Asante Technologies 35516 User Manual

®
IntraCore
Layer 2/3/4 Gigabit Switches
35516 Series
User’s Manual
IntraCore 35516 Series
Layer 2/3/4 Gigabit Switches User’s Manual
Asanté Technologies, Inc. 2223 Old Oakland Road San Jose, CA 95131 USA
SALES
800-662-9686 Home/Office Solutions 800-303-9121 Enterprise Solutions 408-435-8388
TECHNICAL SUPPORT
801-566-8991: Worldwide 801-566-3787: Fax
www.asante.com/support
support@asante.com
Copyright © 2004 Asanté Technologies, Inc. All rights reserved. No part of this document, or any associated artwork, product design, or design concept may be copied or reproduced in whole or in part by any means without the express written consent of Asanté Technologies, Inc. Asanté and IntraCore are registered trademarks and the Asanté logo, AsantéCare, Auto-Uplink, and IntraCare are trademarks of Asanté Technologies, Inc. All other brand names or product names are trademarks or registered trademarks of their respective holders. All features and specifications are subject to change without prior notice. Rev. D 09/01/04
Table of Contents
Table of Contents...........................................................................................................................................................3
Chapter 1: Introduction.................................................................................................................................................10
1.1 Features .............................................................................................................................................................10
1.2 Package Contents ..............................................................................................................................................11
1.3 LEDs...................................................................................................................................................................11
1.3.1 IC35516-T ....................................................................................................................................................11
1.3.2 IC35516-G ...................................................................................................................................................12
1.4 Front and Back Panel Descriptions ....................................................................................................................12
1.4.1 IC35516-T ....................................................................................................................................................12
1.4.2 IC35516-G ...................................................................................................................................................13
1.5 Management and Configuration .........................................................................................................................13
1.5.1 Console Interface.........................................................................................................................................13
Chapter 2: Hardware Installation and Setup ................................................................................................................14
2.1 Installation Overview ..........................................................................................................................................14
2.1.1 Safety Overview...........................................................................................................................................14
2.1.2 Recommended Installation Tools.................................................................................................................14
2.1.3 Power Requirements....................................................................................................................................15
2.1.4 Environmental Requirements.......................................................................................................................15
2.1.5 Cooling and Airflow ......................................................................................................................................15
2.2 Installation into an Equipment Rack ...................................................................................................................15
2.2.1 Equipment Rack Guidelines.........................................................................................................................16
2.3 Gigabit Interface Converters...............................................................................................................................16
2.3.1 Installing a GBIC ..........................................................................................................................................17
2.3.2 Removing a GBIC ........................................................................................................................................17
2.3.3 GBIC Care and Handling .............................................................................................................................17
2.4 Installing the Optional Emergency Power Supply...............................................................................................18
2.5 Connecting Power ..............................................................................................................................................18
2.6 Connecting to the Network .................................................................................................................................18
2.6.1 10/100/1000BaseT Ports Cabling Procedures .............................................................................................19
2.6.2 Gigabit Ethernet Ports Cabling Procedures .................................................................................................20
2.7 Setup..................................................................................................................................................................20
2.7.1 Connecting to a Console..............................................................................................................................20
2.8 Setting Passwords..............................................................................................................................................22
2.9 Login Security.....................................................................................................................................................23
2.9.1 The username Command ............................................................................................................................23
2.9.2 The password and login Commands............................................................................................................23
2.10 Configuring an IP Address................................................................................................................................23
2.10.1 Setting a Default IP Gateway Address.......................................................................................................24
2.11 Restoring Factory Defaults...............................................................................................................................24
2.12 System Boot Parameters..................................................................................................................................24
Chapter 3: Understanding the Command Line Interface (CLI) ..................................................................................... 25
3.1 User Top (User EXEC) Mode ............................................................................................................................. 25
3.2 Privileged Top (Privileged EXEC) Mode............................................................................................................. 26
3.3 Global Configuration Mode.................................................................................................................................27
3.3.1 Interface Configuration Mode.......................................................................................................................28
3.3.2 Router Configuration Mode ..........................................................................................................................29
3.3.3 Route-Map Configuration Mode ...................................................................................................................30
3.4 Advanced Features Supported within the Command Mode ...............................................................................30
3.5 Checking Command Syntax...............................................................................................................................32
3.6 Using CLI Command History ..............................................................................................................................33
3.7 Using the No and Default Forms of Commands .................................................................................................33
3.8 Using Command-Line Editing Features and Shortcuts.......................................................................................33
3.8.1 Moving Around on the Command Line.........................................................................................................34
3.8.2 Completing a Partial Command Name.........................................................................................................34
3.8.3 Editing Command Lines That Wrap .............................................................................................................35
3.8.4 Deleting Entries............................................................................................................................................35
3.8.5 Scrolling Down a Line or a Screen...............................................................................................................36
3.8.6 Redisplaying the Current Command Line ....................................................................................................36
3.8.7 Transposing Mistyped Characters ...............................................................................................................36
3.8.8 Controlling Capitalization .............................................................................................................................36
3.9 Passwords and Privileges Commands ...............................................................................................................36
3.9.1 Enable Password .........................................................................................................................................37
3.9.2 Password .....................................................................................................................................................37
3.9.3 Service Password-Encryption ......................................................................................................................37
Chapter 4: Managing the System and Configuration Files ...........................................................................................38
4.1 Managing the System.........................................................................................................................................38
4.1.1 Setting the System Clock.............................................................................................................................38
4.1.2 Specify the Hostname..................................................................................................................................38
4.1.3 Changing the Password...............................................................................................................................39
4.1.4 Trace Packet Routes....................................................................................................................................39
4.1.5 Test Connections with Ping Tests................................................................................................................39
4.1.6 Enable the System Log................................................................................................................................39
4.1.7 Displaying the Operating Configuration........................................................................................................40
4.2 Managing Configuration Files.............................................................................................................................40
4.2.1 Configuring from the Terminal......................................................................................................................40
