Cabletron Systems, Inc., reserves the right to make changes in specifications and other information
contained in this document without prior notice. The reader should in all cases consult Cabletron
Systems, Inc., to determine whether any such changes have been made.
The hardware, firmware, or software described in this manual is subject to change without notice.
Disclaimer
IN NO EVENT SHALL CABLETRON SYSTEMS BE LIABLE FOR ANY INCIDENTAL, INDIRECT,
SPECIAL, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING BUT NOT LIMITED
TO LOST PROFITS) ARISING OUT OF OR RELATED TO THIS MANUAL OR THE INFORMATION
CONTAINED IN IT, EVEN IF CABLETRON SYSTEMS HAS BEEN ADVISED OF, KNOWN, OR
SHOULD HAVE KNOWN, THE POSSIBILITY OF SUCH DAMAGES.
AppleTalk is a registered trademark of Apple Computer, Inc.
Cabletron Systems is a registered trademark and Cabletron, SmartSwitch, and GIGAswitch are
trademarks of Cabletron Systems, Inc.
Catalyst and EtherChannel are registered trademarks of Cisco Systems, Inc.
DEC is a registered trademark and Decnet is a trademark of Digital Equipment Corporation.
All other product names mentioned in this manual may be trademarks or registered trademarks of
their respective companies.
Page 3
Regulatory Compliance Information
This product complies with the following:
Safety
UL 1950; CSA C22.2, No. 950; 73/23/EEC; EN 60950; IEC 950
Electromagnetic
FCC Part 15; CSA C108.8; 89/336/EEC; EN 55022; EN 61000-3-2
Compatibility (EMC)
EN 61000-3-3; EN 50082-1, AS/NZS 3548; VCCI V-3
Regulatory Compliance Statements
Regulatory Compliance Information
FCC Compliance Statement
This device complies with Part 15 of the FCC rules. Operation is subject to the following two
conditions: (1) this device may not cause harmful interference, and (2) this device must accept any
interference received, including interference that may cause undesired operation.
NOTE: This equipment has been tested and found to comply with the limits for a Class A digital
device, pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable
protection against harmful interference when the equipment is operated in a commercial environment.
This equipment uses, generates, and can radiate radio frequency energy and if not installed in
accordance with the operator’s manual, may cause harmful interference to radio communications.
Operation of this equipment in a residential area is likely to cause interference in which case the user
will be required to correct the interference at his own expense.
WA R NI N G : Changes or modifications made to this device that are not expressly approved by the
party responsible for compliance could void the user’s authority to operate the equipment.
Industry Canada Compliance Statement
This digital apparatus does not exceed the Class A limits for radio noise emissions from digital
apparatus set out in the Radio Interference Regulations of the Canadian Department of
Communications.
Le présent appareil numérique n’émet pas de bruits radioélectriques dépassant les limites applicables
aux appareils numériques de la class A prescrites dans le Règlement sur le brouillage radioélectrique
édicté par le ministère des Communications du Canada.
Internet Appliance User Reference Manualiii
Page 4
Regulatory Compliance Statements
NOTICE: The Industry Canada label identifies certified equipment. This certification means that the
equipment meets telecommunications network protective, operational, and safety requirements as
prescribed in the appropriate Terminal Equipment Technical Requirements document(s). The
department does not guarantee the equipment will operate to the user’s satisfaction.
Before installing this equipment, users should ensure that it is permissible to be connected to the
facilities of the local telecommunications company. The equipment must also be installed using an
acceptable method of connection. The customer should be aware that compliance with the above
conditions may not prevent degradation of service in some situations.
Repairs to certified equipment should be coordinated by a representative designated by the supplier.
Any repairs or alterations made by the user to this equipment, or equipment malfunctions, may give
the telecommunications company cause to request the user to disconnect the equipment.
Users should ensure for their own protection that the electrical ground connections of the power
utility, telephone lines, and internal metallic water pipe system, if present, are connected together. This
precaution may be particularly important in rural areas. CAUTION: Users should not attempt to
make such connections themselves, but should contact the appropriate electric inspection authority, or
electrician, as appropriate.
NOTICE: The Ringer Equivalence Number (REN) assigned to each terminal device provides an
indication of the maximum number of terminals allowed to be connected to a telephone interface. The
termination on an interface may consist of any combination of devices subject only to the requirement
that the sum of the Ringer Equivalence Numbers of all the devices does not exceed 5.
VCCI Compliance Statement
This is a Class A product based on the standard of the Voluntary Control Council for Interference by
Information Technology Equipment (VCCI). If this equipment is used in a domestic environment,
radio disturbance may arise. When such trouble occurs, the user may be required to take corrective
actions.
ivInternet Appliance User Reference Manual
Page 5
Safety Information: Class 1 Laser Transceivers
Safety Information: Class 1 Laser Transceivers
This product may use Class 1 laser transceivers. Read the following safety information before
installing or operating this product.
The Class 1 laser transceivers use an optical feedback loop to maintain Class 1 operation limits. This
control loop eliminates the need for maintenance checks or adjustments. The output is factory set and
does not allow any user adjustment. Class 1 laser transceivers comply with the following safety
standards:
•21 CFR 1040.10 and 1040.11, U.S. Department of Health and Human Services (FDA)
•IEC Publication 825 (International Electrotechnical Commission)
•CENELEC EN 60825 (European Committee for Electrotechnical Standardization)
When operating within their performance limitations, laser transceiver output meets the Class 1
accessible emission limit of all three standards. Class 1 levels of laser radiation are not considered
hazardous.
Laser Radiation and Connectors
When the connector is in place, all laser radiation remains within the fiber. The maximum amount of
radiant power exiting the fiber (under normal conditions) is –12.6 dBm or 55 x 10
Removing the optical connector from the transceiver allows laser radiation to emit directly from the
optical port. The maximum radiance from the optical port (under worst case conditions) is 0.8 W cm
or 8 x 10
Do not use optical instruments to view the laser output. The use of optical instruments to view
laser output increases eye hazard. When viewing the output optical port, power must be removed
from the network adapter.
3
W m2 sr–1.
-6
watts.
-2
Internet Appliance User Reference Manualv
Page 6
Cabletron Systems, Inc. Program License Agreement
Cabletron Systems, Inc.
Program License Agreement
IMPORTANT: THIS LICENSE APPLIES FOR USE OF PRODUCT IN THE FOLLOWING
GEOGRAPHICAL REGIONS:
CANADA
MEXICO
CENTRAL AMERICA
SOUTH AMERICA
BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT, CAREFULLY READ THIS
LICENSE AGREEMENT.
This document is an agreement (“Agreement”) between You, the end user, and Cabletron Systems, Inc.
(“Cabletron”) that sets forth your rights and obligations with respect to the Cabletron software
program (“Program”) in the package. The Program may be contained in firmware, chips or other
media. UTILIZING THE ENCLOSED PRODUCT, YOU ARE AGREEING TO BECOME BOUND BY
THE TERMS OF THIS AGREEMENT, WHICH INCLUDES THE LICENSE AND THE LIMITATION
OF WARRANTY AND DISCLAIMER OF LIABILITY. IF YOU DO NOT AGREE TO THE TERMS OF
THIS AGREEMENT, RETURN THE UNOPENED PRODUCT TO CABLETRON OR YOUR DEALER,
IF ANY, WITHIN TEN (10) DAYS FOLLOWING THE DATE OF RECEIPT FOR A FULL REFUND.
IF YOU HAVE ANY QUESTIONS ABOUT THIS AGREEMENT, CONTACT CABLETRON SYSTEMS
(603) 332-9400. Attn: Legal Department.
1.LICENSE. You have the right to use only the one (1) copy of the Program provided in this
package subject to the terms and conditions of this License Agreement.
You may not copy, reproduce or transmit any part of the Program except as permitted by the
Copyright Act of the United States or as authorized in writing by Cabletron.
2.OTHER RESTRICTIONS. You may not reverse engineer, decompile, or disassemble the
Program.
3.APPLICABLE LAW. This License Agreement shall be interpreted and governed under the laws
and in the state and federal courts of New Hampshire. You accept the personal jurisdiction and
venue of the New Hampshire courts.
4.EXPORT REQUIREMENTS. You understand that Cabletron and its Affiliates are subject to
regulation by agencies of the U.S. Government, including the U.S. Department of Commerce,
which prohibit export or diversion of certain technical products to certain countries, unless a
license to export the product is obtained from the U.S. Government or an exception from obtaining
such license may be relied upon by the exporting party.
If the Program is exported from the United States pursuant to the License Exception CIV under the
U.S. Export Administration Regulations, You agree that You are a civil end user of the Program and
agree that You will use the Program for civil end uses only and not for military purposes.
If the Program is exported from the United States pursuant to the License Exception TSR under the
U.S. Export Administration Regulations, in addition to the restriction on transfer set forth in
viInternet Appliance User Reference Manual
Page 7
Cabletron Systems, Inc. Program License Agreement
Sections 1 or 2 of this Agreement, You agree not to (i) reexport or release the Program, the source
code for the Program or technology to a national of a country in Country Groups D:1 or E:2
(Albania, Armenia, Azerbaijan, Belarus, Bulgaria, Cambodia, Cuba, Estonia, Georgia, Iraq,
Kazakhstan, Kyrgyzstan, Laos, Latvia, Libya, Lithuania, Moldova, North Korea, the People’s
Republic of China, Romania, Russia, Rwanda, Tajikistan, Turkmenistan, Ukraine, Uzbekistan,
Vietnam, or such other countries as may be designated by the United States Government), (ii)
export to Country Groups D:1 or E:2 (as defined herein) the direct product of the Program or the
technology, if such foreign produced direct product is subject to national security controls as
identified on the U.S. Commerce Control List, or (iii) if the direct product of the technology is a
complete plant o r any major component of a plant, export to Country Groups D:1 or E:2 the direct
product of the plant or a major component thereof, if such foreign produced direct product is
subject to national security controls as identified on the U.S. Commerce Control List or is subject to
State Department controls under the U.S. Munitions List.
5.UNITED STATES GOVERNMENT RESTRICTED RIGHTS. The enclosed Product (i) was
developed solely at private expense; (ii) contains “restricted computer software” submitted with
restricted rights in accordance with section 52.227-19 (a) through (d) of the Commercial Computer
Software-Restricted Rights Clause and its successors, and (iii) in all respects is proprietary data
belonging to Cabletron and/or its suppliers. For Department of Defense units, the Product is
considered commercial computer software in accordance with DFARS section 227.7202-3 and its
successors, and use, duplication, or disclosure by the Government is subject to restrictions set
forth herein.
6.EXCLUSION OF WARRANTY. Except as may be specifically provided by Cabletron in writing,
Cabletron makes no warranty, expressed or implied, concerning the Program (including its
documentation and media).
CABLETRON DISCLAIMS ALL WARRANTIES, OTHER THAN THOSE SUPPLIED TO YOU BY
CABLETRON IN WRITING, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED
TO IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE, WITH RESPECT TO THE PROGRAM, THE ACCOMPANYING WRITTEN
MATERIALS, AND ANY ACCOMPANYING HARDWARE.
7.NO LIABILITY FOR CONSEQUENTIAL DAMAGES. IN NO EVENT SHALL CABLETRON OR
ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT
LIMITATION, DAMAGES FOR LOSS OF BUSINESS, PROFITS, BUSINESS INTERRUPTION,
LOSS OF BUSINESS INFORMATION, SPECIAL, INCIDENTAL, CONSEQUENTIAL, OR
RELIANCE DAMAGES, OR OTHER LOSS) ARISING OUT OF THE USE OR INABILITY TO USE
THIS CABLETRON PRODUCT, EVEN IF CABLETRON HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. BECAUSE SOME STATES DO NOT ALLOW THE
EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL
DAMAGES, OR IN THE DURATION OR LIMITATION OF IMPLIED WARRANTIES IN SOME
INSTANCES, THE ABOVE LIMITATION AND EXCLUSIONS MAY NOT APPLY TO YOU.
Internet Appliance User Reference Manualvii
Page 8
Cabletron Systems Sales and Service, Inc. Program License Agreement
Cabletron Systems Sales and Service, Inc.
Program License Agreement
IMPORTANT: THIS LICENSE APPLIES FOR USE OF PRODUCT IN THE UNITED STATES OF
AMERICA AND BY UNITED STATES OF AMERICA GOVERNMENT END USERS.
BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT, CAREFULLY READ THIS
LICENSE AGREEMENT.
This document is an agreement (“Agreement”) between You, the end user, and Cabletron Systems
Sales and Service, Inc. (“Cabletron”) that sets forth your rights and obligations with respect to the
Cabletron software program (“Program”) in the package. The Program may be contained in firmware,
chips or other media. UTILIZING THE ENCLOSED PRODUCT, YOU ARE AGREEING TO BECOME
BOUND BY THE TERMS OF THIS AGREEMENT, WHICH INCLUDES THE LICENSE AND THE
LIMITATION OF WARRANTY AND DISCLAIMER OF LIABILITY. IF YOU DO NOT AGREE TO THE
TERMS OF THIS AGREEMENT, RETURN THE UNOPENED PRODUCT TO CABLETRON OR YOUR
DEALER, IF ANY, WITHIN TEN (10) DAYS FOLLOWING THE DATE OF RECEIPT FOR A FULL
REFUND.
IF YOU HAVE ANY QUESTIONS ABOUT THIS AGREEMENT, CONTACT CABLETRON SYSTEMS
(603) 332-9400. Attn: Legal Department.
1.LICENSE. You have the right to use only the one (1) copy of the Program provided in this
package subject to the terms and conditions of this License Agreement.
You may not copy, reproduce or transmit any part of the Program except as permitted by the
Copyright Act of the United States or as authorized in writing by Cabletron.
2.OTHER RESTRICTIONS. You may not reverse engineer, decompile, or disassemble the
Program.
3.APPLICABLE LAW. This License Agreement shall be interpreted and governed under the laws
and in the state and federal courts of New Hampshire. You accept the personal jurisdiction and
venue of the New Hampshire courts.
4.EXPORT REQUIREMENTS. You understand that Cabletron and its Affiliates are subject to
regulation by agencies of the U.S. Government, including the U.S. Department of Commerce,
which prohibit export or diversion of certain technical products to certain countries, unless a
license to export the product is obtained from the U.S. Government or an exception from obtaining
such license may be relied upon by the exporting party.
If the Program is exported from the United States pursuant to the License Exception CIV under the
U.S. Export Administration Regulations, You agree that You are a civil end user of the Program and
agree that You will use the Program for civil end uses only and not for military purposes.
