message with the
selected priority or higher (more critical). Priorities
include critical, warning, and informational. If not
specified, informational priority messages and
higher are displayed.
■ subsystem — Filters the log to display messages
associated with the selected Switch subsystem.
Subsystems include Syst, STP Brdg, SNMP, Telnet,
VLAN, and Port. If not specified, all subsystems are
displayed.
Allows you to configure the syslog host address and
filter messages sent to the syslog host. Options include:
■ ipaddress — The IP address of the syslog host.
■ facility — The syslog facility level for local use.
■ priority — Filters the log to display message with the
selected priority or higher (more critical). Priorities
include critical, warning, and informational. If not
specified, only critical priority messages are sent to
the syslog host.
■ subsystem — Filters the log to display messages
associated with the selected Switch subsystem.
Subsystems include Syst, STP Brdg, SNMP, Telnet,
VLAN, and Port. If not specified, all subsystems are
sent to the syslog host.
enable log displayAllows you to enable the log display.
enable syslogAllows you to enable logging to a remote syslog host.
disable log displayAllows you to disable the log display.
disable syslogAllows you to disable logging to a remote syslog host.
Configuration and
Table 4-19 describes configuration and image commands.
Image Commands
Table 4-19 Configuration and Image Commands
CommandDescription
save {config} {primary | secondary}Allows you to save the current configuration of the
use config {primary | secondary}Allows you to configure the Switch to use a particular
use image {primary | secondary}Allows you to configure the Switch to use a particular
(continued)
Switch to NVRAM. You can specify the primary or
secondary configuration area. If not specified, the
configuration is saved to the configuration area
currently in use.
configuration on the next reboot. Options include the
primary configuration area, the secondary
configuration area, or an imported ASCII file. If not
specified, the Switch will use the primary configuration
area.
image on the next reboot. If not specified, the Switch
will use the primary image.
4-24CHAPTER 4: COMMANDS
Table 4-19 Configuration and Image Commands (continued)
Allows you to download a new image from a TFTP
server. You must specify the IP address of the TFTP
server and the image filename. You can optionally
specify if you want the file downloaded to the primary
or secondary image. If you do not specify, the file is
downloaded to the primary image.
5
VIRTUAL LANS (VLANS)
Setting up Virtual Local Area Networks (VLANs) on the Switch 3800
eases many time-consuming tasks of network administration while
increasing efficiency in network operations.
This chapter describes the VLAN concepts and explains how to
implement VLANs on the Switch 3800.
Overview of Virtual
LANs
BenefitsImplementing VLANs on your networks has the following advantages:
A VLAN is a group of location- and topology-independent devices, for
example a group of users (workstations) and the server to which they
connect, that communicate as if they are on the same physical LAN.
This means that LAN segments are not restricted by the hardware that
physically connects them. The segments are defined by flexible user
groups that you create with the command-line interface.
■ It eases the change and movement of devices.
With traditional networks, network administrators spend much of
their time dealing with moves and changes. If users move to a
different subnetwork, the addresses of each endstation must be
updated manually.
For example, with a VLAN, if an endstation in VLAN Marketing is
moved to a port in another part of the network, and retains its
original subnet membership, you only need to specify that the new
port is in VLAN Marketing.
5-2CHAPTER 5: VIRTUAL LANS (VLANS)
■ It helps to control traffic.
With traditional networks, congestion can be caused by broadcast
traffic that is directed to all network devices, regardless of whether
they require it. VLANs increase the efficiency of your network
because each VLAN can be set up to contain only those devices that
need to communicate with each other.
■ It provides extra security.
Devices within each VLAN can only communicate with member
devices in the same VLAN. If a device in VLAN Marketing must
communicate with devices in VLAN Sales, the traffic must cross a
routing device.
Types of VLANsSwitch 3800 VLANs can be created according to the following criteria:
■ Physical port
■ IEEE 802.1Q tag
■ Ethernet protocol type
■ A combination of these criteria
Port-Based VLANs
In a port-based VLAN, a VLAN name is given to a group of one or
more ports on the Switch. A Switch port can be a member of only one
port-based VLAN.
Overview of Virtual LANs5-3
For example, in Figure 5-1, the VLANs are configured as followings:
■ Ports 3, 6, and 17 are part of VLAN Marketing
■ Ports 13, 16, and 20 are part of VLAN Sales
■ Ports 21 and 24 are part of VLAN Finance
Marketing
Finance
Sales
Figure 5-1 Example of a port-based VLAN
Even though they are physically connected to the same Switch, in order
for the members of the different VLANs to communicate, the traffic
must go through the IP routing functionality provided in the
Switch 3800. This means that each VLAN must be configured as a
router interface with a unique IP address.