4.2.2 Copying Configuration Files to a Network Server ........................................................................................41
4.2.3 Copying Configuration Files from a Network Server to the IC35516............................................................42
4.3 Configuring SNMP and Spanning Tree ..............................................................................................................43
4.3.1 Configuring SNMP Support..........................................................................................................................43
4.3.2 Other SNMP Configuration ..........................................................................................................................45
4.3.3 Configuring Spanning Tree Protocol (STP)..................................................................................................46
4.3.4 Rapid Spanning Tree Protocol (RSTP) ........................................................................................................47
4.4 MAC Address Table ...........................................................................................................................................50
Chapter 5: Configuring IP.............................................................................................................................................51
5.1 Assign IP Addresses to Network Interfaces........................................................................................................51
5.1.1 Assign Multiple IP Addresses to Network Interfaces....................................................................................52
5.2 Establish Address Resolution.............................................................................................................................53
5.2.1 Define a Static ARP Cache..........................................................................................................................53
5.3 Configuring Static Routes...................................................................................................................................54
5.4 Configuring RIP .................................................................................................................................................. 55
5.4.1 Enable RIP...................................................................................................................................................55
5.4.2 Allow Unicast Updates for RIP .....................................................................................................................56
5.4.3 Specify a RIP Version ..................................................................................................................................56
5.4.4 Redistribute Routing Information..................................................................................................................57
5.4.5 Set Metrics for Redistributed Routes............................................................................................................58
5.4.6 Set Administrative Distance .........................................................................................................................58
5.4.7 Generate a Default Route ............................................................................................................................59
5.4.8 Filtering Routing Information ........................................................................................................................59
5.4.9 Adjust Timers ...............................................................................................................................................60
5.4.10 Enable or Disable Split-horizon..................................................................................................................60
5.4.11 Manage Authentication Keys .....................................................................................................................61
5.4.12 Monitor and Maintain RIP...........................................................................................................................61
5.5 Configuring IP Multicast Routing ........................................................................................................................62
5.5.1 IGMP............................................................................................................................................................62
5.5.2 Configuring IGMP ........................................................................................................................................62
5.5.3 DVMRP........................................................................................................................................................64
5.5.4 Configuring DVMRP.....................................................................................................................................64
5.6 Using Access Lists .............................................................................................................................................66
5.6.1 Create a Standard Access List.....................................................................................................................67
5.6.2 Create an Expanded Access List .................................................................................................................68
5.6.3 Creating an Access List with a Name ..........................................................................................................69
5.6.4 Applying an Access List to an Interface .......................................................................................................70
5.7 Configuring OSPF ..............................................................................................................................................70
5.7.1 Enable OSPF ...............................................................................................................................................70
5.7.2 Configure ABR Type ....................................................................................................................................71
5.7.3 Configure Compatibility................................................................................................................................71
5.7.4 Configure OSPF Interface Parameters ........................................................................................................71
5.7.5 Configure OSPF Network Type....................................................................................................................72
5.7.6 Configure OSPF for Non-broadcast Networks .............................................................................................72
5.7.7 Configure Area Parameters .........................................................................................................................72
5.7.8 Configure OSPF Not So Stubby Area (NSSA).............................................................................................73
5.7.9 Configure Route Summarization between OSPF Areas...............................................................................74
5.7.10 Create Virtual Links....................................................................................................................................74
5.7.11 Control Default Metrics...............................................................................................................................74
5.7.12 Configure Route Calculation Timers ..........................................................................................................75
5.7.13 Refresh Timer Configuration......................................................................................................................75
5.7.14 Redistribute Routes into OSPF ..................................................................................................................75
5.7.15 Generate a Default Route ..........................................................................................................................75
5.7.16 Change the OSPF Administrative Distances..............................................................................................76
5.7.17 Suppress Routes on an Interface...............................................................................................................76
5.7.18 Prevent Routes from being Advertised in Routing Updates .......................................................................76
5.7.19 Monitor and Maintain OSPF.......................................................................................................................77
5.8 Virtual Router Redundancy Protocol (VRRP) ..................................................................................................... 78
5.8.1 VRRP Configuration.....................................................................................................................................78
5.9 Configuring ICMP Router Discovery Protocol (IRDP).........................................................................................79
5.9.1 Enable IRDP Processing..............................................................................................................................79
5.9.2 Change IRDP Parameters ...........................................................................................................................80
5. 10 Configuring Protocol-Independent Multicast Protocol (PIM) ............................................................................ 80
5.10.1 Enabling PIM Sparse Mode .......................................................................................................................80
5.10.2 Setting Up BSR Candidacy........................................................................................................................80
5.10.3 Setting Up RP Candidacy ..........................................................................................................................81
5.11 Enabling Directed Broadcast-to-Physical Broadcast Translation......................................................................81
5.12 Monitoring and Maintaining the Network ..........................................................................................................81
5.13 Configuring EtherAggregate .............................................................................................................................82
5.13.1 Configuring L2 EtherAggregate..................................................................................................................82
5.13.2 EtherAggregate Limitations and Restrictions .............................................................................................83
5.13.3 EtherAggregate Configuration Example.....................................................................................................84
5.14 802.1x Support ................................................................................................................................................. 85
5.14.1 Configuration Mode Commands ................................................................................................................85
5.14.2 Interface Configuration Mode Commands..................................................................................................86
Chapter 6: VLAN Configuration....................................................................................................................................87
6.1 Creating or Modifying a VLAN ............................................................................................................................87
6.1.1 Virtual Interfaces ..........................................................................................................................................87
6.1.2 Deleting a VLAN ..........................................................................................................................................88
6.2 VLAN Port Membership Modes ..........................................................................................................................89
6.2.1 Static Access ...............................................................................................................................................89
6.2.2 Trunk (IEEE 802.1Q)....................................................................................................................................89