If the Program is exported from the United States pursuant to the License Exception TSR under the
U.S. Export Administration Regulations, in addition to the restriction on transfer set forth in
Sections 1 or 2 of this Agreement, You agree not to (i) reexport or release the Program, the source
code for the Program or technology to a national of a country in Country Groups D:1 or E:2
(Albania, Armenia, Azerbaijan, Belarus, Bulgaria, Cambodia, Cuba, Estonia, Georgia, Iraq,
Kazakhstan, Kyrgyzstan, Laos, Latvia, Libya, Lithuania, Moldova, North Korea, the People’s
viiiInternet Appliance User Reference Manual
Page 9
Cabletron Systems Sales and Service, Inc. Program License Agreement
Republic of China, Romania, Russia, Rwanda, Tajikistan, Turkmenistan, Ukraine, Uzbekistan,
Vietnam, or such other countries as may be designated by the United States Government), (ii)
export to Country Groups D:1 or E:2 (as defined herein) the direct product of the Program or the
technology, if such foreign produced direct product is subject to national security controls as
identified on the U.S. Commerce Control List, or (iii) if the direct product of the technology is a
complete plant o r any major component of a plant, export to Country Groups D:1 or E:2 the direct
product of the plant or a major component thereof, if such foreign produced direct product is
subject to national security controls as identified on the U.S. Commerce Control List or is subject to
State Department controls under the U.S. Munitions List.
5.UNITED STATES GOVERNMENT RESTRICTED RIGHTS. The enclosed Product (i) was
developed solely at private expense; (ii) contains “restricted computer software” submitted with
restricted rights in accordance with section 52.227-19 (a) through (d) of the Commercial Computer
Software-Restricted Rights Clause and its successors, and (iii) in all respects is proprietary data
belonging to Cabletron and/or its suppliers. For Department of Defense units, the Product is
considered commercial computer software in accordance with DFARS section 227.7202-3 and its
successors, and use, duplication, or disclosure by the Government is subject to restrictions set
forth herein.
6.EXCLUSION OF WARRANTY. Except as may be specifically provided by Cabletron in writing,
Cabletron makes no warranty, expressed or implied, concerning the Program (including its
documentation and media).
CABLETRON DISCLAIMS ALL WARRANTIES, OTHER THAN THOSE SUPPLIED TO YOU BY
CABLETRON IN WRITING, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED
TO IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE, WITH RESPECT TO THE PROGRAM, THE ACCOMPANYING WRITTEN
MATERIALS, AND ANY ACCOMPANYING HARDWARE.
7.NO LIABILITY FOR CONSEQUENTIAL DAMAGES. IN NO EVENT SHALL CABLETRON
OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING,
WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS, PROFITS, BUSINESS
INTERRUPTION, LOSS OF BUSINESS INFORMATION, SPECIAL, INCIDENTAL,
CONSEQUENTIAL, OR RELIANCE DAMAGES, OR OTHER LOSS) ARISING OUT OF THE USE
OR INABILITY TO USE THIS CABLETRON PRODUCT, EVEN IF CABLETRON HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. BECAUSE SOME STATES DO NOT
ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR
INCIDENTAL DAMAGES, OR IN THE DURATION OR LIMITATION OF IMPLIED
WARRANTIES IN SOME INSTANCES, THE ABOVE LIMITATION AND EXCLUSIONS MAY
NOT APPLY TO YOU.
Internet Appliance User Reference Manualix
Page 10
Cabletron Systems Limited Program License Agreement
Cabletron Systems Limited
Program License Agreement
IMPORTANT: THIS LICENSE APPLIES FOR THE USE OF THE PRODUCT IN THE FOLLOWING
GEOGRAPHICAL REGIONS:
EUROPE
MIDDLE EAST
AFRICA
ASIA
AUSTRALIA
PACIFIC RIM
BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT, CAREFULLY READ THIS
LICENSE AGREEMENT.
This document is an agreement (“Agreement”) between You, the end user, and Cabletron Systems
Limited (“Cabletron”) that sets forth your rights and obligations with respect to the Cabletron
software program (“Program”) in the package. The Program may be contained in firmware, chips or
other media. UTILIZING THE ENCLOSED PRODUCT, YOU ARE AGREEING TO BECOME BOUND
BY THE TERMS OF THIS AGREEMENT, WHICH INCLUDES THE LICENSE AND THE
LIMITATION OF WARRANTY AND DISCLAIMER OF LIABILITY. IF YOU DO NOT AGREE TO THE
TERMS OF THIS AGREEMENT, RETURN THE UNOPENED PRODUCT TO CABLETRON OR YOUR
DEALER, IF ANY, WITHIN TEN (10) DAYS FOLLOWING THE DATE OF RECEIPT FOR A FULL
REFUND.
IF YOU HAVE ANY QUESTIONS ABOUT THIS AGREEMENT, CONTACT CABLETRON SYSTEMS
(603) 332-9400. Attn: Legal Department.
1.LICENSE. You have the right to use only the one (1) copy of the Program provided in this
package subject to the terms and conditions of this License Agreement.
You may not copy, reproduce or transmit any part of the Program except as permitted by the
Copyright Act of the United States or as authorized in writing by Cabletron.
2.OTHER RESTRICTIONS. You may not reverse engineer, decompile, or disassemble the
Program.
3.APPLICABLE LAW. This License Agreement shall be governed in accordance with English law.
The English courts shall have exclusive jurisdiction in the event of any disputes.
4.EXPORT REQUIREMENTS. You understand that Cabletron and its Affiliates are subject to
regulation by agencies of the U.S. Government, including the U.S. Department of Commerce,
which prohibit export or diversion of certain technical products to certain countries, unless a
license to export the product is obtained from the U.S. Government or an exception from obtaining
such license may be relied upon by the exporting party.
If the Program is exported from the United States pursuant to the License Exception CIV under the
U.S. Export Administration Regulations, You agree that You are a civil end user of the Program and
agree that You will use the Program for civil end uses only and not for military purposes.
xInternet Appliance User Reference Manual
Page 11
Cabletron Systems Limited Program License Agreement
If the Program is exported from the United States pursuant to the License Exception TSR under the
U.S. Export Administration Regulations, in addition to the restriction on transfer set forth in
Sections 1 or 2 of this Agreement, You agree not to (i) reexport or release the Program, the source
code for the Program or technology to a national of a country in Country Groups D:1 or E:2
(Albania, Armenia, Azerbaijan, Belarus, Bulgaria, Cambodia, Cuba, Estonia, Georgia, Iraq,
Kazakhstan, Kyrgyzstan, Laos, Latvia, Libya, Lithuania, Moldova, North Korea, the People’s
Republic of China, Romania, Russia, Rwanda, Tajikistan, Turkmenistan, Ukraine, Uzbekistan,
Vietnam, or such other countries as may be designated by the United States Government), (ii)
export to Country Groups D:1 or E:2 (as defined herein) the direct product of the Program or the
technology, if such foreign produced direct product is subject to national security controls as
identified on the U.S. Commerce Control List, or (iii) if the direct product of the technology is a
complete plant o r any major component of a plant, export to Country Groups D:1 or E:2 the direct
product of the plant or a major component thereof, if such foreign produced direct product is
subject to national security controls as identified on the U.S. Commerce Control List or is subject to
State Department controls under the U.S. Munitions List.
5.UNITED STATES GOVERNMENT RESTRICTED RIGHTS. The enclosed Product (i) was
developed solely at private expense; (ii) contains “restricted computer software” submitted with
restricted rights in accordance with section 52.227-19 (a) through (d) of the Commercial Computer
Software-Restricted Rights Clause and its successors, and (iii) in all respects is proprietary data
belonging to Cabletron and/or its suppliers. For Department of Defense units, the Product is
considered commercial computer software in accordance with DFARS section 227.7202-3 and its
successors, and use, duplication, or disclosure by the Government is subject to restrictions set
forth herein.
6.EXCLUSION OF WARRANTY. Except as may be specifically provided by Cabletron in writing,
Cabletron makes no warranty, expressed or implied, concerning the Program (including its
documentation and media).
CABLETRON DISCLAIMS ALL WARRANTIES, OTHER THAN THOSE SUPPLIED TO YOU BY
CABLETRON IN WRITING, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED
TO IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE, WITH RESPECT TO THE PROGRAM, THE ACCOMPANYING WRITTEN
MATERIALS, AND ANY ACCOMPANYING HARDWARE.
7.NO LIABILITY FOR CONSEQUENTIAL DAMAGES. IN NO EVENT SHALL CABLETRON OR
ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT
LIMITATION, DAMAGES FOR LOSS OF BUSINESS, PROFITS, BUSINESS INTERRUPTION,
LOSS OF BUSINESS INFORMATION, SPECIAL, INCIDENTAL, CONSEQUENTIAL, OR
RELIANCE DAMAGES, OR OTHER LOSS) ARISING OUT OF THE USE OR INABILITY TO USE
THIS CABLETRON PRODUCT, EVEN IF CABLETRON HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. BECAUSE SOME STATES DO NOT ALLOW THE
EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL
DAMAGES, OR IN THE DURATION OR LIMITATION OF IMPLIED WARRANTIES IN SOME
INSTANCES, THE ABOVE LIMITATION AND EXCLUSIONS MAY NOT APPLY TO YOU.
Internet Appliance User Reference Manualxi
Page 12
Declaration of Conformity Addendum
Declaration of Conformity
Addendum
Application of Council Directive(s)89/336/EEC
73/23/EEC
Manufacturer’s NameCabletron Systems, Inc.
Manufacturer’s Address35 Industrial Way
PO Box 5005
Rochester, NH 03867
European Representative’s NameMr. J. Solari
European Representative’s AddressCabletron Systems Limited
Nexus House, Newbury
Business Park
London Road, Newbury
Berkshire RG13 2PZ, England
Conformance to Directive(s)/Product
Standards
Equipment Type/EnvironmentNetworking equipment for use in a commercial
We the undersigned, hereby declare, under our sole responsibility, that the equipment packaged
with this notice conforms to the above directives.
ManufacturerLegal Representative in Europe
Mr. Ronald Fotino
Full Name
Principal Compliance Engineer
Title
Rochester, NH, USA
Location
EC Directive 89/336/EEC
EC Directive 73/23/EEC
EN 55022
EN 50082-1
EN 60950
Allocating Memory to RMON............................................................................................261
Internet Appliance User Reference Manualxxi
Page 22
Page 23
About This Manual
Preface
This manual provides detailed information and procedures for configuring the software
for the Cabletron
instructions in the Internet Appliance 1100/1200 Getting Started Guide to install the chassis
and perform basic setup tasks. Then return to this manual for more detailed configuration
information.
™
Internet Appliance (IA). If you have not yet installed the IA, follow the
Who Should Read This Manual?
Read this manual if you are a network administrator responsible for configuring and
monitoring the IA.
Related Documentation
The Internet Appliance documentation set includes the following items. Refer to these
documents to learn more about the IA.
For information about…Refer to…
Installing and setting up the IAInternet Appliance 1100/1200 Getting Started
Guide
The complete syntax for all command
line interface commands
System messagesInternet Appliance Error Reference
Internet Appliance User Reference Manualxxiii
Internet Appliance Command Line Interface
Reference
Page 24
Page 25
Introduction
This chapter provides information that you need to know before configuring the Internet
Appliance (IA) software. If you have not yet installed the IA, follow the instructions in the
Internet Appliance 1100/1200 Getting Started Guide to install the chassis and perform basic
setup tasks. Then return to this manual for more detailed configuration information.
Reviewing Configuration Files
The Internet Appliance 1100/1200 Getting Started Guide introduced the following
configuration files used by the IA:
•Startup – The configuration file that the IA uses to configure itself when the system is
powered on. The Startup configuration remains even when the system is rebooted.
Chapter 1
•Active – The commands from the Startup configuration file and any configuration
commands that you have made active from the scratchpad. The active configuration
remains in effect until you power down or reboot the system.
•Scratchpad – The configuration commands you have entered during a CLI session.
These commands are temporary and do not become active until you explicitly make
them part of the active configuration.
Note:
Entering commands and saving configuration files are discussed in more detail in the
following section.
Internet Appliance User Reference Manual25
Because some commands depend on other commands for successful execution,
the IA scratchpad simplifies system configuration by allowing you to enter
configuration commands in any order, even when dependencies exist. When you
activate the commands in the scratchpad, the IA sorts out the dependencies and
executes the command in the proper sequence.
Page 26
Chapter 1: Introduction
Using the Command Line Interface
The CLI allows you to enter and execute commands from the IA Console or from Telnet
sessions. Up to four simultaneous Telnet sessions are allowed. CLI commands are
grouped by subsystems. For example, the set of commands that let you configure and
display IP routing table information all start with ip. Within the set of ip commands are
commands such as set, show, start, stop, configure, etc. The complete set of commands
for each subsystem is described in the Internet Appliance Command Line Interface Reference Manual.
Command Modes
The CLI provides access to four different command modes. Each command mode
provides a group of related commands. This section describes how to access and list the
commands available in each command mode and explains the primary uses for each
command mode.
User Mode
After you log in to the IA, you are automatically in User mode. The User commands
available are a subset of those available in Enable mode. In general, the User commands
allow you to display basic information and use basic utilities such as ping.
The User mode command prompt consists of the ia name followed by the angle bracket
(>), as shown below:
ia>
The default name is ia unless it has been changed during initial configuration. Refer to the
Internet Appliance 1100/1200 Getting Started Guide for the procedures for changing the
system name.
26Internet Appliance User Reference Manual
Page 27
Enable Mode
Enable mode provides more facilities than User mode. You can display critical features
within Enable mode including router configuration, access control lists, and SNMP
statistics. To enter Enable mode from the User mode, enter the command enable (or en),
and then supply the password when prompted.
The Enable mode command prompt consists of the ia name followed by the pound
sign (#):
ia#
To exit Enable mode and return to User mode, either type exit and press Return or press
Ctrl+Z.
Configure Mode
Configure mode provides the capabilities to configure all features and functions on the IA.
These include router configuration, access control lists, and spanning tree. To enter
Configure mode, enter the command config from Enable mode.
Chapter 1: Introduction
Note:As mentioned previously, up to four Telnet sessions can be run simultaneously on
The Configure mode command prompt consists of the ia name followed by (config) and a
pound sign (#):
ia(config)#
To exit Configure mode and return to Enable mode, either type exit and press Return or
press Ctrl+Z.
Boot PROM Mode
If your IA does not find a valid system image on the external PCMCIA flash, the system
might enter programmable read-only memory (PROM) mode. You should then reboot the
IA (enter the command reboot at the boot PROM prompt) to restart the system. If the
system fails to reboot successfully, call Cabletron Systems, Inc., Technical Support to
resolve the problem.
For information on how to upgrade the boot PROM software and boot using the
upgraded image, see the Internet Appliance 1100/1200 Getting Started Guide.
the IA. All four sessions can be in Configure mode at the same time, so you
should consider limiting access to the IA to authorized users.
