3Com Sonix Ltd. reserves the right to revise this documentation and to make changes in content from time to
time without obligation on the part of 3Com Sonix Ltd to provide notification of such revision or change.
3Com Sonix Ltd provides this documentation without warranty of any kind, either implied or expressed,
including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose.
3Com may make improvements or changes in the product(s) and/or the program(s) described in this
documentation at any time.
UNITED STATES GOVERNMENT LEGENDS:
If you are a United States government agency, then this documentation and the software described herein are
provided to you subject to the following restricted rights:
For units of the Department of Defense:
Restricted Rights Legend:
subparagraph (c) (1) (ii) for restricted Rights in Technical Data and Computer Software clause at 48 C.F.R.
Restricted Rights Legend: Use, reproduction or disclosure is subject to restrictions set forth in subparagraph (a)
through (d) of the Commercial Computer Software - Restricted Rights Clause at 48 C.F.R. 52.227-19 and the
limitations set forth in 3Com Corporation’s standard commercial agreement for the software. Unpublished rights
reserved under the copyright laws of the United States.
If there is any software on removable media described in this documentation, it is furnished under a license
agreement included with the product as a separate document, in the hard copy documentation, or on the
removable media in a directory file named LICENSE.TXT. If you are unable to locate a copy, please contact 3Com
and a copy will be provided to you.
Unless otherwise indicated, 3Com registered trademarks are registered in the United States and may or may not
be registered in other countries.
3Com, AccessBuilder, Boundary Routing,, LANplex, LanScanner, LinkBuilder, NETBuilder, NETBuilder II, Parallel
Tasking, ViewBuilder, EtherDisk, EtherLink, EtherLink Plus, EtherLink II, SmartAgent, TokenLink, TokenLink Plus,
TokenDisk and Transcend are registered trademarks of 3Com Corporation. 3TECH, CacheCard, FDDILink, FMS,
NetProbe and Star-Tek are trademarks of 3Com Corporation. 3ComFacts is a service mark of 3Com Corporation.
5400 Bayfront Plaza ■
Use, duplication or disclosure by the Government is subject to restrictions as set forth in
Santa Clara, California ■
95052-8145
Corporation. Novell and NetWare are registered trademarks of Novell Inc. Windows is a trademark of Microsoft
Corporation. VT100 is a registered trademark of Digital Equipment Corporation.
Other brand and product names may be registered trademarks or trademarks of their respective holders.
I
MPORTAN
T SAFETY INFORMATIO
N
WARNING:
Warnings contain directions that you must follow for your
personal safety. Follow all instructions carefully.
Please read carefully and thoroughly the following information before
installing the AccessBuilder 500:
■
Exceptional care must be taken during installation and removal of the unit.
■
If the power supply plug is unsuitable and you have to replace it, you
may find other codings for the respective connections. Connect the
power supply wires from the unit according to the following scheme:
Brown wire to the Live (Line) plug terminal which may be marked
■
with the letter L or colored red.
Blue wire to the Neutral plug terminal which may be marked with
■
the letter N or colored black.
Yellow/green wire to the Earth (Ground) plug terminal which may
■
be marked with the letter E, or the earth symbol or colored
green/yellow. Do not connect the earth wire to any other pin.
■
The safety status of the interconnection port on this equipment are as
follows:
Ports identified by the labels VOICE and ISDN = TNV
Ports identified by the labels MANAGER, 10BASET, AUI and WAN = SELV
TNV (telecoms network voltage) is a circuit which under normal
operating conditions carries telecommunication signals.
SELV (safety extra low voltage) is a secondary circuit which is designed
and protected so that under normal and single-fault conditions, the
voltage between any two accessible parts does not exceed a safe value
(42.2 V peak or 60 V DC).
Only connect apparatus complying with the relevant interface
requirements to the ports on this unit.
■
There are no user-replaceable fuses or user-serviceable parts inside the
unit. If you have a physical problem with the unit that cannot be solved
with problem solving actions in this guide, contact your supplier.
■
Disconnect the power before moving the unit.
WARNING: Twisted Pair RJ45 data port.
This is a shielded RJ45 data
socket. It cannot be used as a telephone socket. Only connect RJ45 data
connectors to this socket.
W
ICHTIGE SICHERHEITSHINWEIS
E
ACHTUNG:
Die Warnungen enthalten Anweisungen, die Sie zur
eigenen Sicherheit zu befolgen haben.
Lesen Sie bitte die folgenden Informationen sorgfältig durch, bevor Sie den
AccessBuilder 500 einbauen:
■
Auf besondere Vorsicht muß während des Ein- und Ausbaus des
AccessBuilder 500s geachtet werden.
■
Falls Sie das beigelegte Stromversorgungskabel nicht verwenden
können und zu ersetzen haben, finden Sie möglicherweise andere
Anschlußbelegungen vor. Verbinden Sie die Stromversorgungskabel
des Gerätes nach folgendem Schema:
Braunes Kabel an Anschluß Phase welches normalerweise mit P und
■
braunem Zuleitungskabel gekennzeichnet ist.
Blaues Kabel an Anschluß Null, der mit N bezeichnet ist und
■
normalerweise mit blauem Zuleitungskabel versehen ist.
Gelbgrünes Kabel an Anschluß Erde, der mit dem Erdungssymbol
■
markiert ist. Verbinden Sie niemals das Erdungskabel zu
irgendeinem anderen Anschluß.
■
Der Sicherheitsstandard der Anschlüsse fuer dieses Gerät sind wie folgt:
Anschlüsse bezeichnet mit VOICE und ISDN = TNV
Anschlüsse bezeichnet mit MANAGER, 10BASET AUI und WAN = SELV
TNV (Telecoms Network Voltage - Spannung des
Telekommunikationsnetzwerks) ist ein Anschluss, der unter normalen
Umständen Telekommunikationssignale enthält .
SELV (Safety Extra Low Voltage - Extra Sicherheitsspannung) ist ein
weiterer Anschluss, der unter normalen Umständen und
Fehlerkonditionen entworfen und gesichert wurde, so dass die
Spannung zwischen zwei erreichbaren Teilen kein gefährliches Niveau
erreicht (42.2V max. oder 60V DC).
An den Anschlussbuchsen der Geräte dürfen nur die dafür
vorgesehenen Anschlüsse verwendet werden.
■
Es sind keine von dem Benutzer zu ersetzende oder zu wartende Teile
in dem Gerät vorhanden. Wenn Sie ein Problem mit dem AccessBuilder
500 haben, das nicht mittels der Fehleranalyse in dieser Anleitung
behoben werden kann, setzen Sie sich mit Ihrem Lieferanten in
Verbindung.
■
Bevor der AccessBuilder 500 ausgebaut wird ist der Netzstecker zu
ziehen.
ACHTUNG: gedrehte paarfache RJ45 Datenanschluss.
Es ist eine
abgeschirmte RJ45 Datenanschlußbuchse. Sie darf nicht als
Telefonanschluß verwendet werden. Verbinden Sie nur RJ45
Datenstecker mit diesem Anschluss.
L’
INFORMATION D
I
MPORTANTE
E SÉCURITÉ
AVERTISSEMENT:
vous devez suivre pour votre sécurité personnelle. Suivre toutes les
instructions avec soin.
Veuillez lire à fond l’information suivante avant d’installer le moyeu:
■
Le soin exceptionnel doit être pris pendant l’installation et l’enlèvement
du moyeu.
■
Si la prise du courant attachée au cordon d’alimentation n’est pas
utilisable et il la faut remplacer, il est possible que vous trouverez que
la couleur des fils du cordon d’alimentation peut ne pas correspondre
avec les marques de couleur identifiant les bornes de votre prise de
courant. Procéder comme suite:
Le fil qui est coloré en marron doit être connecté à la borne de la
■
prise du courant qui est indiquée par la lettre L ou par la couleur
rouge.
Le fil qui est coloré en bleu doit être connecté à la borne de la prise
■
du courant qui est indiquée par la lettre N ou par le la couleur noire.
Le fil de couleur vert et jaune doit doit être connecté à la borne qui
■
est indiquée par la lettre E, ou par le symbol de terre ou colorée en
vert et jaune. Ne connecter jamais ce fil à aucune autre borne de la
prise du courant.
Les avertissements contiennent les instructions que
■
Les normes de sécurité des ports d'interconnexion sur cet équipement
sont les suivants:
Les ports marqués par les etiquettes VOICE et ISDN = TNV
Les ports marqués par les etiquettes MANAGER, 10BASET AUI et WAN =
SELV
TNV (Telecoms Network Voltage - tension réseau de télécommunications)
est un circuit qui dans des conditions d'opérations normales, transfert les
signeaux télécoms.
SELV (Safety Extra Low Voltage - tension de sécurité extra-réduite) est
un circuit secondaire désigné et protègé qui dans des conditions
normales et de fautes uniques, assure que la tension entre deux
éléments accessibles n'accedéra pas un niveau de sécurité (42.2V max.
ou 60 V DC).
Connecter uniquement des unités conformes aux normes relatives des
interfaces de cet équipement.
■
Il n’y a pas de parties remplaceables par les utilisateurs ou entretenues
par les utilisateurs à l’intérieur du moyeu. Si vous avez un problème
physique avec le moyeu qui ne peut pas être résolu avec les actions de
la résolution des problèmes dans ce guide, contacter votre fournisseur.
■
Débrancher l’alimentation avant de remuer le moyeu.
AVERTISSEMENT: Le port de données RJ45 de paire tordue.
Ceux-ci
est un socle de données RJ45 blindé. Il ne peut pas être utilisé comme
socle de téléphone. Seulement brancher les connecteurs de données
RJ45 à ce socle.