6.2.3 Dot1q Tunnel ...............................................................................................................................................91
Chapter 7: Quality of Service (QoS) Configuration.......................................................................................................92
7.1 Weighted Fair Queuing.......................................................................................................................................92
7.1.1 Configuring Flow-Based Weighted Fair Queuing Configuration...................................................................92
7.1.2 Configuring Type of Service-Based WFQ ....................................................................................................92
7.1.3 Monitoring Weighted Fair Queuing Lists ......................................................................................................93
7.1.4 Weighted Fair Queuing Example .................................................................................................................93
7.2 Priority Queuing..................................................................................................................................................93
7.2.1 Defining the Priority List ...............................................................................................................................93
7.2.2 Assigning Packets to Priority Queues ..........................................................................................................93
7.2.3 Assigning the Priority List to an Interface.....................................................................................................94
7.2.4 Monitoring Priority Queuing Lists .................................................................................................................94
7.2.5 Priority Queuing Example ............................................................................................................................94
7.3 Custom Queuing ................................................................................................................................................94
7.3.1 Defining the Custom Queue List ..................................................................................................................95
7.3.1 Specifying the Minimum Size of the Custom Queues (Optional)..................................................................95
7.3.1 Assigning Packets to Custom Queues.........................................................................................................95
7.3.1 Assigning the Queue List to an Interface (Optional).....................................................................................96
7.3.1 Monitoring Custom Queue Lists...................................................................................................................96
7.3.1 Custom Queuing Example ...........................................................................................................................96
7.4 Generic Traffic Shaping......................................................................................................................................96
7.4.1 Configuring GTS for an Interface .................................................................................................................97
7.4.2 Configuring GTS for an Access List .............................................................................................................97
7.4.3 Monitoring the GTS Configuration................................................................................................................97
7.4.4 Generic Traffic Shaping Example ................................................................................................................97
7.5 Random Early Detection.....................................................................................................................................97
7.5.1 Configuring RED to Use IP Precedence ......................................................................................................98
7.5.2 Configuring RED to Use DSCP....................................................................................................................98
7.5.3 Monitoring RED (Optional) ...........................................................................................................................98
Chapter 8: Configuring DHCP and DNS ......................................................................................................................99
8.1 DHCP .................................................................................................................................................................99
8.1.1 Enabling DHCP Server ................................................................................................................................99
8.1.2 Enabling DHCP Address Conflict Logging ...................................................................................................99
8.1.3 Configuring DHCP Address Pool .................................................................................................................99
8.1.4 Configuring the DHCP Address Pool Subnet and Mask...............................................................................99
8.1.5 Configuring the Domain Name for the Client..............................................................................................100
8.1.6 Configuring the Domain Name System IP Servers for the Client...............................................................100
8.1.7 Configuring the NetBIOS Node Type for the Client....................................................................................100
8.1.8 Configuring the NetBIOS Name Server for the Client ................................................................................100
8.1.9 Configuring the Next Server for the Client..................................................................................................100
8.1.10 Configuring the Default Router for the Client ...........................................................................................100
8.1.11 Configuring the Address Lease Time.......................................................................................................101
8.1.12 Configuring a DHCP Server Boot File......................................................................................................101
8.1.13 Configuring the DHCP Address Range....................................................................................................101
8.1.14 Configuring Manual Bindings ...................................................................................................................101
8.1.15 Monitoring and Maintaining the DHCP Server .........................................................................................102
8.2 DNS.................................................................................................................................................................. 103
8.2.1 Configuring DNS ........................................................................................................................................103
8.2.2 Design Limitation and Restrictions.............................................................................................................104
8.2.3 Configuration Example...............................................................................................................................104
Appendix A: Basic Troubleshooting ...........................................................................................................................105
Appendix B: Specifications.........................................................................................................................................106
B.1 Standards Compliance .................................................................................................................................106
B.2 Technical Support and Warranty ..................................................................................................................107
Appendix C: FCC Compliance and Warranty Statements..........................................................................................108
C.1 FCC Compliance Statement.........................................................................................................................108
C.2 Important Safety Instructions........................................................................................................................108
C.3 IntraCare Warranty Statement......................................................................................................................109
Appendix D: Console Port Pin Outs ...........................................................................................................................110
Appendix E. Online Warranty Registration.................................................................................................................111
- 10 -
Chapter 1: Introduction
Thank you for purchasing the Asanté IntraCore 35516 Series Gigabit switch. The IC35516 is from a family of multi­media and multi-protocol switches capable of supporting Layer 2 switching and Layer 3 and Layer 4 protocols. They are designed to offer industry-leading performance at a very competitive cost of ownership.
Important! This manual describes the hardware setup and configuration commands that are used by the IC35516. It is not intended to be a complete configuration guide for your specific network requirements.
Each IntraCore 35516 switch is a 16-port solution for Gigabit Ethernet switching using shared-memory architecture to achieve Gigabit switching on all ports. The highly integrated system includes MACs, Address Look-up, Content Addressable Memory (CAM), Switch Engine, Primary Buffer Memory, and programmable Quality of Service (QoS).
Two models in the IntraCore 35516 series cover different customer applications.
The IC35516-T is a 16-port switch that has 12 10/100/1000BaseT ports and 4 dual-function Gigabit ports that support either 1000BaseT RJ-45 Gigabit ports or GBIC Gigabit ports.
The IC35516-G is a 16-port switch that has 12 GBIC style Gigabit Ethernet ports and 4 dual-function Gigabit ports that support either 10/100/1000BaseT RJ-45 Gigabit ports or GBIC Gigabit ports.
The following types of GBIC modules are supported on the IC35516 switches:
1000SX multi-mode fiber for 500 m applications
1000LX single-mode fiber for 2 km applications
1000LH single-mode fiber for 20 km applications
1000LZ single-mode fiber for ultra distance (120 km) applications
1000BaseT copper Gigabit for low-cost 100 m applications
The system can operate as a stand-alone network or be used in combination with other IntraCore switches in the backbone.
1.1 Features
The IC35516 is a multi-media, multi-protocol (Ethernet, L2/L3/L4) switch. The following is a list of the switch’s features:
16-port 10/100/1000 switch/router, integrating MACs, CAM, packet buffer memory, and switching engine
Supports wire-speed L2 switching and L3 routing including L2 and IP multicast
QoS provisioning on Layers 2/3/4 and 802.1p tag
Flexible wire-speed packet classification
Packet filtering
Wire-speed MAC address learning on-chip
Port-based VLAN support for 4K VLANs according to IEEE Std. 802.1Q
SNMP, RMON, and SMON statistics counters supported on-chip
- 11 -
128 KB internal packet buffer
Full duplex 1000 Mbps, full and half duplex 10/100 Mbps
Support for Jumbo Frames (up to 32 KB in length)
1.2 Package Contents
The following items are included in the switch’s package:
Switch
AC power cord
Rackmount brackets with screws
Rubber feet
Setup Guide
IntraCore 35516 CD-ROM
Contact your dealer immediately if any of these items is missing.
1.3 LEDs
The system’s front panel LED display allows you to monitor the status of the switch. Refer to the following sections for LED information specific to the switch’s model.
1.3.1 IC35516-T
The IC35516-T has one power LED indicator, one (optional) emergency power LED, and two LED indicators for each of the 16 ports. See the table below for a complete LED description.
LED Color Description
Power Green
Off
Emergency Power Green
Off
Link/Speed Green
Power is on.
Power is off, or main power has failed.
Primary power has failed and optional power supply is powering the switch.
Optional power supply is in standby mode and primary power is working.
A valid 1000 Mbps link has been established on the port.
Yellow
Off
A valid 10/100 Mbps link has been established on the port.
No link has been established on the port.
- 12 -
Duplex/Activity Green
Blinking Green
Yellow
Blinking Yellow
Off
A full-duplex link has been established on the port.