Internet Appliance User Reference Manual27
Page 28
Chapter 1: Introduction
Getting Help with CLI Commands
Interactive help is available from the CLI by entering the question mark (?) character at
any time. The help is context-sensitive; the help provided is based on where in the
command you are. For example, if you are at the User mode prompt, enter a question
mark (?), as shown in the following example, to list the commands available in User
mode:
ia> ?
aging - Show L2 and L3 Aging information
cli - Modify the command line interface behavior
enable - Enable privileged user mode
exit - Exit current mode
file - File manipulation commands
help - Describe online help facility
ip-redundancy - Show IP Redundancy information (VRRP)
l2-tables - Show L2 Tables information
logout - Log off the system
multicast - Configure Multicast related parameters
ping - Ping utility
pvst - Show Per Vlan Spanning Tree Protocol (PVST)
parameters
statistics - Show or clear IA statistics
stp - Show STP status
telnet - Telnet utility
traceroute - Traceroute utility
vlan - Show VLAN-related parameters
You can also type the ? character following a command to see a description of the
parameters or options that you can enter. Once the help information is displayed, the
command line is redisplayed as before but without the ? character. The following is an
example of invoking help while entering a command:
ia(config)# load-balance create ?
group-name - Name of this Load Balanced group of servers
vip-range-name - Name of this Virtual IP range
ia(config)# load-balance create
If you enter enough characters of a command keyword to uniquely identify it and press
the space bar, the CLI attempts to complete the command. If you do not enter enough
characters or you enter the wrong characters, the CLI cannot complete the command. For
example, if you enter the following in Enable mode and press the spacebar as indicated:
ia# system show e[space]
the CLI completes the command as follows:
ia# system show environmental
28Internet Appliance User Reference Manual
Page 29
Chapter 1: Introduction
If you are entering several commands for the same subsystem, you can enter the
subsystem name from the CLI. Then, execute individual commands for the subsystem
without typing the subsystem name each time. For example, if you are configuring several
entries for the IP routing table, you can simply enter ip at the CLI Configure prompt. The
prompt changes to indicate that the context for the commands to be entered has changed
to that of the IP subsystem. If you type a ?, only those commands that are valid for the IP
subsystem are displayed. The following is an example:
ia(config)# ip
ia(config)(ip)# ?
add - Add a static route
dos - Configure specific denial of service features
disable - Disable certain IP function
enable - Enable certain IP function
helper-address - Specify IP helper address for an interface
l3-hash - Change IP hash variant for channel
set - Set ip stack properties
Ctrl-z - Exits to previous level
top - Exits to the top level
ia(config)(ip)# [Ctrl-Z]
ia(config)#
Line Editing Commands
The IA provides line editing capabilities that are similar to Emacs, a UNIX text editor. For
example, you can use certain line editing keystrokes to move forwards or backwards on a
line, delete or transpose characters, and delete portions of a line. To use the line editing
commands, you need to have a VT-100 terminal or terminal emulator. The line editing
commands that you can use with CLI are detailed in the following table:
CommandResulting Action
Ctrl-a
Ctrl-b
Ctrl-c
Ctrl-d
Ctrl-e
Ctrl-f
Ctrl-g
Ctrl-h
Ctrl-i
Move to beginning of line
Move back one character
Abort current line
Delete character under cursor
Move to end of line
Move forward one character
Abort current line
Delete character just prior to the cursor
Insert one space (tab substitution)
Ctrl-j
Internet Appliance User Reference Manual29
Carriage return (executes command)
Page 30
Chapter 1: Introduction
CommandResulting Action
Ctrl-k
Ctrl-l
Ctrl-m
Ctrl-n
Ctrl-o
Ctrl-p
Ctrl-q
Ctrl-r
Ctrl-s
Ctrl-t
Ctrl-u
Ctrl-v
Ctrl-w
Ctrl-x
Kill line from cursor to end of line
Refresh current line
Carriage return (executes command)
Next command from history buffer
None
Previous command from history buffer
None
Refresh current line
None
Transpose character under cursor with the character just prior
to the cursor
Delete line from the beginning of line to cursor
None
None
Move forward one word
Ctrl-y
Ctrl-z
ESC-b
ESC-d
ESC-f
ESCBackSpace
SPACE
!*
Paste back what was deleted by the previous Ctrl-k or Ctrl-w
command. Text is pasted back at the cursor location.
If inside a subsystem, it exits back to the top level. If in Enable
mode, it exits back to User mode. If in Configure mode, it exits
back to Enable mode.
Move backward one word
Kill word from cursor’s current location until the first white
space
Move forward one word
Delete backwards from cursor to the previous space (essentially
a delete-word-backward command)
Attempts to complete command keyword. If word is not
expected to be a keyword, the space character is inserted.
Show all commands currently stored in the history buffer.
30Internet Appliance User Reference Manual
Page 31
CommandResulting Action
Chapter 1: Introduction
!#
“<string>”
Recall a specific history command. # is the number of the
history command to be recalled as shown via the !* command.
Opaque strings may be specified using double quotes. This
prevents interpretation of otherwise special CLI characters.
Displaying and Changing Configuration Information
The IA provides many commands for displaying and changing configuration information.
For example, the CLI allows for the disabling of a command in the active configuration.
Use the negate command on a specific line of the active configuration to disable a feature
or function that has been enabled. For example, Spanning Tree Protocol is disabled by
default. If, after enabling the Spanning Tree Protocol on the IA, you want to disable STP,
you must specify the negate command with the line number in the active configuration
that contains the stpenable command.
The following table shows some useful commands for configuring the IA:
TaskCommand
Enable Mode:
Show active configuration of the system.system show active-config
Show the non-activated configuration changes in
the scratchpad.
Show the startup configuration for the next reboot.system show startup-config
Copy between scratchpad, active configuration,
startup configuration, TFTP server, RCP server, or
URL.
Configure Mode:
Show the running system configuration and the
non-activated changes in the scratchpad.
Compare activated commands with the startup
configuration file.
Erase commands in the scratchpad.erase scratchpad
Erase the startup configuration.erase startup
Negate one or more commands by line number.negate <line number>
Negate commands that match a specified command
string.
system show scratchpad
copy <source> to <destination>
show
diff <filename> | startup
no <string>
Internet Appliance User Reference Manual31
Page 32
Chapter 1: Introduction
TaskCommand
Save scratchpad to the active configuration.save active
Save the active configuration to startup.save startup
The following figure illustrates the configuration files and the commands you can use to
save your configuration:
StartupActiveScratchpad
temporary
location;
contents lost
at reboot
(config)# save active(config)# save startup
Figure 1. Commands to Save Configurations
in effect
until reboot
remains
through
reboot
32Internet Appliance User Reference Manual
Page 33
Chapter 1: Introduction
Identifying Ports on the IA-1100 and IA-1200
The term port refers to a physical connector installed in the IA-1100 and IA-1200. Each port
in the IA is referred to by the type of connector (Ethernet or Gigabit Ethernet) and its
location.
Figure 2 shows the names of the ports on the IA-1100; et stands for Ethernet, and gi stands
for Gigabit Ethernet.
et .3 .1–e t.3.8g i.4 .1gi.4.2
10/100BASE-TX
3
10/100BASE-TX10/100BASE-TX
1
87654321
8765432187654321
10/100 MGMT
RST
SYS
ERRDIAG
CONSOLE
OK
HBT
TxRxLink
TxRxLink
AN
AN
1000BASE-SX
21
4
2
et .1 .1–e t.1.8et .2 .1–e t.2.8
Figure 2. Port Names on the IA-1100
Figure 3 shows the names of the ports on the IA-1200; et stands for Ethernet, and gi stands
for Gigabit Ethernet.
gi.3.1 gi.3.2gi.4.1gi.4.2
TxRxLink
3
AN
TxRxLink
1
AN
TxRxLink
TxRxLink
21
AN
21
AN
10/100 MGMT
CONSOLE
OK
ERR DIAG
TxRxLink
AN
TxRxLink
HBT
RST
SYS
AN
TxRxLink
TxRxLink
21
AN
AN
4
21
2
gi.1.1gi.1.2gi.2.1gi.2.2
Figure 3. Port Names on the IA-1200
There are a few shortcut notations you can use to refer to a range of port numbers. For
example:
•et.(1-3).(1-8) refers to the following ports: et.1.1 through et.1.8, et.2.1 through et.2.8, and
et.3.1 through et.3.8.
•et.(1,3).(1-8) refers to the following ports: et.1.1 through et.1.8, and et.3.1 through et.3.8.
•et.(1-3).(1,8) refers to the following ports: et.1.1, et.1.8, et.2.1, et.2.8, et.3.1, et.3.8.
Internet Appliance User Reference Manual33
Page 34
Page 35
Bridging Overview
The Internet Appliance (IA) provides the following bridging functions:
•Compliance with the IEEE 802.1d standard
Chapter 2
Bridging
Configuration
Guide
•Wire-speed address-based bridging or flow-based bridging
•Ability to logically segment a transparently bridged network into virtual local-area
networks (VLANs) based on physical ports or protocol (IP or bridged protocols such
as AppleTalk
•Integrated routing and bridging that supports bridging of intra-VLAN traffic and
routing of inter-VLAN traffic
Spanning Tree (IEEE 802.1d)
Spanning tree (IEEE 802.1d) allows bridges to dynamically discover a subset of the
topology that is loop free. In addition, the loop-free tree that is discovered contains paths
to every LAN segment.
Internet Appliance User Reference Manual35
®
)
Page 36
Chapter 2: Bridging Configuration Guide
Bridging Modes (Flow-Based and Address-Based)
The IA provides the following types of wire-speed bridging:
Address-based bridging - The IA performs this type of bridging by looking up the
destination address in a Layer-2 lookup table on the line card that receives the bridge
packet from the network. The Layer-2 lookup table indicates the exit port(s) for the
bridged packet. If the packet is addressed to the IA's own MAC address, the packet is
routed rather than bridged.
Flow-based bridging - The IA performs this type of bridging by looking up an entry in
the Layer-2 lookup table containing both the source and destination addresses of the
received packet in order to determine how the packet is to be handled.
The IA ports perform address-based bridging by default, but can be configured to
perform flow-based bridging instead, on a per-port basis. A port cannot be configured to
perform both types of bridging at the same time.
The IA performance is equivalent when performing flow-based bridging or address-based
bridging. However, address-based bridging is more efficient because it requires fewer
table entries while flow-based bridging provides tighter management and control over
bridged traffic.
VLAN Overview
Virtual LANs (VLANs) are a means of dividing a physical network into several logical
(virtual) LANs. The division can be done on the basis of various criteria, giving rise to
different types of VLANs. For example, the simplest type of VLAN is the port-based
VLAN. Port-based VLANs divide a network into a number of VLANs by assigning a
VLAN to each port of a switching device. Then, any traffic received on a given port of a
switch belongs to the VLAN associated with that port.
VLANs are primarily used for broadcast containment. A Layer-2 broadcast frame is
normally transmitted all over a bridged network. By dividing the network into VLANs,
the range of a broadcast is limited, that is, the broadcast frame is transmitted only to the
VLAN to which it belongs. This reduces the broadcast traffic on a network by an
appreciable factor.
36Internet Appliance User Reference Manual
Page 37
The type of VLAN depends upon one criterion: how a received frame is classified as
belonging to a particular VLAN. VLANs can be categorized into the following types:
•Port-based
•MAC address-based
•Protocol-based
•Subnet-based
•Policy-based
Detailed information about these types of VLANs is beyond the scope of this manual.
Each type of VLAN is briefly explained in the following subsections.
Port-Based VLANs
Ports of Layer-2 devices (switches, bridges) are assigned to VLANs. Any traffic received
by a port is classified as belonging to the VLAN to which the port belongs. For example, if
ports 1, 2, and 3 belong to the VLAN named Marketing, then a broadcast frame received by
port 1 is transmitted on ports 2 and 3. It is not transmitted on any other port.
Chapter 2: Bridging Configuration Guide
MAC Address-Based VLANs
In this type of VLAN, each switch (or a central VLAN information server) keeps track of
all MAC addresses in a network and maps them to VLANs based on information
configured by the network administrator. When a frame is received at a port, its
destination MAC address is looked up in the VLAN database. The VLAN database
returns the name of the VLAN to which this frame belongs.
This type of VLAN is powerful in the sense that network devices such as printers and
workstations can be moved anywhere in the network without the need for network
reconfiguration. However, the administration is intensive because all MAC addresses on
the network need to be known and configured.
Protocol-Based VLANs
Protocol-based VLANs divide the physical network into logical VLANs based on
protocol. When a frame is received at a port, its VLAN is determined by the protocol of
the packet. For example, there could be separate VLANs for IP and AppleTalk. An IP
broadcast frame will only be sent to all ports in the IP VLAN.
Internet Appliance User Reference Manual37
Page 38
Chapter 2: Bridging Configuration Guide
Subnet-Based VLANs
Subnet-based VLANs are a subset of protocol-based VLANs and determine the VLAN of
a frame based on the subnet to which the frame belongs. To do this, the switch must look
into the network layer header of the incoming frame. This type of VLAN behaves
similarly to a router by segregating different subnets into different broadcast domains.
Policy-Based VLANs
Policy-based VLANs are the most general definition of VLANs. Each incoming
(untagged) frame is looked up in a policy database, which determines the VLAN to which
the frame belongs. For example, you could set up a policy that creates a special VLAN for
all email traffic between the management officers of a company so that this traffic will not
be seen anywhere else.
IA VLAN Support
The IA supports the following VLANs:
•Port-based
•Protocol-based
•Subnet-based
When using the IA as a Layer-2 bridge/switch, use the port-based and protocol-based
VLAN types. When using the IA as a combined switch and router, use the subnet-based
VLANs in addition to port-based and protocol-based VLANs. It is not necessary to
remember the types of VLANs in order to configure the IA, as seen in the section on
configuring the IA.
VLANs and the IA
VLANs are an integral part of the IA family of switching routers. The IA switching routers
can function as Layer-2 switches as well as fully functional Layer-3 routers. Hence, they
can be viewed as a switch and a router in one box. To provide maximum performance and
functionality, the Layer-2 and Layer-3 aspects of the IA switching routers are tightly
coupled.
The IA can be used purely as a Layer-2 switch. Frames arriving at any port are bridged
and not routed. In this case, setting up VLANs and associating ports with VLANs is all
that is required. You can set up the IA switching router to use port-based VLANs,
protocol-based VLANs, or a mixture of the two types.
38Internet Appliance User Reference Manual
Page 39
Chapter 2: Bridging Configuration Guide
The IA can also be used purely as a router, that is, each physical port of the IA is a separate
routing interface. Packets received at any interface are routed and not bridged. In this
case, no VLAN configuration is required. Note that VLANs are still created implicitly by
the IA as a result of creating Layer-3 interfaces for IP. However, these implicit VLANs do
not need to be created or configured manually. The implicit VLANs created by the IA are
subnet-based VLANs.
Most commonly, an IA is used as a combined switch and router. For example, it may be
connected to two subnets: S1 and S2. Ports 1 through 8 belong to S1, and ports 9 through
16 belong to S2. The required behavior of the IA is that intra-subnet frames be bridged and
inter-subnet packets be routed. In other words, traffic between two workstations that
belong to the same subnet should be bridged, and traffic between two workstations that
belong to different subnets should be routed.
The IA switching routers use VLANs to achieve this behavior. This means that a Layer-3
subnet (that is, an IP subnet) is mapped to a VLAN. A given subnet maps to exactly one
and only one VLAN. With this definition, the terms VLAN and subnet are almost
interchangeable.