C
ONTENTS
I
MPORTAN
W
ICHTIGE SICHERHEITSHINWEIS
L’
INFORMATION D
A
BOU
Introduction1
How to Use This Guide2
Conventions2
Additional Safety Information4
G
1
ETTIN
Introduction1-1
AccessBuilder 500 Features1-1
Benefits of ISDN1-4
Using ISDN to Support Leased Line WAN Circuits1-5
Pack Contents Checklist1-6
Registering Ownership Of Your AccessBuilder 5001-7
Pre-installation Requirements1-8
AccessBuilder 500 Front and Rear Panel Features1-9
Front Panel1-9
Front Panel Liquid Crystal Display1-12
Rear Panel1-13
T SAFETY INFORMATIO
E SÉCURITÉ IMPORTANTE
T THIS GUID
G STARTE
E
D
N
E
Installation1-16
Siting the AccessBuilder 5001-16
Connecting the Power1-17
Connecting to Your 10BaseT LAN1-18
Connecting to an Ethernet Hub1-18
Connecting to the In-House LAN1-19
Connecting to a Single Workstation1-20
Connecting to Your LAN Using a Transceiver1-20
Connecting to ISDN1-21
Connecting to the WAN 1-22
Connecting to the Voice Port1-22
Connecting a Management Terminal 1-22
Quick Configuration 1-24
Starting Quick Configuration1-24
Example Using Windows 3.1 Terminal Application 1-24
About Quick Configuration 1-27
Setting the Unit Name 1-28
Connecting to a Novell (IPX) Network 1-29
Connecting to an IP Host on the Same IP Network 1-31
Connecting to an IP Host on a Different IP Network 1-33
Connecting to the Internet or a PPP Router 1-35
Monitoring ISDN Line Usage 1-39
Setting Up a WAN Link 1-39
Examples of Typical ISDN Networking Applications 1-41
Novell Network 1-41
IP Host on the Same IP Network1-43
IP Host on Another IP Network 1-44
Internet or PPP Router 1-46
Multiple Connections from a Single Site 1-47
Troubleshooting 1-48
Renewing the Internal Protection Fuse 1-50
Guidelines For Choosing Bridging or Routing A-2
How Bridges Learn A-3
Bridging Between Remote Sites A-4
Building a Larger Network A-5
Multiple Paths Between Bridged LANs A-6
Network Topology A-6
Broadcast Storms A-6
Optimum Use of ResourceA-7
Network Organization, Structure and Physical Layout A-7
The Internet A-7
Routing IP and IPX A-8
IP Routing A-10
IPX RoutingA-12
IP Addresses A-13
Subnet MaskingA-14
Obtaining an IP AddressA-16
Numbered and Unnumbered Links A-18
G
T
B
ECHNICA
Specifications B-1
LAN Connector InterfacesB-1
WAN Connector InterfaceB-1
ISDN Connector InterfaceB-1
Voice Connector Interface B-1
Management Connector InterfaceB-2
Bridge CharacteristicsB-2
PerformanceB-2
Approvals B-3
Dimensions and Operating Requirements B-4
Interface Cable CharacteristicsB-5
WAN Port Connecting Cable – V.11/X.21 SupportB-5
WAN Port Connecting Cable – V.24/V.28 SupportB-6
WAN Port Connecting Cable – V.35/V.36 SupportB-7
Manager Port Connecting Cable B-8
LAN Port Connecting Cable - 10BaseT B-9
LAN Port Connecting Cable - AUI B-10
Ordering InformationB-11
G
C
LOSSARY
L INFORMATIO
N
T
D
ECHNICA
On-line Technical Services D-1
3Com Bulletin Board Service D-1
Access by Modem D-1
Access by ISDN D-2
World Wide Web SiteD-2
Support from Your Network Supplier D-3
Support from 3ComD-4
Returning Products for RepairD-5
L SUPPOR
T
I
NDE
L
IMITE
X
D WARRANTY
FCC C
LAS
B V
S
ERIFICATION STATEMEN
T
A
Introduction
This guide describes the features, installation and initial configuration
of the AccessBuilder 500. The guide has been designed to be used by
both first-time and experienced computer network users who want to
install and use the AccessBuilder 500.
If you are working with an ISDN bridge or router for the first time, it is
possible you may make mistakes. We have tried to identify the likely
errors you may make and have provided hints and tips to help you
recover from error situations.
Once you have carried out the initial configuration of the unit using the
Quick Configuration
to optimize the unit’s performance on your network. Refer to the
This table shows where to find specific information:
If you are looking for information on:
About the AccessBuilder 500’s features, a
description of the front panel indicators and rear
panel connectors and step-by-step installation
and configuration instructions.
An overview of bridging and routing and an
introduction to IP and IPX protocols.
Technical Information and cable specifications.
Glossary of technical terms.
Technical Support information.
Conventions
The icon conventions that are used throughout this guide are:
Icon
Type
Information Note
Caution
Warning
Turn to:
Chapter 1
Appendix A
Appendix B
Appendix C
Appendix D
Description
Information notes call attention to
important features or instructions.
Cautions alert you to personal safety
risk, system damage, or loss of data.
Warnings alert you to the risk of
severe personal injury.
The text conventions used in this guide are:
Conventions
3
Convention
“Enter” vs. “Type”
Text represented as
screen display
Text represented as
commands
Keys
Italics
Description
When the word “enter” is used in this guide,
it means type something, then press the
[Return] or [Enter] key. Do not press the
[Return] or [Enter] key when an instruction
simply says “type.”
This typeface
displays on your screen, for example:
Enter the unit’s IP address:
This typeface
commands that you enter, for example:
CO IS NU
When specific keys are referred to in the
text, they are called out by their labels, such
as “the Return key” or “the Escape key,” or
they may be shown as [Return] or [Esc].
If two or more keys are to be pressed
simultaneously, the keys are linked with a
plus sign (+), for example:
Press [Ctrl]+[Alt]+[Del].
Italics
are used to denote
emphasis
.
is used to represent
is used to represent
new terms
or
4
A
BOU
T THIS GUID
E
Additional Safety Information
See also the Important Safety Information at the front of this guide.
■
When using the unit, observe the following safety information:
■
Retain this user’s guide for later use and pass it on in the event of
change of ownership of the unit.
■
Protect the unit from sudden, transient increases and decreases in
electrical power by fitting an in-line surge suppressor or
uninterruptable power supply.
■
Products manufactured by us are safe and without risk provided they
are installed, used and maintained in good working order in
accordance with our instructions and recommendations.
■
If any of the following conditions occur, isolate the electricity supply
and refer to your 3Com reseller.
If the case or cover is not correctly fitted.
■
If the case is damaged.
■
If the unit begins to make an odd noise, smell or smoke.
■
If the unit shows signs of a distinct change in performance.
■
■
Never install telephone wires during a lightening storm, or install
telephone connection sockets in wet locations, unless the socket is
specifically designed for wet locations.
■
Do not touch uninstalled telephone wires or terminals unless the
telephone line has been disconnected at the network interface. Always
exercise caution when installing or modifying telephone lines.
■
Do not use a telephone, which is connected to the unit, to report a gas
leak in the vicinity of the leak.
■
Do not spill food or liquids on the unit. If the unit gets wet, isolate the
electrical supply and contact your 3Com reseller.
■
Do not push any objects into the openings of the unit. Doing so can
cause fire or electric shock by shorting out internal components.
Additional Safety Information
■
Avoid using a telephone, which is connected to the unit (other than a
cordless type), during an electrical storm. There may be a remote risk of
electric shock from lightning.
■
Equipment connected to the Voice port must be located in the same
building as the unit.
■
Be sure nothing rests on the unit’s system cables and that the cables
are not located where they can be stepped on and cause damage to
the unit.
■
Keep the unit away from radiators and heat sources. Allow 25 mm (1 inch)
around the unit to provide adequate air circulation.
Install the unit in a clean area that is free from dust or extreme
■
temperatures.
■
The unit has been designed to be a free standing unit. Do not place
anything on top of the unit’s case.
■
Allow a clearance gap of at least a 150 mm from the rear panel of the
unit, to allow for cable access.
■
This product ostensibly complies with the electro-magnetic
compatibility (EMC) requirements of EN 55022 Class A and EN 50082
(susceptibility). However, to fully comply with Class B of EN55022 the
following prerequisites should be observed;
5
the WAN port must be attached to a screened digital cable.
■
the ISDN cable must be used in conjunction with a three turn ferrite.
■
■
This unit contains a lithium battery which is attached to a microchip on
the printed circuit board. The defective battery must be disposed of
safely in-line with the manufacturers instructions.
■
Interconnecting directly, or by way of other apparatus, to ports
complying with SELV requirements may produce hazardous conditions
on the network. Advice should be sought from a competent engineer
before such a connection is made.
6
A
BOU
T THIS GUID
E
1
Introduction
AccessBuilder 500 Features
G
ETTIN
This chapter contains all the information you need to install and configure
the AccessBuilder 500 to make it operational. You can carry out more
sophisticated configuration using the information in the
Access Router Software Reference
The AccessBuilder 500 is a remote local area network (LAN) ISDN access
router, which allows geographically separate LAN workgroups and
single small office users, to connect to central computing facilities
through either, a dial-up on demand connection over the integrated
services digital network (ISDN), or a permanently connected leased line.
The AccessBuilder 500 is designed to connect a LAN (Local Area Network)
at one location with a number of other LANs at remote locations. The LAN
could comprise any number of PCs, servers or other computing equipment,
which in an office or small business environment are typically linked
together using a centrally located Ethernet hub. In order to interconnect
the LANs in different locations, the AccessBuilder 500 unit transmits
information over a WAN (Wide Area Network) service provided by
telephone carrier organizations.
G STARTE
guide.
D
AccessBuilder ISDN
1-2
C
1:
HAPTE
G
R
ETTIN
G STARTE
D
The most modern and efficient of these WAN services includes ISDN
(Integrated Services Digital Network). This provides a high speed dialup
facility to allow your AccessBuilder 500 to automatically and quickly dial
remote offices, transmit your data between remote PCs just as speedily
and then disconnect the call. You incur minimum ISDN telephone charges
as calls are made only when needed. This is known as Dial on Demand.
ISDN can also be used to make voice calls using the AccessBuilder 500’s
Voice port. You can connect an ordinary telephone handset, faxes and
other similar office equipment.
The AccessBuilder 500 also has al port for connection over a permanent
leased line WAN connection, also available from your telephone carrier
organization. Leased lines are available to work at a range of speeds
which incur higher costs the higher the line speed. The benefit of
leased lines is their permanence and fixed cost. No dialling is required
but unlike ISDN you pay a fixed cost regardless of whether you transfer
little data or high volumes of data 24 hours a day.
Overall ISDN is probably the most cost effective solution for small
businesses. However, if your requirements to move data between sites
is likely to increase, the flexibility offered by the AccessBuilder 500 fitted
with both ISDN and WAN ports allows you to choose the type of
connection between sites that best meets your needs.
Typically, the AccessBuilder 500 is used to interconnect LANs running
protocols such as Transmission Control Protocol/Internet Protocol
(TCP/IP) or Novell Internetwork Packet Exchange (IPX). Offering full
LAN-to-LAN connectivity at speeds up to 64 Kilobits per second (Kbps)
on each ISDN B channel (128 Kpbs in total) and up to 2 Megabits per
second (Mbps) on the WAN port, the AccessBuilder 500 is a compact
desktop unit with unrivalled price and performance.
In the USA, some ISDN services run over 56 Kbps channels. Basic Rate
ISDN therefore offers connectivity of 112 Kbps in total.
Introduction
The principal features of the AccessBuilder 500 are:
■
Easy to install, configure and support.
■
ISDN, 2B+D port, supporting Basic Rate interface of two 64 Kbps and a
16 Kbps control channel.
■
Voice port.
■
Leased line wide area network (WAN) access port.
■
Data terminal equipment (DTE) management port.
■
Support for full IP and IPX routing.
■
Protocol transparent bridging.
■
Sophisticated data packet filtering to provide network security.
■
Provides NetWare protocol
■
Data compression based on an optimized Lempel Ziv algorithm.
■
Remote and local management.
■
Flash erasable programmable read-only memory (EPROM), allowing the
spoofing
.
remote upgrading of the units operating system.
1-3
■
Uses simple network management protocol (SNMP) and provides
management information base (MIB) II support.
1-4
C
HAPTE
1:
G
R
Benefits of ISDN
ISDN is an extension of the national and international public switched
telephone network, which offers a digital end-to-end telecommunication
system, providing a better quality service than available using the analog
telephone network. The principal benefits of ISDN are:
■
Fast call setup times, typically taking less than one second for national
calls.
■
Greater bandwidth with multiple channels.
The basic rate service, often referred to as ISDN 2, carries two 64 Kbps
(or possibly two 56 Kpbs in USA) user channels, called B channels and
one 16 Kbps control channel called the D channel. The line service is
presented into the customers premises through a standard RJ45 socket.
A significant aspect of the ISDN service is that it can be provided over
the same wiring that was installed for the original telephone service.
Therefore, ISDN can be made available relatively cheaply almost
anywhere that previously had access to the analog system.
ETTIN
G STARTE
D
The cost of installation and rental of basic rate ISDN lines has dropped to
the point where it is extremely attractive as regards cost and performance.
