Table of Contents...........................................................................................................................................................3
1.1 Features .............................................................................................................................................................10
1.4 Front and Back Panel Descriptions ....................................................................................................................12
1.5 Management and Configuration .........................................................................................................................13
2.1.3 Power Requirements....................................................................................................................................15
2.1.5 Cooling and Airflow ......................................................................................................................................15
2.2 Installation into an Equipment Rack ...................................................................................................................15
2.3.1 Installing a GBIC ..........................................................................................................................................17
2.3.2 Removing a GBIC ........................................................................................................................................17
2.3.3 GBIC Care and Handling .............................................................................................................................17
2.4 Installing the Optional Emergency Power Supply...............................................................................................18
2.5 Connecting Power ..............................................................................................................................................18
2.6 Connecting to the Network .................................................................................................................................18
2.7.1 Connecting to a Console..............................................................................................................................20
2.9.1 The username Command ............................................................................................................................23
2.9.2 The password and login Commands............................................................................................................23
2.10 Configuring an IP Address................................................................................................................................23
2.10.1 Setting a Default IP Gateway Address.......................................................................................................24
2.12 System Boot Parameters..................................................................................................................................24
Chapter 3: Understanding the Command Line Interface (CLI) ..................................................................................... 25
3.1 User Top (User EXEC) Mode ............................................................................................................................. 25
3.2 Privileged Top (Privileged EXEC) Mode............................................................................................................. 26
3.3 Global Configuration Mode.................................................................................................................................27
3.6 Using CLI Command History ..............................................................................................................................33
3.7 Using the No and Default Forms of Commands .................................................................................................33
3.8 Using Command-Line Editing Features and Shortcuts.......................................................................................33
3.8.1 Moving Around on the Command Line.........................................................................................................34
3.8.2 Completing a Partial Command Name.........................................................................................................34
3.8.3 Editing Command Lines That Wrap .............................................................................................................35
3.8.5 Scrolling Down a Line or a Screen...............................................................................................................36
3.8.6 Redisplaying the Current Command Line ....................................................................................................36
3.9.3 Service Password-Encryption ......................................................................................................................37
Chapter 4: Managing the System and Configuration Files ...........................................................................................38
4.1 Managing the System.........................................................................................................................................38
4.1.1 Setting the System Clock.............................................................................................................................38
4.1.2 Specify the Hostname..................................................................................................................................38
4.1.3 Changing the Password...............................................................................................................................39
4.1.5 Test Connections with Ping Tests................................................................................................................39
4.1.6 Enable the System Log................................................................................................................................39
4.1.7 Displaying the Operating Configuration........................................................................................................40
4.2.1 Configuring from the Terminal......................................................................................................................40
4.2.2 Copying Configuration Files to a Network Server ........................................................................................41
4.2.3 Copying Configuration Files from a Network Server to the IC35516............................................................42
4.3 Configuring SNMP and Spanning Tree ..............................................................................................................43
4.3.2 Other SNMP Configuration ..........................................................................................................................45
4.3.3 Configuring Spanning Tree Protocol (STP)..................................................................................................46
4.3.4 Rapid Spanning Tree Protocol (RSTP) ........................................................................................................47
4.4 MAC Address Table ...........................................................................................................................................50
5.1 Assign IP Addresses to Network Interfaces........................................................................................................51
5.1.1 Assign Multiple IP Addresses to Network Interfaces....................................................................................52
5.4.2 Allow Unicast Updates for RIP .....................................................................................................................56
- 6 -
5.4.3 Specify a RIP Version ..................................................................................................................................56
5.4.5 Set Metrics for Redistributed Routes............................................................................................................58
5.4.6 Set Administrative Distance .........................................................................................................................58
5.4.7 Generate a Default Route ............................................................................................................................59
5.4.8 Filtering Routing Information ........................................................................................................................59
5.4.10 Enable or Disable Split-horizon..................................................................................................................60
5.4.12 Monitor and Maintain RIP...........................................................................................................................61
5.5 Configuring IP Multicast Routing ........................................................................................................................62
5.6 Using Access Lists .............................................................................................................................................66
5.6.1 Create a Standard Access List.....................................................................................................................67
5.6.2 Create an Expanded Access List .................................................................................................................68
5.6.3 Creating an Access List with a Name ..........................................................................................................69
5.6.4 Applying an Access List to an Interface .......................................................................................................70
5.7.2 Configure ABR Type ....................................................................................................................................71
5.7.6 Configure OSPF for Non-broadcast Networks .............................................................................................72