5-4CHAPTER 5: VIRTUAL LANS (VLANS)
Expanding Port-Based VLANs Across Switches
To create a port-based VLAN that spans two Switches you must do two
things:
■ Assign the port on each Switch to the VLAN.
■ Cable the two Switches together using one port on each Switch per
VLAN.
Figure 5-2 illustrates a single VLAN that spans two Switches. All ports
on both Switches belong to VLAN Sales. The two Switches are
connected using port 12 on Switch 1, and port 18 on Switch 2.
Sales
Switch 1
Switch 2
Figure 5-2 Single port-based VLAN spanning two Switches
In a port-based VLAN, to create multiple VLANs that span two
Switches, a port on Switch 1 must be cabled to a port on Switch 2 for
each VLAN that you want to create. At least one port on each Switch
must be a member of one of the VLANs, as well.
Overview of Virtual LANs5-5
Figure 5-3 illustrates two VLANs spanning two Switches. On Switch 1,
ports 1–16 are part of VLAN Accounting; ports 17–24 are part of VLAN
Engineering. On Switch 2, ports 1–16 are part of VLAN Accounting;
ports 17–24 are part of VLAN Engineering. VLAN Accounting spans
Switch 1 and Switch 2 by way of a connection between Switch 1 port
11 and Switch 2 port 6. VLAN Engineering spans Switch 1 and Switch
2 by way of a connection between Switch 1 port 19 and Switch 2 port
20.
AccountingEngineering
Switch 1
Switch 2
Figure 5-3 Two port-based VLANs spanning two Switches
Using these steps, you can create multiple VLANs that span multiple
Switches, in a daisy-chained fashion. Each Switch must have a
dedicated port for each VLAN. Each dedicated port must be connected
to a port that is a member of its VLAN on the next Switch.
To avoid the creation of a bridging loop, you must configure the VLANs
prior to cabling the ports.
5-6CHAPTER 5: VIRTUAL LANS (VLANS)
Tagged VLANs
The Switch 3800 uses the IEEE 802.1Q D4 draft standard for rules
associated with VLAN tagging.
Tagging is a process that inserts a marker (called a tag) into the
Ethernet frame. The tag contains the identification number of a specific
VLAN, called the VLANid.
Uses of Tagged VLANs
Tagging is most commonly used to create VLANs that span Switches.
The Switch-to-Switch connections are called trunks. Using tags, multiple
VLANs can span multiple Switches using one or more trunks. In a
port-based VLAN, each VLAN requires its own pair of trunk ports, as
shown in Figure 5-3. Using tags, multiple VLANs can span two Switches
with a single trunk.
Another benefit of tagged VLANs is the ability to have a port be a
member of multiple VLANs. This is particularly useful if you have a
device (such as a server) that must belong to multiple VLANs. The
device must have a NIC that supports 802.1Q tagging.
A single port can be a member of only one port-based VLAN. All
additional VLAN membership for the port must be done using tags. In
addition to configuring the VLAN tag for the port, the server must have
a Network Interface Card (NIC) that supports 802.1Q tagging.
Assigning a VLAN Tag
When a tag-based VLAN is created, it is given a name and a unique tag
(VLANid). Ports are then assigned to the VLAN. As you assign each
port, you can decide if the port will use the tag.
Not all ports in the VLAN must be tagged. As traffic from a port is
forwarded out of the Switch, the Switch determines (in real time) if
each destination port should use tagged or untagged packet formats
for that VLAN. The Switch adds and strips tags, as required, by the port
configuration.
Overview of Virtual LANs5-7
Figure 5-4 illustrates the physical view of a network that uses tagged
and untagged traffic.
802.1Q
Tagged server
SS
S
M
M
M
Switch 1
M
SS
M
S
M
Switch 2
Figure 5-4 Physical diagram of tagged and untagged traffic
Figure 5-5 shows a logical diagram of the same network.
Marketing
Switch 1
Port 8
Port 12
Port 21
Switch 2
Port 5
Port 10
Port 18
Switch 1
Port 1 *
Port 25 *
Switch 2
Port 25 *
Switch 1
Port 4
Port 9
Port 17
M
= Marketing
S
= Sales
= Tagged port
Sales
Switch 2
Port 7
Port 11
Port 20
Figure 5-5 Logical view of tagged and untagged traffic
*Tagged Ports
5-8CHAPTER 5: VIRTUAL LANS (VLANS)
In Figure 5-4 and Figure 5-5:
■ The trunk port on each Switch carries traffic for both VLAN
Marketing and VLAN Sales.