To configure an IA as a combined switch and router, the administrator must create VLANs
whenever multiple ports of the IA are to belong to a particular VLAN/subnet. Then the
VLAN must be bound to a Layer-3 (IP) interface so that the IA knows which VLAN maps
to which IP subnet.
Ports, VLANs, and Layer-3 Interfaces
The term port refers to a physical connector on the IA, such as an Ethernet port. Each port
must belong to at least one VLAN. When the IA is unconfigured, each port belongs to a
VLAN called the default VLAN. By creating VLANs and adding ports to the created
VLANs, the ports are moved from the default VLAN to the newly created VLANs.
Unlike traditional routers, the IA has the concept of logical interfaces rather than physical
interfaces. A Layer-3 interface is a logical entity created by the administrator. It can
contain more than one physical port. When a Layer-3 interface contains exactly one
physical port, it is equivalent to an interface on a traditional router. When a Layer-3
interface contains several ports, it is equivalent to an interface of a traditional router that is
connected to a Layer-2 device such as a switch or bridge.
Access Ports and Trunk Ports (802.1Q Support)
The ports of an IA can be classified into two types, based on VLAN functionality: access
ports and trunk ports. By default, a port is an access port. An access port can belong to at
most one VLAN of the following type: IP or bridged protocols. The IA can automatically
determine whether or not a received frame is an IP frame. Based on this, it selects a VLAN
for the frame. Frames transmitted out of an access port are untagged, meaning that they
contain no special information about the VLAN to which they belong. Untagged frames
Internet Appliance User Reference Manual39
Page 40
Chapter 2: Bridging Configuration Guide
are classified as belonging to a particular VLAN based on the protocol of the frame and
the VLAN configured on the receiving port for that protocol.
For example, if port 1 belongs to VLAN IP_VLAN for IP and VLAN OTHER_VLAN for
any other protocol, then an IP frame received by port 1 is classified as belonging to VLAN
IP_VLAN.
Trunk ports (802.1Q) are usually used to connect one VLAN-aware switch to another.
They carry traffic belonging to several VLANs. For example, suppose that IA A and B are
both configured with VLANs V1 and V2.
Then a frame arriving at a port on IA A must be sent to IA B if the frame belongs to VLAN
V1 or to VLAN V2. Thus, the ports on IA A and B that connect the two IAs must belong to
both VLAN V1 and VLAN V2. Also, when these ports receive a frame, they must be able
to determine whether the frame belongs to V1 or to V2. This is accomplished by tagging
the frames, that is, by prepending information to the frame in order to identify the VLAN
to which the frame belongs. In the IA switching routers, trunk ports always transmit and
receive tagged frames only. The format of the tag is specified by the IEEE 802.1Q standard.
The only exception to this is Spanning Tree Protocol frames, which are transmitted as
untagged frames.
Explicit and Implicit VLANs
As mentioned earlier, VLANs can either be created explicitly by the administrator (explicit
VLANs) or are created implicitly by the IA when Layer-3 interfaces are created (implicit
VLANs).
Configuring IA Bridging Functions
Configuring Address-Based or Flow-Based Bridging
The IA ports perform address-based bridging by default, but can be configured to
perform flow-based bridging instead of address-based bridging on a per-port basis. A
port cannot be configured to perform both types of bridging at the same time.
The IA performance is equivalent when performing flow-based bridging or address-based
bridging. However, address-based bridging is more efficient because it requires fewer
table entries, while flow-based bridging provides tighter management and control over
bridged traffic.
40Internet Appliance User Reference Manual
Page 41
Chapter 2: Bridging Configuration Guide
For example, the following illustration shows an IA with traffic being sent from port A to
port B, port B to port A, port B to port C, and port A to port C.
IA
ABC
The corresponding bridge tables for address-based and flow-based bridging are shown in
the following table. The bridge table contains more information on the traffic patterns
when flow-based bridging is enabled compared to address-based bridging.
Address-Based Bridge TableFlow-Based Bridge Table
A (source)A
B (source)B
C (destination)B
→ B
→ A
→ C
A → C
With the IA configured in flow-based bridging mode, the network manager has per-flow
control of Layer-2 traffic. The network manager can then apply Quality of Service (QoS)
policies based on Layer-2 traffic flows.
To enable flow-based bridging on a port, enter the following command in Configure
mode.
Configure a port for flow-based
port flow-bridging <port-list>|all-ports
bridging.
To change a port from flow-based bridging to address-based bridging, enter the following
command in Configure mode:
Change a port from flow-based
bridging to address-based bridging.
negate <line-number of active config containing
command>
list>
: port flow-bridging <port-
|all-ports
Internet Appliance User Reference Manual41
Page 42
Chapter 2: Bridging Configuration Guide
Configuring Spanning Tree
The IA supports per VLAN spanning tree. By default, all the VLANs defined belong to the
default spanning tree. You can create a separate instance of spanning tree using the
following command:
Create spanning tree for a VLAN.
By default, spanning tree is disabled on the IA. To enable spanning tree on the IA, you
perform the following tasks on the ports where you want spanning tree enabled.
Enable spanning tree on one or
more ports for default spanning
tree.
Enable spanning tree on one or
more ports for a particular VLAN.
pvst create spanningtree vlan-name
stp enable port <port-list>
pvst enable port <port-list> spanning-tree
Adjusting Spanning-Tree Parameters
You may need to adjust certain spanning-tree parameters if the default values are not
suitable for your bridge configuration. Parameters affecting the entire spanning tree are
configured with variations of the bridge global configuration command. Interface-specific
parameters are configured with variations of the bridge-group interface configuration
command.
You can adjust spanning-tree parameters by performing any of the tasks in the next two
sections:
<string>
<string>
•“Setting the Bridge Priority”
•“Setting a Port Priority”
Note:
42Internet Appliance User Reference Manual
Only network administrators with a good understanding of how bridges and the
Spanning-Tree Protocol work should make adjustments to spanning-tree
parameters. Poorly chosen adjustments to these parameters can have a negative
impact on performance. A good source on bridging is the IEEE 802.1d
specification.
Page 43
Setting the Bridge Priority
You can globally configure the priority of an individual bridge when two bridges tie for
position as the root bridge, or you can configure the likelihood that a bridge will be
selected as the root bridge. The lower the bridge's priority, the more likely the bridge will
be selected as the root bridge. This priority is determined by default; however, you can
change it.
To set the bridge priority, enter the following command in Configure mode:
Chapter 2: Bridging Configuration Guide
Set the bridge priority for default
spanning tree.
Set the bridge priority for a
particular instance of spanning tree.
Setting a Port Priority
You can set a priority for an interface. When two bridges tie for position as the root bridge,
you configure an interface priority to break the tie. The bridge with the lowest interface
value is elected.
To set an interface priority, enter the following command in Configure mode:
Establish a priority for a specified
interface for default spanning tree.
Establish a priority for a specified
interface for a particular instance of
spanning tree.
Assigning Port Costs
stp set bridging priority <num>
pvst set bridging spanning-tree <string>
priority
stp set port <port-list> priority <num>
pvst set port <port-list> spanning-tree
<num>
<string> priority <num>
Each interface has a port cost associated with it. By convention, the port cost is 1000/data
rate of the attached LAN, in Mbps. You can set different port costs.
To assign port costs, enter the following command in Configure mode:
Set a different port cost other than
the defaults for default spanning
tree.
Set a different port cost other than
the defaults for a particular instance
of spanning tree.
Internet Appliance User Reference Manual43
stp set port <port-list> port-cost <num>
pvst set port <port-list> spanning-tree
<string> port-cost <num>
Page 44
Chapter 2: Bridging Configuration Guide
Adjusting Bridge Protocol Data Unit (BPDU) Intervals
You can adjust BPDU intervals as described in the next three sections:
•“Adjusting the Interval between Hello Times”
•“Defining the Forward Delay Interval”
•“Defining the Maximum Age”
Adjusting the Interval between Hello Times
You can specify the interval between hello time.
To adjust this interval, enter the following command in Configure mode:
Specify the interval between hello
stp set bridging hello-time <num>
time for default spanning tree.
Specify the interval between hello
time for a particular instance of
pvst set bridging spanning-tree <string>
hello-time
<num>
spanning tree.
Defining the Forward Delay Interval
The forward delay interval is the amount of time spent listening for topology change
information after an interface has been activated for bridging and before forwarding
actually begins.
To change the default interval setting, enter the following command in Configure mode:
Set the default of the forward delay
stp set bridging forward-delay <num>
interval for default spanning tree.
Set the default of the forward delay
interval for a particular instance of
pvst set bridging spanning-tree <string>
forward-delay
<num>
spanning tree.
44Internet Appliance User Reference Manual
Page 45
Chapter 2: Bridging Configuration Guide
Defining the Maximum Age
If a bridge does not hear BPDUs from the root bridge within a specified interval, it
assumes that the network has changed and recomputes the spanning-tree topology.
To change the default interval setting, enter the following command in Configure mode:
Change the amount of time a bridge will
stp set bridging max-age <num>
wait to hear BPDUs from the root bridge
for default spanning tree.
Change the amount of time a bridge will
wait to hear BPDUs from the root bridge
pvst set bridging spanning-tree
<string> max-age <num>
for a particular instance of spanning tree.
Configuring a Port- or Protocol-Based VLAN
To create a port- or protocol-based VLAN, perform the following steps in the Configure
mode:
1.Create a port or protocol based VLAN.
2.Add physical ports to a VLAN.
Creating a Port- or Protocol-Based VLAN
To create a VLAN, enter the following command in Configure mode:
Create a VLAN.
vlan create <vlan-name> <type> id <num>
Adding Ports to a VLAN
To add ports to a VLAN, enter the following command in Configure mode.
Add ports to a VLAN.
Internet Appliance User Reference Manual45
vlan add ports <port-list> to <vlan-name>
Page 46
Chapter 2: Bridging Configuration Guide
Configuring VLAN Trunk Ports
The IA supports standards-based VLAN trunking between multiple IAs as defined by
IEEE 802.1Q. 802.1Q adds a header to a standard Ethernet frame that includes a unique
VLAN ID per trunk between two IAs. These VLAN IDs extend the VLAN broadcast
domain to more than one IA.
To configure a VLAN trunk, enter the following command in the Configure mode.:
Configure 802.1Q VLAN trunks.
Configuring VLANs for Bridging
The IA allows you to create VLANs for AppleTalk, DECnet™, SNA, and IPv6 traffic as
well as for IP traffic. You can create a VLAN for handling traffic for a single protocol, such
as a DECnet VLAN, or you can create a VLAN that supports several specific protocols,
such as SNA and IP traffic.
Monitoring Bridging
The IA provides a display of bridging statistics and configurations contained in the IA.
To display bridging information, enter the following commands in Enable mode:
Show IP routing table.
Show all MAC addresses currently
in the l2 tables.
Show l2 table information on a
specific port.
vlan make <port-type><port-list>
ip show routes
l2-tables show all-macs
l2-tables show port-macs
Show information the master MAC
table.
Show information on a specific
MAC address.
Show information on MACs
registered.
Show all VLANs.
46Internet Appliance User Reference Manual
l2-tables show mac-table-stats
l2-tables show mac
l2-table show bridge-management
vlan show
Page 47
Configuration Examples
VLANs are used to associate physical ports on the IA with connected hosts that may be
physically separated but need to participate in the same broadcast domain. To associate
ports to a VLAN, you must first create a VLAN and then assign ports to the VLAN. This
section shows examples of creating an IP VLAN and a DECnet, SNA, and AppleTalk
VLAN.
Creating an IP VLAN
In this example, servers connected to ports gi.1.1 and gi.1.2 on the IA need to
communicate with clients connected to ports et.4.1 through et.4.8. You can associate all the
ports containing the clients and servers to an IP VLAN named BLUE.
First, enter the following command to create an IP VLAN named BLUE:
ia(config)# vlan create BLUE ip
Chapter 2: Bridging Configuration Guide
Next, enter the following command to assign ports to the VLAN named BLUE:
ia(config)# vlan add ports et.4.(1-8),gi.1.(1-2) to BLUE
Creating a Non-IP VLAN
In this example, SNA, DECnet, and AppleTalk hosts are connected to ports et.1.1 and
et.2.1 through et.2.4. You can associate all the ports containing these hosts to a VLAN
named RED with the VLAN ID 5.
First, enter the following command to create a VLAN named RED:
ia(config)# vlan create RED sna dec appletalk id 5
Next, enter the following command to assign ports to the RED VLAN:
ia(config)# vlan add ports et.1.1, et.2.(1-4) to RED
Internet Appliance User Reference Manual47
Page 48
Page 49
Overview
This chapter explains how to configure and monitor SmartTRUNKs on the Internet
Appliance (IA). A SmartTRUNK is Cabletron’s technology for load balancing and load
sharing. For a description of the SmartTRUNK commands, see the “smarttrunk
Command” section of the Internet Appliance Command Line Interface Reference.
Chapter 3
SmartTRUNK
Configuration
Guide
On the IA, a SmartTRUNK is a group of two or more ports that have been logically
combined into a single port. Multiple physical connections between devices are
aggregated into a single logical high-speed path that acts as a single link. Traffic is
balanced across all interfaces in the combined link, thereby increasing overall available
system bandwidth.
SmartTRUNKs allow administrators to increase bandwidth at congestion points in the
network, thus eliminating potential traffic bottlenecks. SmartTRUNKs also provide
improved data-link resiliency. If one port in a SmartTRUNK should fail, its load is
distributed evenly among the remaining ports and the entire SmartTRUNK link remains
operational.
SmartTRUNK is Cabletron’s standard for building high-performance links between
Cabletron’s switching platforms. SmartTRUNKs can interoperate with switches, routers,
and servers from other vendors as well as Cabletron platforms.
SmartTRUNKs are compatible with all IA features, including VLANs, STP, VRRP, etc.
SmartTRUNK operation is supported over different media types and a variety of
technologies including 10/100/1000 Mbps Ethernet.
Internet Appliance User Reference Manual49
Page 50
Chapter 3: SmartTRUNK Configuration Guide
Configuring SmartTRUNKs
To create a SmartTRUNK
1.Create a SmartTRUNK, and specify a control protocol for it.
2.Add physical ports to the SmartTRUNK.
3.Specify the policy for distributing traffic across SmartTRUNK ports. This step is
optional; by default, the IA distributes traffic to ports in a round-robin (sequential)
manner.
Creating a SmartTRUNK
When you create a SmartTRUNK, you specify whether the DEC® Hunt Group control
protocol is to be used or no control protocol is to be used according to the following
criteria:
•If you are connecting the SmartTRUNK to another IA, other Cabletron devices (such as
the SmartSwitch
specify the DEC Hunt Group control protocol. The Hunt Group protocol is useful in
detecting errors such as transmit/receive failures, and misconfiguration.
•If you are connecting the SmartTRUNK to a device that does not support the DEC Hunt
Group control protocol, such as those devices that support Cisco’s EtherChannel
technology, specify no control protocol. Only link failures are detected in this mode.