Activity has been detected in full-duplex mode.
A half-duplex link has been established on the port.
Activity has been detected in half-duplex mode.
No link has been established on the port.
1.3.2 IC35516-G
The IntraCore 35516-G has one power LED, one (optional) emergency power LED, two LED indicators for 10/100/1000BaseT status, and one LED for GBIC status. See the table below for a complete LED description.
LED Color Description
Power Green
Off
Emergency Power Green
Off
BaseT 10/100/1000 Link/Speed
Green Yellow Off
Power is on. Power is off, or main power supply has failed.
Primary power has failed and optional power supply is powering the switch. Optional power supply is in standby mode and primary power is working.
A valid 1000 Mbps link has been established on the port. A valid 10 or 100 Mbps link has been established on the port. No link has been established on the port.
BaseT 10/100/1000 Duplex/Activity
GBIC Link
Green Blinking Yellow Blinking Yellow Off
Green Off
A full-duplex link has been established on the port. Activity is detected in full-duplex mode. A half-duplex link has been established on the port. Activity is detected in half-duplex mode. No link has been established on the port.
A valid 1000 Mbps link has been established on the port. No link has been established on the port.
1.4 Front and Back Panel Descriptions
Refer to the following sections for detailed descriptions of the front and back panels of the IC35516 Series switches.
1.4.1 IC35516-T
The front panel of the IC35516-T contains the following: power and port LEDs, 12 10/100/1000BaseT ports, 4 dual­function Gigabit ports that support either 1000BaseT or GBIC-style Gigabit Ethernet ports, and a console port.
The back panel, not shown, contains a 12 VDC jack for emergency power (optional), the primary power bay cover plate, the primary power outlet, and the on/off switch.
- 13 -
1.4.2 IC35516-G
The front panel of the IC35516-G contains the following: power and port LEDs, 12 GBIC ports, 4 dual-function Gigabit ports that support either 1000BaseT or GBIC-style Gigabit Ethernet ports, and a console port.
The back panel, shown below, contains a 12 VDC jack for emergency power (optional), the primary power bay cover plate, the on/off switch, and the primary power outlet.
1.5 Management and Configuration
The switch is managed using Command Line Interface (CLI) in order to access several different command modes. Entering a question mark (?) at each command mode’s prompt provides a list of commands.
1.5.1 Console Interface
Support for local, out-of-band management is delivered through a terminal or modem attached to the EIA/TIA-232 interface. Users can access the switch by connecting a PC or terminal to the console port of the switch, via a serial cable. The default password set on the console line is Asante (it is case-sensitive). The default IP address is
192.168.0.1/24. The default settings for the terminal emulation program are as follows:
9600-8-N-1
Remote in-band management is available through Simple Network Management Protocol (SNMP) and Telnet client. When connecting via a Telnet session (line vty0), the default password is also Asante (case-sensitive).
See Chapter 2 for more information on connecting to the switch.
- 14 -
Chapter 2: Hardware Installation and Setup
The following guidelines will help you easily install the switch, ensuring that it has the proper power supply and environment.
2.1 Installation Overview
Follow these steps to install the IntraCore switch:
1. Open the box and check the contents. See Chapter 1.2 Package Contents for a complete list of the items included with the IntraCore switch.
2. Install the switch in an equipment or wall rack, or prepare it for desktop placement.
3. Connect the power cord to the switch and to an appropriate power source.
4. Connect network devices to the switch.
See the sections below for more detailed installation instructions.
2.1.1 Safety Overview
The following information provides safety guidelines to ensure your safety and to protect the switch from damage.
Note: This information is intended as a guideline, and may not include every possible hazard to which you may be exposed. Use caution when installing this switch.
Only trained and qualified personnel should be allowed to install or replace this equipment
Always use caution when lifting heavy equipment
Keep the switch clean
Keep tools and components off the floor and away from foot traffic
Avoid wearing rings or chains (or other jewelry) that could get caught in the switch. Metal objects can heat up
and cause serious injury to persons and damage to the equipment. Avoid wearing loose clothing (such as ties or loose sleeves) when working around the switch
When working with electricity, follow these guidelines:
Disconnect all external cables before installing or removing the cover
Do not work alone when working with electricity
Always check that the cord has been disconnected from the outlet before performing hardware configuration
Do not tamper with the equipment. Doing so could void the warranty
Examine the work area for potential hazards (such as wet floors or ungrounded cables)
2.1.2 Recommended Installation Tools
- 15 -
You will need the following tools and equipment (not included) to install the switch into an equipment rack:
Flat head screwdriver
Phillips head screwdriver
Antistatic mat or foam
2.1.3 Power Requirements
The electrical outlet should be located near the switch and be easily accessible. It must also be properly grounded.
Make sure the power source adheres to the following guidelines:
Power: Auto Switching 90-260 VAC
Frequency range: 50/60 Hz
2.1.4 Environmental Requirements
The switch must be installed in a clean, dry, dust-free area with adequate air circulation to maintain the following environmental limits:
Operating Temperature: 0° to 40°C (32° to 104°F)
Relative Humidity: 10% to 90% non-condensing
Avoid direct sunlight, heat sources, or areas with high levels limits may cause damage to the switch and void the warranty.
of electromagnetic interference. Failure to observe these
2.1.5 Cooling and Airflow
The IC35516 switches use internal fans for air-cooling. Do not restrict airflow by covering or obstructing air vents on the sides of the switch.
2.2 Installation into an Equipment Rack
Important! Before continuing, disconnect all cables from the switch.
To mount the switch onto an equipment rack:
1. Place the switch on a flat, stable surface.
2. Locate a rack-mounting bracket (supplied) and place it over the mounting holes on one side of the switch.
3. Use the screws (supplied) to secure the bracket (with a Phillips screwdriver).
4. Repeat the two previous steps on the other side of the switch.
5. Place the switch in the equipment rack.
- 16 -
6. Secure the switch by securing its mounting brackets onto the equipment rack with the appropriate screws (supplied).
Important! Make sure the switch is supported until all the mounting screws for each bracket are secured to the equipment rack. Failure to do so could cause the switch to fall, which may result in personal injury or damage to the switch.