5.7.7 Configure Area Parameters .........................................................................................................................72
5.7.8 Configure OSPF Not So Stubby Area (NSSA).............................................................................................73
5.7.9 Configure Route Summarization between OSPF Areas...............................................................................74
5.7.11 Control Default Metrics...............................................................................................................................74
5.7.14 Redistribute Routes into OSPF ..................................................................................................................75
5.7.15 Generate a Default Route ..........................................................................................................................75
5.7.16 Change the OSPF Administrative Distances..............................................................................................76
5.7.17 Suppress Routes on an Interface...............................................................................................................76
5.7.18 Prevent Routes from being Advertised in Routing Updates .......................................................................76
5.7.19 Monitor and Maintain OSPF.......................................................................................................................77
5.10.2 Setting Up BSR Candidacy........................................................................................................................80
5.10.3 Setting Up RP Candidacy ..........................................................................................................................81
5.12 Monitoring and Maintaining the Network ..........................................................................................................81
5.14 802.1x Support ................................................................................................................................................. 85
6.1 Creating or Modifying a VLAN ............................................................................................................................87
6.1.2 Deleting a VLAN ..........................................................................................................................................88
6.2 VLAN Port Membership Modes ..........................................................................................................................89
Chapter 7: Quality of Service (QoS) Configuration.......................................................................................................92
7.2.1 Defining the Priority List ...............................................................................................................................93
7.2.2 Assigning Packets to Priority Queues ..........................................................................................................93
7.2.3 Assigning the Priority List to an Interface.....................................................................................................94
7.2.5 Priority Queuing Example ............................................................................................................................94
7.3.1 Defining the Custom Queue List ..................................................................................................................95
7.3.1 Specifying the Minimum Size of the Custom Queues (Optional)..................................................................95
7.3.1 Assigning Packets to Custom Queues.........................................................................................................95
- 8 -
7.3.1 Assigning the Queue List to an Interface (Optional).....................................................................................96
7.3.1 Custom Queuing Example ...........................................................................................................................96
7.4.1 Configuring GTS for an Interface .................................................................................................................97
7.4.2 Configuring GTS for an Access List .............................................................................................................97
7.4.3 Monitoring the GTS Configuration................................................................................................................97
7.4.4 Generic Traffic Shaping Example ................................................................................................................97
7.5 Random Early Detection.....................................................................................................................................97
7.5.1 Configuring RED to Use IP Precedence ......................................................................................................98
7.5.2 Configuring RED to Use DSCP....................................................................................................................98
7.5.3 Monitoring RED (Optional) ...........................................................................................................................98
Chapter 8: Configuring DHCP and DNS ......................................................................................................................99
8.1.1 Enabling DHCP Server ................................................................................................................................99
8.2.1 Configuring DNS ........................................................................................................................................103
8.2.2 Design Limitation and Restrictions.............................................................................................................104
B.2 Technical Support and Warranty ..................................................................................................................107
Appendix C: FCC Compliance and Warranty Statements..........................................................................................108
C.2 Important Safety Instructions........................................................................................................................108
Appendix D: Console Port Pin Outs ...........................................................................................................................110
Appendix E. Online Warranty Registration.................................................................................................................111
- 10 -
Chapter 1: Introduction
Thank you for purchasing the Asanté IntraCore 35516 Series Gigabit switch. The IC35516 is from a family of multimedia and multi-protocol switches capable of supporting Layer 2 switching and Layer 3 and Layer 4 protocols. They
are designed to offer industry-leading performance at a very competitive cost of ownership.
Important! This manual describes the hardware setup and configuration commands that are used by the IC35516. It
is not intended to be a complete configuration guide for your specific network requirements.
Each IntraCore 35516 switch is a 16-port solution for Gigabit Ethernet switching using shared-memory architecture to
achieve Gigabit switching on all ports. The highly integrated system includes MACs, Address Look-up, Content
Addressable Memory (CAM), Switch Engine, Primary Buffer Memory, and programmable Quality of Service (QoS).
Two models in the IntraCore 35516 series cover different customer applications.
•The IC35516-T is a 16-port switch that has 12 10/100/1000BaseT ports and 4 dual-function Gigabit ports that
support either 1000BaseT RJ-45 Gigabit ports or GBIC Gigabit ports.
•The IC35516-G is a 16-port switch that has 12 GBIC style Gigabit Ethernet ports and 4 dual-function Gigabit
ports that support either 10/100/1000BaseT RJ-45 Gigabit ports or GBIC Gigabit ports.
The following types of GBIC modules are supported on the IC35516 switches:
• 1000SX multi-mode fiber for 500 m applications
• 1000LX single-mode fiber for 2 km applications
• 1000LH single-mode fiber for 20 km applications
• 1000LZ single-mode fiber for ultra distance (120 km) applications
• 1000BaseT copper Gigabit for low-cost 100 m applications
The system can operate as a stand-alone network or be used in combination with other IntraCore switches in the
backbone.
1.1 Features
The IC35516 is a multi-media, multi-protocol (Ethernet, L2/L3/L4) switch. The following is a list of the switch’s
features:
• Supports wire-speed L2 switching and L3 routing including L2 and IP multicast
• QoS provisioning on Layers 2/3/4 and 802.1p tag
• Flexible wire-speed packet classification
• Packet filtering
• Wire-speed MAC address learning on-chip
• Port-based VLAN support for 4K VLANs according to IEEE Std. 802.1Q
• SNMP, RMON, and SMON statistics counters supported on-chip
- 11 -
• 128 KB internal packet buffer
• Full duplex 1000 Mbps, full and half duplex 10/100 Mbps
• Support for Jumbo Frames (up to 32 KB in length)
1.2 Package Contents
The following items are included in the switch’s package:
• Switch
• AC power cord
• Rackmount brackets with screws
• Rubber feet
• Setup Guide
• IntraCore 35516 CD-ROM
Contact your dealer immediately if any of these items is missing.
1.3 LEDs
The system’s front panel LED display allows you to monitor the status of the switch. Refer to the following sections for
LED information specific to the switch’s model.
1.3.1 IC35516-T
The IC35516-T has one power LED indicator, one (optional) emergency power LED, and two LED indicators for each
of the 16 ports. See the table below for a complete LED description.
LED Color Description
Power Green
Off
Emergency Power Green
Off
Link/Speed Green
Power is on.
Power is off, or main power has failed.
Primary power has failed and optional power supply is powering the switch.
Optional power supply is in standby mode and primary power is working.