To create a SmartTRUNK, enter the following command in Configure mode:
Create a SmartTRUNK that will be
connected to a device that supports
the DEC Hunt Group control
protocol.
Create a SmartTRUNK that will be
connected to a device that does not
support the DEC Hunt Group
control protocol.
™
6000 or SmartSwitch 9000), or DIGITAL GIGAswitch™/Router,
smarttrunk create <smarttrunk> protocol
huntgroup
smarttrunk create <smarttrunk> protocol
no-protocol
®
50Internet Appliance User Reference Manual
Page 51
Chapter 3: SmartTRUNK Configuration Guide
Add Physical Ports to the SmartTRUNK
You can add any number of ports to a SmartTRUNK. The limit is the number of ports on
the IA. Any port on any module can be part of a SmartTRUNK. If one module fails, the
remaining ports on other modules remain operational.
Ports added to a SmartTRUNK must:
•Be set to full-duplex.
•Be in the same VLAN.
•Have the same properties (Layer-2 aging, STP state, and so on).
To add ports to a SmartTRUNK, enter the following command in Configure mode:
Create a SmartTRUNK that will be
connected to a device that supports
the DEC Hunt Group control
protocol.
smarttrunk add ports <port list> to
<smarttrunk>
Specify Traffic Distribution Policy (Optional)
The default policy for distributing traffic across the ports in a SmartTRUNK is round-r ob in,
where the IA selects the port on a rotating basis. The other policy that can be chosen is link-utilization, where packets are sent to the least-used port in a SmartTRUNK. You can choose
to specify the link-utilization policy for a particular SmartTRUNK, a list of
SmartTRUNKs, or for all SmartTRUNKs on the IA.
Specify traffic distribution policy.
smarttrunk set load-policy on <smarttrunk
list>
|all-smarttrunks round-robin|link-
utilization
Internet Appliance User Reference Manual51
Page 52
Chapter 3: SmartTRUNK Configuration Guide
Monitoring SmartTRUNKs
Statistics are gathered for data flowing through a SmartTRUNK and each port in the
SmartTRUNK.
To display SmartTRUNK statistics, enter one of the following commands in Enable mode:
Display information about all
smarttrunk show trunks
SmartTRUNKS and the control
protocol used.
Display statistics on traffic
distribution on SmartTRUNK.
Display information about the
control protocol on a SmartTRUNK.
Display information about the
SmartTRUNK connection (DEC
smarttrunk show distribution
<smarttrunk list>|all-smarttrunks
smarttrunk show protocol-state
<smarttrunk list>|all-smarttrunks
smarttrunk show connections <smarttrunk
list>
|all-smarttrunks
Hunt Group control protocol
connections only).
To clear statistics for SmartTRUNK ports, enter the following command in Enable mode:.
Clear load distribution statistics
for SmartTRUNK ports.
smarttrunk clear load-distribution
<smarttrunk list>|all-smarttrunk
52Internet Appliance User Reference Manual
Page 53
Example Configurations
The following illustration shows a network design based on SmartTRUNKs. R1 is an IA
operating as a router, while S1 and S2 are IAs operating as switches.
Chapter 3: SmartTRUNK Configuration Guide
Cisco
7500
Router
10.1.1.1/24
st.1st.2st.4
Router
R1
10.1.1.2/24
to-cisco
12.1.1.2/24
to-s2
11.1.1.2/24
to-s1
st.3
Switch
S2
st.5
Cisco
Catalyst
®
5K Switch
The following is the configuration for the Cisco 7500 router:
interface port-channel 1
ip address 10.1.1.1 255.255.255.0
ip route-cache distributed
interface fasteth 0/0
no ip address
channel-group 1
Switch
S1
Server
The following is the configuration for the Cisco Catalyst 5K switch:
set port channel 3/1-2 on
Internet Appliance User Reference Manual53
Page 54
Chapter 3: SmartTRUNK Configuration Guide
The following is the SmartTRUNK configuration for the IA labeled R1 in the diagram:
interface create ip to-cisco address-netmask 10.1.1.2/24 port st.1
interface create ip to-s1 address-netmask 11.1.1.2/24 port st.2
interface create ip to-s2 address-netmask 12.1.1.2/24 port st.3
The following is the SmartTRUNK configuration for the IA labeled S1 in the diagram:
This chapter describes how to configure IP interfaces and general non-protocol-specific
routing parameters.
IP Routing Overview
Chapter 4
IP Routing
Configuration
Guide
Internet Protocol (IP) is a packet-based protocol used to exchange data over computer
networks. IP handles addressing, routing, fragmentation, reassembly, and protocol
demultiplexing. In addition, IP specifies how hosts and routers should process packets,
handle errors, and discard packets. IP forms the foundation upon which transport layer
protocols, such as TCP or UDP, interoperate over a routed network.
The Transmission Control Protocol (TCP) is built upon the IP layer. TCP is a connectionoriented protocol that specifies the data format, buffering, and acknowledgments used in
the transfer of data. TCP is a full-duplex connection that also specifies the procedures that
the computers use to ensure that the data arrives correctly.
The User Datagram Protocol (UDP) provides the primary mechanism that applications
use to send datagrams to other application programs. UDP is a connectionless protocol
that does not guarantee delivery of datagrams between applications. Applications that
use UDP are responsible for ensuring successful data transfer by employing error
handling, retransmission, and sequencing techniques.
Internet Appliance User Reference Manual55
Page 56
Chapter 4: IP Routing Configuration Guide
TCP and UDP also specify ports that identify the application that is using TCP/UDP. For
example, a web server would typically use TCP/UDP port 80, which specifies HTTP-type
traffic.
The IA supports standards-based TCP, UDP, and IP.
IP Routing Protocols
The Internet Appliance (IA) supports standards-based unicast routing. Unicast routing
protocol support includes Interior Gateway Protocols and Exterior Gateway Protocols.
Interior Gateway Protocols are used for routing networks that are within an autonomous system, a network of relatively limited size. All IP Interior Gateway Protocols must be
specified with a list of associated networks before routing activities can begin. A routing
process listens to updates from other routers on these networks and broadcasts its own
routing information on those same networks. The IA supports the following Interior
Gateway Protocols:
•Routing Information Protocol (RIP) Version 1, 2 (RFC 1058, 1723)
•Open Shortest Path First (OSPF) Version 2 (RFC 1583)
Exterior Gateway Protocols are used to transfer information between different
autonomous systems. The IA supports the following Exterior Gateway Protocol:
•Border Gateway Protocol (BGP), Version 3, 4 (RFC 1267, 1771)
Configuring IP Interfaces and Parameters
This section provides an overview of configuring various IP parameters and setting up IP
interfaces.
Configuring IP Addresses to Ports
You can configure one IP interface directly to physical ports. Each port can be assigned
multiple IP addresses representing multiple subnets connected to the physical port.
To configure an IP interface to a port, enter one of the following commands in Configure
mode:
Configure an IP interface to a
physical port.
Configure a secondary address to
an existing IP interface.
interface create ip <InterfaceName>
address-mask
interface add ip <InterfaceName>
address-netmask
[broadcast
<ipAddr-mask> port <port>
<ipAddr-mask>
<ipaddr>]
56Internet Appliance User Reference Manual
Page 57
Configuring IP Interfaces for a VLAN
You can configure one IP interface per VLAN. Once an IP interface has been assigned to a
VLAN, you can add a secondary IP addresses to the VLAN.
To configure a VLAN with an IP interface, enter the following command in Configure
mode:
Chapter 4: IP Routing Configuration Guide
Create an IP interface for a VLAN.
Configure a secondary address to
an existing VLAN.
interface create ip <InterfaceName>
address-mask
interface add ip <InterfaceName>
address-netmask
<name>
vlan
Specifying Ethernet Encapsulation Method
The IA supports two encapsulation types for IP. You can configure encapsulation type on
a per-interface basis.
•Ethernet II: The standard ARPA Ethernet Version 2.0 encapsulation, which uses a 16-bit
protocol type code (the default encapsulation method)
•802.3 SNAP: SNAP IEEE 802.3 encapsulation, in which the type code becomes the
frame length for the IEEE 802.2 LLC encapsulation (destination and source Service
Access Points and a control byte)
To configure IP encapsulation, enter one of the following commands in Configure mode:
Configure Ethernet II
encapsulation.
interface create ip <InterfaceName>
output-mac-encapsulation ethernet_II
<ipAddr-mask> vlan <name>
<ipAddr-mask>
Configure 802.3
SNAP encapsulation.
Configuring Address Resolution Protocol (ARP)
The IA allows you to configure Address Resolution Protocol (ARP) table entries and
parameters. ARP is used to associate IP addresses with media or MAC addresses. Taking
an IP address as input, ARP determines the associated MAC address. Once a media or
MAC address is determined, the IP address/media address association is stored in an
ARP cache for rapid retrieval. Then the IP datagram is encapsulated in a link-layer frame
and sent over the network.
Internet Appliance User Reference Manual57
interface create ip <InterfaceName>
output-mac-encapsulation ethernet_snap
Page 58
Chapter 4: IP Routing Configuration Guide
Configuring ARP Cache Entries
You can add and delete entries in the ARP cache. To add or delete static ARP entries, enter
one of the following commands in Configure mode:
Add a static ARP entry.
Clear a static ARP entry.
Configuring Proxy ARP
The IA can be configured for proxy ARP. The IA uses proxy ARP (as defined in
RFC 1027) to help hosts with no knowledge of routing to determine the MAC address of
hosts on other networks or subnets. Through Proxy ARP, the IA will respond to ARP
requests from a host with a ARP reply packet containing the IA MAC address. Proxy ARP
is enabled by default on the IA.
To disable proxy ARP, enter the following command in Configure mode:
Disable Proxy ARP on
ip disable-proxy-arp interface <InterfaceName>|all
an interface.
Configuring DNS Parameters
The IA can be configured to specify DNS servers, which supply name services for DNS
requests. You can specify up to three DNS servers.
arp add <host> mac-addr <MAC-addr>
exit-port
arp clear <host>
<port>
To configure DNS servers, enter the following command in Configure mode:
Configure a DNS server.
system set dns server <IPaddr>
[,<IPaddr>[,<IPaddr>]]
You can also specify a domain name for the IA. The domain name is used by the IA to
respond to DNS requests.
To configure a domain name, enter the following command in Configure mode:
Configure a domain name.
58Internet Appliance User Reference Manual
system set dns domain <name>
Page 59
Configuring IP Services (ICMP)
The IA provides ICMP message capabilities, including ping and traceroute. Ping allows
you to determine the reachability of a certain IP host. Traceroute allows you to trace the IP
gateways to an IP host.
To access ping or traceroute on the IA, enter the following commands in Enable mode:
Chapter 4: IP Routing Configuration Guide
Specify ping.
Specify traceroute.
Configuring IP Helper
You can configure the IA to forward UDP broadcast packets received on a given interface
to all other interfaces or to a specified IP address. You can specify a UDP port number for
which UDP broadcast packets with that destination port number will be forwarded. By
default, if no UDP port number is specified, the IA will forward UDP broadcast packets
for the following five services:
To configure a destination to which UDP packets will be forwarded, enter the following
command in Configure mode:
Specify local subnet interface,
destination helper IP address,
and UDP port number to
forward.
Internet Appliance User Reference Manual59
ip helper-address interface <interface-name>
<helper-address>|all-interfaces [<udp-port#>]
Page 60
Chapter 4: IP Routing Configuration Guide
Configuring Direct Broadcast
You can configure the IA to forward all directed broadcast traffic from the local subnet to a
specified IP address or all associated IP addresses. This is a more efficient method than
defining only one local interface and remote IP address destination at a time with the
ip-helper command when you are forwarding traffic from more than one interface in the
local subnet to a remote destination IP address.
To forward all directed broadcast traffic to a specified IP address, enter the following
command in Configure mode:
Forward directed broadcast
traffic.
ip enable directed-broadcast interface
Configuring Denial of Service (DOS)
By default, the IA installs flows in the hardware so that packets sent as directed broadcasts
are dropped in hardware, if directed broadcast is not enabled on the interface where the
packet is received. You can disable this feature, causing directed broadcast packets to be
processed on the IA even if directed broadcast is not enabled on the interface receiving the
packet.
Similarly, the IA installs flows to drop packets destined for the IA for which service is not
provided by the IA. This prevents packets for unknown services from slowing the CPU.
You can disable this behavior, causing these packets to be processed by the CPU.
Disables the directedbroadcast-protection feature
of the IA.
Disables the port-attackprotection feature of the IA.
ip dos disable directed-broadcast-protection
ip dos disable port-attack-protection
<interface name>|all
60Internet Appliance User Reference Manual
Page 61
Monitoring IP Parameters
The IA provides display of IP statistics and configurations contained in the routing table.
Information displayed provides routing and performance information.
To display IP information, enter the following commands in Enable mode:
Chapter 4: IP Routing Configuration Guide
Show ARP table entries.
Show IP interface configuration.
Show all TCP/UDP connections
and services.
Show configuration of IP interfaces.
Show IP routing table information.
Show ARP entries in routing table.
Show DNS parameters.
Configuration Examples
Assigning IP Interfaces
To enable routing on the IA, you must assign an IP interface to a VLAN. To assign an IP
interface named RED to the BLUE VLAN, enter the following command:
ia(config)# interface create ip RED address-netmask
10.50.0.1/255.255.0.0 vlan BLUE
arp show all
interface show ip
ip show connections [no-lookup]
ip show interfaces [<interface-name>]
ip show routes
ip show routes show-arps
system show dns
You can also assign an IP interface directly to a physical port. For example, to assign IP
interface RED to physical port et.3.4, enter the following command:
ia(config)# interface create ip RED address-netmask
10.50.0.0/255.255.0.0 port et.3.4
Internet Appliance User Reference Manual61
Page 62
Page 63
VRRP Overview
This chapter explains how to set up and monitor the Virtual Router Redundancy Protocol
(VRRP) on the Internet Appliance (IA). VRRP is defined in RFC 2338.
En- host systems on a LAN are often configured to send packets to a statically configured
default router. If this default router becomes unavailable, all the hosts that use it as their
first hop router become isolated on the network. VRRP provides a way to ensure the
availability of an end host’s default router.
Chapter 5
VRRP
Configuration
Guide
This is done by assigning IP addresses that end hosts use as their default route to a virtual
router. A Master router is assigned to forward traffic designated for the virtual router. If
the Master router becomes unavailable, a Backup router takes over and begins forwarding
traffic for the virtual router. As long as one of the routers in a VRRP configuration is up,
the IP addresses assigned to the virtual router are always available and the end hosts can
send packets to these IP addresses without interruption.
Internet Appliance User Reference Manual63
Page 64
Chapter 5: VRRP Configuration Guide
6
Configuring VRRP
This section presents three sample VRRP configurations:
•A basic VRRP configuration with one virtual router
•A symmetrical VRRP configuration with two virtual routers
•A multi-backup VRRP configuration with three virtual routers
Basic VRRP Configuration
Figure 4 shows a basic VRRP configuration with a single virtual router. Routers R1 and R2
are both configured with one virtual router (
Router R2 serves as the Backup. The four end hosts are configured to use 10.0.0.1/16 as
the default route. IP address 10.0.0.1/16 is associated with virtual router
MasterBackup
VRID=1). Router R1 serves as the Master and
VRID=1.