2.2.1 Equipment Rack Guidelines
Use the following guidelines to ensure that the switch will fit safely within the equipment rack:
Size: IC35516-T: 17.1 x 10.1 x 1.6 inches (434 x 257 x 41 mm) IC35516-G: 17.5 x 14.0 x 2.6 inches (445 x 356 x 66 mm)
Ventilation: Ensure that the rack is installed in a room in which the temperature remains below 40° C (104° F). Be sure that no obstructions, such as other equipment or cables, block airflow to or from the vents of the switch
Clearance: In addition to providing clearance for ventilation, ensure that adequate clearance for servicing the switch from the front exists
2.3 Gigabit Interface Converters
The GBIC Interface is the industry standard for Gigabit Ethernet Interfaces. Some of the benefits of GBIC include reducing the components needed in a “spares” inventory, being able to choose from a wide variety of manufacturers with cross-vendor compatibility, and having competitive prices.
Instructions for installing, removing, and maintaining GBIC modules are provided in following sections.
Important! The 35516-G has 12 GBIC ports that are paired— port numbers 1/2, 3/4, 5/6, 7/8, 10/12, and 14/16. DO NOT use more than one copper GBIC module per pair (maximum 8 modules).
Model Part Number Standard Media
GBIC 1000SX 99-00549-01 1000BaseSX Multi-mode fiber
GBIC 1000LX 99-00550-01 1000BaseLX Single-mode fiber
GBIC 1000T 99-00673-01 1000BaseT Category 5 UTP (or better)
copper
GBIC 1000TP 99-00647-07 1000BaseT Category 5 UTP (or better)
copper
Table 2-1 GBIC Modules by Asanté
- 17 -
2.3.1 Installing a GBIC
GBICs are hot-swappable. This means that they can be inserted and removed while the switch is powered on. However, please allow 40–60 seconds for the switch to recognize the module when it has been installed while the switch is on.
1. Wearing an ESD (electro-static discharge) wrist strap, remove the GBIC module from its protective packaging.
2. Verify that the GBIC is the correct type for the network (see the table above).
3. Grip the sides of the GBIC with the thumb and forefinger, and then insert the GBIC into the slot on the face of the switch.
4. Slide the GBIC into the slot until it clicks into place.
5. Fiber GBIC modules: Remove the rubber plugs from the end of the GBIC module. Save them for future use.
6. Attach the appropriate cable.
Note: After installing a GBIC 1000T module, the link LED may light even before a valid cable has been connected. This is a normal condition for most 1000BaseT GBIC modules.
Note: Auto-negotiation must be disabled on a port in which a copper GBIC module is installed. Copper GBICs themselves control auto-negotiation.
2.3.2 Removing a GBIC
Caution: GBIC 1000T modules run hot under normal operating conditions. When it has been removed from the
system, place it on a heat-resistant surface and allow the module to cool before handling.
Note: Unnecessary removals/insertions of a GBIC module will lead to premature failure of the GBIC connector. The rated duty cycle for a GBIC module is 100–500 removals/insertions.
Follow the steps below to remove a GBIC interface from a Gigabit Ethernet module:
1. Disconnect the cable from the GBIC module.
2. Release the GBIC from the slot by simultaneously squeezing the locking tabs on both sides of the GBIC.
3. Slide the GBIC out of the slot.
4. Fiber GBIC modules: Install the rubber plugs in the GBIC optical bores, and place the GBIC in protective packaging.
2.3.3 GBIC Care and Handling
Follow these GBIC maintenance guidelines:
GBICs are static-sensitive. To prevent ESD damage, follow normal board and component handling procedures. Wear an ESD wrist strap
Fiber GBIC modules are very sensitive to dust and contaminants. When they are not connected to a fiber-optic cable, install the rubber plugs in the optical bores
The ferrules of the optical connectors may pick up debris that can obstruct the optical bore. Use an alcohol swab or equivalent to clean the ferrules of the optical connector
- 18 -
2.4 Installing the Optional Emergency Power Supply
To ensure increased reliability for mission-critical applications, the IC35516 can be equipped with a 12 VDC emergency backup power supply (the IC35-EPS12, sold separately). When installed, the emergency power supply is in standby mode. Should the primary unit fail, the DC backup automatically switches on and the LED on the front panel lights. In addition, an SNMP fault notice is sent.
To verify the primary power status, use the Router# show system command. Under System Information, you will see the power unit status.
System Information
------------------
System up since: 10:34:43 Fri Mar 19 2004 PROM Image Version/Date: 1.01A/Jan 20 2004 20:24:10 DRAM Size: 64.0MB Flash Size: 8.0MB Config NVRAM Size: 128KB Console Baud Rate: 9600 bps Serial No. : Power Unit Status = OK
Should the IC35-EPS12 become active due to a fault with the primary power, the unit should be swapped out at the earliest convenience and sent for repair. The IC35-EPS12 is designed to be a temporary replacement when the primary power fails, not a permanent replacement.
To install the optional power supply, simply attach the 12 VDC connector of the power supply to the jack located in the center of the rear panel of the switch. Connect the power cord to the power supply and plug the power cord into an outlet.
Important! The optional power supply becomes HOT under normal operating conditions. To avoid damage or injury, set the power supply on a heat-resistant surface and USE CAUTION when handling the unit.
2.5 Connecting Power
Important: Carefully review the power requirements (Chapter 2.1.3) before connecting power to the switch.
Use the following procedure to connect power to the switch:
1. Plug one end of the supplied power cord into the power connector on the back of the switch.
2. Plug the other end into a grounded AC outlet.
3. Turn on the switch’s power. The power LED will begin its initialization process.
The front panel LEDs blink and the power LED illuminates when it has initialized. The switch is ready for connection to the network.
Important: If the power does not come on, check the next section to ensure that the correct cabling is used.
2.6 Connecting to the Network
The switch may be connected to an Ethernet network with the switch powered on or off. Use the following procedure to make the network connections:
1. Connect the network devices to the switch, following the cable guidelines outlined below.
- 19 -
2. After the switch is connected to the network, it can be configured for management capabilities (see the following chapters for information on configuration).
2.6.1 10/100/1000BaseT Ports Cabling Procedures
The 10/100/1000 ports on the switch allow for the connection of 10BaseT, 100BaseTX, or 1000BaseT network devices. The ports are compatible with IEEE 802.3 and 802.3u standards.
Important: The switch must be located within 100 meters of its attached 10BaseT or 100BaseTX devices.
Use the following guidelines to determine the cabling requirements for the network devices:
Connecting to Network Station: Category 5 UTP (Unshielded Twisted-Pair) straight-through cable (100 m maximum) with RJ-45 connectors
Connecting to Repeater/Hub/Switch’s Uplink port: Category 5, UTP straight- through cable (100 m maximum) with RJ-45 connectors
Note: These switches have no specific uplink ports. All 10/100/1000 ports on these switches are auto-sensing MDI/MDI-X. This advanced feature means that when the ports are operating at 10/100Mbps, they will automatically determine whether the device at the other end of the link is a hub, switch, or workstation, and adjust its signals accordingly. No crossover cables are required.