A valid 1000 Mbps link has been established on the port.
Yellow
Off
A valid 10/100 Mbps link has been established on the port.
No link has been established on the port.
- 12 -
Duplex/Activity Green
Blinking Green
Yellow
Blinking Yellow
Off
A full-duplex link has been established on the port.
Activity has been detected in full-duplex mode.
A half-duplex link has been established on the port.
Activity has been detected in half-duplex mode.
No link has been established on the port.
1.3.2 IC35516-G
The IntraCore 35516-G has one power LED, one (optional) emergency power LED, two LED indicators for
10/100/1000BaseT status, and one LED for GBIC status. See the table below for a complete LED description.
LED Color Description
Power Green
Off
Emergency Power Green
Off
BaseT
10/100/1000
Link/Speed
Green
Yellow
Off
Power is on.
Power is off, or main power supply has failed.
Primary power has failed and optional power supply is powering the switch.
Optional power supply is in standby mode and primary power is working.
A valid 1000 Mbps link has been established on the port.
A valid 10 or 100 Mbps link has been established on the port.
No link has been established on the port.
BaseT 10/100/1000
Duplex/Activity
GBIC
Link
Green
Blinking
Yellow
Blinking Yellow
Off
Green
Off
A full-duplex link has been established on the port.
Activity is detected in full-duplex mode.
A half-duplex link has been established on the port.
Activity is detected in half-duplex mode.
No link has been established on the port.
A valid 1000 Mbps link has been established on the port.
No link has been established on the port.
1.4 Front and Back Panel Descriptions
Refer to the following sections for detailed descriptions of the front and back panels of the IC35516 Series switches.
1.4.1 IC35516-T
The front panel of the IC35516-T contains the following: power and port LEDs, 12 10/100/1000BaseT ports, 4 dualfunction Gigabit ports that support either 1000BaseT or GBIC-style Gigabit Ethernet ports, and a console port.
The back panel, not shown, contains a 12 VDC jack for emergency power (optional), the primary power bay cover
plate, the primary power outlet, and the on/off switch.
- 13 -
1.4.2 IC35516-G
The front panel of the IC35516-G contains the following: power and port LEDs, 12 GBIC ports, 4 dual-function Gigabit
ports that support either 1000BaseT or GBIC-style Gigabit Ethernet ports, and a console port.
The back panel, shown below, contains a 12 VDC jack for emergency power (optional), the primary power bay cover
plate, the on/off switch, and the primary power outlet.
1.5 Management and Configuration
The switch is managed using Command Line Interface (CLI) in order to access several different command modes.
Entering a question mark (?) at each command mode’s prompt provides a list of commands.
1.5.1 Console Interface
Support for local, out-of-band management is delivered through a terminal or modem attached to the EIA/TIA-232
interface. Users can access the switch by connecting a PC or terminal to the console port of the switch, via a serial
cable. The default password set on the console line is Asante (it is case-sensitive). The default IP address is
192.168.0.1/24. The default settings for the terminal emulation program are as follows:
9600-8-N-1
Remote in-band management is available through Simple Network Management Protocol (SNMP) and Telnet client.
When connecting via a Telnet session (line vty0), the default password is also Asante (case-sensitive).
See Chapter 2 for more information on connecting to the switch.
- 14 -
Chapter 2: Hardware Installation and Setup
The following guidelines will help you easily install the switch, ensuring that it has the proper power supply and
environment.
2.1 Installation Overview
Follow these steps to install the IntraCore switch:
1. Open the box and check the contents. See Chapter 1.2 Package Contents for a complete list of the items
included with the IntraCore switch.
2. Install the switch in an equipment or wall rack, or prepare it for desktop placement.
3. Connect the power cord to the switch and to an appropriate power source.
4. Connect network devices to the switch.
See the sections below for more detailed installation instructions.
2.1.1 Safety Overview
The following information provides safety guidelines to ensure your safety and to protect the switch
from damage.
Note: This information is intended as a guideline, and may not include every possible hazard to
which you may be exposed. Use caution when installing this switch.
• Only trained and qualified personnel should be allowed to install or replace this equipment
• Always use caution when lifting heavy equipment
• Keep the switch clean
• Keep tools and components off the floor and away from foot traffic
• Avoid wearing rings or chains (or other jewelry) that could get caught in the switch. Metal objects can heat up
and cause serious injury to persons and damage to the equipment. Avoid wearing loose clothing (such as ties or
loose sleeves) when working around the switch
When working with electricity, follow these guidelines:
• Disconnect all external cables before installing or removing the cover
• Do not work alone when working with electricity
• Always check that the cord has been disconnected from the outlet before performing hardware configuration
• Do not tamper with the equipment. Doing so could void the warranty
• Examine the work area for potential hazards (such as wet floors or ungrounded cables)
2.1.2 Recommended Installation Tools
- 15 -
You will need the following tools and equipment (not included) to install the switch into an equipment rack:
• Flat head screwdriver
• Phillips head screwdriver
• Antistatic mat or foam
2.1.3 Power Requirements
The electrical outlet should be located near the switch and be easily accessible. It must also be properly grounded.
Make sure the power source adheres to the following guidelines:
• Power: Auto Switching 90-260 VAC
• Frequency range: 50/60 Hz
2.1.4 Environmental Requirements
The switch must be installed in a clean, dry, dust-free area with adequate air circulation to maintain the following
environmental limits:
• Operating Temperature: 0° to 40°C (32° to 104°F)
• Relative Humidity: 10% to 90% non-condensing
Avoid direct sunlight, heat sources, or areas with high levels
limits may cause damage to the switch and void the warranty.
of electromagnetic interference. Failure to observe these
2.1.5 Cooling and Airflow
The IC35516 switches use internal fans for air-cooling. Do not restrict airflow by covering or obstructing air vents on
the sides of the switch.
