Cabletron Systems IA1100, IA1200 User's Reference Manual

Internet Appliance
User Reference Manual
9033371
Changes
Cabletron Systems, Inc., reserves the right to make changes in specifications and other information contained in this document without prior notice. The reader should in all cases consult Cabletron Systems, Inc., to determine whether any such changes have been made.
Disclaimer
IN NO EVENT SHALL CABLETRON SYSTEMS BE LIABLE FOR ANY INCIDENTAL, INDIRECT, SPECIAL, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING BUT NOT LIMITED TO LOST PROFITS) ARISING OUT OF OR RELATED TO THIS MANUAL OR THE INFORMATION CONTAINED IN IT, EVEN IF CABLETRON SYSTEMS HAS BEEN ADVISED OF, KNOWN, OR SHOULD HAVE KNOWN, THE POSSIBILITY OF SUCH DAMAGES.
Copyright
© 2000 by Cabletron Systems, Inc. All rights reserved. Cabletron Systems, Inc.
35 Industrial Way Rochester, NH 03867-5005
Printed in the United States of America
Trademarks
AppleTalk is a registered trademark of Apple Computer, Inc. Cabletron Systems is a registered trademark and Cabletron, SmartSwitch, and GIGAswitch are
trademarks of Cabletron Systems, Inc. Catalyst and EtherChannel are registered trademarks of Cisco Systems, Inc. DEC is a registered trademark and Decnet is a trademark of Digital Equipment Corporation. All other product names mentioned in this manual may be trademarks or registered trademarks of
their respective companies.
Regulatory Compliance Information
This product complies with the following:
Safety
UL 1950; CSA C22.2, No. 950; 73/23/EEC; EN 60950; IEC 950
Electromagnetic
FCC Part 15; CSA C108.8; 89/336/EEC; EN 55022; EN 61000-3-2
Compatibility (EMC)
EN 61000-3-3; EN 50082-1, AS/NZS 3548; VCCI V-3
Regulatory Compliance Statements
Regulatory Compliance Information
FCC Compliance Statement
This device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation.
NOTE: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment uses, generates, and can radiate radio frequency energy and if not installed in accordance with the operator’s manual, may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause interference in which case the user will be required to correct the interference at his own expense.
WA R NI N G : Changes or modifications made to this device that are not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment.
Industry Canada Compliance Statement
This digital apparatus does not exceed the Class A limits for radio noise emissions from digital apparatus set out in the Radio Interference Regulations of the Canadian Department of Communications.
Le présent appareil numérique n’émet pas de bruits radioélectriques dépassant les limites applicables aux appareils numériques de la class A prescrites dans le Règlement sur le brouillage radioélectrique édicté par le ministère des Communications du Canada.
Internet Appliance User Reference Manual iii
Regulatory Compliance Statements
NOTICE: The Industry Canada label identifies certified equipment. This certification means that the equipment meets telecommunications network protective, operational, and safety requirements as prescribed in the appropriate Terminal Equipment Technical Requirements document(s). The department does not guarantee the equipment will operate to the user’s satisfaction.
Before installing this equipment, users should ensure that it is permissible to be connected to the facilities of the local telecommunications company. The equipment must also be installed using an acceptable method of connection. The customer should be aware that compliance with the above conditions may not prevent degradation of service in some situations.
Repairs to certified equipment should be coordinated by a representative designated by the supplier. Any repairs or alterations made by the user to this equipment, or equipment malfunctions, may give the telecommunications company cause to request the user to disconnect the equipment.
Users should ensure for their own protection that the electrical ground connections of the power utility, telephone lines, and internal metallic water pipe system, if present, are connected together. This precaution may be particularly important in rural areas. CAUTION: Users should not attempt to make such connections themselves, but should contact the appropriate electric inspection authority, or electrician, as appropriate.
NOTICE: The Ringer Equivalence Number (REN) assigned to each terminal device provides an indication of the maximum number of terminals allowed to be connected to a telephone interface. The termination on an interface may consist of any combination of devices subject only to the requirement that the sum of the Ringer Equivalence Numbers of all the devices does not exceed 5.
VCCI Compliance Statement
This is a Class A product based on the standard of the Voluntary Control Council for Interference by Information Technology Equipment (VCCI). If this equipment is used in a domestic environment, radio disturbance may arise. When such trouble occurs, the user may be required to take corrective actions.
iv Internet Appliance User Reference Manual
Safety Information: Class 1 Laser Transceivers
Safety Information: Class 1 Laser Transceivers
This product may use Class 1 laser transceivers. Read the following safety information before installing or operating this product.
The Class 1 laser transceivers use an optical feedback loop to maintain Class 1 operation limits. This control loop eliminates the need for maintenance checks or adjustments. The output is factory set and does not allow any user adjustment. Class 1 laser transceivers comply with the following safety standards:
21 CFR 1040.10 and 1040.11, U.S. Department of Health and Human Services (FDA)
IEC Publication 825 (International Electrotechnical Commission)
CENELEC EN 60825 (European Committee for Electrotechnical Standardization)
When operating within their performance limitations, laser transceiver output meets the Class 1 accessible emission limit of all three standards. Class 1 levels of laser radiation are not considered hazardous.
Laser Radiation and Connectors
When the connector is in place, all laser radiation remains within the fiber. The maximum amount of radiant power exiting the fiber (under normal conditions) is –12.6 dBm or 55 x 10
Removing the optical connector from the transceiver allows laser radiation to emit directly from the optical port. The maximum radiance from the optical port (under worst case conditions) is 0.8 W cm or 8 x 10
Do not use optical instruments to view the laser output. The use of optical instruments to view laser output increases eye hazard. When viewing the output optical port, power must be removed from the network adapter.
3
W m2 sr–1.
-6
watts.
-2
Internet Appliance User Reference Manual v
Cabletron Systems, Inc. Program License Agreement
Cabletron Systems, Inc.