Although 10/100BaseT requires only pins 1, 2, 3, and 6, Asanté strongly recommends cables with all 8 wires connected as shown in Table 2-2 below.
1000BaseT requires that all four pairs (8 wires) be connected correctly, using Category 5 or better Unshielded Twisted Pair (UTP) cable (to a distance of 100 meters). Table 2-2 shows the correct pairing of all eight wires.
Pin Number
Pair Number & Wire Colors
1 2 White / Orange
2 2 Orange / White
3 3 White / Green
4 1 Blue / White
5 1 White / Blue
6 3 Green / White
7 4 White / Brown
8 4 Brown / White
- 20 -
Table 2-2 Pin Numbers and Wire Colors
2.6.2 Gigabit Ethernet Ports Cabling Procedures
Cabling requirements for the optional hardware modules depend on the type of module installed. Use the following guidelines to determine the particular cabling requirements of the module(s):
1000BaseSX GBIC: Cables with SC-type fiber connectors; 62.5µ multi-mode fiber (MMF) media up to 275 m (902'), or 50µ MMF media up to 550 m (1805')
1000BaseLX GBIC: Cables with SC-type fiber connectors; 10µ single-mode fiber media up to 5 km (16,405')
1000BaseLH GBIC: Cables with SC-type fiber connectors; 10µ single-mode fiber media up to 20 km (65,617')
1000BaseLX Long Haul GBIC: Cables with SC-type fiber connectors; 10µ single-mode fiber media up to 100 km
(328,100')
1000BaseLZ GBIC: Cables with SC-type fiber connectors; 10µ single-mode fiber media up to 120 km (393,701')
1000BaseT: Category 5 or better Unshielded Twisted Pair (UTP) cable up to 100 m (328.1')
When attaching a workstation to the switch, a standard straight-through CAT5 cable may be used, even when the workstation is attached via a patch panel. No crossover cable is needed with the MDX/MDI ports. It is recommended that the switch be kept off the network until proper IP settings have been set.
2.7 Setup
In order to configure the switch, connect to it through a console (out-of-band management), running a terminal emulation program, such as HyperTerminal.
2.7.1 Connecting to a Console
To connect the switch to a console or computer, set up the system in the following manner:
1. Plug power cord into the back of the switch.
2. Attach a straight-through serial cable between the RS232 console port and a COM port on the PC.
3. Set up a HyperTerminal (or equivalent terminal program) in the following manner:
a. Open the HyperTerminal program, and from its file menu, right-click on Properties.
b. Under the Connect To tab, choose the appropriate COM port (such as COM1 or COM2).
- 21 -
c. Under the Settings tab, choose VT100 for Emulation mode.
d. Select Terminal keys for Function, Arrow, and Ctrl keys. Be sure the setting is for Terminal keys, NOT
Windows keys.
e. Back under the Connect To tab, press the Configuration button.
f. Set the data rate to 9600 Baud.
g. Set data format to 8 data bits, 1 stop bit and no parity.
h. Set flow control to NONE.
Now that terminal is set up correctly, power on the switch. The boot sequence will display in the terminal.
After connecting to the console, a prompt like the following will appear:
User Access Verification Password:
By default, the initial password for access via console and telnet is Asante (case-sensitive). See the following section for setting new passwords on the terminal lines.
- 22 -
2.8 Setting Passwords
The switch ships with a default of no enable password, which allows anyone on the network access to various privilege levels. To prevent unauthorized changes to the switch’s configuration, you should set an enable password for access to switch management. Follow the example below to assign a privileged password.
Router> enable Password: <no password by default; press Enter> Router# configure terminal Router(config)# enable password ? 0 Specifies an UNENCRYPTED password will follow 7 Specifies a HIDDEN password will follow LINE The UNENCRYPTED (cleartext) 'enable' password Router(config)# enable password 0 <password> Router(config)# exit Router# write [memory file]
A separate password should be set for the primary terminal line (console) and the virtual terminal lines (telnet). The default password Asante is assigned only to the virtual terminal line Vty0. Up to three other virtual terminal lines may be created, and they each will require a separate password.
Note: It is recommended that you change the default telnet password to prevent unauthorized access to the switch.
Router(config)# line ? console Primary terminal line vty Virtual terminal Router(config)# line console ? <0-0> Line number Router(config)# line console 0 Router(config-line)# ? end End current mode and change to enable mode exec-timeout Set timeout value exit Exit current mode and down to previous mode help Description of the interactive help system no Negate a command or set its defaults password Set a password quit Exit current mode and down to previous mode Router(config-line)# password ? LINE The UNENCRYPTED (cleartext) line password 0 Specifies an UNENCRYPTED line password will follow 7 Specifies a HIDDEN line password will follow Router(config-line)# password Asante Router(config-line)# end Router# write ? file Write to configuration file memory Write configuration to the file (same as write file) terminal Write to terminal Router# write file Writing current-config to startup-config, Please wait... Configuration saved to startup-config file Router#
The password can be set at unencrypted (level 0) or encrypted (level 7).
Router(config-line)# password ? LINE The UNENCRYPTED (cleartext) line password 0 Specifies an UNENCRYPTED line password will follow
- 23 -
7 Specifies a HIDDEN line password will follow
2.9 Login Security
Two methods are available on the IntraCore 35516 to configure an authentication query process for better login security: the username command or the password and login commands.
2.9.1 The username Command
To establish a username-based authentication system, use the username command in global configuration mode. This method is more effective because authentication is determined on a user basis. The configuration is done for each line.
Router(config)# line console 0
Or
Router(config)# line vty vty-number
Router(config-line)# login user Router# username name password password
The name argument can be a host name, server name, user ID, or command name. It is restricted to only one word. Blank spaces and quotation marks are not allowed.
Optionally, an encrypted password can be used, preceded by a single-digit number that defines what type of encryption is used. Currently defined encryption types are 0 (which means that the text immediately following is not encrypted) and 7 (which means that the text is encrypted using an encryption algorithm).
2.9.2 The password and login Commands
Using the password and login commands is less effective because the password is configured for the port, not for the user. Therefore, any user who knows the password can authenticate successfully.
This method enables user name and password checking at login time. Authentication is based on the user.
Note that login user is NOT set by default. The “root” user is the only default user; the password is the same as line password.