■ The trunk port on each Switch is tagged.
■ The server connected to port 1 on Switch 1 has a NIC that supports
802.1Q tagging.
■ The server connected to port 1 on Switch 1 is a member of both
VLAN Marketing and VLAN Sales.
■ All other stations use untagged traffic.
As data passes into the Switch, the Switch determines if the destination
port requires the frames to be tagged or untagged. All traffic coming
from and going to the server is tagged. Traffic coming from and going
to the trunk ports is tagged. The traffic that comes from and goes to
the other stations on this network is not tagged.
Spanning Tree Protocol (STP) Bridge Protocol Data Unit (BPDU) traffic is
always untagged and occurs on all ports when Spanning Tree is
enabled.
Protocol-based
VLANs
For the purposes of VLAN classification, packets arriving on a port with
an 802.1Q tag containing a vlanid of 0 are treated as untagged.
Mixing Port-based and Tagged VLANs
You can configure the Switch 3800 using a combination of port-based
and tagged VLANs. A given port can be a member of multiple VLANs,
with the stipulation that only one of its VLANs uses untagged traffic. In
other words, a port can simultaneously be a member of one port-based
VLAN and multiple tag-based VLANs.
Protocol-based VLANs enable you to define a protocol filter that the
Switch 3800 uses as the matching criteria to determine if a particular
packet belongs to a particular VLAN.
Protocol-based VLANs are most often used in situations where network
segments contain hosts running multiple protocols. For example, in
Figure 5-6, the hosts are running both the IP and NetBIOS protocols.
Overview of Virtual LANs5-9
The IP traffic has been divided into two IP subnets, 192.207.35.0 and
192.207.36.0. The subnets are internally routed by the Switch 3800.
The subnets are assigned different VLAN names, Finance and Personnel,
respectively. The remainder of the traffic belongs to the VLAN named
MyCompany. All ports are members of the VLAN MyCompany.
192.207.36.1192.207.35.1
My Company
FinancePersonnel
1
234
192.207.36.0192.207.35.0
Figure 5-6 Protocol-based VLANs
Predefined Protocol Filters
The following protocol filters are predefined on the Switch 3800:
■ IP
■ IPX
■ NetBIOS
■ DECNet
= IP traffic
= All other traffic
5-10CHAPTER 5: VIRTUAL LANS (VLANS)
Defining Protocol Filters
If necessary, you can define a customized protocol filter based on
EtherType, LLC, and/or SNAP. Up to six filters may be part of a protocol
filter. To define a protocol filter, do the following:
■ Create a protocol using the following command:
create protocol <protocol_name>
■ Configure the protocol using the following command:
A maximum of seven protocol names, each containing a maximum of
six protocol filters, can be defined.
VLAN NamesThe Switch 3800 supports up to 64 different VLANs. Each VLAN is
given a name that can be up to 32 characters. VLAN names can use
standard alpha-numeric characters. The following characters are not
permitted in a VLAN name:
■ Space
■ Comma
■ Quotation mark
VLAN names must begin with an alphabetical letter unless quotation
marks are used to enclose a VLAN name that does not begin with an
alphabetical character, or that contains a space, comma, or other
special character.
VLAN names are locally significant. That is, VLAN names used on one
Switch are only meaningful to that Switch. If another Switch is
connected to it, the VLAN names have no significance to the other
Switch.
Configuring VLANs on the Switch 38005-11
The Default VLAN
The Switch 3800 ships with one default VLAN that has the following
properties:
■ The VLAN name is default.
■ It contains all the ports on a new or initialized Switch.
■ The default VLAN is untagged, and has no VLANid or protocol filter
assigned.
Configuring VLANs
on the Switch 3800
This section describes the commands associated with setting up VLANs
on the Switch 3800. Configuring a VLAN involves the following steps:
1 Create and name the VLAN.
2 Assign an IP address and subnet mask (if applicable) to the VLAN, if
needed.
3 Assign a VLANid, if any ports in this VLAN will use a tag.
4 Assign one or more ports to the VLAN.
As you add each port to the VLAN, decide if the port will use an
802.1Q tag.
5-12CHAPTER 5: VIRTUAL LANS (VLANS)
Table 5-1 describes the commands used to configure a VLAN.
Table 5-1 VLAN Configuration Commands
CommandDescription
create vlan <name>Allows you to create a named VLAN.
create protocol <protocol_name>Allows you to create a user-defined protocol.
config protocol <protocol_name> add
config vlan <name> tag <vlanid>Allows you to assign a numerical VLANid. The
config dot1p ethertype <ethertype>Allows you to configure an IEEE 802.1Q
Allows you to configure a protocol filter. Supported
protocol types include:
■ EtherType
■ LLC
■ SNAP
Allows you to assign an IP address and an optional
mask to the VLAN.