Program License Agreement
IMPORTANT: THIS LICENSE APPLIES FOR USE OF PRODUCT IN THE FOLLOWING GEOGRAPHICAL REGIONS:
CANADA MEXICO CENTRAL AMERICA SOUTH AMERICA
BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT, CAREFULLY READ THIS LICENSE AGREEMENT.
This document is an agreement (“Agreement”) between You, the end user, and Cabletron Systems, Inc. (“Cabletron”) that sets forth your rights and obligations with respect to the Cabletron software program (“Program”) in the package. The Program may be contained in firmware, chips or other media. UTILIZING THE ENCLOSED PRODUCT, YOU ARE AGREEING TO BECOME BOUND BY THE TERMS OF THIS AGREEMENT, WHICH INCLUDES THE LICENSE AND THE LIMITATION OF WARRANTY AND DISCLAIMER OF LIABILITY. IF YOU DO NOT AGREE TO THE TERMS OF THIS AGREEMENT, RETURN THE UNOPENED PRODUCT TO CABLETRON OR YOUR DEALER, IF ANY, WITHIN TEN (10) DAYS FOLLOWING THE DATE OF RECEIPT FOR A FULL REFUND.
IF YOU HAVE ANY QUESTIONS ABOUT THIS AGREEMENT, CONTACT CABLETRON SYSTEMS (603) 332-9400. Attn: Legal Department.
1. LICENSE. You have the right to use only the one (1) copy of the Program provided in this package subject to the terms and conditions of this License Agreement.
You may not copy, reproduce or transmit any part of the Program except as permitted by the Copyright Act of the United States or as authorized in writing by Cabletron.
2. OTHER RESTRICTIONS. You may not reverse engineer, decompile, or disassemble the Program.
3. APPLICABLE LAW. This License Agreement shall be interpreted and governed under the laws and in the state and federal courts of New Hampshire. You accept the personal jurisdiction and venue of the New Hampshire courts.
4. EXPORT REQUIREMENTS. You understand that Cabletron and its Affiliates are subject to regulation by agencies of the U.S. Government, including the U.S. Department of Commerce, which prohibit export or diversion of certain technical products to certain countries, unless a license to export the product is obtained from the U.S. Government or an exception from obtaining such license may be relied upon by the exporting party.
If the Program is exported from the United States pursuant to the License Exception CIV under the U.S. Export Administration Regulations, You agree that You are a civil end user of the Program and agree that You will use the Program for civil end uses only and not for military purposes.
If the Program is exported from the United States pursuant to the License Exception TSR under the U.S. Export Administration Regulations, in addition to the restriction on transfer set forth in
vi Internet Appliance User Reference Manual
Cabletron Systems, Inc. Program License Agreement
Sections 1 or 2 of this Agreement, You agree not to (i) reexport or release the Program, the source code for the Program or technology to a national of a country in Country Groups D:1 or E:2 (Albania, Armenia, Azerbaijan, Belarus, Bulgaria, Cambodia, Cuba, Estonia, Georgia, Iraq, Kazakhstan, Kyrgyzstan, Laos, Latvia, Libya, Lithuania, Moldova, North Korea, the People’s Republic of China, Romania, Russia, Rwanda, Tajikistan, Turkmenistan, Ukraine, Uzbekistan, Vietnam, or such other countries as may be designated by the United States Government), (ii) export to Country Groups D:1 or E:2 (as defined herein) the direct product of the Program or the technology, if such foreign produced direct product is subject to national security controls as identified on the U.S. Commerce Control List, or (iii) if the direct product of the technology is a complete plant o r any major component of a plant, export to Country Groups D:1 or E:2 the direct product of the plant or a major component thereof, if such foreign produced direct product is subject to national security controls as identified on the U.S. Commerce Control List or is subject to State Department controls under the U.S. Munitions List.
5. UNITED STATES GOVERNMENT RESTRICTED RIGHTS. The enclosed Product (i) was
developed solely at private expense; (ii) contains “restricted computer software” submitted with restricted rights in accordance with section 52.227-19 (a) through (d) of the Commercial Computer Software-Restricted Rights Clause and its successors, and (iii) in all respects is proprietary data belonging to Cabletron and/or its suppliers. For Department of Defense units, the Product is considered commercial computer software in accordance with DFARS section 227.7202-3 and its successors, and use, duplication, or disclosure by the Government is subject to restrictions set forth herein.
6. EXCLUSION OF WARRANTY. Except as may be specifically provided by Cabletron in writing,
Cabletron makes no warranty, expressed or implied, concerning the Program (including its documentation and media).
CABLETRON DISCLAIMS ALL WARRANTIES, OTHER THAN THOSE SUPPLIED TO YOU BY CABLETRON IN WRITING, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, WITH RESPECT TO THE PROGRAM, THE ACCOMPANYING WRITTEN MATERIALS, AND ANY ACCOMPANYING HARDWARE.
7. NO LIABILITY FOR CONSEQUENTIAL DAMAGES. IN NO EVENT SHALL CABLETRON OR
ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS, PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, SPECIAL, INCIDENTAL, CONSEQUENTIAL, OR RELIANCE DAMAGES, OR OTHER LOSS) ARISING OUT OF THE USE OR INABILITY TO USE THIS CABLETRON PRODUCT, EVEN IF CABLETRON HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. BECAUSE SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, OR IN THE DURATION OR LIMITATION OF IMPLIED WARRANTIES IN SOME INSTANCES, THE ABOVE LIMITATION AND EXCLUSIONS MAY NOT APPLY TO YOU.
Internet Appliance User Reference Manual vii
Cabletron Systems Sales and Service, Inc. Program License Agreement
Cabletron Systems Sales and Service, Inc.
Program License Agreement
IMPORTANT: THIS LICENSE APPLIES FOR USE OF PRODUCT IN THE UNITED STATES OF AMERICA AND BY UNITED STATES OF AMERICA GOVERNMENT END USERS.
BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT, CAREFULLY READ THIS LICENSE AGREEMENT.