2.10 Configuring an IP Address
The switch ships with the default IP address 192.168.0.1/24. Connect via the serial port in order to assign the switch an IP address on your network.
The physical ports (or switchports) of the IC35516 are L2 ports, and cannot have an IP address assigned to them. By default, each switchport belongs to VLAN 1, a virtual interface (veth1) that may be assigned a primary, as well as any number of secondary, IP addresses. Use the following instructions to configure an IP address to the switch. The network administrator may later assign primary IP addresses to any other VLAN created.
Follow the steps below to change the switch’s IP address.
1. Connect to the console and press Enter at the Password prompt, as described above.
2. The screen will display the user mode prompt, Router>.
- 24 -
3. Type enable. The new prompt is Router#.
4. Type configure terminal. The new prompt is Router(config)#.
5. The default IP address is assigned to the veth1 interface. Type interface veth1. The new prompt is
Router(config-if-veth1)#. Type ip address and the new address. Your screen will look like this example:
Router> enable Router# configure terminal Router(config)# interface veth1 Router(config-if-veth1)# ip address 192.168.123.254 255.255.255.0 Router(config-if-veth1)# end Router# show interface veth1 Veth1 is up, line protocol is up Hardware is virtual interface VLAN 1, address is 00:00:94:D2:56:FA Encapsulation ARPA, Flags: <UP,BROADCAST,RUNNING,MULTICAST> inet 192.168.123.254/24 broadcast 192.168.123.255 ARP Type: ARPA, ARP Timeout: 14400 seconds Router# write file Writing current-config to startup-config. Please wait. Configuration saved to startup-config file
It is also acceptable to enter the subnet mask by typing ip address 192.168.123.254/24. Use the show interface veth1 command from privileged mode to see the new IP address. The new IP address automatically writes
over the default IP address.
See Chapter 5 for more information on assigning IP addresses to interfaces.
2.10.1 Setting a Default IP Gateway Address
To define the default IP gateway for the switch, insert a static route:
Router(config)# ip route 0.0.0.0 255.255.255.255 <gateway IP> <mask>
2.11 Restoring Factory Defaults
If you ever need to restore the switch to its factory default settings, follow the commands shown in the following screen.
Router> enable Router# reload factory-default
The switch is now ready for configuration. Refer to the following chapters for management and configuration information.
2.12 System Boot Parameters
The IC35516 has two boot banks to store its runtime code. You can select which bank will be used for the next boot with the following command:
Router(config)# boot system flash {bank1|bank2}
- 25 -
Chapter 3: Understanding the Command Line Interface (CLI)
The switch utilizes Command Line Interface (CLI) to provide access to several different command modes. Each command mode provides a group of related commands.
After logging into the system, you are automatically in the user top (user EXEC) mode. From the user top mode you can enter into the privileged top (privileged EXEC) mode. From the privileged EXEC level, you can access the global configuration mode and specific configuration modes: interface, router, and route-map configuration. Entering a question mark (?) at the system prompt allows you to obtain a list of commands available for each command mode. Almost every router configuration command also has a no form. You can use the no form to disable a feature or function. For example, ARP is enabled by default. Specify the command no arp to disable the ARP table (see section
3.7).
Document Conventions
Command descriptions use the following conventions:
Vertical bars ( | ) separate alternative, mutually exclusive, elements
Square brackets ([ ]) indicate optional elements
Braces ({ }) indicate a required choice
Braces within square brackets ([{ }]) indicate a required choice within an optional element
Boldface indicates commands and keywords that are entered literally as shown
Italics indicate arguments for which you supply values
Access Each Command Mode
The following sections describe how to access each of the CLI command modes:
User Top Mode: Router>
Privileged Top Mode: Router#
Global Configuration Mode: Router(config)#
Interface Configuration Mode: Router(config-if-IFNAME)#
Router Configuration Mode: Router(config-RTNAME-router)#
Route-Map Configuration Mode: Router(config-route-map)#
3.1 User Top (User EXEC) Mode
After you log in to the router, you are automatically in user top (user EXEC) command mode. The user-level prompt consists of the host name followed by the angle bracket (>):
Router>
The default host name is Router unless it has been changed during initial configuration, using the setup command.
The user top commands available at the user level are a subset of those available at the privileged level. In general, the user top commands allow you to connect to remote devices, change terminal settings on a temporary basis, perform basic tests, and show system information.
- 26 -
To list the commands available in user top mode, enter a question mark (?). Use a space and a question mark (?) after entering a command to see all the options for that particular command.
Command Purpose
?
show ?
User top commands:
Router> ? enable Turn on privileged mode command exit Exit current mode and down to previous mode help Description of the interactive help system ping Send echo messages quit Exit current mode and down to previous mode show Show running system information tracert Trace route to destination cls Clear screen
You may also enter a question mark after a letter or string of letters to view all the commands that start with that letter (with no space between the letter and the question mark). See section 3.8.2.
Lists the user EXEC commands.
Lists all the options available for the given command.
3.2 Privileged Top (Privileged EXEC) Mode
Because many of the privileged commands set the system configuration parameters, privileged access can be password protected to prevent unauthorized use. The privileged command set includes those commands contained in user EXEC mode, as well as the configure command through which you can access the remaining command modes. Privileged EXEC mode also includes high-level testing commands, such as debug.
The following example shows how to access privileged EXEC mode. Note that the prompt changes from Router> to Router#:
Router> enable Password: <your password> Router#
Command Purpose
Router> enable [password]
Router# ?
If you have set a password, the system prompts for it before allowing access to privileged EXEC mode. If an enable password has not been set, the enable mode can be accessed only through the console. You can enter the enable password global configuration command to set the password that restricts access to privileged mode.
To return to user EXEC mode, use the disable command.
In general, the top (privileged) commands allow you to change terminal settings on a temporary basis, perform basic tests, and list system information. To list the commands available in top mode, enter a question mark (?) at the
Enters the privileged EXEC mode.
Lists privileged EXEC commands.
- 27 -
prompt, as shown in the following example. Enter a question mark (?) after a command to see all the options for that command.
Router> enable Router# ? clear Reset functions clock Manage the system clock configure Enter configuration mode copy Copy from one file to another debug Debugging functions disable Turn off privileged mode command erase Erase a filesystem exit Exit current mode and down to previous mode help Description of the interactive help system no Negate a command or set its defaults ping Send echo messages quit Exit current mode and down to previous mode reload Halt and perform a cold restart show Show running system information tracert Trace route to destination write Write running configuration to memory, network, or terminal cls Clear screen
Important! You MUST save any changes you make in running configuration to the startup configuration file if you want those changes to remain after a system reload. From the privileged level, configurations can be saved using the write command, or by using the copy running-config startup-config command.