R1R2
Interface Addr. =
VRID=1
Addr. =
;
10.0.0.1/16
10.0.0.1/16
H1H2H3H4
Default Route = 10.0.0.1/16
VRID=1
10.0.0.1/16
Interface Addr. =
VRID=1
Addr. =
;
10.0.0.2/1
10.0.0.1/16
Figure 4. Basic VRRP Configuration
If Router R1 becomes unavailable, Router R2 takes over virtual router
VRID=1 and its
associated IP addresses. Packets sent to 10.0.0.1/16 go to Router R2. When Router R1
comes up again, it takes over as Master, and Router R2 reverts to Backup.
64Internet Appliance User Reference Manual
Page 65
Configuration of Router R1
The following is the configuration file for Router R1 in Figure 4:
1: interface create ip test address-netmask 10.0.0.1/16 port et.1.1
2: ip-redundancy create vrrp 1 interface test
3: ip-redundancy associate vrrp 1 interface test address 10.0.0.1/16
4: ip-redundancy start vrrp 1 interface test
Line 1 adds IP address 10.0.0.1/16 to interface test, making Router R1 the owner of this IP
address. Line 2 creates virtual router
10.0.0.1/16 with virtual router
In VRRP, the router that owns the IP address associated with the virtual router is the
Master. Any other routers that participate in this virtual router are Backups. In this
configuration, Router R1 is the Master for virtual router
10.0.0.1/16, the IP address associated with virtual router
Configuration for Router R2
Chapter 5: VRRP Configuration Guide
VRID=1 on interface test. Line 3 associates IP address
VRID=1. Line 4 starts VRRP on interface test.
VRID=1 because it owns
VRID=1.
The following is the configuration file for Router R2 in Figure 4:
1: interface create ip test address-netmask 10.0.0.2/16 port et.1.1
2: ip-redundancy create vrrp 1 interface test
3: ip-redundancy associate vrrp 1 interface test address 10.0.0.1/16
4: ip-redundancy start vrrp 1 interface test
The configuration for Router R2 is nearly identical to Router R1. The difference is that
Router R2 does not own IP address 10.0.0.1/16. Since Router R2 does not own this IP
address, it is the Backup. It takes over from the Master if the Master becomes unavailable.
Symmetrical Configuration
Figure 5 shows a VRRP configuration with two routers and two virtual routers. Routers
R1 and R2 are both configured with two virtual routers (
Router R1 serves as:
•Master for
•Backup for VRID=2
Router R2 serves as:
VRID=1
VRID=1 and VRID=2).
•Master for
•Backup for VRID=1
Internet Appliance User Reference Manual65
VRID=2
Page 66
Chapter 5: VRRP Configuration Guide
This configuration allows you to load-balance traffic coming from the hosts on the
10.0.0.0/16 subnet and provides a redundant path to either virtual router.
Note:This is the recommended configuration on a network using VRRP.
Master for VRID=1
Backup for VRID=2
Master for VRID=2
Backup for VRID=1
R1R2
Interface Addr. =
Addr. =
;
VRID=1
Addr. =
;
VRID=2
10.0.0.1/16
10.0.0.1/16
10.0.0.2/16
10.0.0.1/16
VRID=1
H1H2H3H4
Default Route = 10.0.0.1/16
VRID=2
10.0.0.2/16
Interface Addr. =
Addr. =
;
VRID=1
Addr. =
;
VRID=2
Default Route = 10.0.0.2/16
10.0.0.2/16
10.0.0.1/16
10.0.0.2/16
Figure 5. Symmetrical VRRP Configuration
In this configuration, half the hosts use 10.0.0.1/16 as their default route, and half use
10.0.0.2/16. IP address 10.0.0.1/16 is associated with virtual router
10.0.0.2/16 is associated with virtual router
VRID=2.
VRID=1, and IP address
If Router R1, the Master for virtual router
address 10.0.0.1/16. Similarly, if Router R2, the Master for virtual router
VRID=1, goes down, Router R2 takes over the IP
VRID=2, goes
down, Router R1 takes over the IP address 10.0.0.2/16.
66Internet Appliance User Reference Manual
Page 67
Configuration of Router R1
The following is the configuration file for Router R1 in Figure 5:
1: interface create ip test address-netmask 10.0.0.1/16 port et.1.1
!
2: ip-redundancy create vrrp 1 interface test
3: ip-redundancy create vrrp 2 interface test
!
4: ip-redundancy associate vrrp 1 interface test address 10.0.0.1/16
5: ip-redundancy associate vrrp 2 interface test address 10.0.0.2/16
!
6: ip-redundancy start vrrp 1 interface test
7: ip-redundancy start vrrp 2 interface test
Router R1 is the owner of IP address 10.0.0.1/16. Line 4 associates this IP address with
virtual router
VRID=1, so Router R1 is the Master for virtual router VRID=1.
Chapter 5: VRRP Configuration Guide
On line 5, Router R1 associates IP address 10.0.0.2/16 with virtual router
However, since Router R1 does not own IP address 10.0.0.2/16, it is not the default Master
for virtual router
Configuration of Router R2
The following is the configuration file for Router R2 in Figure 5:
1: interface create ip test address-netmask 10.0.0.2/16 port et.1.1
!
2: ip-redundancy create vrrp 1 interface test
3: ip-redundancy create vrrp 2 interface test
!
4: ip-redundancy associate vrrp 1 interface test address 10.0.0.1/16
5: ip-redundancy associate vrrp 2 interface test address 10.0.0.2/16
!
6: ip-redundancy start vrrp 1 interface test
7: ip-redundancy start vrrp 2 interface test
On line 1, Router R2 is made owner of IP address 10.0.0.2/16. Line 5 associates this IP
address with virtual router
Line 4 associates IP address 10.0.0.1/16 with virtual router
Backup for virtual router
VRID=2.
VRID=2.
VRID=2, so Router R2 is the Master for virtual router VRID=2.
VRID=1, making Router R2 the
VRID=1.
Internet Appliance User Reference Manual67
Page 68
Chapter 5: VRRP Configuration Guide
Multi-Backup Configuration
Figure 6 shows a VRRP configuration with three routers and three virtual routers. Each
router serves as a Master for one virtual router and as a Backup for each of the others.
When a Master router goes down, one of the Backups takes over the IP addresses of its
virtual router.
In a VRRP configuration where more than one router is backing up a Master, you can
specify which Backup router takes over when the Master goes down by setting the
priority for the Backup routers.
Master for VRID=1
1st Backup for VRID=2
1st Backup for VRID=3
Master for VRID=2
1st Backup for VRID=1
2nd Backup for VRID=3
R1R2
VRID=1
10.0.0.1/16
H1H2H3H4
Default Route = 10.0.0.1/16
Default Route = 10.0.0.2/16
10.0.0.2/16
Figure 6. Multi-Backup VRRP Configuration
In this configuration, Router R1 is the Master for virtual router
Backup for virtual routers
VRID=2 and VRID=3. If Router R2 or R3 go down, Router R1
assumes the IP addresses associated with virtual routers
VRID=2
Master for VRID=3
2nd Backup for VRID=1
2nd Backup for VRID=2
R3
VRID=3
10.0.0.3/16
H5H6
Default Route = 10.0.0.3/16
VRID=1 and the primary
VRID=2 and VRID=3.
Router R2 is the Master for virtual router
VRID=1, and the secondary Backup for virtual router VRID=3. If Router R1 fails, Router R2
becomes the Master for virtual router
becomes the Master for all three virtual routers. All packets sent to IP addresses
10.0.0.1/16, 10.0.0.2/16, and 10.0.0.3/16 go to Router R2.
Router R3 is the secondary Backup for virtual routers
becomes a Master router only if both Routers R1 and R2 fail. In this case, Router R3
becomes the Master for all three virtual routers.
68Internet Appliance User Reference Manual
VRID=2, the primary Backup for virtual router
VRID=1. If both Routers R1 and R3 fail, Router R2
VRID=1 and VRID=2. Router R3
Page 69
Configuration of Router R1
The following is the configuration file for Router R1 in Figure 6:
1: interface create ip test address-netmask 10.0.0.1/16 port et.1.1
!
2: ip-redundancy create vrrp 1 interface test
3: ip-redundancy create vrrp 2 interface test
4: ip-redundancy create vrrp 3 interface test
!
5: ip-redundancy associate vrrp 1 interface test address 10.0.0.1/16
6: ip-redundancy associate vrrp 2 interface test address 10.0.0.2/16
7: ip-redundancy associate vrrp 3 interface test address 10.0.0.3/16
!
8: ip-redundancy set vrrp 2 interface test priority 200
9: ip-redundancy set vrrp 3 interface test priority 200
!
10: ip-redundancy start vrrp 1 interface test
11: ip-redundancy start vrrp 2 interface test
12: ip-redundancy start vrrp 3 interface test
Router R1’s IP address on interface test is 10.0.0.1. There are three virtual routers on this
interface:
Chapter 5: VRRP Configuration Guide
•
VRID=1 – IP address=10.0.0.1/16
•VRID=2 – IP address=10.0.0.2/16
VRID=3 – IP address=10.0.0.3/16
•
Since the IP address of virtual router
VRID=1 is the same as the interface’s IP address
(10.0.0.1), then the router automatically becomes the address owner of virtual router
VRID=1.
A priority is associated with each of the virtual routers. The priority determines whether
the router becomes the Master or the Backup for a particular virtual router. Priorities can
have values between 1 and 255. When a Master router goes down, the router with the
next-highest priority takes over the virtual router. If more than one router has the nexthighest priority, the router that has the highest-numbered interface IP address becomes
the Master.
If a router is the address owner for a virtual router, then its priority for that virtual router
is 255 and cannot be changed. If a router is not the address owner for a virtual router, then
the router’s priority for that virtual router is 100 by default and can be changed by the
user.
Since Router R1 is the owner of the IP address associated with virtual router
a priority of 255 (the highest) for virtual router
priority for virtual routers
VRID=2 and VRID=3 at 200. If no other routers in the VRRP
VRID=1. Lines 8 and 9 set Router R1’s
VRID=1, it has
configuration have a higher priority, Router R1 will take over as Master for virtual routers
VRID=2 and VRID=3 should Router R2 or R3 go down.
Internet Appliance User Reference Manual69
Page 70
Chapter 5: VRRP Configuration Guide
The following table shows the priorities for each virtual router configured on Router R1:
Virtual RouterDefault PriorityConfigured Priority
VRID=1 – IP address=10.0.0.1/16255 (address owner)255 (address owner)
VRID=2 – IP address=10.0.0.2/16100200 (see line 8)
VRID=3 – IP address=10.0.0.3/16100200 (see line 9)
Configuration of Router R2
The following is the configuration file for Router R2 in Figure 6:
1: interface create ip test address-netmask 10.0.0.2/16 port et.1.1
!
2: ip-redundancy create vrrp 1 interface test
3: ip-redundancy create vrrp 2 interface test
4: ip-redundancy create vrrp 3 interface test
!
5: ip-redundancy associate vrrp 1 interface test address 10.0.0.1/16
6: ip-redundancy associate vrrp 2 interface test address 10.0.0.2/16
7: ip-redundancy associate vrrp 3 interface test address 10.0.0.3/16
!
8: ip-redundancy set vrrp 1 interface test priority 200
9: ip-redundancy set vrrp 3 interface test priority 100
!
10: ip-redundancy start vrrp 1 interface test
11: ip-redundancy start vrrp 2 interface test
12: ip-redundancy start vrrp 3 interface test
Line 8 sets the Backup priority for virtual router
higher than Router R3’s Backup priority for virtual router
primary Backup and Router R3 is the secondary Backup for virtual router
On line 9, the Backup priority for virtual router
VRID=1 to 200. Since this number is
VRID=1, Router R2 is the
VRID=1.
VRID=3 is set to 100. Since Router R1’s
Backup priority for this virtual router is 200, Router R1 is the primary Backup and Router
R2 is the secondary Backup for virtual router
70Internet Appliance User Reference Manual
VRID=3.
Page 71
The following table shows the priorities for each virtual router configured on Router R2:
Virtual RouterDefault PriorityConfigured Priority
VRID=1 – IP address=10.0.0.1/16100200 (see line 8)
VRID=2 – IP address=10.0.0.2/16255 (address owner)255 (address owner)
VRID=3 – IP address=10.0.0.3/16100100 (see line 9)
Note:Since 100 is the default priority, line 9, which sets the priority to 100, is actually
unnecessary. It is included for illustration purposes only.
Configuration of Router R3
The following is the configuration file for Router R3 in Figure 6:
1: interface create ip test address-netmask 10.0.0.3/16 port et.1.1
!
2: ip-redundancy create vrrp 1 interface test
3: ip-redundancy create vrrp 2 interface test
4: ip-redundancy create vrrp 3 interface test
!
5: ip-redundancy associate vrrp 1 interface test address 10.0.0.1/16
6: ip-redundancy associate vrrp 2 interface test address 10.0.0.2/16
7: ip-redundancy associate vrrp 3 interface test address 10.0.0.3/16
!
8: ip-redundancy set vrrp 1 interface test priority 100
9: ip-redundancy set vrrp 2 interface test priority 100
!
10: ip-redundancy start vrrp 1 interface test
11: ip-redundancy start vrrp 2 interface test
12: ip-redundancy start vrrp 3 interface test
Chapter 5: VRRP Configuration Guide
Lines 8 and 9 set the Backup priority for Router R3 at 100 for virtual routers
VRID=2. Since Router R1 has a priority of 200 for backing up virtual router VRID=2, and
Router R2 has a priority of 200 for backing up virtual router
secondary Backup for both virtual routers
Internet Appliance User Reference Manual71
VRID=1 and
VRID=1, Router R3 is the
VRID=1 and VRID=2.
Page 72
Chapter 5: VRRP Configuration Guide
The following table shows the priorities for each virtual router configured on Router R3:
Virtual RouterDefault PriorityConfigured Priority
VRID=1 – IP address=10.0.0.1/16100100 (see line 8)
VRID=2 – IP address=10.0.0.2/16100100 (see line 9)
VRID=3 – IP address=10.0.0.3/16255 (address owner)255 (address owner)
Note:Since 100 is the default priority, lines 8 and 9, which set the priority to 100, are
actually unnecessary. They are included for illustration purposes only.
Additional Configuration
This section covers settings you can modify in a VRRP configuration, including Backup
priority, advertisement interval, pre-empt mode, and authentication key.
Setting the Backup Priority
As described in “Multi-Backup Configuration” on page 68, you can specify which Backup
router takes over when the Master router goes down by setting the priority for the Backup
routers. To set the priority for a Backup router, enter the following command in Configure
mode:
Set the Backup priority for a
virtual router.
The priority can be between 1 (lowest) and 254. The default is 100. The priority for the IP
address owner is 255 and cannot be changed.