Allows you to add and delete ports within the
VLAN. You can specify tagged and untagged
port(s). By default, ports are untagged.
Allows you to configure a protocol-based VLAN. If
the keyword “any” is specified, then it becomes
the default VLAN. All packets that cannot be
classified into other protocol-based VLANs are
assigned to the default VLAN of that port.
valid range is from 1 to 4095.
EtherType. Use this command if you have another
Switch that supports 802.1Q, but uses a different
EtherType. The default value used by the Switch is
8100.
VLAN Configuration
Examples
The following example creates a port-based VLAN named accounting,
assigns the IP address 132.15.121.1, and assigns ports 1, 2, 3, and 6 to
it:
Because VLAN names are unique, you do not need to enter the
keyword “vlan” after you have created the unique VLAN name. You
can use the VLAN name alone.
Displaying VLAN Settings5-13
The following example creates a tag-based VLAN named video. It
assigns the VLANid 1000. Ports 4–8 are added as tagged ports to the
VLAN.
create vlan video
config video tag 1000
config video add port 4-8 tagged
The following example creates a VLAN named Sales , with the VLANid
120. The VLAN uses both tagged and untagged ports. Ports 1–3 are
tagged, and ports 4 and 7 are untagged. Note that when not explicitly
specified, ports are added as untagged.
create vlan sales
config sales tag 120
config sales add port 1-3 tagged
config sales add port 4,7
The following example creates a protocol-based VLAN named IPSales.
Ports 6 through 8 are assigned to the VLAN.
Displaying VLAN
Settings
create vlan ipsales
config ipsales protocol ip
config ipsales add port 6-8
The following example defines a protocol filter, myprotocol, for the
purposes of later applying to a VLAN. This is an example only, and has
no real-world application.
To display VLAN settings, use the following command:
show vlan {<name> | all}
The show command displays summary information about each VLAN,
and includes the following:
■ Name
■ VLANid
■ Ports assigned
5-14CHAPTER 5: VIRTUAL LANS (VLANS)
■ Status for each port
■Enabled/disabled
■Tagged/untagged
■ Protocol information
■ IP address
■ STPD information
Sample output from this command is as follows:
3C16910:7 # sh vlan all
VLAN "Default" created by user
Tagging: 802.1Q Tag 1
IP: 192.207.37.214/255.255.255.0
STPD: Domain "s0" is not running spanning tree protocol.
Protocol:Match all unfiltered protocols.
Ports:23. (Number of active port=1)
Untag: 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
21 22 23 24 25
VLAN "green" created by user
Tagging:802.1Q Tag 11
IP: Not configured
STPD: Domain "s0" is not running spanning tree protocol.
Protocol: Match all unfiltered protocols.
Ports: 3. (Number of active port=0)
Untag: 1 2
Tagged: 7
To display protocol information, use the following command:
This show command displays protocol information, including the
following:
■ Protocol name
■ List of protocol fields
■ VLANs that use the protocol
Deleting and
Resetting VLANs
To delete a VLAN, or to return VLAN settings to their defaults, use the
commands listed in Table 5-2.
Table 5-2 VLAN Delete and Reset Commands
CommandDescription
delete vlan <name>Allows you to remove a VLAN.
delete protocol <protocol>Allows you to remove a protocol.
unconfig vlan <name> ipaddressAllows you to remove the IP address.
5-16CHAPTER 5: VIRTUAL LANS (VLANS)
SWITCH FORWARDING
6
Overview of the
FDB
FDB ContentsThe database holds up to a maximum of 12,000 entries. Each entry
FDB Entry TypesThe following are three types of entries in the FDB:
D
ATABASE (FDB)
This chapter describes the contents of the Switch forwarding database
(FDB), how the FDB works, and how to configure the FDB.
The Switch 3800 maintains a database of all addresses received on all
of its ports. It uses the information in this database to decide whether
a frame should be forwarded or filtered.
consists of the MAC address of the device, an identifier for the port on
which it was received, and an identifier for the VLAN to which the
device belongs. Frames destined for devices that are not in the FDB are
flooded to all members of the VLAN.
■ Dynamic entries — Initially, all entries in the database are dynamic.
Entries in the database are removed (aged-out) if, after a period of
time (ageing time), the Switch has not received a frame containing
that source address. This prevents the database from becoming full
with obsolete entries by ensuring that when a device is removed
from the network, its entry is deleted from the database. Dynamic
entries are deleted from the database if the Switch is reset or a
power off/on cycle occurs.