This document is an agreement (“Agreement”) between You, the end user, and Cabletron Systems Sales and Service, Inc. (“Cabletron”) that sets forth your rights and obligations with respect to the Cabletron software program (“Program”) in the package. The Program may be contained in firmware, chips or other media. UTILIZING THE ENCLOSED PRODUCT, YOU ARE AGREEING TO BECOME BOUND BY THE TERMS OF THIS AGREEMENT, WHICH INCLUDES THE LICENSE AND THE LIMITATION OF WARRANTY AND DISCLAIMER OF LIABILITY. IF YOU DO NOT AGREE TO THE TERMS OF THIS AGREEMENT, RETURN THE UNOPENED PRODUCT TO CABLETRON OR YOUR DEALER, IF ANY, WITHIN TEN (10) DAYS FOLLOWING THE DATE OF RECEIPT FOR A FULL REFUND.
IF YOU HAVE ANY QUESTIONS ABOUT THIS AGREEMENT, CONTACT CABLETRON SYSTEMS (603) 332-9400. Attn: Legal Department.
1. LICENSE. You have the right to use only the one (1) copy of the Program provided in this package subject to the terms and conditions of this License Agreement.
You may not copy, reproduce or transmit any part of the Program except as permitted by the Copyright Act of the United States or as authorized in writing by Cabletron.
2. OTHER RESTRICTIONS. You may not reverse engineer, decompile, or disassemble the Program.
3. APPLICABLE LAW. This License Agreement shall be interpreted and governed under the laws and in the state and federal courts of New Hampshire. You accept the personal jurisdiction and venue of the New Hampshire courts.
4. EXPORT REQUIREMENTS. You understand that Cabletron and its Affiliates are subject to regulation by agencies of the U.S. Government, including the U.S. Department of Commerce, which prohibit export or diversion of certain technical products to certain countries, unless a license to export the product is obtained from the U.S. Government or an exception from obtaining such license may be relied upon by the exporting party.
If the Program is exported from the United States pursuant to the License Exception CIV under the U.S. Export Administration Regulations, You agree that You are a civil end user of the Program and agree that You will use the Program for civil end uses only and not for military purposes.
If the Program is exported from the United States pursuant to the License Exception TSR under the U.S. Export Administration Regulations, in addition to the restriction on transfer set forth in Sections 1 or 2 of this Agreement, You agree not to (i) reexport or release the Program, the source code for the Program or technology to a national of a country in Country Groups D:1 or E:2 (Albania, Armenia, Azerbaijan, Belarus, Bulgaria, Cambodia, Cuba, Estonia, Georgia, Iraq, Kazakhstan, Kyrgyzstan, Laos, Latvia, Libya, Lithuania, Moldova, North Korea, the People’s
viii Internet Appliance User Reference Manual
Cabletron Systems Sales and Service, Inc. Program License Agreement
Republic of China, Romania, Russia, Rwanda, Tajikistan, Turkmenistan, Ukraine, Uzbekistan, Vietnam, or such other countries as may be designated by the United States Government), (ii) export to Country Groups D:1 or E:2 (as defined herein) the direct product of the Program or the technology, if such foreign produced direct product is subject to national security controls as identified on the U.S. Commerce Control List, or (iii) if the direct product of the technology is a complete plant o r any major component of a plant, export to Country Groups D:1 or E:2 the direct product of the plant or a major component thereof, if such foreign produced direct product is subject to national security controls as identified on the U.S. Commerce Control List or is subject to State Department controls under the U.S. Munitions List.
5. UNITED STATES GOVERNMENT RESTRICTED RIGHTS. The enclosed Product (i) was
developed solely at private expense; (ii) contains “restricted computer software” submitted with restricted rights in accordance with section 52.227-19 (a) through (d) of the Commercial Computer Software-Restricted Rights Clause and its successors, and (iii) in all respects is proprietary data belonging to Cabletron and/or its suppliers. For Department of Defense units, the Product is considered commercial computer software in accordance with DFARS section 227.7202-3 and its successors, and use, duplication, or disclosure by the Government is subject to restrictions set forth herein.
6. EXCLUSION OF WARRANTY. Except as may be specifically provided by Cabletron in writing,
Cabletron makes no warranty, expressed or implied, concerning the Program (including its documentation and media).
CABLETRON DISCLAIMS ALL WARRANTIES, OTHER THAN THOSE SUPPLIED TO YOU BY CABLETRON IN WRITING, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, WITH RESPECT TO THE PROGRAM, THE ACCOMPANYING WRITTEN MATERIALS, AND ANY ACCOMPANYING HARDWARE.
7. NO LIABILITY FOR CONSEQUENTIAL DAMAGES. IN NO EVENT SHALL CABLETRON
OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS, PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, SPECIAL, INCIDENTAL, CONSEQUENTIAL, OR RELIANCE DAMAGES, OR OTHER LOSS) ARISING OUT OF THE USE OR INABILITY TO USE THIS CABLETRON PRODUCT, EVEN IF CABLETRON HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. BECAUSE SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, OR IN THE DURATION OR LIMITATION OF IMPLIED WARRANTIES IN SOME INSTANCES, THE ABOVE LIMITATION AND EXCLUSIONS MAY NOT APPLY TO YOU.
Internet Appliance User Reference Manual ix
Cabletron Systems Limited Program License Agreement
Cabletron Systems Limited
Program License Agreement
IMPORTANT: THIS LICENSE APPLIES FOR THE USE OF THE PRODUCT IN THE FOLLOWING GEOGRAPHICAL REGIONS:
EUROPE MIDDLE EAST AFRICA ASIA AUSTRALIA PACIFIC RIM
BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT, CAREFULLY READ THIS LICENSE AGREEMENT.
This document is an agreement (“Agreement”) between You, the end user, and Cabletron Systems Limited (“Cabletron”) that sets forth your rights and obligations with respect to the Cabletron software program (“Program”) in the package. The Program may be contained in firmware, chips or other media. UTILIZING THE ENCLOSED PRODUCT, YOU ARE AGREEING TO BECOME BOUND BY THE TERMS OF THIS AGREEMENT, WHICH INCLUDES THE LICENSE AND THE LIMITATION OF WARRANTY AND DISCLAIMER OF LIABILITY. IF YOU DO NOT AGREE TO THE TERMS OF THIS AGREEMENT, RETURN THE UNOPENED PRODUCT TO CABLETRON OR YOUR DEALER, IF ANY, WITHIN TEN (10) DAYS FOLLOWING THE DATE OF RECEIPT FOR A FULL REFUND.