2.2 Installation into an Equipment Rack
Important! Before continuing, disconnect all cables from the switch.
To mount the switch onto an equipment rack:
1. Place the switch on a flat, stable surface.
2. Locate a rack-mounting bracket (supplied) and place it over the
mounting holes on one side of the switch.
3. Use the screws (supplied) to secure the bracket (with a Phillips screwdriver).
4. Repeat the two previous steps on the other side of the switch.
5. Place the switch in the equipment rack.
- 16 -
6. Secure the switch by securing its mounting brackets onto the equipment rack with the appropriate screws
(supplied).
Important! Make sure the switch is supported until all the mounting screws for each bracket are secured to the
equipment rack. Failure to do so could cause the switch to fall, which may result in personal injury or damage to the
switch.
2.2.1 Equipment Rack Guidelines
Use the following guidelines to ensure that the switch will fit safely within the equipment rack:
•Size: IC35516-T: 17.1 x 10.1 x 1.6 inches (434 x 257 x 41 mm) IC35516-G: 17.5 x 14.0 x 2.6 inches (445 x 356 x 66 mm)
•Ventilation: Ensure that the rack is installed in a room in which the temperature remains below 40° C (104° F). Be
sure that no obstructions, such as other equipment or cables, block airflow to or from the vents of the switch
•Clearance: In addition to providing clearance for ventilation, ensure that adequate clearance for servicing the
switch from the front exists
2.3 Gigabit Interface Converters
The GBIC Interface is the industry standard for Gigabit Ethernet Interfaces. Some of the benefits of GBIC include
reducing the components needed in a “spares” inventory, being able to choose from a wide variety of manufacturers
with cross-vendor compatibility, and having competitive prices.
Instructions for installing, removing, and maintaining GBIC modules are provided in following sections.
Important! The 35516-G has 12 GBIC ports that are paired— port numbers 1/2, 3/4, 5/6, 7/8, 10/12, and 14/16. DO
NOT use more than one copper GBIC module per pair (maximum 8 modules).
GBICs are hot-swappable. This means that they can be inserted and removed while the switch is powered on.
However, please allow 40–60 seconds for the switch to recognize the module when it has been installed while the
switch is on.
1. Wearing an ESD (electro-static discharge) wrist strap, remove the GBIC module from its protective packaging.
2. Verify that the GBIC is the correct type for the network (see the table above).
3. Grip the sides of the GBIC with the thumb and forefinger, and then insert the GBIC into the slot on the face of the
switch.
4. Slide the GBIC into the slot until it clicks into place.
5. Fiber GBIC modules: Remove the rubber plugs from the end of the GBIC module. Save them for future use.
6. Attach the appropriate cable.
Note: After installing a GBIC 1000T module, the link LED may light even before a valid cable has been connected.
This is a normal condition for most 1000BaseT GBIC modules.
Note: Auto-negotiation must be disabled on a port in which a copper GBIC module is installed. Copper GBICs
themselves control auto-negotiation.
2.3.2 Removing a GBIC
Caution: GBIC 1000T modules run hot under normal operating conditions. When it has been removed from the
system, place it on a heat-resistant surface and allow the module to cool before handling.
Note: Unnecessary removals/insertions of a GBIC module will lead to premature failure of the GBIC connector. The
rated duty cycle for a GBIC module is 100–500 removals/insertions.
Follow the steps below to remove a GBIC interface from a Gigabit Ethernet module:
1. Disconnect the cable from the GBIC module.
2. Release the GBIC from the slot by simultaneously squeezing the locking tabs on both sides of the GBIC.
3. Slide the GBIC out of the slot.
4. Fiber GBIC modules: Install the rubber plugs in the GBIC optical bores, and place the GBIC in protective
packaging.
2.3.3 GBIC Care and Handling
Follow these GBIC maintenance guidelines:
•GBICs are static-sensitive. To prevent ESD damage, follow normal board and component handling procedures.
Wear an ESD wrist strap
•Fiber GBIC modules are very sensitive to dust and contaminants. When they are not connected to a fiber-optic
cable, install the rubber plugs in the optical bores
•The ferrules of the optical connectors may pick up debris that can obstruct the optical bore. Use an alcohol swab
or equivalent to clean the ferrules of the optical connector
- 18 -
2.4 Installing the Optional Emergency Power Supply
To ensure increased reliability for mission-critical applications, the IC35516 can be equipped with a 12 VDC
emergency backup power supply (the IC35-EPS12, sold separately). When installed, the emergency power supply is
in standby mode. Should the primary unit fail, the DC backup automatically switches on and the LED on the front
panel lights. In addition, an SNMP fault notice is sent.
To verify the primary power status, use the Router# show system command. Under System Information, you will
see the power unit status.
System Information
------------------
System up since: 10:34:43 Fri Mar 19 2004
PROM Image Version/Date: 1.01A/Jan 20 2004 20:24:10
DRAM Size: 64.0MB Flash Size: 8.0MB
Config NVRAM Size: 128KB Console Baud Rate: 9600 bps
Serial No. :
Power Unit Status = OK
Should the IC35-EPS12 become active due to a fault with the primary power, the unit should be swapped out at the
earliest convenience and sent for repair. The IC35-EPS12 is designed to be a temporary replacement when the
primary power fails, not a permanent replacement.