Introduction
Using ISDN to Support Leased Line WAN Circuits
ISDN provides an ideal service to connect remote LANs. To be
effective, the connecting bandwidth needed is at least 56 Kbps to
achieve a realistic throughput. Slower speed links can be used but
usually only when usage is low and infrequent, or if higher speed
circuits cannot be provided.
1-5
Leased digital point-to-point circuits
can
still
be
cost effective if usage
spans many hours per day. However as ISDN tariffs reduce, this balance
also changes. ISDN can be used to provide effective backup of these
point-to-point WAN circuits in two ways.
■
Firstly, if the point-to-point circuit fails, an ISDN channel can be
dialled-up automatically and quickly, to provide an alternative path to
the remote unit.
■
Secondly, if the leased circuit becomes heavily loaded due to peaks in
the traffic between remote bridges or routers, additional bandwidth
can be automatically dialled-up to supplement the bandwidth of the
leased circuit. The interconnected bridges would then treat the leased
line and ISDN channel as parallel links, sharing the load across the two.
1-6
C
HAPTE
1:
G
R
ETTIN
G STARTE
Pack Contents Checklist
Before you install your AccessBuilder 500, check the contents of the box
against the pack contents checklist below. If any of the items have been
damaged in transit or are missing, then contact the 3Com dealer from
whom the equipment was purchased.
■
1 x AccessBuilder 500 unit.
■
1 x 2 meter mains lead with fitted with molded plug.
■
1 x 3 meter RJ-45 to RJ-45 male plug ISDN 2 connecting cable.
1 x 100 mm crossover cable.
■
■
1 x 9-pin D-type to 25-pin D-type socket, gender changer (COM port
adapter).
It is important that you save the unit’s box and protective packing
material in case you need to store, or transport it in the future.
The US version of the AccessBuilder Remote Office 500 is supplied with
an NT1 ISDN Network Termination Unit (NTU). Follow the instructions
provided with the NTU to connect the AccessBuilder Remote Office 500
to the ISDN.
Introduction
1-7
Figure 1-1
AccessBuilder 500 Pack Contents
Registering Ownership Of Your AccessBuilder 500
A warranty registration card is enclosed in the box with your AccessBuilder
500. Please take a few moments before commencing the installation to fill
in the card and post it to us.
1-8
C
HAPTE
1:
G
R
ETTIN
G STARTE
D
Pre-installation Requirements
Before you install your AccessBuilder 500 you will need the following:
■
A suitable cable for connection to your LAN (or workstation if only a
single workstation is attached to this unit).
■
A transceiver connected to your network cabling if the AUI port is to be
used.
Although the AccessBuilder 500 has two LAN connections (AUI and
10BaseT), only one port can be used at a time.
■
A standard ISDN line wall socket to connect the ISDN cable to the ISDN
port of the AccessBuilder 500. If a suitably sited wall socket is not already
available, then contact your telecommunications supplier for assistance.
■
A suitable cable to connect to your ISDN socket. A 3 meter ISDN cable
is supplied with this unit.
■
The ISDN telephone number of the remote ISDN unit in order to carry
out the connection configuration procedure.
■
A suitable WAN cable if you are connecting to the remote site over a
leased line.
AccessBuilder 500 Front and Rear Panel Features
Front Panel
Introduction
1-9
Figure 1-2
POWER
■
On – Power is connected to the unit and the rear panel On/Off
AccessBuilder 500 Front Panel Features
This LED indicator shows the following:
switch is set to the ON position.
■
Flash – Indicates that the unit’s main program is corrupted and
needs to be reinstalled.
■
Off – No power supplied to the unit. See
page 1-48
for more details.
“Troubleshooting” on
1-10
C
HAPTE
1:
G
R
ETTIN
G STARTE
D
LAN COLLISION
This LED indicator provides a visual indication that a
data collision has occurred on the attached LAN. Collisions are a normal
part of Ethernet operation. The LED flashes to provide a visual indication
of the number of data collisions that are occurring on the LAN:
■
Slow flash – Low collision activity.
Medium flash – Moderate collision activity.
■
■
Quick flash – High collision activity. Continuous high collision
activity can indicate that there is too much traffic on your LAN.
LAN RECEIVE
This LED indicator provides confirmation that data is
being received from the attached LAN. The LED flashes to provide a
visual indication of the activity status occurring on the LAN.
■
Slow flash – Low LAN activity.
■
Medium flash – Moderate LAN activity.
Quick flash – High LAN activity.
■
LAN SEND
This LED indicator provides confirmation that data is being
transmitted to the attached LAN. The LED flashes to provide a visual
indication of the activity status occurring on the LAN.
Slow flash – Low LAN activity.
■
■
Medium flash – Moderate LAN activity.
■
Quick flash – High LAN activity.
ISDN OK
This LED indicator provides confirmation of the state of the
ISDN line.
On – Indicates the AccessBuilder 500 is connected to a working
■
ISDN line. Sometimes this LED does not light until the first call
attempt is made.
Off – No ISDN connection present.
■
ISDN DATA
This LED indicator provides confirmation that an ISDN call is in
progress and that the AccessBuilder 500 is connecting to a remote unit.
Introduction
1-11
ISDN VOICE
This LED indicator provides confirmation that a voice call is
in progress, or the handset is off the hook and a dial tone is present,
indicating that an ISDN network connection is available.
ALARM
This LED indicator provides confirmation that a fault has been
detected on one of the configured ports. Typically this would indicate
that a serial link has gone down, or that a configured port does not
have a cable connected to it.
ALERT
This LED indicator is application specific and lights to indicate that
while the system is operating normally, it has detected a change in state.
For example, where an ISDN backup circuit or any other on-demand
circuits have been brought into use.
The ALERT LED can be disabled using the management software, if
required. See the
The liquid crystal display (LCD) cycles through a number of displays for
three seconds each. These are shown in the table below:
Figure 1-3
Display
NoName
10.0.0.1
LAN1 T (R)
ISDN1 T (R)
WAN1 T (R)
Front Panel LCD Display
Meaning
Unit name (when assigned).
Internet protocol (IP) address (when assigned).
LAN port transmit (and receive) loading percentage,
displayed as a bar graph.
ISDN port transmit (and receive) loading percentage,
displayed as a bar graph.
WAN port transmit (and receive) loading percentage,
displayed as a bar graph.
Rear Panel
Introduction
1-13
Figure 1-4
VOICE
AccessBuilder 500 Rear Panel Features
This port is used to connect an optional public switched telephone
network (PSTN) telephone handset, or any other compatible analog
equipment, operating in digital tone multiple frequency (DTMF) mode,
by connecting the handset’s plug into this port.
This port is in effect an analog to digital convertor which allows you to
use your conventional PSTN telephone on an ISDN line. It is capable of
supporting ringing current and call progress tones, and supports
analog devices to a maximum ringer equivalence number (REN) of one
(United Kingdom). Providing one of the two ISDN B channels is not
being used by the unit, then a voice call can be made.
Incoming ISDN traffic carries both a voice and data identifier and
depending on the type of transmission, a voice call is automatically
directed to the appropriate port connected to the telephone handset.
The Voice port has a British Telecom phone socket. Use the BT to RJ11
converter supplied with the unit to connect voice equipment outside the UK.
1-14
C
HAPTE
1:
G
R
ETTIN
G STARTE
D
0.5 A (T) 250 V~
unit. For instructions on changing the fuse, see
Protection Fuse”
Contains the 0.5 Amp internal protection fuse for the
“Renewing the Internal
on
page 1-50
. Voltage and fuse rating may change
from country to country.
RESET
This push-button can be used to cancel an alarm condition. It
can also be used by your Technical Support service to reset or reload
the EPROM.
ISDN
This port is used to connect to the ISDN network. The port uses an
RJ45 connection socket. A standard ISDN line wall socket is required to
connect the ISDN cable to the ISDN port of the AccessBuilder 500.
Power switch
Provides the unit with switched ON/OFF isolation from
the electrical mains system.
MANAGER
The Manager port enables a management PC or terminal to
be connected to the AccessBuilder 500 using the 9-pin D-type to RJ11
Serial Manager cable supplied with the unit. The port provides VT100
terminal emulation, running at 9600 bps. Refer to
Appendix B
for more
information about cables.
You also need a proprietary communications software package such as
Windows ‘Terminal’ to communicate with the AccessBuilder 500.
WAN
This port is used to provide connection to a WAN, via a private
leased line. The port terminates with a 25-way D-type female connector.
This port supports any of the CCITT data transmission standards;
X.21/V.11 V.24/V.28 (RS232), and V.35/V.36 at data transfer rates up to
2 Mbps. Provided that connection cables that follow these standards are
used, the AccessBuilder 500 automatically detects the type of interface
that the port is required to support, and configure it accordingly.
Refer to
Appendix B
for information about the WAN interface cables
required. Suitable cables are available from your 3Com reseller as spare
parts, refer to
Appendix B
for the required item part number.
Introduction
1-15
10BaseT
This RJ45 port is used to provide a connection to a 10BaseT LAN.
This socket allows direct connection between the AccessBuilder 500 and a
single piece of equipment, as opposed to multi-point LAN connections
using 10Base2 or 10Base5 cabling systems. The AccessBuilder 500 LAN
port simulates the characteristics of a workstation port, which allows it to
be directly connected to a LAN or network hub port as required.
If the LAN port is to be connected directly to a single PC or workstation,
then you must use the crossover cable supplied with the unit to enable
communication with your PC’s Ethernet adapter.
AUI
The AUI port is used to provide a connection to an Ethernet
network using any cabling media by means of a transceiver and AUI
(drop) cable.
220-240 V~ or 100-120V~
CAUTION:
The electrical mains system supply socket must be capable of
The electrical mains system input socket.
supplying 1 Amp of electrical current.
1-16
C
HAPTE
1:
G
R
ETTIN
G STARTE
D
Installation
Siting the AccessBuilder 500
When siting the AccessBuilder 500, ensure:
■
It is accessible and cables can be easily connected.
■
It is out of direct sunlight and away from sources of heat.
Cabling is away from:
■
Sources of electrical noise, such as radios, transmitters and
■
broadband amplifiers.
Power lines and fluorescent lighting fixtures.
■
■
Water or moisture cannot enter the case of the unit.
■
Air flow around the unit and the side of the case is not restricted. We
recommend that you provide a minimum of 30mm (approx. 1.25 inch)
clearance around the unit.
To prolong the operational life of your equipment, do not place objects
on top of the unit.
Connecting the Power
Installation
1-17
CAUTION:
start of this guide and the
Guide”
First, read the section;
.
“Important Safety Information”
“Additional Safety Information”
in
“About This
Isolate the electrical mains system supply before commencing installation.
Ensure that the On/Off switch is set to its ‘OFF’ position.
1
Plug the mains lead into the power socket of the AccessBuilder 500
(see
“Rear Panel”
2
Plug the other end of the mains lead into an adjacent electrical mains
on
page 1-13
).
system outlet socket and if necessary turn on the power at the outlet
socket.
3
The AccessBuilder 500 performs a self test procedure (Figure 6.2) which
ends with the unit displaying its media access control (MAC) address
for approximately ten seconds. The display then alternates between
'NoName', with its default IP address '10.0.0.1' showing, and its port
status 'LAN 1: DOWN'. The unit's POWER and ALERT LEDs light and the
ALARM LED flashes.
at the
Figure 1-5
Power Connection And On/Off Switch
1-18
C
HAPTE
1:
G
R
ETTIN
G STARTE
D
Connecting to Your 10BaseT LAN
Figure 1-6
Connecting to the 10BaseT Port
You can use the 10BaseT connection on the AccessBuilder 500 in the
following ways
■
To connect directly to an Ethernet hub port.