For more information about setting the Ageing time, refer to
“Configuring FDB Entries,” page 6-3.
■ Static entries — If the ageing time is set to 00:00, all dynamic
entries in the database are defined as non-ageing entries. This
means that they do not age, but they are still deleted if the Switch
is reset.
6-2CHAPTER 6: SWITCH FORWARDING DATABASE (FDB)
■ Permanent entries — Permanent entries are retained in the
database if the Switch is reset or a power off/on cycle occurs. The
system administrator must make entries permanent. A permanent
entry can either be a unicast or multicast MAC address. All entries
entered by way of the command-line interface are stored as
permanent. The Switch can support a maximum of 64 permanent
entries.
PACE PrioritizationFor devices supporting PACE, the Switch 3800 can be configured to
recognize PACE modified addresses. When present, the Switch assigns
PACE traffic to the high priority queue within the Switch.
Recognition of PACE traffic is controlled by the following commands:
enable pace
disable pace
How FDB Entries are
Added
Entries are added into the FDB in two ways:
■ The Switch can learn entries. That is, the Switch updates its FDB
with the source MAC address from a packet, the VLAN, and the
port identifier on which the source packet is received.
■ You can enter and update entries using a MIB browser, an SNMP
Network Manager, or the command-line interface, as described in
the next section.
Configuring FDB Entries6-3
Configuring FDB
To configure entries in the FDB, use the commands listed in Table 6-1.
■ mac_address — displays the entry for a particular MAC address
■ vlan <name> — displays the entries for a VLAN
6-4CHAPTER 6: SWITCH FORWARDING DATABASE (FDB)
■ portlist — displays the entries for one or more ports
■ permanent — displays all permanent entries
The following sample output shows the information displayed when
you request output for all FDB entries:
show fdb
Hash Num Mac Vlan Flags Ptag Portlist
-----------------------------------------------------------0f00: 0 ff:ff:ff:ff:ff:ff Default(0001) sm 0fef CPU
3289: 0 00:e0:2b:00:00:00 Default(0001) sm 0ffb CPU
373d: 0 01:80:c2:00:00:00 (0000) sm 0ffb CPU
72f3: 0 00:e0:2b:00:a4:00 Default(0001) sm 0ff1 CPU
Total: 4 Static: 4 Perm: 0 Dyn: 0 Dropped: 0
FDB Aging time: 300
The show command displays summary information, including
■ MAC address
■ VLAN name and VLANid
■ Entry method (dynamic/static/permanent)
■ Port
Removing FDB
Entries
You can remove one or more specific entries from the FDB, or you can
clear the entire FDB of all entries by using the commands listed in
Table 6-2.
Table 6-2 Removing FDB Entry Commands
CommandDescription
delete fdbentry <mac_address> vlan <name>Allows you to delete a permanent FDB entry.
clear fdb {all | <mac_address> | vlan <name>
| <portlist>}
Allows you to clear dynamic FDB entries that match
the filter. Use the keyword “all” to clear all
dynamic entries.
7
SPANNING TREE PROTOCOL (STP)
Using the Spanning Tree Protocol (STP) functionality of the Switch 3800
makes your network more fault tolerant.
The following sections describe STP concepts, and how STP features are
supported by the Switch.
STP is a part of the 802.1d bridge specification defined by the IEEE
Computer Society. To explain STP more effectively, the Switch 3800 will
be defined as a bridge.
Overview of the
Spanning Tree
Protocol
STP is a bridge-based mechanism for providing fault tolerance on
networks. STP allows you to implement parallel paths for network
traffic, and ensure that:
■ Redundant paths are disabled when the main paths are operational
■ Redundant paths are enabled if the main path fails
CAUTION: You should not configure any STP parameters unless you
have considerable knowledge and experience with STP. The default STP
parameters are adequate for most networks.
Figure 7-1 shows a network containing three LAN segments separated
by three bridges. Using this configuration, each segment can
communicate with the others by using two paths.
7-2CHAPTER 7: SPANNING TREE PROTOCOL (STP)
Figure 7-1 Network with an illegal topology
This configuration is illegal because it creates loops that cause the
network to overload. However, STP allows you to use this configuration
because STP detects duplicate paths and immediately prevents (or
blocks) one of them from forwarding traffic.
Figure 7-2 shows an example of enabling STP on the bridges in the
configuration. The STP system has decided that traffic from LAN
segment 2 to LAN segment 1 can only flow through Bridges C and A.
Figure 7-2 Traffic flowing through Bridges C and A
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.