To install the optional power supply, simply attach the 12 VDC connector of the power supply to the jack located in
the center of the rear panel of the switch. Connect the power cord to the power supply and plug the power cord into
an outlet.
Important! The optional power supply becomes HOT under normal operating conditions. To avoid damage or injury,
set the power supply on a heat-resistant surface and USE CAUTION when handling the unit.
2.5 Connecting Power
Important: Carefully review the power requirements (Chapter 2.1.3) before connecting power to the switch.
Use the following procedure to connect power to the switch:
1. Plug one end of the supplied power cord into the power connector on the back of the switch.
2. Plug the other end into a grounded AC outlet.
3. Turn on the switch’s power. The power LED will begin its initialization process.
The front panel LEDs blink and the power LED illuminates when it has initialized. The switch is ready for connection
to the network.
Important: If the power does not come on, check the next section to ensure that the correct cabling is used.
2.6 Connecting to the Network
The switch may be connected to an Ethernet network with the switch powered on or off.Use the following procedure
to make the network connections:
1. Connect the network devices to the switch, following the cable guidelines outlined below.
- 19 -
2. After the switch is connected to the network, it can be configured for management capabilities (see the following
chapters for information on configuration).
2.6.1 10/100/1000BaseT Ports Cabling Procedures
The 10/100/1000 ports on the switch allow for the connection of 10BaseT, 100BaseTX, or 1000BaseT network
devices. The ports are compatible with IEEE 802.3 and 802.3u standards.
Important: The switch must be located within 100 meters of its attached 10BaseT or 100BaseTX devices.
Use the following guidelines to determine the cabling requirements for the network devices:
•Connecting to Network Station: Category 5 UTP (Unshielded Twisted-Pair)
straight-through cable (100 m maximum) with RJ-45 connectors
•Connecting to Repeater/Hub/Switch’s Uplink port: Category 5, UTP straight-
through cable (100 m maximum) with RJ-45 connectors
Note: These switches have no specific uplink ports. All 10/100/1000 ports on these
switches are auto-sensing MDI/MDI-X. This advanced feature means that when the ports are operating at
10/100Mbps, they will automatically determine whether the device at the other end of the link is a hub, switch, or
workstation, and adjust its signals accordingly. No crossover cables are required.
Although 10/100BaseT requires only pins 1, 2, 3, and 6, Asanté strongly recommends cables with all 8 wires
connected as shown in Table 2-2 below.
1000BaseT requires that all four pairs (8 wires) be connected correctly, using Category 5 or better Unshielded
Twisted Pair (UTP) cable (to a distance of 100 meters). Table 2-2 shows the correct pairing of all eight wires.
Pin Number
Pair Number & Wire Colors
12 White / Orange
22 Orange / White
33 White / Green
41 Blue / White
51 White / Blue
63 Green / White
74 White / Brown
84 Brown / White
- 20 -
Table 2-2 Pin Numbers and Wire Colors
2.6.2 Gigabit Ethernet Ports Cabling Procedures
Cabling requirements for the optional hardware modules depend on the type of module installed. Use the following
guidelines to determine the particular cabling requirements of the module(s):
•1000BaseSX GBIC: Cables with SC-type fiber connectors; 62.5µ multi-mode fiber (MMF) media up to 275 m
(902'), or 50µ MMF media up to 550 m (1805')
• 1000BaseLX GBIC: Cables with SC-type fiber connectors; 10µ single-mode fiber media up to 5 km (16,405')
• 1000BaseLH GBIC: Cables with SC-type fiber connectors; 10µ single-mode fiber media up to 20 km (65,617')
• 1000BaseLX Long Haul GBIC: Cables with SC-type fiber connectors; 10µ single-mode fiber media up to 100 km
(328,100')
• 1000BaseLZ GBIC: Cables with SC-type fiber connectors; 10µ single-mode fiber media up to 120 km (393,701')
• 1000BaseT: Category 5 or better Unshielded Twisted Pair (UTP) cable up to 100 m (328.1')
When attaching a workstation to the switch, a standard straight-through CAT5 cable may be used, even when the
workstation is attached via a patch panel. No crossover cable is needed with the MDX/MDI ports. It is recommended
that the switch be kept off the network until proper IP settings have been set.
2.7 Setup
In order to configure the switch, connect to it through a console (out-of-band management), running a terminal
emulation program, such as HyperTerminal.
2.7.1 Connecting to a Console
To connect the switch to a console or computer, set up the system in the following manner:
1. Plug power cord into the back of the switch.
2. Attach a straight-through serial cable between the RS232 console port and a COM port on the PC.
3. Set up a HyperTerminal (or equivalent terminal program) in the following manner:
a. Open the HyperTerminal program, and from its file menu, right-click on Properties.
b. Under the Connect To tab, choose the appropriate COM port (such as COM1 or COM2).
- 21 -
c. Under the Settings tab, choose VT100 for Emulation mode.
d. Select Terminal keys for Function, Arrow, and Ctrl keys. Be sure the setting is for Terminal keys, NOT
Windows keys.
e. Back under the Connect To tab, press the Configuration button.
f. Set the data rate to 9600 Baud.
g. Set data format to 8 data bits, 1 stop bit and no parity.
h. Set flow control to NONE.
Now that terminal is set up correctly, power on the switch. The boot sequence will display in the terminal.