Setting the Advertisement Interval
The VRRP Master router sends periodic advertisement messages to let the other routers
know that the Master is up and running. By default, advertisement messages are sent once
each second. To change the VRRP advertisement interval, enter the following command in
Configure mode:
Set the Advertisement interval
for a virtual router.
ip-redundancy set vrrp <vrid> interface
<interface> priority <number>
ip-redundancy set vrrp <vrid> interface
<interface> adv-interval <seconds>
72Internet Appliance User Reference Manual
Page 73
Setting Pre-empt Mode
When a Master router goes down, the Backup with the highest priority takes over the IP
addresses associated with the Master. By default, when the original Master comes back
up, it takes over from the Backup router that assumed its role as Master. When a VRRP
router does this, it is said to be in pre-empt mode. Pre-empt mode is enabled by default on
the IA. You can prevent a VRRP router from taking over from a lower-priority Master by
disabling pre-empt mode. To do this, enter the following command in Configure mode:
Chapter 5: VRRP Configuration Guide
Disable pre-empt mode for a
virtual router.
Note:If the IP address owner is available, then it will always take over as the Master,
regardless of whether pre-empt mode is on or off.
Setting an Authentication Key
By default, no authentication of VRRP packets is performed on the IA. You can specify a
clear-text password to be used to authenticate VRRP exchanges. To enable authentication,
enter the following command in Configure mode:
Set an authentication key for a
virtual router.
where <key> is a clear-text password.
Note:The IA does not currently support the IP Authentication Header method of
authentication.
ip-redundancy set vrrp <vrid> interface
<interface> preempt-mode disabled
ip-redundancy set vrrp <vrid> interface
<interface> auth-type text auth-key <key>
Internet Appliance User Reference Manual73
Page 74
Chapter 5: VRRP Configuration Guide
Monitoring VRRP
The IA provides two commands for monitoring a VRRP configuration: ip-redundancy
trace, which displays messages when VRRP events occur, and ip-redundancy show,
which reports statistics about virtual routers.
ip-redundancy trace
The ip-redundancy trace command is used for troubleshooting purposes. This command
causes messages to be displayed when certain VRRP events occur on the IA. To trace
VRRP events, enter the following commands in Enable mode:
Display a message when any
VRRP event occurs. (Disabled
by default.)
Display a message when a
VRRP router changes from one
state to another; for example
Backup to Master. (Enabled by
default.)
Display a message when a
VRRP packet error is detected.
(Enabled by default.)
Enable all VRRP tracing.
ip-redundancy show
The ip-redundancy show command reports information about a VRRP configuration. To
display VRRP information, enter the following commands in Enable mode:
Display information about all
virtual routers.
ip-redundancy trace vrrp events enabled
ip-redundancy trace vrrp state-transitions
enabled
ip-redundancy trace vrrp packet-errors
enabled
ip-redundancy trace vrrp all enabled
ip-redundancy show vrrp
Display information about all
virtual routers on a specified
interface.
Display detailed statistics about
a specific virtual router
74Internet Appliance User Reference Manual
ip-redundancy show vrrp interface <interface>
ip-redundancy show vrrp <vrid> interface
<interface> verbose
Page 75
VRRP Configuration Notes
•The Master router sends keep-alive advertisements. The frequency of these keep-alive
advertisements is determined by setting the Advertisement interval parameter. The
default value is 1 second.
•If a Backup router doesn’t receive a keep-alive advertisement from the current Master
within a certain period of time, it will transition to the Master state and start sending
advertisements itself. The amount of time that a Backup router will wait before it
becomes the new Master is based on the following equation:
The skew-time depends on the Backup router's configured priority:
Skew-time = ( (256 - Priority) / 256 )
Therefore, the higher the priority, the faster a Backup router will detect that the Master
is down. For example:
–Default advertisement-interval = 1 second
–Default Backup router priority = 100
Chapter 5: VRRP Configuration Guide
–Master-down-interval = time it takes a Backup to detect the Master is down
= (3 * adv-interval) + skew-time
= (3 * 1 second) + ((256 - 100) / 256)
= 3.6 seconds
•If a Master router is manually rebooted, or if its interface is manually brought down, it
will send a special keep-alive advertisement that lets the Backup routers know that a
new Master is needed immediately.
•A virtual router will respond to ARP requests with a virtual MAC address. This virtual
MAC depends on the virtual router ID:
virtual MAC address = 00005E:0001XX
where XX is the virtual router ID
This virtual MAC address is also used as the source MAC address of the keep-alive
Advertisements transmitted by the Master router.
•If multiple virtual routers are created on a single interface, the virtual routers must
have unique identifiers. If virtual routers are created on different interfaces, you can
reuse virtual router IDs.
For example, the following configuration is valid:
•As specified in RFC 2338, a Backup router that has transitioned to Master will not
respond to pings, accept telnet sessions, or field SNMP requests directed at the virtual
router's IP address.
Not responding allows network management to notice that the original Master router
(i.e., the IP address owner) is down.
76Internet Appliance User Reference Manual
Page 77
RIP Overview
This chapter describes how to configure the Routing Information Protocol (RIP) on the
Internet Appliance (IA). RIP is a distance-vector routing protocol for use in small
networks. RIP is described in RFC 1723. A router running RIP broadcasts updates at set
intervals. Each update contains paired values where each pair consists of an IP network
address and an integer distance to that network. RIP uses a hop count metric to measure
the distance to a destination.
Chapter 6
RIP Configuration
Guide
The IA provides support for RIP Version 1 and 2. The IA implements plain text and MD5
authentication methods for RIP Version 2.
The protocol independent features that apply to RIP are described in Chapter 4, “IP
Routing Configuration Guide.”
Internet Appliance User Reference Manual77
Page 78
Chapter 6: RIP Configuration Guide
Configuring RIP
By default, RIP is disabled on the IA and on each of the attached interfaces. To configure
RIP on the IA, follow these steps:
1.Start the RIP process by entering the rip start command.
2.Use the rip add interface command to inform RIP about the attached interfaces.
Enabling and Disabling RIP
To enable or disable RIP, enter one of the following commands in Configure mode:
Enable RIP.
Disable RIP.
Configuring RIP Interfaces
To configure RIP in the IA, you must first add interfaces to inform RIP about attached
interfaces.
To add RIP interfaces, enter the following commands in Configure mode:
Add interfaces to the RIP
process.
Add gateways from which
the IA will accept RIP
updates.
Define the list of routers to
which RIP sends packets
directly, not through
multicast or broadcast.
rip start
rip stop
rip add interface <interfacename-or-IPaddr>
rip add trusted-gateway <interfacename-or-IPaddr>
rip add source-gateway <interfacename-or-IPaddr>
78Internet Appliance User Reference Manual
Page 79
Configuring RIP Parameters
No further configuration is required, and the system default parameters will be used by
RIP to exchange routing information. These default parameters may be modified to suit
your needs by using the rip set interface command.
RIP ParameterDefault Value
Version numberRIP v1
Check-zero for RIP reserved parametersEnabled
Whether RIP packets should be broadcastChoose
Preference for RIP routes 100
Metric for incoming routes1
Metric for outgoing routes0
Authentication None
Update interval30 seconds
Chapter 6: RIP Configuration Guide
To change RIP parameters, enter the following commands in Configure mode.
Set RIP Version on an interface
to RIP V1.
Set RIP Version on an interface
to RIP V2.
Specify that RIP V2 packets
should be multicast on this
rip set interface <interfacename-or-IPaddr>|all
version 1
rip set interface <interfacename-or-IPaddr>|all
version 2
rip set interface <interfacename-or-IPaddr>|all
type multicast
interface.
Specify that RIP V2 packets that
are RIP V1-compatible should
rip set interface <interfacename-or-IPaddr>|all
type broadcast
be broadcast on this interface.
Change the metric on incoming
RIP routes.
Change the metric on outgoing
RIP routes.
Set the authentication method
to simple text up to 8
rip set interface <interfacename-or-IPaddr>|all
metric-in
rip set interface <interfacename-or-IPaddr>|all
metric-out
rip set interface <interfacename-or-IPaddr>|all
authentication-method simple
<num>
<num>
characters.
Set the authentication method
to MD5.
rip set interface <interfacename-or-IPaddr>|all
authentication-method md5
Internet Appliance User Reference Manual79
Page 80
Chapter 6: RIP Configuration Guide
Specify the metric to be used
when advertising routes that
were learned from other
protocols.
Enable automatic summarization and redistribution of RIP
routes.
Specify broadcast of RIP
packets regardless of number of
interfaces present.
Check that reserved fields in
incoming RIP V1 packets are
zero.
Enable acceptance of RIP routes
that have a metric of zero.
Enable poison reverse, as
specified by RFC 1058.
Configuring RIP Route Preference
rip set default-metric <num>
rip set auto-summary disable|enable
rip set broadcast-state always|choose|never
rip set check-zero disable|enable
rip set check-zero-metric disable|enable
rip set poison-reverse disable|enable
You can set the preference of routes learned from RIP.
To configure RIP route preference, enter the following command in Configure mode:
Set the preference of routes learned from RIP.rip set preference <num>
Configuring RIP Route Default-Metric
You can define the metric used when advertising routes via RIP that were learned from
other protocols. The default value for this parameter is 16 (unreachable). To export routes
from other protocols into RIP, you must explicitly specify a value for the default-metric
parameter. The metric specified by the default-metric parameter may be overridden by a
metric specified in the export command.
To configure default-metric, enter the following command in Configure mode:
Define the metric used when advertising routes
via RIP that were learned from other protocols.
For
<num>
, you must specify a number between 1 and 16.
rip set default-metric <num>
80Internet Appliance User Reference Manual
Page 81
Monitoring RIP
The rip trace command can be used to trace all rip request and response packets.
To monitor RIP information, enter the following commands in Enable mode:
Chapter 6: RIP Configuration Guide
Show all RIP information.
Show RIP export policies.
Show RIP global information.
Show RIP import policies.
Show RIP information on the specified
interface.
Show RIP interface policy information.
Show detailed information of all RIP
packets.
Show detailed information of all packets
received by the router.
Show detailed information of all packets
sent by the router.
Show detailed information of all request
received by the router.
Show detailed information of all response
received by the router.
rip show all
rip show export-policy
rip show globals
rip show import-policy
rip show interface <Name or IP-addr>
rip show interface-policy
rip trace packets detail
rip trace packets receive
rip trace packets send
rip trace request receive
rip trace response receive
Show detailed information of response
rip trace response send
packets sent by the router.
Show detailed information of request
rip trace send request
packets sent by the router.
Show RIP timer information.
Internet Appliance User Reference Manual81
rip show timers
Page 82
Chapter 6: RIP Configuration Guide
Configuration Example
IA 1
Interface 1.1.1.1Interface 3.2.1.1
! Example configuration
!
! Create interface
-1
IA
interface create ip
1-if1 with ip address 1.1.1.1/16 on port et.1.1 on
IA
1-if1 address-netmask 1.1.1.1/16 port et.1.1
IA
!
! Configure rip on IA-1
rip add interface
rip set interface
1-if1
IA
1-if1 version 2
IA
rip start
!
!
! Set authentication method to md5
rip set interface
1-if1 authentication-method md5
IA
!
! Change default metric-in
rip set interface
1-if1 metric-in 2
IA
!
! Change default metric-out
rip set interface
1-if1 metric-out 3
IA
IA 2
82Internet Appliance User Reference Manual
Page 83
OSPF Overview
Open Shortest Path First (OSPF) is a link-state routing protocol that supports IP
subnetting and authentication. The Internet Appliance (IA) supports OSPF Version 2.0 as
defined in RFC 1583. Each link-state message contains all the links connected to the router
with a specified cost associated with the link.
Chapter 7
OSPF
Configuration
Guide
The IA supports the following OSPF functions:
•Stub Areas: Definition of stub areas is supported.
•Authentication: Simple password and MD5 authentication methods are supported
within an area.
•Virtual Links: Virtual links are supported.
•Route Redistribution: Routes learned via RIP, BGP, or any other sources can be
redistributed into OSPF. OSPF routes can be redistributed into RIP or BGP.
•Interface Parameters: Parameters that can be configured include interface output cost,
retransmission interval, interface transmit delay, router priority, router dead and hello
intervals, and authentication key.
Internet Appliance User Reference Manual83
Page 84
Chapter 7: OSPF Configuration Guide
OSPF Multipath
The IA also supports OSPF and static Multi-path. If multiple equal-cost OSPF or static
routes have been defined for any destination, then the IA discovers and uses all of them.
The IA will automatically learn up to four equal-cost OSPF or static routes and retain
them in its forwarding information base (FIB). The forwarding module then installs flows
for these destinations in a round-robin fashion.
Configuring OSPF
To configure OSPF on the IA, you must enable OSPF, create OSPF areas, assign interfaces
to OSPF areas, and, if necessary, specify any of the OSPF interface parameters.
To configure OSPF, you may need to perform some or all of the following tasks:
•Enable OSPF.
•Create OSPF areas.
•Create an IP interface or assign an IP interface to a VLAN.
•Add IP interfaces to OSPF areas.
•Configure OSPF interface parameters, if necessary.
Note:
•Add IP networks to OSPF areas.
•Create virtual links, if necessary.
Enabling OSPF
OSPF is disabled by default on the IA.
To enable or disable OSPF, enter one of the following commands in Configure mode.
Enable OSPF.
By default, the priority of an OSPF router for an interface is set to zero, which
makes the router ineligible from becoming a designated router on the network to
which the interface belongs. To make the router eligible to become a designated
router, you must set the priority to a non-zero value.
The default cost of an OSPF interface is 1. The cost of the interface should be
inversely proportional to the bandwidth of the interface; if the IA has interfaces
with differing bandwidths, the OSPF costs should be set accordingly.
ospf start
Disable OSPF.
84Internet Appliance User Reference Manual
ospf stop
Page 85
Configuring OSPF Interface Parameters
You can configure the OSPF interface parameters shown in Ta b l e 1 .
Table 1. OSPF Interface Parameters
OSPF ParameterDefault Value
Interface OSPF State (Enable/Disable)Enable (except for virtual links)
To configure OSPF interface parameters, enter one of the following commands in
Configure mode:
Enable OSPF state on interface.
Specify the cost of sending a packet
on an OSPF interface.
Specify the priority for determining
the designated router on an OSPF
ospf set interface <name-or-IPaddr>|all
state disable|enable
ospf set interface <name-or-IPaddr>|all
cost
<num>
ospf set interface <name-or-IPaddr>|all
priority
<num>
interface.
Specify the interval between OSPF
hello packets on an OSPF interface.
Configure the retransmission interval
between link state advertisements for
ospf set interface <name-or-IPaddr>|all
hello-interval
ospf set interface <name-or-IPaddr>|all
retransmit-interval
<num>
<num>
adjacencies belonging to an OSPF
interface.
Internet Appliance User Reference Manual85
Page 86
Chapter 7: OSPF Configuration Guide
Specify the number of seconds
required to transmit a link state
update on an OSPF interface.
Specify the time a neighbor router
will listen for OSPF hello packets
before declaring the router down.