IF YOU HAVE ANY QUESTIONS ABOUT THIS AGREEMENT, CONTACT CABLETRON SYSTEMS (603) 332-9400. Attn: Legal Department.
1. LICENSE. You have the right to use only the one (1) copy of the Program provided in this package subject to the terms and conditions of this License Agreement.
You may not copy, reproduce or transmit any part of the Program except as permitted by the Copyright Act of the United States or as authorized in writing by Cabletron.
2. OTHER RESTRICTIONS. You may not reverse engineer, decompile, or disassemble the Program.
3. APPLICABLE LAW. This License Agreement shall be governed in accordance with English law. The English courts shall have exclusive jurisdiction in the event of any disputes.
4. EXPORT REQUIREMENTS. You understand that Cabletron and its Affiliates are subject to regulation by agencies of the U.S. Government, including the U.S. Department of Commerce, which prohibit export or diversion of certain technical products to certain countries, unless a license to export the product is obtained from the U.S. Government or an exception from obtaining such license may be relied upon by the exporting party.
If the Program is exported from the United States pursuant to the License Exception CIV under the U.S. Export Administration Regulations, You agree that You are a civil end user of the Program and agree that You will use the Program for civil end uses only and not for military purposes.
x Internet Appliance User Reference Manual
Cabletron Systems Limited Program License Agreement
If the Program is exported from the United States pursuant to the License Exception TSR under the U.S. Export Administration Regulations, in addition to the restriction on transfer set forth in Sections 1 or 2 of this Agreement, You agree not to (i) reexport or release the Program, the source code for the Program or technology to a national of a country in Country Groups D:1 or E:2 (Albania, Armenia, Azerbaijan, Belarus, Bulgaria, Cambodia, Cuba, Estonia, Georgia, Iraq, Kazakhstan, Kyrgyzstan, Laos, Latvia, Libya, Lithuania, Moldova, North Korea, the People’s Republic of China, Romania, Russia, Rwanda, Tajikistan, Turkmenistan, Ukraine, Uzbekistan, Vietnam, or such other countries as may be designated by the United States Government), (ii) export to Country Groups D:1 or E:2 (as defined herein) the direct product of the Program or the technology, if such foreign produced direct product is subject to national security controls as identified on the U.S. Commerce Control List, or (iii) if the direct product of the technology is a complete plant o r any major component of a plant, export to Country Groups D:1 or E:2 the direct product of the plant or a major component thereof, if such foreign produced direct product is subject to national security controls as identified on the U.S. Commerce Control List or is subject to State Department controls under the U.S. Munitions List.
5. UNITED STATES GOVERNMENT RESTRICTED RIGHTS. The enclosed Product (i) was
developed solely at private expense; (ii) contains “restricted computer software” submitted with restricted rights in accordance with section 52.227-19 (a) through (d) of the Commercial Computer Software-Restricted Rights Clause and its successors, and (iii) in all respects is proprietary data belonging to Cabletron and/or its suppliers. For Department of Defense units, the Product is considered commercial computer software in accordance with DFARS section 227.7202-3 and its successors, and use, duplication, or disclosure by the Government is subject to restrictions set forth herein.
6. EXCLUSION OF WARRANTY. Except as may be specifically provided by Cabletron in writing,
Cabletron makes no warranty, expressed or implied, concerning the Program (including its documentation and media).
CABLETRON DISCLAIMS ALL WARRANTIES, OTHER THAN THOSE SUPPLIED TO YOU BY CABLETRON IN WRITING, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, WITH RESPECT TO THE PROGRAM, THE ACCOMPANYING WRITTEN MATERIALS, AND ANY ACCOMPANYING HARDWARE.
7. NO LIABILITY FOR CONSEQUENTIAL DAMAGES. IN NO EVENT SHALL CABLETRON OR
ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS, PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, SPECIAL, INCIDENTAL, CONSEQUENTIAL, OR RELIANCE DAMAGES, OR OTHER LOSS) ARISING OUT OF THE USE OR INABILITY TO USE THIS CABLETRON PRODUCT, EVEN IF CABLETRON HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. BECAUSE SOME STATES DO NOT ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL DAMAGES, OR IN THE DURATION OR LIMITATION OF IMPLIED WARRANTIES IN SOME INSTANCES, THE ABOVE LIMITATION AND EXCLUSIONS MAY NOT APPLY TO YOU.
Internet Appliance User Reference Manual xi
Declaration of Conformity Addendum
Declaration of Conformity
Addendum
Application of Council Directive(s) 89/336/EEC
73/23/EEC
Manufacturer’s Name Cabletron Systems, Inc. Manufacturer’s Address 35 Industrial Way
PO Box 5005 Rochester, NH 03867
European Representative’s Name Mr. J. Solari European Representative’s Address Cabletron Systems Limited
Nexus House, Newbury Business Park London Road, Newbury Berkshire RG13 2PZ, England
Conformance to Directive(s)/Product Standards
Equipment Type/Environment Networking equipment for use in a commercial
We the undersigned, hereby declare, under our sole responsibility, that the equipment packaged with this notice conforms to the above directives.