After connecting to the console, a prompt like the following will appear:
User Access Verification
Password:
By default, the initial password for access via console and telnet is Asante (case-sensitive). See the following section
for setting new passwords on the terminal lines.
- 22 -
2.8 Setting Passwords
The switch ships with a default of no enable password, which allows anyone on the network access to various
privilege levels. To prevent unauthorized changes to the switch’s configuration, you should set an enable password
for access to switch management. Follow the example below to assign a privileged password.
Router> enable
Password: <no password by default; press Enter>
Router# configure terminal
Router(config)# enable password ?
0 Specifies an UNENCRYPTED password will follow
7 Specifies a HIDDEN password will follow
LINE The UNENCRYPTED (cleartext) 'enable' password
Router(config)# enable password 0<password>
Router(config)# exit
Router# write [memory file]
A separate password should be set for the primary terminal line (console) and the virtual terminal lines (telnet). The
default password Asante is assigned only to the virtual terminal line Vty0. Up to three other virtual terminal lines may
be created, and they each will require a separate password.
Note: It is recommended that you change the default telnet password to prevent unauthorized access to the switch.
Router(config)# line ?
console Primary terminal line
vty Virtual terminal
Router(config)# line console ?
<0-0> Line number
Router(config)# line console 0
Router(config-line)# ?
end End current mode and change to enable mode
exec-timeout Set timeout value
exit Exit current mode and down to previous mode
help Description of the interactive help system
no Negate a command or set its defaults
password Set a password
quit Exit current mode and down to previous mode
Router(config-line)# password ?
LINE The UNENCRYPTED (cleartext) line password
0 Specifies an UNENCRYPTED line password will follow
7 Specifies a HIDDEN line password will follow
Router(config-line)# password Asante
Router(config-line)# end
Router# write ?
file Write to configuration file
memory Write configuration to the file (same as write file)
terminal Write to terminal
Router# write file
Writing current-config to startup-config, Please wait...
Configuration saved to startup-config file
Router#
The password can be set at unencrypted (level 0) or encrypted (level 7).
Router(config-line)# password ?
LINE The UNENCRYPTED (cleartext) line password
0 Specifies an UNENCRYPTED line password will follow
- 23 -
7 Specifies a HIDDEN line password will follow
2.9 Login Security
Two methods are available on the IntraCore 35516 to configure an authentication query process for better login
security: the username command or the password and login commands.
2.9.1 The username Command
To establish a username-based authentication system, use the username command in global configuration mode.
This method is more effective because authentication is determined on a user basis. The configuration is done for
each line.
Router(config)# line console 0
Or
Router(config)# line vtyvty-number
Router(config-line)# login user
Router# username name password password
The name argument can be a host name, server name, user ID, or command name. It is restricted to only one word.
Blank spaces and quotation marks are not allowed.
Optionally, an encrypted password can be used, preceded by a single-digit number that defines what type of
encryption is used. Currently defined encryption types are 0 (which means that the text immediately following is not
encrypted) and 7 (which means that the text is encrypted using an encryption algorithm).
2.9.2 The password and login Commands
Using the password and login commands is less effective because the password is configured for the port, not for
the user. Therefore, any user who knows the password can authenticate successfully.
This method enables user name and password checking at login time. Authentication is based on the user.
Note that login user is NOT set by default. The “root” user is the only default user; the password is the same as line
password.
2.10 Configuring an IP Address
The switch ships with the default IP address 192.168.0.1/24. Connect via the serial port in order to assign the switch
an IP address on your network.
The physical ports (or switchports) of the IC35516 are L2 ports, and cannot have an IP address assigned to them. By
default, each switchport belongs to VLAN 1, a virtual interface (veth1) that may be assigned a primary, as well as any
number of secondary, IP addresses. Use the following instructions to configure an IP address to the switch. The
network administrator may later assign primary IP addresses to any other VLAN created.
Follow the steps below to change the switch’s IP address.
1. Connect to the console and press Enter at the Password prompt, as described above.
2. The screen will display the user mode prompt, Router>.
- 24 -
3. Type enable. The new prompt is Router#.
4. Type configure terminal. The new prompt is Router(config)#.
5. The default IP address is assigned to the veth1 interface. Type interface veth1. The new prompt is
Router(config-if-veth1)#. Type ip address and the new address. Your screen will look like this example:
Router> enable
Router# configure terminal
Router(config)# interface veth1
Router(config-if-veth1)# ip address 192.168.123.254 255.255.255.0
Router(config-if-veth1)# end
Router# show interface veth1
Veth1 is up, line protocol is up
Hardware is virtual interface VLAN 1, address is 00:00:94:D2:56:FA
Encapsulation ARPA, Flags: <UP,BROADCAST,RUNNING,MULTICAST>
inet 192.168.123.254/24 broadcast 192.168.123.255
ARP Type: ARPA, ARP Timeout: 14400 seconds
Router# write file
Writing current-config to startup-config. Please wait.
Configuration saved to startup-config file
It is also acceptable to enter the subnet mask by typing ip address 192.168.123.254/24. Use the show
interface veth1 command from privileged mode to see the new IP address. The new IP address automatically writes
over the default IP address.
See Chapter 5 for more information on assigning IP addresses to interfaces.
2.10.1 Setting a Default IP Gateway Address
To define the default IP gateway for the switch, insert a static route:
Router(config)# ip route 0.0.0.0 255.255.255.255<gateway IP> <mask>
2.11 Restoring Factory Defaults
If you ever need to restore the switch to its factory default settings, follow the commands shown in the following
screen.