■
To connect to a 10BaseT in-house LAN socket that connects to your
organization’s network.
■
To connect to a single workstation using a 10BaseT crossover cable.
Connecting to an Ethernet Hub
To connect directly to a hub:
1
Connect the UTP cable (not supplied) to the 10BaseT port of the
AccessBuilder 500.
2
Connect the other end to a 10BaseT port on your hub.
Connecting to the In-House LAN
Installation
1-19
Figure 1-7
Connect The
To connect the AccessBuilder 500 to i
1
Connect the UTP cable (not supplied) into RJ45 socket marked LAN on
UTP
Cable To In-House LAN Connection Box
n-house LAN:
the AccessBuilder 500.
2
Connect the other end of the cable into the female socket of the
in-house LAN connection box, as shown in
Figure 1-7
.
1-20
C
1:
HAPTE
G
R
ETTIN
G STARTE
D
Connecting to a Single Workstation
To connect the AccessBuilder 500 to a single personal computer or
workstation:
1
Use the 10BaseT crossover cable supplied together with a length of
standard 10BaseT cable.
2
Connect the crossover cable to the 10BaseT socket on the workstation’s
Ethernet adapter as shown in
3
Connect the port of the crossover cable that is connected to your PC and
Figure 1-8
.
the socket marked LAN on the AccessBuilder 500 using a length of
standard 10BaseT cable.
Figure 1-8
Using the 10BaseT Crossover To Connect To A PC.
Connecting to Your LAN Using a Transceiver
You can use the AUI port to connect the AccessBuilder 500 to an
Ethernet network using any type of cabling media, such as 10Base5,
10Base2 or fiber optic cable.
The transceiver must be correctly attached to your network cabling and
can be connected to the AccessBuilder 500 using an AUI cable
(sometimes known as drop cable). Follow the instructions provided
with your transceiver’s user guide.
Connecting to ISDN
Installation
1-21
Figure 1-9
Connect ISDN Cable Into A Proprietary ISDN Wall Box
Connect the supplied ISDN cable from the ISDN port into the ISDN wall
box. See
CAUTION:
Figure 1-9
and
Figure 1-10
. (US models see the note on
Do not connect the ISDN line into the
page 1-6
AccessBuilder 500
LAN port as the ISDN line voltage could damage the unit.
Figure 1-10
Examples of ISDN Wall Boxes
)
’s
1-22
C
HAPTE
1:
G
R
ETTIN
G STARTE
D
Connecting to the WAN
If you intend to use a permanent leased line connection, you can
connect to a WAN Network Terminating Unit (NTU) fitted by your WAN
service supplier. Using a suitable WAN cable (as described in
Appendix B
) connect one end to the WAN port on the AccessBuilder 500
unit and the other to the NTU. For details of configuring the
AccessBuilder 500 for use with a WAN, see
page 1-39
.
Connecting to the Voice Port
You can connect a standard telephone handset or other analog
telephony equipment, such as a a fax or answering machine, can be
connected to the port marked VOICE if required.
Some service providers offer Basic Rate ISDN connections with a single
B-channel. If you connect a handset to a unit connected to this type of
ISDN service, you cannot pass data while the Voice port is in use. We
recommend that you only connect voice equipment to ISDN services
offering the standard 2 B-channel Basic Rate service.
“Setting Up a WAN Link”
on
The Voice port has a British Telecom phone socket. Use the BT to RJ11
converter supplied with the unit to connect voice equipment outside the UK.
A dial tone is not provided to the handset if the ISDN line is not
operational or has been disconnected.
Connecting a Management Terminal
Connect the Manager cable to the MANAGER port on the rear of the
unit. Connect the other end to the serial COM port on your PC
workstation. See
Figure 1-11
.
When you have connected a management terminal, you can configure
the AccessBuilder 500 to communicate with the remote site(s). See
“Quick Configuration”
on
page 1-24
.
Installation
1-23
Figure 1-11
Connecting The Management Cable
If your PC has a 25 pin COM port, use the 9-pin to 25-pin adapter
supplied with the AccessBuilder 500 to connect the manager cable to
your PC as shown in
Figure 1-12
9-Pin to 25-Pin Converter
Figure 1-12
.
1-24
C
HAPTE
1:
G
R
ETTIN
G STARTE
Quick Configuration
This section describes how you can configure the unit to bridge or route
over ISDN links to suit most networking requirements using a simple
forms-based user interface. If you want to connect to a remote site using
leased line WAN links see
If you are unsure about the networking configuration you require, see
“Examples of Typical ISDN Networking Applications”
more information.
D
“Setting Up a WAN Link”
on
page 1-39
on
.
page 1-41
for
IMPORTANT
The Quick Configuration menu option is designed to be used
only when you set up the unit for the first time. If you want to make any
changes to the unit’s configuration at a later stage, use the management
system menus to make these changes. For more information, see the
Using a VT100 compliant terminal emulator, setup the terminal
emulation to VT100 with communications parameters set as follows;
select the COM port to be used for data transmission, 9600 bits/s – 8
data bits – 1 stop bit – no parity, with flow control set to none.
Example Using Windows 3.1 Terminal Application
Start the Windows ‘Terminal’ application. Using a mouse, click on
Settings
in the status bar to reveal the menu.
From the menu:
a
Select the
(ANSI)
b
Select the
Terminal Emulation
is selected.
Communications
parameters are set as above.
.
dialo
g b
ox; confirm that
DEC VT-100
dialog box; check the communications
c
Select the
Terminal Preferences
check-boxes have been cleared.
dialog box; confirm that all
Quick Configuration
1-25
If the cursor disappears during configuration, confirm that the Cursor
Blink check-box has been checked (i.e. shows a cross in it).
If the keyboard arrow keys fail to move the cursor during configuration,
confirm that the ‘Use Function, Arrow, and Ctrl Keys for Windows’
check-box has not been checked.
d
Now save this configuration as a Windows terminal emulator file for
future use.
If you are using Windows 95, use the Hyperterminal application and
configure it in the same way as described above.
Figure 1-13
2
If the terminal emulator has been correctly configured, pressing
The Main Menu Screen
[RETURN] displays the Enter Password screen.
3
Enter the default password,
PASSWORD
The Main Menu appears as shown in
, using uppercase characters.
Figure 1-13
.
1-26
C
HAPTE
1:
G
R
ETTIN
G STARTE
D
Figure 1-14
4
At the command prompt enter QC.
Quick Configuration Menu
The screen changes to display the Quick Configuration menu shown in
Figure 1-14
.
About Quick Configuration
You can configure the unit to connect to other Novell networks, to bridge
to hosts on the same IP network (a network with the same IP network
address), to route to a different IP network (an IP network with a different
IP network address) and to connect to the Internet or other Point-to-Point
Protocol (PPP) router. By using the commands several times, you can
configure the unit to automatically connect to a combination of the above
networks or to several different networks of the same type.
For example, if you need to connect to an IPX site, an IP host on a
different network and to the Internet using an ISDN connection to your
Internet service provider you would do the following.
■
Use the NO
command to configure the connection to the Novell server
at the remote site.
■
Use the IPR
command to configure the connection to the remote IP
host.
■
Use the IN
command to configure the connection to your Internet
service provider’s router.
Quick Configuration
1-27
You cannot configure the unit to be an IP bridge and IP router at the
same time.
The AccessBuilder 500 talks to other AccessBuilder units using its own
very efficient FastConnect protocol over the ISDN or WAN port
connections. If you need to communicate with another manufacturer’s
equipment, then you need to configure the AccessBuilder 500 to use
the PPP protocol using the
Internet
option. See later in this section for
more information. You can further configure the PPP parameters using
the management system. See the
Software Reference
guide for more information.
AccessBuilder ISDN Access Router
Before configuring the unit to use PPP, check with your Internet service
provider or with the system administrator of the remote site to find out
which PPP parameters must be set and what their values should be.
Do not
attempt to configure the unit to use PPP without this information.
1-28
C
HAPTE
1:
G
R
ETTIN
G STARTE
Setting the Unit Name
Before you configure the unit to connect to any other network, you must
first give the unit a name. Enter NA at the command prompt on the Quick
Configuration screen to display the screen illustrated in
The fields on this screen are:
D
Figure 1-15
.
Unit Name
Type in a suitable name for this unit. The name can be up
to 12 characters long, must contain no spaces and should, where
possible, give an indication of the geographical location of the unit or
the name of the users.
Manager LAN IP Address
Type the IP address for this unit. It must be a
unique IP address on your network.
Manager LAN IP Mask
“Subnet Masking”
Enter an appropriate IP subnet mask. See
in
Appendix A
for more information about subnet
masks.
Network Type
Toggle the network type to match the ISDN service
provided by your ISDN service provider.
Figure 1-15
Setting The Unit Name
Quick Configuration
1-29
SPID 1 and 2
Service Profile IDs (SPID) are used by some ISDN service
providers in the USA. If SPID is used, enter the value you are given by
your ISDN service provider. Leave this field blank if you have not been
provided a SPID.
Directory Number 1 and 2
Enter the ISDN number associated with
each SPID.
Press [CTRL]+[E] to submit these parameters.
Connecting to a Novell (IPX) Network
To connect to a Novell network using FastConnect, enter NO
command prompt on the Quick Configuration screen to display the
screen illustrated in
Figure 1-16
.
at the
Figure 1-16
Connecting To A Novell Network
Complete the fields on this screen as follows:
Do you have a local server?
Use the [Spacebar] to toggle this field to
Yes or No as appropriate.
If you have a local server, the unit’s configuration is updated to ensure
that no data destined for local servers is passed over the link.
1-30
C
HAPTE
1:
G
R
ETTIN
G STARTE
D
Remote ISDN Number
Type the ISDN number of the remote unit that
connects to the Novell network.
Call Type
Set the Call Type required for your ISDN line. Toggle this field
to the Call Type required by your ISDN service provider.
Press [CTRL]+[E] to submit this information.
When you do this, the unit automatically makes a short call to the
remote unit to interrogate the remote network for information about
its servers. When it has obtained the information it needs the call is
automatically disconnected. The unit then updates the autocall table so
that when data is destined for a remote server, the unit automatically
dials the correct ISDN number and connects to the remote network.
Enter SAVE
at the command prompt to permanently store this
configuration in the unit’s memory.
Quick Configuration
Connecting to an IP Host on the Same IP Network
To connect to an IP host on the same network using FastConnect, enter
at the command prompt on the Quick Configuration screen to
IPB
display the screen illustrated in
Figure 1-17
.
1-31
Figure 1-17
Connecting To An IP Host On The Same Network
Complete the fields on this screen as follows:
Remote ISDN Number
Type the ISDN number of the remote unit that
connects to the IP network.
Call Type
Set the Call Type required for your ISDN line. Toggle this field
to the Call Type required by your ISDN service provider.
Remote IP Address
Type the IP address of the remote IP host to which
you want to connect.
Press [CTRL]+[E] to submit this information.
An entry is made in the autocall table so that if any data is destined to
the remote host, a call is made automatically and a connection made
to the remote IP network.
1-32
C
HAPTE
1:
G
R
ETTIN
G STARTE
D
Enter
at the command prompt to permanently store this
SAVE
configuration in the unit’s memory.