From the privileged level, you can access global configuration mode, as described in the following section.
3.3 Global Configuration Mode
Global configuration commands apply to features that affect the system as a whole, rather than just one protocol or interface. Commands to enable a particular routing function are also global configuration commands. To enter the global configuration mode, use the configure terminal command.
The following example shows how to access and exit global configuration mode and list global configuration commands.
Command Purpose
Router# configure terminal
Router(config)# ?
To exit global configuration command mode and return to privileged EXEC mode, use one of the following commands:
From privileged EXEC mode, enters global configuration mode.
Lists the global configuration commands.
Command Purpose
exit
end
Exits global configuration mode and returns to privileged
- 28 -
Ctrl-Z
To list the commands available in global configuration mode, enter a question mark (?) at the prompt, as shown in the following example. Enter a question mark (?) after a command to see all the options for that command.
Router# configure terminal Router(config)# ? access-list Add an access list entry adp Global ADP configuration subcommands arp Set static arp entry banner Define a login banner bgp BGP information boot Modify system boot parameters define Create a definition dot1x IEEE 802.1x configuration duplicate-ip Duplicate IP Address detection Global Commands enable Modify enable password parameters end End current mode and change to enable mode exit Exit current mode and down to previous mode help Description of the interactive help system hostname Set system's network name interface Select an interface to configure ip Global IP configuration subcommands lacp Configure LACP line Configure a terminal line logging Message Logging global configuration commands mac Add a MAC access list entry mac-address-table MAC Address Table global configuration command no Negate a command or set its defaults priority-list Priority List global configuration commands priority-precedence Set priority source precedence queue-list Queue List global configuration commands quit Exit current mode and down to previous mode route-map Create route-map or enter route-map command mode router Enable a routing process service Modify use of network based services set set operations show Show running system information snmp-server Modify SNMP parameters spanning-tree Enable Spanning Tree Protocol tacacs-server Modify TACACS+ query parameters tos-list Tos List global configuration commands username To establish a username-based authentication system vlan VLAN global configuration command write Write running configuration to memory, network, or terminal
EXEC mode.
From global configuration mode, you can access three additional configuration modes: The interface, router, and
route-map commands are used to access their respective configuration modes.
3.3.1 Interface Configuration Mode
Many features are enabled on a per-interface basis. Interface configuration commands modify the operation of an interface such as an Ethernet or serial port. Interface configuration commands always follow an interface global
- 29 -
configuration command, which defines the interface type as ethernet or virtual. The virtual interfaces are bound to VLANs and can be assigned IP addresses.
In the following example, Ethernet interface eth1 is about to be configured. The new prompt, Router(config-if- eth1)#, indicates the interface configuration mode. In this example, the user asks for help by requesting a list of commands.
Router(config)# interface eth1 Router(config-if-eth1)# ? adp ADP interface subcommands custom-queue-list Assign a custom queue list to an interface description Interface specific description dot1x IEEE 802.1x configuration duplex Configure duplex operation end End current mode and change to enable mode exit Exit current mode and down to previous mode fair-queue Fair-queue interface configuration commands flow-control IEEE 802.3X Flow Control Configuration commands help Description of the interactive help system ip Interface Internet Protocol config commands lacp Configure LACP mac control access to an interface mtu Set the interface Maximum Transmission Unit (MTU) negotiation Select Autonegotiation mode no Negate a command or set its defaults priority-group Assign a priority queue list to an interface quit Exit current mode and down to previous mode show Show running system information shutdown Shutdown the selected interface spanning-tree Spanning Tree Protocol interface command speed Configure speed operation switchport Port operating in L2 mode tos-group Assign a tos list to an interface traffic-shape Generic traffic shape QoS interface configuration commands. write Write running configuration to memory, network, or terminal
To exit interface configuration mode and return to global configuration mode, enter the exit command. To exit configuration mode and return to top mode, use the end command or press Ctrl-Z.
3.3.2 Router Configuration Mode
Router configuration commands are used to configure an IP routing protocol and always follow a router command. To list the available router configuration keywords, enter the router command followed by a space and a question mark (?) at the global configuration prompt.
Router(config)# router ? ospf Open Shortest Path First rip Routing Information Protocol (RIP) Router(config)# router
In the following example, the router is configured to support the Routing Information Protocol (RIP). The new prompt is Router(config-rip-router)#.
Router(config)# router rip Router(config-rip-router)# ? default-information Control distribution of default route
- 30 -
default-metric Set a metric of redistribute routes distance Administrative distance distribute-list Filter networks in routing updates end End current mode and change to enable mode exit Exit current mode and down to previous mode help Description of the interactive help system neighbor Specify a neighbor router network Enable routing on an IP network no Negate a command or set its defaults offset-list Modify RIP metric passive-interface Suppress routing updates on an interface quit Exit current mode and down to previous mode redistribute Redistribute information from another routing protocol show Show running system information timers Adjust routing timers version Set routing protocol version write Write running configuration to memory, network, or terminal
To exit router configuration mode and return to global configuration mode, enter the exit command. To exit configuration mode and return to privileged EXEC mode, use the end command or press Ctrl-Z.
3.3.3 Route-Map Configuration Mode
Use the route-map configuration mode to configure the routing table and the source and destination information. To access and list the route-map configuration commands, use the route-map command in global configuration mode.
In the following example, a route map named mymap is configured. The new prompt is Router(config-route-map)#. Enter a question mark (?) to list route-map configuration commands.
Router(config)# route-map mymap permit 30 Router(config-route-map)# ? end End current mode and change to enable mode exit Exit current mode and down to previous mode help Description of the interactive help system match Match values from routing table no Negate a command or set its defaults on-match Exit policy on matches quit Exit current mode and down to previous mode route-map Create route-map or enter route-map command mode set Set values in destination routing protocol show Show running system information write Write running configuration to memory, network, or terminal
To exit route-map configuration mode and return to global configuration mode, enter the exit command. To exit configuration mode and return to privileged EXEC mode, use the end command or press Ctrl-Z.
3.4 Advanced Features Supported within the Command Mode
Entering a question mark (?) at the system prompt displays a list of commands available for each command mode. You can also get a list of any command's associated keywords and arguments with the context-sensitive help feature.
To get help specific to a command mode, a command, a keyword, or an argument, perform one of the following commands:
Loading...
+ 81 hidden pages