Router> enable
Router# reload factory-default
The switch is now ready for configuration. Refer to the following chapters for management and configuration
information.
2.12 System Boot Parameters
The IC35516 has two boot banks to store its runtime code. You can select which bank will be used for the next boot
with the following command:
Router(config)# boot system flash {bank1|bank2}
- 25 -
Chapter 3: Understanding the Command Line Interface (CLI)
The switch utilizes Command Line Interface (CLI) to provide access to several different command modes. Each
command mode provides a group of related commands.
After logging into the system, you are automatically in the user top (user EXEC) mode. From the user top mode you
can enter into the privileged top (privileged EXEC) mode. From the privileged EXEC level, you can access the global
configuration mode and specific configuration modes: interface, router, and route-map configuration. Entering a
question mark (?) at the system prompt allows you to obtain a list of commands available for each command mode.
Almost every router configuration command also has a no form. You can use the no form to disable a feature or
function. For example, ARP is enabled by default. Specify the command no arp to disable the ARP table (see section
3.7).
Document Conventions
Command descriptions use the following conventions:
• Vertical bars ( | ) separate alternative, mutually exclusive, elements
• Square brackets ([ ]) indicate optional elements
• Braces ({ }) indicate a required choice
• Braces within square brackets ([{ }]) indicate a required choice within an optional element
• Boldface indicates commands and keywords that are entered literally as shown
• Italics indicate arguments for which you supply values
Access Each Command Mode
The following sections describe how to access each of the CLI command modes:
After you log in to the router, you are automatically in user top (user EXEC) command mode. The user-level prompt
consists of the host name followed by the angle bracket (>):
Router>
The default host name is Router unless it has been changed during initial configuration, using the setup command.
The user top commands available at the user level are a subset of those available at the privileged level. In general,
the user top commands allow you to connect to remote devices, change terminal settings on a temporary basis,
perform basic tests, and show system information.
- 26 -
To list the commands available in user top mode, enter a question mark (?). Use a space and a question mark (?)
after entering a command to see all the options for that particular command.
Command Purpose
?
show ?
User top commands:
Router> ?
enable Turn on privileged mode command
exit Exit current mode and down to previous mode
help Description of the interactive help system
ping Send echo messages
quit Exit current mode and down to previous mode
show Show running system information
tracert Trace route to destination
cls Clear screen
You may also enter a question mark after a letter or string of letters to view all the commands that start with that letter
(with no space between the letter and the question mark). See section 3.8.2.
Lists the user EXEC commands.
Lists all the options available for the given command.
3.2 Privileged Top (Privileged EXEC) Mode
Because many of the privileged commands set the system configuration parameters, privileged access can be
password protected to prevent unauthorized use. The privileged command set includes those commands contained
in user EXEC mode, as well as the configure command through which you can access the remaining command
modes. Privileged EXEC mode also includes high-level testing commands, such as debug.
The following example shows how to access privileged EXEC mode. Note that the prompt changes from Router> to
Router#:
Router> enable
Password: <your password>
Router#
Command Purpose
Router> enable [password]
Router# ?
If you have set a password, the system prompts for it before allowing access to privileged EXEC mode. If an enable
password has not been set, the enable mode can be accessed only through the console. You can enter the enable password global configuration command to set the password that restricts access to privileged mode.
To return to user EXEC mode, use the disable command.
In general, the top (privileged) commands allow you to change terminal settings on a temporary basis, perform basic
tests, and list system information. To list the commands available in top mode, enter a question mark (?) at the
Enters the privileged EXEC mode.
Lists privileged EXEC commands.
- 27 -
prompt, as shown in the following example. Enter a question mark (?) after a command to see all the options for that
command.
Router> enable
Router# ?
clear Reset functions
clock Manage the system clock
configure Enter configuration mode
copy Copy from one file to another
debug Debugging functions
disable Turn off privileged mode command
erase Erase a filesystem
exit Exit current mode and down to previous mode
help Description of the interactive help system
no Negate a command or set its defaults
ping Send echo messages
quit Exit current mode and down to previous mode
reload Halt and perform a cold restart
show Show running system information
tracert Trace route to destination
write Write running configuration to memory, network, or terminal
cls Clear screen
Important! You MUST save any changes you make in running configuration to the startup configuration file if you
want those changes to remain after a system reload. From the privileged level, configurations can be saved using the
write command, or by using the copy running-config startup-config command.
From the privileged level, you can access global configuration mode, as described in the following section.
3.3 Global Configuration Mode
Global configuration commands apply to features that affect the system as a whole, rather than just one protocol or
interface. Commands to enable a particular routing function are also global configuration commands. To enter the
global configuration mode, use the configure terminal command.
The following example shows how to access and exit global configuration mode and list global configuration
commands.
Command Purpose
Router# configure terminal
Router(config)# ?
To exit global configuration command mode and return to privileged EXEC mode, use one of the following
commands:
From privileged EXEC mode, enters global configuration
mode.
Lists the global configuration commands.
Command Purpose
exit
end
Exits global configuration mode and returns to privileged
- 28 -
Ctrl-Z
To list the commands available in global configuration mode, enter a question mark (?) at the prompt, as shown in the
following example. Enter a question mark (?) after a command to see all the options for that command.