Manufacturer Legal Representative in Europe
Mr. Ronald Fotino Full Name
Principal Compliance Engineer Title
Rochester, NH, USA Location
EC Directive 89/336/EEC EC Directive 73/23/EEC EN 55022 EN 50082-1 EN 60950
or light-industrial environment
Mr. J. Solari Full Name
Managing Director, E.M.E.A. Title
Newbury, Berkshire, England Location
xii Internet Appliance User Reference Manual
Contents
Preface.................................................................................................. xxiii
About This Manual............................................................................................................xx iii
Who Should Read This Manual? .....................................................................................xxiii
Related Documentation.....................................................................................................xxiii
Chapter 1: Introduction.......................................................................... 25
Reviewing Configuration Files ............................................................................................25
Using the Command Line Interface ....................................................................................26
Command Modes............................................................................................................26
User Mode.................................................................................................................26
Enable Mode.............................................................................................................27
Configure Mode.......................................................................................................27
Boot PROM Mode....................................................................................................27
Getting Help with CLI Commands..............................................................................28
Line Editing Commands................................................................................................29
Displaying and Changing Configuration Information.....................................................31
Identifying Ports on the IA-1100 and IA-1200 ...................................................................33
Chapter 2: Bridging Configuration Guide............................................. 35
Bridging Overview.................................................................................................................35
Spanning Tree (IEEE 802.1d).........................................................................................35
Bridging Modes (Flow-Based and Address-Based)...................................................36
VLAN Overview ....................................................................................................................36
Port-Based VLANs..........................................................................................................37
MAC Address-Based VLANs........................................................................................37
Protocol-Based VLANs ..................................................................................................37
Subnet-Based VLANs.....................................................................................................38
Policy-Based VLANs ......................................................................................................38
IA VLAN Support..................................................................................................................38
VLANs and the IA ..........................................................................................................38
Ports, VLANs, and Layer-3 Interfaces .........................................................................39
Access Ports and Trunk Ports (802.1Q Support)........................................................39
Explicit and Implicit VLANs.........................................................................................40
Internet Appliance User Reference Manual xiii
Contents
Configuring IA Bridging Functions.................................................................................... 40
Configuring Address-Based or Flow-Based Bridging.............................................. 40
Configuring Spanning Tree.......................................................................................... 42
Adjusting Spanning-Tree Parameters......................................................................... 42
Setting the Bridge Priority ..................................................................................... 43
Setting a Port Priority............................................................................................. 43
Assigning Port Costs .............................................................................................. 43
Adjusting Bridge Protocol Data Unit (BPDU) Intervals.................................... 44
Adjusting the Interval between Hello Times............................................... 44
Defining the Forward Delay Interval............................................................ 44
Defining the Maximum Age .......................................................................... 45
Configuring a Port- or Protocol-Based VLAN........................................................... 45
Creating a Port- or Protocol-Based VLAN .......................................................... 45
Adding Ports to a VLAN ....................................................................................... 45
Configuring VLAN Trunk Ports.................................................................................. 46
Configuring VLANs for Bridging................................................................................ 46
Monitoring Bridging.............................................................................................................46
Configuration Examples....................................................................................................... 47
Creating an IP VLAN .................................................................................................... 47
Creating a Non-IP VLAN.............................................................................................. 47
Chapter 3: SmartTRUNK Configuration Guide......................................49
Overview ................................................................................................................................ 49
Configuring SmartTRUNKs ................................................................................................ 50
Creating a SmartTRUNK .............................................................................................. 50
Add Physical Ports to the SmartTRUNK.................................................................... 51
Specify Traffic Distribution Policy (Optional) ........................................................... 51
Monitoring SmartTRUNKs.................................................................................................. 52
Example Configurations....................................................................................................... 53
Chapter 4: IP Routing Configuration Guide .......................................... 55
IP Routing Overview ............................................................................................................ 55
IP Routing Protocols...................................................................................................... 56
Configuring IP Interfaces and Parameters ........................................................................ 56
Configuring IP Addresses to Ports.............................................................................. 56
Configuring IP Interfaces for a VLAN........................................................................ 57
Specifying Ethernet Encapsulation Method............................................................... 57
Configuring Address Resolution Protocol (ARP) ..................................................... 57
Configuring ARP Cache Entries ........................................................................... 58
Configuring Proxy ARP......................................................................................... 58
Configuring DNS Parameters ...................................................................................... 58
Configuring IP Services (ICMP)................................................................................... 59
Configuring IP Helper................................................................................................... 59
Configuring Direct Broadcast....................................................................................... 60
Configuring Denial of Service (DOS).......................................................................... 60
Monitoring IP Parameters............................................................................................. 61
Configuration Examples....................................................................................................... 61
Assigning IP Interfaces.................................................................................................. 61
xiv Internet Appliance User Reference Manual
Contents
Chapter 5: VRRP Configuration Guide................................................... 63
VRRP Overview .....................................................................................................................63
Configuring VRRP .................................................................................................................64
Basic VRRP Configuration.............................................................................................64
Configuration of Router R1....................................................................................65
Configuration for Router R2 ..................................................................................65
Symmetrical Configuration...........................................................................................65
Configuration of Router R1....................................................................................67
Configuration of Router R2....................................................................................67
Multi-Backup Configuration.........................................................................................68
Configuration of Router R1....................................................................................69
Configuration of Router R2....................................................................................70
Configuration of Router R3....................................................................................71
Additional Configuration..............................................................................................72
Setting the Backup Priority ....................................................................................72
Setting the Advertisement Interval.......................................................................72
Setting Pre-empt Mode...........................................................................................73
Setting an Authentication Key...............................................................................73
Monitoring VRRP...................................................................................................................74
ip-redundancy trace........................................................................................................74
ip-redundancy show.......................................................................................................74
VRRP Configuration Notes...................................................................................................75
Chapter 6: RIP Configuration Guide ...................................................... 77
RIP Overview..........................................................................................................................77
Configuring RIP .....................................................................................................................78
Enabling and Disabling RIP ..........................................................................................78
Configuring RIP Interfaces............................................................................................78
Configuring RIP Parameters .........................................................................................79
Configuring RIP Route Preference...............................................................................80
Configuring RIP Route Default-Metric........................................................................80
Monitoring RIP.......................................................................................................................81
Configuration Example.........................................................................................................82
Chapter 7: OSPF Configuration Guide................................................... 83
OSPF Overview ......................................................................................................................83
OSPF Multipath...............................................................................................................84
Configuring OSPF..................................................................................................................84
Enabling OSPF.................................................................................................................8 4