Although calls to the remote site are only generated when data is
addressed to a specific IP host or hosts (in our example, 191.000.000.100),
any data that cannot be identified as local is also passed over the link
while it is open. This can prevent the link from closing after the intended
data has been transferred.
To avoid this situation you can also configure the units at both ends of
the link to implement a Firewall and/or set the
Maximum Call Duration
in
the ISDN parameters screen to reduce the amount of traffic permitted to
pass across the link. See the
Reference
guide for more information about these features.
AccessBuilder ISDN Access Router Software
Alternatively, you may wish to configure the unit to operate as a router
to prevent this problem occurring altogether. However, this requires
that each site consists of separate subnets. See the next section for
more information.
Quick Configuration
Connecting to an IP Host on a Different IP Network
To connect to an IP host on a different network using FastConnect,
enter
to display the screen illustrated in
at the command prompt on the Quick Configuration screen
IPR
Figure 1-18
.
1-33
Figure 1-18
Connecting To An IP Host On A Different Network
Complete the fields on this screen as follows:
Remote ISDN Number
Type the ISDN number of the remote unit that
connects to the remote IP network.
Call Type
Set the Call Type required for your ISDN line. Toggle this field
to the Call Type required by your ISDN service provider.
IP Address of this unit’s LAN
Type the IP address of this unit. This is
the address you entered on the Name screen.
IP Mask of this unit’s LAN
this unit on the Name screen. See
Type the IP subnet mask you entered for
Appendix A
for more information
about subnet masks.
IP Address of this end of the ISDN link
By default this field is set to
UNNUMBERED which allows unnumbered links to be used. This option
is suitable for most network configurations.
1-34
C
1:
HAPTE
G
R
ETTIN
G STARTE
D
If you want to use numbered links, you must enter an IP address for
this port. The IP address must be on a different network or subnetwork
than the unit’s LAN IP address but on the same network or subnetwork
as the IP Address at the other end of the ISDN link.
See
Appendix A
for information about numbered and unnumbered links.
IP Address at the other end of the ISDN link
By default this field is set
to UNNUMBERED indicating unnumbered links are being used. If you
want to use numbered links, type the IP address of the remote ISDN port
on the unit to which you want to connect. It must be on the same
network or subnetwork as the IP address at this end of the ISDN link.
IP Mask of the ISDN Link
to UNNUMBERED
. If you want to use numbered links, type a subnet mask
To use unnumbered links, leave this field set
suitable for use with the IP addresses you have selected for the ISDN
ports at both ends of the link. See
Appendix A
for more information
about subnet masks.
IP Address of the Remote Host
By default, this field is set to DEFAULT.
This indicates that this is the default route and all IP traffic that cannot be
routed elsewhere is to be passed to the remote unit on the ISDN number
you configure in this screen. If you want to route IP traffic to a specific
unit, type the IP address of remote host to which you want to connect.
Remote IP Mask
By default, this field is set to DEFAULT. Use this option
if all IP traffic is to be passed to a single destination and no other route
exists. If you want to route to a specific unit, type an IP subnet mask to
match the address type being used.
Press [CTRL]+[E] to submit this information. An entry is made in the
autocall table so if any data destined to the remote host, a connection
is automatically made to the remote IP network.
Quick Configuration configures static routes which means that they are
not learned, aged out or advertised to other routers.
Enter SAVE
at the command prompt to permanently store this
configuration in the unit’s memory.
Connecting to the Internet or a PPP Router
To connect to an Internet router or to a router using Point-to-Point
Protocol (PPP), enter IN at the command prompt on the Quick
Configuration screen to display the screen illustrated in
Quick Configuration
Figure 1-19
1-35
.
Figure 1-19
Connecting To The Internet Or PPP Router
Complete the fields on this screen as follows:
If you are connecting to the Internet, your service provider will be able to
give you the correct values for each of these fields.
If you are connecting to a remote PPP router, check with the system
administrator of the remote network for the correct values for these fields.
Name of your Internet Provider or remote site
Type the name of your
Internet service provider or of the remote unit that connects to the remote
IP network.
ISDN Number of the remote unit
Type the ISDN number of the
remote unit that connects to the remote IP network.
Call Type
Set the Call Type required for your ISDN line. Toggle this field
to the Call Type required by your ISDN service provider.
1-36
C
HAPTE
1:
G
R
ETTIN
G STARTE
D
IP Address of this unit’s LAN
Type the IP address of this unit. This is
the address you entered on the Name screen.
IP Mask of this unit’s LAN
this unit on the Name screen. See
Type the IP subnet mask you entered for
Appendix A
for more information
about subnet masks.
IP Address of this end of the ISDN link
UNNUMBERED
which allows unnumbered links to be used. This option
is suitable for most network configurations. See
By default this field is set to
Appendix A
for more
information about numbered and unnumbered links.
If you want to use numbered links, you must enter an IP address for this
port that is on a different network or subnetwork than the unit’s IP address.
IP Address at the other end of the ISDN link
set to
UNNUMBERED
indicating unnumbered links are being used. If
By default this field is
you are using numbered links, type the IP address of the remote ISDN
port on the unit to which you want to connect. It must be on the same
network or subnetwork as the local ISDN port.
IP Mask of the ISDN Link
field set to
UNNUMBERED
If you are using unnumbered links, leave this
. If you are using numbered links, type a
subnet mask suitable for use with the IP addresses you have selected
for the ISDN ports at both ends of the link. See
Appendix A
for more
information about subnet masks.
P Address of the Remote Host
By default this field is set to
INTERNET
This is the default route and all IP traffic not destined for the LAN port is
passed to the remote unit on the ISDN number you configure in this
screen. If you want to route IP traffic to a specific unit, type the IP address
of remote host to which you want to connect.
.
Quick Configuration
1-37
IP Mask of the remote host’s network
By default, this field is set to
INTERNET. Use this option if all IP traffic is to be passed to a single
destination and no other route exists. If you want to route to a specific
unit, type an IP subnet mask to match the address type being used.
Make of remote router
This option sets PPP parameters needed to
connect to the remote unit in its default configuration. If the remote unit’s
PPP configuration has been altered, you will need to amend the PPP
parameters on this unit to reflect the changes. Refer to the
ISDN Access Router Software Reference
guide for more information
AccessBuilder
Toggle this field to the type of remote router to which you are connecting.
The PPP options for the default settings at the remote router are then
automatically configured when you press [CTRL]+[E] to exit this screen.
The options are:
Default – Use this option if you are connecting to another
■
AccessBuilder 500. Also use this option if the remote unit is none of
the following and amend the PPP parameters accordingly.
3Com – 3Com NETBuilder router.
■
■
Cisco – Cisco router.
■
Ascend – Ascend router.
Spider – Spider/Shiva router.
■
If you are connecting to a Spider/Shiva router, you need also to edit the
ISDN port’s configuration and set the PAP field in the LCP Configuration
screen to Incoming. See the
Reference
guide for details.
PAP Password to login to Remote Site
UNUSED
. If you need to use a PAP password, enter the password
AccessBuilder ISDN Access Router Software
By default this is set to
provided by your Internet service provider or the system administrator
responsible for the remote router. This password is submitted to the
remote unit for it to verify. The password is case-sensitive.
1-38
C
HAPTE
1:
G
R
ETTIN
G STARTE
D
PAP Password for others to login to you
UNUSED
. If you need to use a PAP password, enter the password
By default this is set to
provided by your Internet service provider or the system administrator
responsible for the remote router. Your unit verifies that the remote
unit is valid by comparing its submitted PAP password with the entry in
this field. The password is case-sensitive.
CHAP Password to login to Remote Site
UNUSED
. If you need to use a CHAP password, enter the password
By default this is set to
provided by your Internet service provider or the system administrator
responsible for the remote router. This password is submitted to the
remote unit for it to verify.
The password is case-sensitive. To ensure
security, it is recommended that the local password is different from
the remote password.
CHAP Password for others to login to you
UNUSED
. If you need to use a CHAP password, enter the password
By default this is set to
provided by your Internet service provider or the system administrator
responsible for the remote router. Your unit verifies that the remote
unit is valid by comparing its submitted CHAP password with the entry
in this field. The password is case-sensitive.
Press [CTRL]+[E] to save this information.
An entry is made in the autocall table so that if any data is destined for
the Internet or Remote PPP routed network, a call is made
automatically and a connection made to the remote router.
Enter SAVE
at the command prompt to permanently store this
configuration in the unit’s memory.
Monitoring ISDN Line Usage
After you have first configured the unit for use with ISDN, it is important
to monitor ISDN line usage to ensure that the unit is working in the way
you expect.
Check the ISDN DATA LED to ensure that unexpected calls are not being
made or that connections are not remaining open when you expect
them to have closed. As in a conventional telephone call, charges are
made regardless of what is sent down the line until the call is dropped.
If you want to ensure that ISDN line usage is limited, set up ISDN
Timebands or set the
If you are using the AccessBuilder 500 to connect to a remote site over
a leased line link, the initial setup is very simple.
Monitoring ISDN Line Usage
parameter. See the
guide for more
1-39
1
Before you power on the unit, connect an appropriate WAN cable to
the WAN port on the rear of the unit. If you have already powered on
the unit, switch it off and connect the cable.
For more information about suitable cables, see
2
Power on the unit.
The AccessBuilder 500 automatically configures the WAN port to the
appropriate line speed.
3
Refer to the
and edit the WAN port’s configuration as follows:
a
From the main menu, enter CO
b
Highlight the WAN port.
c
Enter ED to display the Edit WAN Port screen shown in
If you are routing, edit the Port IP address to set it to
UNNUMBERED
or to a valid IP address for the WAN link.
See
Appendix A
for more information about using numbered and
unnumbered links.
If you are bridging, leave this field at the default setting.
e
If necessary, change any of the other parameters to suit your WAN
link. In most cases the defaults can be used.
f
Press [CTRL]+[E] to submit this configuration.
The WAN port is now configured and provided the remote unit’s WAN
port has also been configured, data will be passed across the link.
Enter
at the command prompt to permanently store this
SAVE
configuration in the unit’s memory.
Figure 1-20
Edit WAN Port Screen
Examples of Typical ISDN Networking Applications
Examples of Typical ISDN Networking Applications
This section describes four of the most common applications of the
AccessBuilder 500. All of these configurations can be carried out using
the
Quick Configuration
necessary to make the unit operational. However, you may want to fine
tune the performance of the AccessBuilder 500. The information
provided in the
guide will help you do this.
The four typical applications are:
■
Connecting to a Novell Network.
■
Connecting to an IP host on the same IP network.
■
Connecting to an IP host on another IP network.
■
Connecting to the Internet or a PPP router.
You may need to combine two or more of these applications to provide
full connectivity to your network. This is easily done by repeating the
Many organizations base their local area networks on Novell NetWare
servers and users may need to access information stored on servers in
other locations. If you are using ISDN to connect to the remote site, you
can configure the AccessBuilder 500 to automatically call and connect
to remote Novell servers when connection is required.
During configuration, once you have entered the ISDN number for the
remote site, the AccessBuilder 500 makes a call to the remote site and
autodiscovers the Novell servers on that network. It is then able to
autocall the remote site whenever a connection to one of the remote
servers is requested. To the user at the local site it will appear as
though the server is on the same network.