Router# configure terminal
Router(config)# ?
access-list Add an access list entry
adp Global ADP configuration subcommands
arp Set static arp entry
banner Define a login banner
bgp BGP information
boot Modify system boot parameters
define Create a definition
dot1x IEEE 802.1x configuration
duplicate-ip Duplicate IP Address detection Global Commands
enable Modify enable password parameters
end End current mode and change to enable mode
exit Exit current mode and down to previous mode
help Description of the interactive help system
hostname Set system's network name
interface Select an interface to configure
ip Global IP configuration subcommands
lacp Configure LACP
line Configure a terminal line
logging Message Logging global configuration commands
mac Add a MAC access list entry
mac-address-table MAC Address Table global configuration command
no Negate a command or set its defaults
priority-list Priority List global configuration commands
priority-precedence Set priority source precedence
queue-list Queue List global configuration commands
quit Exit current mode and down to previous mode
route-map Create route-map or enter route-map command mode
router Enable a routing process
service Modify use of network based services
set set operations
show Show running system information
snmp-server Modify SNMP parameters
spanning-tree Enable Spanning Tree Protocol
tacacs-server Modify TACACS+ query parameters
tos-list Tos List global configuration commands
username To establish a username-based authentication system
vlan VLAN global configuration command
write Write running configuration to memory, network, or terminal
EXEC mode.
From global configuration mode, you can access three additional configuration modes: The interface, router, and
route-map commands are used to access their respective configuration modes.
3.3.1 Interface Configuration Mode
Many features are enabled on a per-interface basis. Interface configuration commands modify the operation of an
interface such as an Ethernet or serial port. Interface configuration commands always follow an interface global
- 29 -
configuration command, which defines the interface type as ethernet or virtual. The virtual interfaces are bound to
VLANs and can be assigned IP addresses.
In the following example, Ethernet interface eth1 is about to be configured. The new prompt, Router(config-if-eth1)#, indicates the interface configuration mode. In this example, the user asks for help by requesting a list of
commands.
Router(config)# interface eth1
Router(config-if-eth1)# ?
adp ADP interface subcommands
custom-queue-list Assign a custom queue list to an interface
description Interface specific description
dot1x IEEE 802.1x configuration
duplex Configure duplex operation
end End current mode and change to enable mode
exit Exit current mode and down to previous mode
fair-queue Fair-queue interface configuration commands
flow-control IEEE 802.3X Flow Control Configuration commands
help Description of the interactive help system
ip Interface Internet Protocol config commands
lacp Configure LACP
mac control access to an interface
mtu Set the interface Maximum Transmission Unit (MTU)
negotiation Select Autonegotiation mode
no Negate a command or set its defaults
priority-group Assign a priority queue list to an interface
quit Exit current mode and down to previous mode
show Show running system information
shutdown Shutdown the selected interface
spanning-tree Spanning Tree Protocol interface command
speed Configure speed operation
switchport Port operating in L2 mode
tos-group Assign a tos list to an interface
traffic-shape Generic traffic shape QoS interface configuration commands.
write Write running configuration to memory, network, or terminal
To exit interface configuration mode and return to global configuration mode, enter the exit command. To exit
configuration mode and return to top mode, use the end command or press Ctrl-Z.
3.3.2 Router Configuration Mode
Router configuration commands are used to configure an IP routing protocol and always follow a router command.
To list the available router configuration keywords, enter the router command followed by a space and a question
mark (?) at the global configuration prompt.
Router(config)# router ?
ospf Open Shortest Path First
rip Routing Information Protocol (RIP)
Router(config)# router
In the following example, the router is configured to support the Routing Information Protocol (RIP). The new prompt
is Router(config-rip-router)#.
Router(config)# router rip
Router(config-rip-router)# ?
default-information Control distribution of default route
- 30 -
default-metric Set a metric of redistribute routes
distance Administrative distance
distribute-list Filter networks in routing updates
end End current mode and change to enable mode
exit Exit current mode and down to previous mode
help Description of the interactive help system
neighbor Specify a neighbor router
network Enable routing on an IP network
no Negate a command or set its defaults
offset-list Modify RIP metric
passive-interface Suppress routing updates on an interface
quit Exit current mode and down to previous mode
redistribute Redistribute information from another routing protocol
show Show running system information
timers Adjust routing timers
version Set routing protocol version
write Write running configuration to memory, network, or terminal
To exit router configuration mode and return to global configuration mode, enter the exit command. To exit
configuration mode and return to privileged EXEC mode, use the end command or press Ctrl-Z.
3.3.3 Route-Map Configuration Mode
Use the route-map configuration mode to configure the routing table and the source and destination information. To
access and list the route-map configuration commands, use the route-map command in global configuration mode.
In the following example, a route map named mymap is configured. The new prompt is Router(config-route-map)#.
Enter a question mark (?) to list route-map configuration commands.
Router(config)# route-map mymap permit 30
Router(config-route-map)# ?
end End current mode and change to enable mode
exit Exit current mode and down to previous mode
help Description of the interactive help system
match Match values from routing table
no Negate a command or set its defaults
on-match Exit policy on matches
quit Exit current mode and down to previous mode
route-map Create route-map or enter route-map command mode
set Set values in destination routing protocol
show Show running system information
write Write running configuration to memory, network, or terminal
To exit route-map configuration mode and return to global configuration mode, enter the exit command. To exit
configuration mode and return to privileged EXEC mode, use the end command or press Ctrl-Z.
3.4 Advanced Features Supported within the Command Mode
Entering a question mark (?) at the system prompt displays a list of commands available for each command mode.
You can also get a list of any command's associated keywords and arguments with the context-sensitive help feature.
To get help specific to a command mode, a command, a keyword, or an argument, perform one of the following
commands:
Loading...
+ 81 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.