Configuring OSPF Interface Parameters .....................................................................85
Configuring an OSPF Area............................................................................................86
Configuring OSPF Area Parameters ............................................................................87
Creating Virtual Links....................................................................................................88
Configuring Autonomous System External (ASE) Link Advertisements..............88
Configuring OSPF over Non-Broadcast Multiple Access.........................................89
Monitoring OSPF....................................................................................................................89
OSPF Configuration Examples.............................................................................................90
Exporting All Interface and Static Routes to OSPF....................................................91
Exporting All RIP, Interface, and Static Routes to OSPF ..........................................92
Internet Appliance User Reference Manual xv
Contents
Chapter 8: BGP Configuration Guide.....................................................97
BGP Overview ....................................................................................................................... 97
The Internet Appliance (IA) BGP Implementation................................................... 98
Basic BGP Tasks..................................................................................................................... 98
Setting the Autonomous System Number.................................................................. 99
Setting the Router ID ..................................................................................................... 99
Configuring a BGP Peer Group.................................................................................. 100
Adding and Removing a BGP Peer........................................................................... 101
Starting BGP.................................................................................................................. 1 01
Using AS-Path Regular Expressions ......................................................................... 102
AS-Path Regular Expression Examples............................................................. 103
Using the AS Path Prepend Feature.......................................................................... 104
Notes on Using the AS Path Prepend Feature.................................................. 104
BGP Configuration Examples............................................................................................ 105
BGP Peering Session Example.................................................................................... 105
IBGP Configuration Example..................................................................................... 107
IBGP Routing Group Example............................................................................ 108
IBGP Internal Group Example............................................................................ 111
EBGP Multihop Configuration Example.................................................................. 114
Community Attribute Example ................................................................................. 117
Notes on Using Communities............................................................................. 124
Local_Pref Attribute Example.................................................................................... 124
Notes on Using the Local_Pref Attribute .......................................................... 126
Multi-Exit Discriminator Attribute Example ........................................................... 126
EBGP Aggregation Example....................................................................................... 128
Route Reflection Example........................................................................................... 129
Notes on Using Route Reflection........................................................................ 132
Chapter 9: Routing Policy Configuration Guide..................................133
Route Import and Export Policy Overview..................................................................... 133
Preference......................................................................................................................134
Import Policies.............................................................................................................. 135
Import-Source........................................................................................................ 135
Route-Filter ............................................................................................................ 136
Export Policies .............................................................................................................. 136
Export-Destination................................................................................................ 136
Export-Source ........................................................................................................ 137
Route-Filter ............................................................................................................ 137
Specifying a Route Filter ............................................................................................. 138
Aggregates and Generates.......................................................................................... 139
Aggregate-Destination ......................................................................................... 139
Aggregate-Source.................................................................................................. 139
Route-Filter ............................................................................................................ 140
Authentication.............................................................................................................. 140
Authentication Methods...................................................................................... 141
Authentication Keys and Key Management..................................................... 141
xvi Internet Appliance User Reference Manual
Contents
Configuring Simple Routing Policies................................................................................142
Redistributing Static Routes........................................................................................142
Redistributing Directly Attached Networks.............................................................143
Redistributing RIP into RIP.........................................................................................143
Redistributing RIP into OSPF......................................................................................143
Redistributing OSPF to RIP .........................................................................................144
Redistributing Aggregate Routes ...............................................................................144
Simple Route Redistribution Examples.....................................................................144
Example 1: Redistribution into RIP.....................................................................144
Exporting a Given Static Route to All RIP Interfaces................................146
Exporting All Static Routes to All RIP Interfaces.......................................146
Exporting All Static Routes Except the Default Route to All RIP
Interfaces...................................................................................................146
Example 2: Redistribution into OSPF .................................................................146
Exporting All Interface & Static Routes to OSPF.......................................147
Exporting All RIP, Interface & Static Routes to OSPF...............................148
Configuring Advanced Routing Policies..........................................................................148
Export Policies...............................................................................................................149
Creating an Export Destination ..................................................................................150
Creating an Export Source...........................................................................................150
Import Policies...............................................................................................................150
Creating an Import Source ..........................................................................................151
Creating a Route Filter .................................................................................................151
Creating an Aggregate Route......................................................................................152
Creating an Aggregate Destination............................................................................153
Creating an Aggregate Source ....................................................................................153
Examples of Import Policies........................................................................................153
Example 1: Importing from RIP...........................................................................153
Importing a Selected Subset of Routes from One RIP Trusted
Gateway....................................................................................................155
Importing a Selected Subset of Routes from All RIP Peers
Accessible Over a Certain Interface......................................................156
Example 2: Importing from OSPF.......................................................................157
Importing a Selected Subset of OSPF-ASE Routes....................................159
Examples of Export Policies ........................................................................................160
Example 1: Exporting to RIP................................................................................160
Exporting a Given Static Route to All RIP Interfaces................................161
Exporting a Given Static Route to a Specific RIP Interface ......................162
Exporting All Static Routes Reachable Over a Given Interface to a
Specific RIP-Interface..............................................................................163
Exporting Aggregate-Routes into RIP.........................................................164
Example 2: Exporting to OSPF.............................................................................165
Exporting All Interface & Static Routes to OSPF.......................................166
Exporting All RIP, Interface & Static Routes to OSPF...............................167
Internet Appliance User Reference Manual xvii
Contents
Chapter 10: IP Policy-Based Forwarding Configuration Guide .......... 171
Overview .............................................................................................................................. 171
Configuring IP Policies....................................................................................................... 172
Defining an ACL Profile.............................................................................................. 172
Associating the Profile with an IP Policy.................................................................. 173
Creating Multi-statement IP Policies ................................................................. 173
Setting Load Distribution for Next-Hop Gateways......................................... 174
Setting the IP Policy Action................................................................................. 174
Checking the Availability of Next-Hop Gateways .......................................... 175
Applying an IP Policy to an Interface ....................................................................... 176
Applying an IP Policy to Locally Generated Packets ...................................... 176
IP Policy Configuration Examples.................................................................................... 176
Routing Traffic to Different ISPs................................................................................ 176
Prioritizing Service to Customers.............................................................................. 178
Authenticating Users through a Firewall................................................................. 179
Firewall Load Balancing.............................................................................................. 180
Monitoring IP Policies ........................................................................................................ 181
Chapter 11: Network Address Translation Configuration Guide ......185
Overview .............................................................................................................................. 185
Configuring NAT ................................................................................................................ 186
Setting Inside and Outside Interfaces ....................................................................... 186
Setting NAT Rules........................................................................................................ 187
Static........................................................................................................................ 187
Dynamic ................................................................................................................. 187