1-42
C
1:
HAPTE
G
R
ETTIN
G STARTE
D
When no data is being passed between the workstation and server, the
AccessBuilder 500 closes the ISDN connection and the units at each
end of the link
spoof
the Novell IPX protocol so that both the
workstation and server believe the connection is still valid. As soon as
the unit identifies that data needs to be passed to the server, the ISDN
connection is re-established without the user being aware of ever
being disconnected. In this way ISDN calls are kept to a minimum.
Figure 1-21
In the example shown in
Connecting To A Remote Novell Network
Figure 1-21
, the Local Site is connected to a
Remote Site. The Local Site shown has several workstations and a server
but could equally consist solely of workstations or even a single
workstation (such as in the case of a homeworker). The Remote Site may
be a central site for an organization or simply another like-sized office.
If you are connecting to the remote site over a WAN leased line link,
the AccessBuilder 500 has no need to spoof the IPX protocol as there is
a permanent connection in place. Once the AccessBuilder 500 has
determined that the server is on the Remote Site all data between the
server and workstation is passed over the link.
Examples of Typical ISDN Networking Applications
IP Host on the Same IP Network
If your organization operates a TCP/IP network and needs to extend the
IP network over geographically remote sites, it is possible to bridge the
network using the AccessBuilder 500. It is only possible to bridge where
both sites have the same network address and the devices are on the
same subnet. In a class C IP address, the network address is the first three
groups of numbers. For example:
192.000.000.xxx
1-43
where
See
represents the host ID of the individual devices on the subnet.
xxx
“IP Addresses”
in
Appendix A
for more information about addresses.
Typically IP bridging would be used to connect a back office or home
office into a main site. Any further network connections would be
carried out from the main site. An example of such a network is shown
in
Figure 1-22
.
During configuration, you enter the ISDN number and the IP addresses
of any hosts to which you want to connect. In the example in
Figure 1-22
, the IP address of the host 191.000.000.100 is used and only
when data destined for this device is received by the AccessBuilder 500,
is a call made to the remote site.
Figure 1-22
IP Bridged Network
1-44
C
1:
HAPTE
G
R
ETTIN
G STARTE
D
There are some issues about which you should be aware when
implementing an IP bridging solution.
■
Although calls to the remote site are only generated when data is
addressed to a specific IP host or hosts (in our example, 191.000.000.100),
any data that cannot be identified as local is also passed over the link
while it is open. This can prevent the link from closing after the intended
data has been transferred.
■
Some devices and applications (for example autodiscovery programs
on SNMP managers) poll all devices on a subnet at regular intervals
and this could lead to frequent ISDN calls if you have entered several IP
hosts to generate autocalls to the remote site. When combined with
the problem described above, you could find your ISDN line
permanently connected.
To avoid this situation you need to be sure that no devices or applications
exist on your local site that could make unnecessary and costly calls to your
remote site. You can also configure the AccessBuilder 500 units at both
ends of the link to implement a Firewall and/or Call Guillotine to reduce the
amount of traffic permitted to pass across the link. See the
ISDN Access Router Software Reference
guide for more information about
AccessBuilder
these features.
Alternatively, you may wish to configure the AccessBuilder 500 to operate
as a router to prevent this problem occurring altogether. This however
requires that each site consists of separate subnets. See the next section
for more information about IP routing.
IP Host on Another IP Network
Most organizations using TCP/IP protocols on their network, choose to
subnet remote sites or even to have them on different networks. This
requires that connections to remote sites are routed rather than bridged.
The advantage of routing over bridging is that calls to the remote site are
only made when data is specifically addressed to a remote network.
Bridging passes any data not known to be for the local network to the
remote network whether that is its destination or not.
Examples of Typical ISDN Networking Applications
1-45
Because the ISDN number can be associated with a remote network
rather than just a specific IP host, any data for the remote network can
generate an autocall and be routed over the AccessBuilder 500. If you
need to connect to IP hosts on several networks, you will need to use
routing to be able to communicate with the different hosts.
The example shown in
Figure 1-23
shows the Local Site connected to
two Remote sites over ISDN. All sites are connected using AccessBuilder
500 units.
Figure 1-23
IP Routed Network
1-46
C
HAPTE
1:
G
R
ETTIN
G STARTE
Internet or PPP Router
Some small businesses need high-speed connections into the Internet or
need to connect to large global networks used by larger organizations.
When communicating with another AccessBuilder 500, the unit uses
FastConnect, its own proprietary high speed protocol. However, in order
to connect with other routers it needs to be configured to use the slower
PPP protocol. PPP is used by many other routers.
Increasingly Internet service providers are offering access to the
Internet over ISDN via an ISDN router. PPP routing over ISDN allows a
simple cost-effective connection to the Internet or into a large
organization’s global network.
D
Figure 1-24
PPP Connections To The Internet and Corporate Network
Examples of Typical ISDN Networking Applications
Multiple Connections from a Single Site
In some instances it is likely that you will need to connect to Novell servers
on one site, IP hosts on the same remote site or possibly a different
remote site and a connection into the Internet. This can all be achieved by
running the simple configuration several times until all the desired types
of connection have been configured. The only thing you need to be aware
of is that you cannot bridge and route the same protocol.
1-47
The local site shown in
Figure 1-25
is a small business that needs data
links to several of its clients and a connection to the Internet. It has an IPX
connection to access information on one client’s NetWare server and IP
routed connections to several IP hosts at different clients’ sites. Finally,
there is a connection to the local Internet service provider’s PPP router
giving fast access to the Internet. All connections can be set up with an
autocall so that connections to the remote sites are made as soon as the
AccessBuilder 500 identifies data not destined for the local network.
Figure 1-25
Multiple Connections From A Single Site
1-48
C
HAPTE
1:
G
R
ETTIN
Troubleshooting
G STARTE
D
WARNING:
There are no user serviceable components inside the case of
the unit.
CAUTION:
Read the section ‘Important Safety information’, at the start
of this manual.
The AccessBuilder 500 is fully performance tested after assembly. Providing
the unit has been correctly installed, and is used in accordance with the
instructions contained in this manual, difficulties should not arise. If unit or
system maintenance is required, then it must be carried out by a
competent network engineer.
In the unlikely event that you experience problems with the unit, the
following procedure will enable you to undertake basic troubleshooting
before contacting your 3Com reseller.
Malfunction
If you cannot
connect the unit
to the network or
PC.
The POWER LED
does not light.
Remedy
Verify that your computer is equipped with an available serial
port and that the correct cables and connectors are being
used. If in doubt contact the unit’s supplier.
Confirm that:
a)
The switched outlet socket of the electrical mains
system supply is turned on. The mains lead is correctly
plugged into the unit’s power socket.
b)
The unit’s on/off switch is toggled to the ON position.
c)
The switched outlet socket is ‘live’ by plugging the unit
into an alternate socket to see if it functions.
d)
The fuse within the plug (if fitted) has not blown and
that the plug is in good working order.
e)
The unit’s internal fuse has not blown. If the fuse has
blown, see
page 1-50
“Renewing the Internal Protection Fuse”
for instructions on replacing it.
on
Troubleshooting
1-49
Malfunction
The ISDN OK LED
does not light.
If other LEDs do
not light during
operation of the
unit.
The local unit
does not connect
to the remote
unit.
Remedy
Follow the procedures as outlined for
“The POWER LED does
not light.”
a)
Ensure that the AccessBuilder 500 is powered up and the
POWER LED is lit.
b)
Confirm that the ISDN UTP cable is correctly connected,
and that the cable is attached to the socket marked
ISDN.
c)
Confirm that the ISDN line socket that is connected to
the unit is conveying an ISDN service.
d)
Try making an ISDN call using a telephone connected to
the ISDN line to confirm if the line is operational.
e)
If the LED still fails to light, plug the UTP cable into an
alternate ISDN service socket to confirm that it functions.
f)
Try using an alternate UTP cable to connect the unit to
the ISDN service socket.
During normal operation the remaining unit LEDs should
light and extinguish depending on the action being taken. If
the LEDs fail to light in accordance with their function (refer
to
“Front Panel”
on
page 1-9
), then contact your supplying
3Com reseller.
a)
Check the connections between the unit, the network, or
PC and the ISDN line.
b)
Confirm that the line is working by connecting a
telephone to the ISDN line to make a call.
c)
Check that the number which you are dialling is
connected to the remote unit and that the unit is
configured to be able to answer calls.
1-50
C
HAPTE
1:
G
R
ETTIN
G STARTE
D
Renewing the Internal Protection Fuse
CAUTION:
First, read the section; 'Important safety information' at the
start of this manual.
Isolate the electrical mains system supply before commencing installation.
Ensure all on/off power switches are set to their 'OFF' positions and the
mains lead has been removed from the unit's power socket.
1
Using a small thin-bladed screwdriver, remove the fuse retainer cap.
The cap has a spring-loaded locking feature which needs to be
disengaged by pushing the cap inwards whilst turning it anticlockwise.
The fuse carrier and fuse can then be withdrawn from its socket.
2
Renew the protection fuse with a fuse of the same type and rating.
3
Refit the protection fuse in reverse order.
17
Figure 1-26
Renewing The Internal Protection Fuse
Utilities Diskette
The
AccessBuilder 500 is supplied with a software support diskette
containing utilities which may help you enhance the performance of
the unit. The directory structure for the diskette is shown below:
The AB-UTILS directory contains three sub-directories which hold the
following information, programs and utilities.
Utilities Diskette
1-51
Figure 1-27
Utilities Diskette Directory Structure
Sub-directory NOVELL
Contains two dialler programs for use with Novell NetWare:
■
macdial.exe uses the AccessBuilder's autocall on MAC address feature.
■
dialler.exe allows for calling and clearing by using the ISDN telephone
number.
Both of these programs need Novell ipx.com to be running, both are
designed for command prompt use and can be incorporated into
batch files.
1-52
C
HAPTE
1:
G
R
ETTIN
G STARTE
Sub-directory MIB
Contains the private SNMP MIBs in ASN1 format for use with the 3Com
Impresario network management application, and for integration of a
third party SNMP manager.
Sub-directory DECNET
Contains files which can be used for establishing ISDN calls in the
DecNet environment.
D
A
Introduction
During the initial configuration of the AccessBuilder 500 you must decide
whether to configure the unit as a bridge or as a router although we may
help you with this choice with our Quick Configuration options. If you are
unsure which option you should choose, read this appendix to help you
decide.
Bridges and routers are used to connect networks together. The cost of
connecting networks together is generally proportional to the distance
over which the network extends and the amount of bandwidth required.
Large amounts of bandwidth can be provided easily within a LAN by
connecting different segments together with a local bridge. However, it
becomes impractical and expensive to extend this bandwidth over
larger distances, and it is, therefore, usual to interconnect local high
speed networks using bridges or routers connecting over slower speed
terrestrial and satellite links.
B
RIDGING AND ROUTIN
G
In the following sections we describe the concepts behind bridging
and routing, and discuss the different ways in which LANs can be
configured and operated to optimize performance and minimize
disruption of traffic on each individual LAN.
A-2
A
PPENDIX
A:
B
RIDGING AND ROUTIN
G
Bridging and Routing Concepts
A bridge connects one or more LANs together. It examines each data
frame received at a LAN port and forwards any frames that it assumes are
for a destination device not connected to that LAN port. The bridge is able
to do this by learning which devices are connected to each LAN port.
A router learns much more about the networks connected to it and is
able to be much more selective about the data it passes on to other
networks and to which networks it transmits. By default routers reject or
filter
data unless it matches predefined attributes (for example specific
protocols or destination network addresses). In large interconnected
networks a router selects the best route for data to travel.