Disable IP multicast for sending OSPF
packets to neighbors on an OSPF
interface.
Specify the poll interval on an OSPF
interface.
Specify the identifier of the key chain
containing the authentication keys.
Specify the authentication method to
be used on this interface.
Configuring an OSPF Area
ospf set interface <name-or-IPaddr>|all
transit-delay
ospf set interface <name-or-IPaddr>|all
router-dead-interval
ospf set interface <name-or-IPaddr>|all
no-multicast
ospf set interface <name-or-IPaddr>|all
poll-interval
ospf set interface <name-or-IPaddr>|all
key-chain
ospf set interface <name-or-IPaddr>|all
authentication-method
none|simple|md5
<num>
<num>
<num>
<num-or-string>
OSPF areas are a collection of subnets that are grouped in a logical fashion. These areas
communicate with other areas via the backbone area. Once OSPF areas are created, you
can add interfaces, stub hosts, and summary ranges to the area.
In order to reduce the amount of routing information propagated between areas, you can
configure summary-ranges on Area Border Routers (ABRs). On the IA, summary-ranges
are created using the ospf add network command. The networks specified using this
command describe the scope of an area. Intra-area Link State Advertisements (LSAs) that
fall within the specified ranges are not advertised into other areas as inter-area routes.
Instead, the specified ranges are advertised as summary network LSAs.
86Internet Appliance User Reference Manual
Page 87
Chapter 7: OSPF Configuration Guide
To create areas and assign interfaces, enter the following commands in the Configure
mode:
Create an OSPF area.
Add an interface to an OSPF area.ospf add interface <name-or-IPaddr>
Add a stub host to an OSPF area.ospf add stub-host [to-area
Add a network to an OSPF area for
summarization.
Configuring OSPF Area Parameters
The IA allows configuration of various OSPF area parameters, including stub areas, stub
cost, and authentication method. Stub areas are areas into which information on external
routes is not sent. Instead, there is a default external route generated by the ABR, into the
stub area for destinations outside the autonomous system. Stub cost specifies the cost to
be used to inject a default route into a stub area. An authentication method for OSPF
packets can be specified on a per-area basis.
To configure OSPF area parameters, enter the following commands in the Configure
mode:
ospf create area <area-num>|backbone
[to-area
[type broadcast|non-broadcast]
<area-addr>
|backbone]
<area-
addr>
[cost
ospf add network <IPaddr/mask> [to-area
<area-addr>
[host-net]
|backbone]
<num>
]
|backbone] [restrict]
Specify an OSPF stub area.ospf set area <area-num> stub
Specify the cost to be used to inject a
ospf set area <area-num> stub-cost
<num>
default route into an area.
Specify the authentication method
to be used by neighboring OSPF
routers.
Internet Appliance User Reference Manual87
ospf set area <area-num> [stub]
[authentication-method
none|simple|md5]
Page 88
Chapter 7: OSPF Configuration Guide
Creating Virtual Links
In OSPF, virtual links can be established:
•To connect an area via a transit area to the backbone
•To create a redundant backbone connection via another area
Each Area Border Router must be configured with the same virtual link. Note that virtual
links cannot be configured through a stub area.
To configure virtual links, enter the following commands in the Configure mode:
Configuring Autonomous System External (ASE) Link
Advertisements
These parameters specify the defaults used when importing OSPF AS External (ASE)
routes into the routing table and exporting routes from the routing table into OSPF ASEs.
To specify AS external link advertisements parameters, enter the following commands in
the Configure mode:
Specify the interval which AS
external link advertisements
will be generated and flooded
to an OSPF AS.
ospf set export-interval <num>
Specify the number of AS
external link advertisements
which will be generated and
flooded to an OSPF AS.
Specify AS external link
advertisement default
parameters.
88Internet Appliance User Reference Manual
ospf set export-limit <num>
ospf set ase-defaults [preference
[cost
[inherit-metric]
<num>
] [type
<num>
]
<num>
]
Page 89
Chapter 7: OSPF Configuration Guide
Configuring OSPF over Non-Broadcast Multiple Access
You can configure OSPF over NBMA circuits to limit the number of Link State
Advertisements (LSAs). LSAs are limited to initial advertisements and any subsequent
changes. Periodic LSAs over NBMA circuits are suppressed.
To configure OSPF over WAN circuits, enter the following command in Configure mode:
Configure OSPF over a WAN
circuit.
Monitoring OSPF
The IA lets you display OSPF statistics and configurations contained in the routing table.
Information displayed provides routing and performance information.
To display OSPF information, enter the following commands in Enable mode:
Show IP routing table.
Monitor OSPF error conditions.
Show information on all interfaces
configured for OSPF.
Display link state advertisement
information.
Display the link state database.
ospf add nbma-neighbor <hostname-or-IPaddr>
to-interface
ip show table routing
ospf monitor errors destination
<name-or-IPaddr>[eligible]
<hostname-or-IPaddr>
ospf monitor interfaces destination
<hostname-or-IPaddr>
ospf monitor lsa destination
<hostname-or-IPaddr>
ospf monitor lsdb destination
<hostname-or-IPaddr>
Shows information about all OSPF
routing neighbors.
Show information on valid next hops.
Display OSPF routing table.
Monitor OSPF statistics for a specified
destination.
Shows information about all OSPF
routing version
Shows OSPF Autonomous System
External Link State Database.
Show all OSPF tables.
Internet Appliance User Reference Manual89
ospf monitor neighborsdestination
<hostname-or-IPaddr>
ospf monitor next-hop-list
destination
ospf monitor routes destination
<hostname-or-IPaddr>
<hostname-or-IPaddr>
ospf monitor statistics destination
<hostname-or-IPaddr>
ospf monitor version
ospf sbow AS-External-LSDB
ospf show all
Page 90
Chapter 7: OSPF Configuration Guide
Show all OSPF areas.
Show OSPF errors.
Show information about OSPF export
policies.
Shows routes redistributed into OSPF.
Show all OSPF global parameters.
Show information about OSPF import
policies.
Show OSPF interfaces.
Shows information about all valid next
hops mostly derived from the SPF
calculation.
Show OSPF statistics.
Shows information about OSPF Border
Routes.
Show OSPF timers.
Show OSPF virtual-links.
ospf show areas
ospf show errors
ospf show export-policies
ospf show exported-routes
ospf show globals
ospf show import-policies
ospf show interfaces
ospf show next-hop-list
ospf show statistics
ospf show summary-asb
ospf show timers
ospf show virtual-links
OSPF Configuration Examples
For all examples in this section, refer to the configuration shown in Figure 7 on page 95.
The following configuration commands for router R1:
•Determine the IP address for each interface
•Specify the static routes configured on the router
90Internet Appliance User Reference Manual
Page 91
Chapter 7: OSPF Configuration Guide
•Determine its OSPF configuration
!++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
! Create the various IP interfaces.
!++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
interface create ip to-r2 address-netmask 120.190.1.1/16 port et.1.2
interface create ip to-r3 address-netmask 130.1.1.1/16 port et.1.3
interface create ip to-r41 address-netmask 140.1.1.1/24 port et.1.4
interface create ip to-r42 address-netmask 140.1.2.1/24 port et.1.5
interface create ip to-r6 address-netmask 140.1.3.1/24 port et.1.6
!+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
! Configure default routes to the other subnets reachable through R2.
!+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
ip add route 202.1.0.0/16 gateway 120.1.1.2
ip add route 160.1.5.0/24 gateway 120.1.1.2
!++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
! OSPF Box Level Configuration
!++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
ospf start
ospf create area 140.1.0.0
ospf create area backbone
ospf set ase-defaults cost 4
!++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
! OSPF Interface Configuration
!++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
ospf add interface 140.1.1.1 to-area 140.1.0.0
ospf add interface 140.1.2.1 to-area 140.1.0.0
ospf add interface 140.1.3.1 to-area 140.1.0.0
ospf add interface 130.1.1.1 to-area backbone
Exporting All Interface and Static Routes to OSPF
Router R1 has several static routes. We would export these static routes as type-2 OSPF
routes. The interface routes would be redistributed as type-1 OSPF routes.
1.Create a OSPF export destination for type-1 routes since we would like to redistribute
certain routes into OSPF as type 1 OSPF-ASE routes.
Exporting All RIP, Interface, and Static Routes to OSPF
Note:
Also export interface, static, RIP, OSPF, and OSPF-ASE routes into RIP.
In the configuration shown in Figure 7 on page 95, RIP Version 2 is configured on the
interfaces of routers R1 and R2 on network 120.190.0.0/16.
We would like to redistribute these RIP routes as OSPF type-2 routes and associate the tag
100 with them. Router R1 would also like to redistribute its static routes as type-2 OSPF
routes. The interface routes would redistributed as type-1 OSPF routes.
Router R1 would like to redistribute its OSPF, OSPF-ASE, RIP, Static, and Interface/Direct
routes into RIP.
1.Enable RIP on interface 120.190.1.1/16.
rip add interface 120.190.1.1
rip set interface 120.190.1.1 version 2 type multicast
2.Create a OSPF export destination for type-1 routes.
The Border Gateway Protocol (BGP) is an exterior gateway protocol that allows IP routers
to exchange network reachability information. BGP became an internet standard in 1989
(RFC 1105) and the current version, BGP-4, was published in 1994 (RFC 1771). BGP is
typically run between Internet Service Providers. It is also frequently used by multihomed ISP customers, as well as in large commercial networks.
Autonomous systems that wish to connect their networks together must agree on a
method of exchanging routing information. Interior gateway protocols such as RIP and
OSPF may be inadequate for this task since they were not designed to handle multi-AS,
policy, and security issues. Similarly, using static routes may not be the best choice for
exchanging AS-AS routing information because there may be a large number of routes, or
the routes may change often.
Chapter 8
BGP Configuration
Guide
Note:
In an environment where using static routes is not feasible, BGP is often the best choice for
an AS-AS routing protocol. BGP prevents the introduction of routing loops created by
multi-homed and meshed AS topologies. BGP also provides the ability to create and
enforce policies at the AS level, such as selectively determining which AS routes are to be
accepted or what routes are to be advertised to BGP peers.
Internet Appliance User Reference Manual97
This chapter uses the term Autonomous System (AS) throughout. An AS is defined
as a set of routers under a central technical administration that has a coherent
interior routing plan and accurately portrays to other ASs what routing
destinations are reachable by way of it.
Page 98
Chapter 8: BGP Configuration Guide
The Internet Appliance (IA) BGP Implementation
The Internet Appliance (IA) routing protocol implementation is based on GateD 4.0.3 code
(http://www.gated.org
services, a routing database, and protocol modules supporting multiple routing protocols
(RIP versions 1 and 2, OSPF version 2, BGP version 2 through 4, and Integrated IS-IS).
Since the IA IP routing code is based upon GateD, BGP can also be configured using a
GateD configuration file (gated.conf) instead of the IA Command Line Interface (CLI).
Additionally, even if the IA is configured using the CLI, the gated.conf equivalent can be
displayed by entering the ip-router show configuration-file command at the IA Enable
prompt.
VLANs, interfaces, ACLs, and many other IA configurable entities and functionality can
only be configured using the IA CLI. Therefore, a gated.conf file is dependent upon some
IA CLI configuration.
). GateD is a modular software program consisting of core
Basic BGP Tasks
This section describes the basic tasks necessary to configure BGP on the IA. Due to the
abstract nature of BGP, many BGP designs can be extremely complex. For any one BGP
design challenge, there may only be one solution out of many that is relevant to common
practice.
When designing a BGP configuration, it may be prudent to refer to information in RFCs,
Internet drafts, and books about BGP. Some BGP designs may also require the aid of an
experienced BGP network consultant.
Basic BGP configuration involves the following tasks:
•Setting the autonomous system number
•Setting the router ID
•Creating a BGP peer group
•Adding and removing a BGP peer host
•Starting BGP
•Using AS path regular expressions
•Using AS path prepend
98Internet Appliance User Reference Manual
Page 99
Setting the Autonomous System Number
An autonomous system number identifies your autonomous system to other routers. To
set the IA’s autonomous system number, enter the following command in Configure
mode:
Chapter 8: BGP Configuration Guide
Set the IA’s autonomous system
number.
The autonomous-system<num1> parameter sets the AS number for the router. Specify a
number from 1 to 65534. The loops<num2> parameter controls the number of times the
AS may appear in the as-path. The default is 1.
Setting the Router ID
The router ID uniquely identifies the IA. To set the router ID to be used by BGP, enter the
following command in Configure mode:
Set the IA’s router ID.ip-router global set router-id <hostname-or-IPaddr>
If you do not explicitly specify the router ID, then an ID is chosen implicitly by the IA. A
secondary address on the loopback interface (the primary address being 127.0.0.1) is the
most preferred candidate for selection as the IA’s router ID. If there are no secondary
addresses on the loopback interface, then the default router ID is set to the address of the
first interface that is in the up state that the IA encounters (except the interface en0, which
is the Control Module’s interface). The address of a non point-to-point interface is
preferred over the local address of a point-to-point interface. If the router ID is implicitly
chosen to be the address of a non-loopback interface, and if that interface were to go
down, then the router ID is changed. When the router ID changes, an OSPF router has to
flush all its LSAs from the routing domain.
ip-router global set autonomous-system <num1>
loops <num2>
If you explicitly specify a router ID, then it would not change, even if all interfaces were to
go down.
Internet Appliance User Reference Manual99
Page 100
Chapter 8: BGP Configuration Guide
Configuring a BGP Peer Group
A BGP peer group is a group of neighbor routers that have the same update policies. To
configure a BGP peer group, enter the following command in Configure mode:
Configure a BGP peer group.bgp create peer-group <number-or-string>
where:
peer-group <number-or-string>
Is a group ID, which can be a number or a character string.
type Specifies the type of BGP group you are adding. You can specify one of the
following:
external In the classic external BGP group, full policy checking is applied to all
incoming and outgoing advertisements. The external neighbors must
be directly reachable through one of the machine's local interfaces.
type external|internal|igp|routing
[autonomous-system <number>]
[proto any|rip|ospf|static]
[interface <interface-name-or-ipaddr> |all]
routingAn internal group which uses the routes of an interior protocol to
resolve forwarding addresses. Type Routing groups will determine the
immediate next hops for routes by using the next hop received with a
route from a peer as a forwarding address, and using this to look up an
immediate next hop in an IGP’s routes. Such groups support distant
peers, but need to be informed of the IGP whose routes they are using
to determine immediate next hops. This implementation comes closest
to the IBGP implementation of other router vendors.
internal An internal group operating where there is no IP-level IGP, for example
an SMDS network. Type Internal groups expect all peers to be directly
attached to a shared subnet so that, like external peers, the next hops
received in BGP advertisements may be used directly for forwarding.
All Internal group peers should be L2 adjacent.
igpAn internal group operating where there is no IP-level IGP; for
example, an SMDS network.
autonomous-system<number>
Specifies the autonomous system of the peer group. Specify a number from 1 –
65534.
100Internet Appliance User Reference Manual
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.