Managing Dynamic Bindings............................................................................................ 187
NAT and FTP....................................................................................................................... 188
Monitoring NAT..................................................................................................................188
Configuration Examples..................................................................................................... 189
Static Configuration..................................................................................................... 189
Using Static NAT .................................................................................................. 190
Dynamic Configuration............................................................................................... 190
Using Dynamic NAT............................................................................................ 191
Dynamic NAT with IP Overload (PAT) Configuration ......................................... 192
Using Dynamic NAT with IP Overload ............................................................ 193
Dynamic NAT with Outside Interface Redundancy .............................................. 193
Using Dynamic NAT with Matching Interface Redundancy......................... 194
Chapter 12: Web Hosting Configuration Guide.................................. 195
Overview .............................................................................................................................. 195
Load Balancing .................................................................................................................... 196
Configuring Load Balancing ...................................................................................... 196
Creating the Server Group................................................................................... 196
Adding Servers to the Load Balancing Group.................................................. 197
Optional Group or Server Operating Parameters................................................... 197
Specifying Load Balancing Policy ...................................................................... 197
Specifying a Connection Threshold ................................................................... 198
Verifying Servers and Applications................................................................... 198
Verifying Extended Content................................................................................ 199
xviii Internet Appliance User Reference Manual
Contents
Setting Server Status.....................................................................................................200
Load Balancing and FTP..............................................................................................201
Allowing Access to Load Balancing Servers.............................................................201
Setting Timeouts for Load Balancing Mappings......................................................201
Specifying the VPN Port Number..............................................................................202
Displaying Load Balancing Information...................................................................202
Configuration Examples ..............................................................................................203
Web Hosting with One Virtual Group and Multiple Destination Servers....203
Web Hosting with Multiple Virtual Groups and Multiple Destination
Servers..............................................................................................................204
Virtual IP Address Ranges ...................................................................................205
Web Caching.........................................................................................................................206
Configuring Web Caching...........................................................................................207
Creating the Cache Group....................................................................................207
Specifying the Client(s) for the Cache Group (Optional).................................207
Redirecting HTTP Traffic on an Interface..........................................................208
Configuration Example................................................................................................208
Other Configurations ...................................................................................................209
Bypassing Cache Servers ......................................................................................209
Proxy Server Redundancy....................................................................................209
Distributing Frequently-Accessed Sites Across Cache Servers.......................210
Monitoring Web Caching ............................................................................................210
Chapter 13: Access Control List Configuration Guide........................ 211
ACL Basics ............................................................................................................................212
Defining Selection Criteria in ACL Rules..................................................................212
How ACL Rules are Evaluated...................................................................................213
Implicit Deny Rule........................................................................................................214
Allowing External Responses to Established TCP Connections ............................215
Creating and Modifying ACLs...........................................................................................216
Editing ACLs Offline....................................................................................................216
Maintaining ACLs Using the ACL Editor.................................................................217
Using ACLs...........................................................................................................................218
Applying ACLs to Interfaces.......................................................................................218
Applying ACLs to Services .........................................................................................219
Using ACLs as Profiles.................................................................................................219
Using Profile ACLs with the IP Policy Facility .................................................220
Using Profile ACLs with the Traffic Rate Limiting Facility ............................221
Using Profile ACLs with Dynamic NAT............................................................222
Using Profile ACLs with the Port Mirroring Facility .......................................222
Using Profile ACLs with the Web Caching Facility .........................................223
Redirecting HTTP Traffic to Cache Servers................................................223
Preventing Web Objects From Being Cached.............................................224
Enabling ACL Logging........................................................................................................225
Monitoring ACLs .................................................................................................................225
Internet Appliance User Reference Manual xix
Contents
Chapter 14: Security Configuration Guide ..........................................227
Security Overview...............................................................................................................227
Configuring IA Access Security ........................................................................................ 228
Configuring RADIUS .................................................................................................. 228
Monitoring RADIUS............................................................................................. 229
Configuring TACACS ................................................................................................. 229
Monitoring TACACS............................................................................................ 229
Configuring TACACS Plus......................................................................................... 230
Monitoring TACACS Plus................................................................................... 231
Configuring Passwords............................................................................................... 231
Chapter 15: QoS Configuration Guide................................................. 233
QoS & Layer-2, -3, and -4 Flow Overview....................................................................... 233
Layer-2, -3, and -4 Flow Specification....................................................................... 234
Precedence for Layer-3 Flows .................................................................................... 234
IA Queuing Policies ..................................................................................................... 235
Traffic Prioritization for Layer-2 Flows............................................................................ 235
Configuring Layer-2 QoS............................................................................................ 236
Traffic Prioritization for Layer-3 and -4 Flows ............................................................... 236
Configuring IP QoS Policies ....................................................................................... 236
Setting an IP QoS Policy....................................................................................... 237
Specifying Precedence for an IP QoS Policy..................................................... 237
Configuring IA Queueing Policy...................................................................................... 237
Allocating Bandwidth for a Weighted-Fair Queuing Policy ................................. 238
ToS Rewrite .......................................................................................................................... 238
Configuring ToS Rewrite for IP Packets................................................................... 239
Monitoring QoS................................................................................................................... 241
Limiting Traffic Rate...........................................................................................................241
Example Configuration............................................................................................... 242
Displaying Rate Limit Information ........................................................................... 242
Chapter 16: Performance Monitoring Guide.......................................243
Performance Monitoring Overview ................................................................................. 243
Configuring the IA for Port Mirroring............................................................................. 245
Monitoring Broadcast Traffic............................................................................................. 245
Chapter 17: RMON Configuration Guide.............................................247
RMON Overview ................................................................................................................ 247
Configuring and Enabling RMON.................................................................................... 248
Example of RMON Configuration Commands....................................................... 248
RMON Groups ............................................................................................................. 249
Lite RMON Groups .............................................................................................. 250
Standard RMON Groups..................................................................................... 250
Professional RMON Groups................................................................................ 250
Control Tables............................................................................................................... 251
Using RMON ....................................................................................................................... 252
xx Internet Appliance User Reference Manual
Contents
Configuring RMON Groups...............................................................................................254
Configuration Examples ..............................................................................................256
Displaying RMON Information.........................................................................................257
RMON CLI Filters.........................................................................................................258
Creating RMON CLI Filters .................................................................................259
Using RMON CLI Filters ......................................................................................259
Troubleshooting RMON .....................................................................................................260
Allocating Memory to RMON............................................................................................261
Internet Appliance User Reference Manual xxi
About This Manual
Preface
This manual provides detailed information and procedures for configuring the software for the Cabletron instructions in the Internet Appliance 1100/1200 Getting Started Guide to install the chassis and perform basic setup tasks. Then return to this manual for more detailed configuration information.