Guidelines For Choosing Bridging or Routing
The list below outlines some of the reasons why you might choose to
configure the AccessBuilder 500 as a bridge or a router. Read through
the rest of this appendix for more explanation and to help decide
which of the above conditions apply to your network.
■
A bridge is simpler to configure but a router can provide more security on
a busy network and filter unwanted data transmissions more effectively.
■
If your network consists of only one or two links between different sites
and your network is not heavily loaded, in most circumstances you can
configure your AccessBuilder 500 units as bridges.
■
If your network structure is complicated and consists of a mixture of
leased line and ISDN links, or if it uses several different protocols, you
may obtain better performance from the AccessBuilder 500 units if you
configure them as routers.
■
If you are connecting to a routed corporate network that is already running
IP and/or IPX protocols or if you are using the
AccessBuilder 500
to
connect to the Internet you must configure the unit as a router.
How Bridges Learn
When a bridge is first powered on, it does not know the number or the
locations of stations that are connected to the LAN. To minimize the
amount of data passed over the bridge it must
(address) of stations to ensure that it passes only the data that is
intended to be passed over the bridge.
Like the envelope of a letter, the header of each frame of data transmitted
on the network has a From (source) address and To (destination) address.
This ensures that data reaches its destination on the LAN and that the
receiving station can reply. The bridge reads every frame of data received
at the LAN port and extracts the source address of the frame. From this
information it builds an address table of stations it knows to be on the LAN.
To decide if data should be passed over the bridge, the bridge examines
the destination address of the frame. If the address is already in its
address table, the bridge knows the destination is on the LAN and
therefore rejects or
If the destination address is not in the address table, the bridge
transmits the data across the bridge. It does this even if the destination
device is on the local LAN because it does not recognize the
destination station as local. However, if the destination device is on the
local LAN, once it replies to the original source station, its own source
address is part of the data frame and it is learned by the bridge and
added to the address table.
filters
the frame.
Bridging and Routing Concepts
learn
the whereabouts
A-3
By operating in this way, the amount of data forwarded by the bridge
is kept to a minimum. Traffic that is for devices on the attached LAN is
rarely forwarded over the bridge.
A bridge can be configured to forget or
age
a station’s address after a
period of inactivity, a facility which is used to ensure that stations which
are no longer attached to the LAN, do not remain in the bridge’s address
table, using up space that may be required for other stations’ addresses.
A-4
A
PPENDIX
A:
B
RIDGING AND ROUTIN
G
Some bridges allow address information to be manually configured
into the bridge, provided the automatic
although this will not normally prove necessary unless specific traffic
filtering is required.
You can also configure a number of other features to improve the
performance and operation of the AccessBuilder 500. These include
sophisticated frame filtering techniques so that only certain types of
frame, or those associated with particular work groups, are passed
between specific segments.
Bridging Between Remote Sites
The AccessBuilder 500 is able to send frames between LANs that may
be separated by considerable physical distances. It achieves this by
making use of digital ISDN links. ISDN services are usually operated by
telephone companies (PTTs) or other service providers.
learning
facility is turned off,
Figure A-1
shows two LAN segments, A and B, which are connected by
a pair of AccessBuilder 500 units, 1 and 2. The type of link between the
two depends on the WAN services available at each of the remote
bridge locations, and the price the network administrator is willing to
pay for those services.
Figure A-1
Simple Remote Bridging
The AccessBuilder 500 uses FastConnect, its own protocol, to ensure the
most efficient connection with other AccessBuilder units. However, if you
are connecting to a different type of bridge/router the standard PPP
communications protocol is required to establish the link. You can
configure outgoing calls to use either FastConnect or PPP as required. The
ISDN port on the AccessBuilder 500 autosenses the protocol being used on
incoming calls and switches to the protocol necessary for that connection.
If you are using ISDN to connect to different networks, the two B
channels can be used independently to connect to different networks
at the same time.
Building a Larger Network
Large networks of interconnected LANs can be established by using
multiple bridges as illustrated in
The bridges build up their address tables. If the destination unit is not
registered as being accessed via the bridge’s LAN interface, the frame
will not be placed on LAN A. Therefore, frames passing between LAN B
and LANs C or D will not impact the overall performance of the LAN.
Bridging and Routing Concepts
Figure A-2
.
A-5
Figure A-2
Multiple Remote Bridges
A-6
A
PPENDIX
A:
B
RIDGING AND ROUTIN
G
Multiple Paths Between Bridged LANs
With only a single physical path between LANs, the network is susceptible
to link and bridge failures. In the event of a failure, the connection between
any of the LANs upstream or downstream of the point of failure will be
broken. A more resilient network of interconnected LANs can be
established by providing more than one link between any two of the LANs.
Normally, this network would soon encounter serious problems
resulting from a loop, around which frames could endlessly travel if
precautions aren’t taken by the bridges. Over ISDN links a proprietary
form of loop control is implemented.
On startup, the bridges send out frames to enquire if there are other
bridges on the network. By exchanging information, the bridges block
ports that cause the loops and ensure that there is only ever one active
path through the network. If one of the links or bridges fail, the other
bridges detect this and reconfigure their ports so that there is once
again an active data path through the network.
Network Topology
If your network topology is star shaped, a combination of ISDN and
bridging is usually the most efficient and successful option. Routing is a
better solution if your network topology is a complex mix of both
leased line and ISDN circuits, running at 64 Kbps to 2 Mbps.
Broadcast Storms
Bridges are programmed to automatically forward data packets by
default while routers filter data packets by default. These attributes have
an impact on the overall flow of data across the network. Much has been
made of
broadcast signals from bridges propagate to fill all of the wide area
bandwidth, and bring the network down. Broadcast storms cannot be
attributed to installation of bridges or routers, but by poor protocol
implementation and network design. However the deployment of routers
can effectively
broadcast storms
firewall
one logical network from another.
in connection with bridged networks, where the
Optimum Use of Resource
Bridged networks use Spanning Tree Protocol (STP) to provide
network resilience, by retaining redundant links on stand-by, in case
the primary link fails. This means that you are not making maximum
use of available resources.
Routing protocols make each node aware of the primary and alternate
routes available, ensuring that resources are not wasted.
Routers have been designed to provide the optimum route through
the network from the workstation through to the destination resource
with which the user wishes to communicate. In a very large network
there could be multiple paths available, and these could change as
dedicated links go in or out of service. These changes in network
topology are handled by routing protocols. However, when using the
ISDN the source network can dial direct to the destination network,
and establish a point-to-point bridged or routed connection. Generally,
when using this type of ISDN dial-up link, routing does not provide
much extra benefit.
Bridging and Routing Concepts
A-7
Network Organization, Structure and Physical Layout
Some organizations are structured into departments determined by the
physical layout of their work environment, so it is natural to divide the
corporate network into separate logical networks. Routing becomes
the obvious candidate for handling these individual LANs.
The Internet
The protocol adopted by the Defense Data Network (DDN) for the
Internet, is based on obtaining and abiding by, a registered Internet
address range. This makes a router the ideal choice for accessing the
Internet. Unfortunately, new applicants are likely to only get a
registered Internet address, preventing more than 254 connections on
one bridged IP LAN.
Class C
A-8
A
PPENDIX
A:
B
RIDGING AND ROUTIN
Routing IP and IPX
Running a bridged network allows workstations to communicate
directly between one another. A PC user wishing to communicate with
a remote network server is totally unaware of any intervening bridges.
This is known as transparent operation.
G
Figure A-3
Example Network
It is important to understand that in a bridged network the addressing
structure for both IP and IPX relates to a single network. If the units in
Figure A-3
were bridges and not routers, then an IP node on LAN A
could, for example, have an address 140.56.10.0, the node on LAN B an
address 140.56.10.2, and the node on LAN C, an address of 140.56.10.3.
All the nodes, therefore, are able to share the same Class B network
address, regardless of their location on the bridged network.
However, if there were NetWare nodes throughout the three bridged
sites, they would also share the same IPX network number. If each of
the bridged LANs supported a network server, each with its own
unique network number, and an IPX address is misconfigured, the
NetWare network server consoles will report the message ‘Router
Configuration Error – Router XXXXX claims that LAN is XX-XX-XX-XX’.
(The router it refers to is in fact the network server).
APPLICATION
PRESENTATION
SESSION
Network
File Store
(NFS)
File
Transfer
Protocol
(FTP)
Telnet
Routing IP and IPX
A-9
(ICMP)
Transmission
Control
Protocol
(TCP)
Others
ARP
RARP
Figure A-4
User
Database
Protocol
TRANSPORT
NETWORK
DATA LINK
PHYSICAL
(UDP)
Internet Protocol (IP) and
Internet Control Message Protocol
Link Level Control
Ethernet
Hardware
Open Systems Interconnection Network Layer Model
A routing environment allows stations to communicate indirectly.
Following the example in
Figure A-3
, let us assume that a station on LAN 1
wants to communicate with a network server on LAN 2. The station on
LAN 1, constructs a
Layer 2
datalink header (see
Figure A-5
), with the
source station’s hardware address, and also the destination hardware
address of the local router. To direct the packet to its final network
destination, the source station must complete the
Layer 3
network header
with the destination network address of LAN 2.
A-10
A
PPENDIX
A:
B
RIDGING AND ROUTIN
G
Once the packet is received by the Router A, attached to LAN 1, it strips
off the network header (refer to
Figure A-5
) and examines the Layer 3
datalink header information. It then reviews its routing tables in order
to establish where to forward the data packet. It is possible that the
LAN 1 router has multiple outgoing ports that would allow different
transmission routes to the destination network. In our example using
Figure A-3
, a packet could go via Router D to get to Router B, or it
could go more directly across a single direct link between Router A and
Router B.
IP Routing
Figure A-5
Data Packet Containing Hardware And Software Addresses
The local router contains, within its routing table, information which
will allow it to determine the best data transmission route. The type of
information the router uses to make these assessments is protocol
dependent, and some communications protocols may employ a range
of routing algorithms, and accompanying routing protocols. In the case
of the TCP/IP protocol suite, the AccessBuilder 500 utilizes the Routing
Information Protocol (RIP). RIP is also known as a
distance vector
protocol.
Routing IP and IPX
A-11
Different protocols use differing network characteristics or
when making routing decisions. The metric employed by RIP is a
Count
. A hop count is defined by the number of routing nodes there
metrics
Hop
are between the source and destination units. In our example, there are
two hops between LAN1 and LAN 2 going via Routers A and B. If traffic
was directed via Routers A, D, and then B, this would be three hops.
The algorithm will automatically select to forward the data packet via
Router A, as this route contains the least number of hop counts which
makes it the preferred direct route.
Every thirty seconds, each IP router will advertise via RIP datagrams, to
all other routers on the internetwork, how many hops it takes to reach
all connected logical networks, based on the routers network position
and the state of its physical links. In an ISDN environment, making ISDN
calls every thirty seconds to pass on and receive RIP updates would be
costly. When initially setting up the network, the AccessBuilder 500 is
manually connected over the ISDN for a three minute period, in order
to learn the topology of the rest of the network. Once this has been
performed the AccessBuilder 500 will only make ISDN calls to transmit
data packets. While this data transfer is in progress, RIP updates will be
piggybacked
on to the call, updating both parts of the network with the
latest RIP information.
It is also possible to assign what are known as
static routes
, which are
manually entered fixed routes. The network manager may be aware of
specific traffic patterns, or needs to enforce a particular routing policy.
Static routes provide an option to force traffic through the network in a
particular way. The disadvantage with this approach is that routing
protocols dynamically update all the routers on the network, with the
current network topology, enabling backup routes to be deployed. In
a static route situation, if the WAN links in that routing definition are
down, then traffic cannot be passed. Implementing a static route
prohibits the router from being able to offer alternative data paths.
A-12
A
PPENDIX
IPX Routing
Novell IPX also uses RIP for routing purposes. Although it is similarly
named to the IP equivalent, it uses a different protocol. IPX RIP
broadcasts datagrams out onto the network every sixty seconds. Upon
receipt of a RIP datagram, a router adds one to the hop count of each
route advertised and broadcasts a RIP datagram to the other networks,
with which it is connected.
The cost of a route in an IPX network is determined by the metric known
as
three hops or four ticks. For an internetwork connected via a WAN or
ISDN links, the tick count is factored on the speed of the WAN link.
We saw above the common network numbering scheme employed
for a bridged network. By employing routing, LAN A, LAN B and LAN C
become three separate networks on a network. The network
numbering must reflect that situation.
In a Novell IPX environment we could allocate IPX network numbers
00000111 to LAN A, 00000222 to LAN B and 00000333 to LAN C.
Having configured the ports of the AccessBuilder 500 to accept this
protocol, routing will now occur between the remote network servers
and workstations but addressed by different network numbers.
A:
B
RIDGING AND ROUTIN
ticks
. In a LAN only environment this is the hop count plus one, e.g.
G
It should be noted that NetWare 3.X and later, uses the concept of internal
IPX addresses, which is somewhat similar to network addressing. The
internal address refers to the internal network within that server allowing
internal processes to communicate. These numbers must be unique for all
servers right across the network. Although network servers may appeared
wired correctly, and in other respects seem to be working correctly,
duplicated internal IPX addresses will not allow correct operation.
NetWare has a hop count limitation imposed by the RIP. On an IPX
network a data packet can cross a maximum of fifteen routers before
being discarded.
IP Addresses
Routing IP and IPX
A-13
TCP/IP Numbering and subnet masking IP numbers or
normally made up of four fields (normally called
addresses
bytes
), with each byte
having a whole number value of between 0 and 255, and the bytes
separated by a full stop. For example:
123.123.123.123
An IP address is divided into two sections, one is the
section and the other is the
123.123.|123.123
Network Host
Host Address
section. For example:
Network Address
The divider | between the two sections is moveable according to what
class
of IP address it is. The class of address is defined by what the
number is in the first address byte:
■
For a Class A IP address the number in the first byte will be in the range
00 to 126
■
For a Class B IP address the numbers in the first & second bytes will be
in the range 128.001 to 191.254
■
For a Class C IP address the numbers in the first, second & third bytes
will be in the range 192.000.001 to 223.255.254
are
For example:
Class A1.|123.123.123
Network Host
Class B128.001.|123.123
Network Host
Class C192.123.123.|123
Network Host
A-14
A
PPENDIX
A:
B
RIDGING AND ROUTIN
G
Using of any of the address classes in a private TCP/IP network is not a
problem, providing that connections outside of that private network
to external public or private TCP/IP networks are never needed. If a
private IP addressing number scheme is established within a private
corporate network, connections out of that network to external public
or other private TCP/IP networks, can be achieved via a computer
which has software which enables it to act as an IP
gateway
. These
devices, if configured correctly, provide the IP numbering/address
translation between the two networks.
Subnet Masking
Subnet Masking is a mechanism which can be enabled in computer
and communications equipment which tells the equipment and the
network, which parts of the IP address are to be used as the
identifier and which are the
Host
identifier.
Network
A subnet mask consists of a similar field structure to that of the IP
address (123.123.123.123). For example:
255.255.0.0
This means that the first two three digit bytes of the IP address (the
fields
masked
by - 255.255) are to be recognized and used as the
Network address, and the last two bytes (those set to .0.0) are to be
used to identify the Host address.
An alternative way of expressing a subnet mask is a single number
indicating how many bits of the IP address are to be used for the
network address. For example 255.255.0.0 can be expressed as 16 while
255.255.255.192 can be expressed as 24.
The AccessBuilder 500 can be configured to use subnet masking to
enable ISDN Autocalls to be made on groups of IP addresses or on
specific IP addresses.
Normally, a subnet mask would be set so that any IP address, in a range
of hosts on a destination LAN which are detected on the unit’s locally
connected LAN port, causes an ISDN Autocall to be made out to that
destination.
Routing IP and IPX
A-15
This is achieved by the addition of a
number at the end of the
/xx
configured address. For example:
193.123.123.123/32
The /32
appended to the IP number indicates that all four of the bytes
are used and must have valid entries.
A /24
mask, for example:
193.123.123.0/24
means that only the first three bytes are to be recognized and used, and
the last byte can be ignored. In this case, any IP address appearing on the
locally connected LAN in the range 193.123.123.0 to 193.123.123.255 will
cause an autocall to be made to the destination network who’s name is
associated with that number in the ISDN Autocall table. The name is then
looked up in the ISDN Numbers table and a call made to the ISDN
number which has been assigned to that name.
A-16
A
PPENDIX
A:
B
RIDGING AND ROUTIN
G
Obtaining an IP Address
If you want to use a unique IP addressing system on your network so you
can connect to the Internet, there are three organizations responsible for
allocating network addresses. These details are correct at the time of
printing but may change.
USA - InterNIC, Network Solutions
Attention:
InterNIC Registration Services
505 Huntmar park Drive
Herndon
VA 22070
Conrad, David (DC296)
81 3 3580 3781 or 3580
81 3 3580 3782
davidc@apnic.net
A-18
A
PPENDIX
A:
B
RIDGING AND ROUTIN
G
Numbered and Unnumbered Links
When routing and using the AccessBuilder 500’s FastConnect protocol
over ISDN links as opposed to PPP, you have the option of using
numbered or unnumbered links.
A numbered link requires a valid IP address to be configured for both
ports connected to each end of the link. The IP address used must be
for a different subnet or network than that used by either LAN at each
end of the link. An example is shown in
Local Site uses the network address 191.000.100.xxx on its LAN. The
remote site uses the network address 191.000.200 on its LAN and the
link uses 191.000.300.
Figure A-6
. In this example, the
Figure A-6
Example Of A Numbered Link
By default the ISDN port has an IP address of 10.0.0.1. This is set to allow
remote Telnet connections to the unit to enable configuration but must
be changed when configuring the unit to allow correct operation. If you
use the
Quick Configuration
(QC
) option to configure the unit to operate
over ISDN, the Port IP Address is set to unnumbered.
In most instances you should use unnumbered links. This is easier to
configure and does not use network addresses which may be in short
supply.
B
T
ECHNICA
Specifications
LAN Connector Interfaces
■
15-way D-type female AUI connector.
■
10BaseT via an RJ45 connector socket for UTP.
Only one LAN connection can be used at a time.
WAN Connector Interface
25-way D-type female connector, configured to support one of:
■
V.11 (X.21) for speeds up to 2.048 Mbps.
■
V.28 (V.24/RS232) for speeds up to 19.2 Kbps.
V.35/V.36 for speeds up to 2.048 Mbps.
■
L INFORMATIO
N
ISDN Connector Interface
Provides a twin interface to a 2B+D basic rate ISDN service, via an RJ45
connector socket.
Voice Connector Interface
Provides interface for analog telephony equipment via a British Telecom
connector socket. A BT to RJ11 adapter is provided with the unit.
B-2
A
PPENDIX
B:
T
ECHNICA
L INFORMATIO
N
Management Connector Interface
9-way D-type to sub RJ11 connector for use with a VT100 compliant
terminal or PC.
■
Local and remote terminal management.
■
TCP/IP Telnet menu driven management interface for remote
management.
■
Software upgrades, enhancements and configurations downloadable
from network attached terminal or PC.
SNMP MIB II support with private extensions for management of
■
unique features.
Bridge Characteristics
■
802.3 MAC layer bridge.
■
802.1D spanning tree algorithm.
■
Support for bridge triangulation and link load sharing.
Performance
■
LAN filtering rate: 10000 frames per second.
■
LAN forwarding rate: 4000 frames per second.
ISDN and WAN forwarding rates are dependent on the link speed.
Approvals
■
■
■
■
■
Approvals
B-3
This product ostensibly complies with the electro-magnetic
compatibility (EMC) requirements of EN 55022 Class A and EN 50082
(susceptibility). However, to fully comply with Class B of EN55022 the
following prerequisites should be observed:
The WAN port must be attached to a screened digital cable.
The ISDN cable must be used in conjunction with a three turn ferrite.
The product carries the CE certification mark to indicate conformance
with the following EU directives:
LVD (Low Voltage Directive (Safety) 73/23/EEC.
EMC (Electro Magnetic Compatibility) Directive 89/336/EEC.
The product conforms to I-CTR3 (based on NET3 – ISDN interface).
See also the FCC and CSA statements at the back of this guide.
B-4
A
PPENDIX
B:
T
ECHNICA
L INFORMATIO
N
Dimensions and Operating Requirements
Power Supply:
Power Supply:
Power Consumption:
240 V AC, 50/60 Hz (nominal) UK and Europe
110 V AC 50/60 Hz (nominal) (USA)
25 Watts
Operating Temperature:
Humidity:
0-90% non-condensing
0-40°C (32-105°F)
Interface Cable Characteristics
Interface Cable Characteristics
WAN Port Connecting Cable – V.11/X.21 Support
The WAN port terminates with a 25-way D-type female connector. The
port can be configured to support V.11 signalling characteristics at data
transfer rates up to 2.048 Mbps. The WAN port connecting cable is not
supplied with the unit. The following signalling characteristics should
be observed when purchasing or fabricating a suitable cable.
B-5
B-6
A
PPENDIX
B:
T
ECHNICA
L INFORMATIO
N
WAN Port Connecting Cable – V.24/V.28 Support
The WAN port terminates with a 25-way D-type female connector. The
port can be configured to support V.24 or V.28 signalling characteristics
at data transfer rates up to 19.2 Kbps. The WAN port connecting cable
is not supplied with the unit. The following signalling characteristics
should be observed when purchasing or fabricating a suitable cable.
Interface Cable Characteristics
WAN Port Connecting Cable – V.35/V.36 Support
The WAN port terminates with a 25-way D-type female connector. The
port can be configured to support V.36 signalling characteristics at data
transfer rates up to 48 Kbps. The WAN port connecting cable is not
supplied with the unit. The following signalling characteristics should
be observed when purchasing or fabricating a suitable cable.
7
B-7
B-8
A
PPENDIX
B:
T
ECHNICA
L INFORMATIO
N
Manager Port Connecting Cable
The manager port cable terminates with an RJ11 connector at one end
and a 9-pin male/female D-type connector. The pin-out table below
show the pin outs for this cable.
LAN Port Connecting Cable - 10BaseT
The 10BaseT port terminates with an RJ45 connector which can be
connected to the 10BaseT port on another device. The table below
shows the pin-outs for a straight through cable.
Interface Cable Characteristics
B-9
B-10
A
PPENDIX
B:
T
ECHNICA
L INFORMATIO
N
LAN Port Connecting Cable - AUI
The AUI port terminates with a 15-pin female connector which must be
connected to a transceiver on a LAN using an AUI (drop) cable. This
cable is not supplied with the unit. The following signal characteristics
must be observed when purchasing or fabricating a suitable cable.
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.