Internet Appliance (IA). If you have not yet installed the IA, follow the
Who Should Read This Manual?
Read this manual if you are a network administrator responsible for configuring and monitoring the IA.
Related Documentation
The Internet Appliance documentation set includes the following items. Refer to these documents to learn more about the IA.
For information about… Refer to…
Installing and setting up the IA Internet Appliance 1100/1200 Getting Started
Guide
The complete syntax for all command line interface commands
System messages Internet Appliance Error Reference
Internet Appliance User Reference Manual xxiii
Internet Appliance Command Line Interface Reference
Introduction
This chapter provides information that you need to know before configuring the Internet Appliance (IA) software. If you have not yet installed the IA, follow the instructions in the Internet Appliance 1100/1200 Getting Started Guide to install the chassis and perform basic setup tasks. Then return to this manual for more detailed configuration information.
Reviewing Configuration Files
The Internet Appliance 1100/1200 Getting Started Guide introduced the following configuration files used by the IA:
Startup – The configuration file that the IA uses to configure itself when the system is powered on. The Startup configuration remains even when the system is rebooted.
Chapter 1
Active – The commands from the Startup configuration file and any configuration commands that you have made active from the scratchpad. The active configuration remains in effect until you power down or reboot the system.
Scratchpad – The configuration commands you have entered during a CLI session. These commands are temporary and do not become active until you explicitly make them part of the active configuration.
Note:
Entering commands and saving configuration files are discussed in more detail in the following section.
Internet Appliance User Reference Manual 25
Because some commands depend on other commands for successful execution, the IA scratchpad simplifies system configuration by allowing you to enter configuration commands in any order, even when dependencies exist. When you activate the commands in the scratchpad, the IA sorts out the dependencies and executes the command in the proper sequence.
Chapter 1: Introduction
Using the Command Line Interface
The CLI allows you to enter and execute commands from the IA Console or from Telnet sessions. Up to four simultaneous Telnet sessions are allowed. CLI commands are grouped by subsystems. For example, the set of commands that let you configure and display IP routing table information all start with ip. Within the set of ip commands are commands such as set, show, start, stop, configure, etc. The complete set of commands for each subsystem is described in the Internet Appliance Command Line Interface Reference Manual.
Command Modes
The CLI provides access to four different command modes. Each command mode provides a group of related commands. This section describes how to access and list the commands available in each command mode and explains the primary uses for each command mode.
User Mode
After you log in to the IA, you are automatically in User mode. The User commands available are a subset of those available in Enable mode. In general, the User commands allow you to display basic information and use basic utilities such as ping.
The User mode command prompt consists of the ia name followed by the angle bracket (>), as shown below:
ia>
The default name is ia unless it has been changed during initial configuration. Refer to the Internet Appliance 1100/1200 Getting Started Guide for the procedures for changing the system name.
26 Internet Appliance User Reference Manual
Enable Mode
Enable mode provides more facilities than User mode. You can display critical features within Enable mode including router configuration, access control lists, and SNMP statistics. To enter Enable mode from the User mode, enter the command enable (or en), and then supply the password when prompted.
The Enable mode command prompt consists of the ia name followed by the pound sign (#):
ia#
To exit Enable mode and return to User mode, either type exit and press Return or press Ctrl+Z.
Configure Mode
Configure mode provides the capabilities to configure all features and functions on the IA. These include router configuration, access control lists, and spanning tree. To enter Configure mode, enter the command config from Enable mode.
Chapter 1: Introduction
Note: As mentioned previously, up to four Telnet sessions can be run simultaneously on
The Configure mode command prompt consists of the ia name followed by (config) and a pound sign (#):
ia(config)#
To exit Configure mode and return to Enable mode, either type exit and press Return or press Ctrl+Z.
Boot PROM Mode
If your IA does not find a valid system image on the external PCMCIA flash, the system might enter programmable read-only memory (PROM) mode. You should then reboot the IA (enter the command reboot at the boot PROM prompt) to restart the system. If the system fails to reboot successfully, call Cabletron Systems, Inc., Technical Support to resolve the problem.
For information on how to upgrade the boot PROM software and boot using the upgraded image, see the Internet Appliance 1100/1200 Getting Started Guide.
the IA. All four sessions can be in Configure mode at the same time, so you should consider limiting access to the IA to authorized users.
Internet Appliance User Reference Manual 27
Chapter 1: Introduction
Getting Help with CLI Commands
Interactive help is available from the CLI by entering the question mark (?) character at any time. The help is context-sensitive; the help provided is based on where in the command you are. For example, if you are at the User mode prompt, enter a question mark (?), as shown in the following example, to list the commands available in User mode:
ia> ? aging - Show L2 and L3 Aging information cli - Modify the command line interface behavior enable - Enable privileged user mode exit - Exit current mode file - File manipulation commands help - Describe online help facility ip-redundancy - Show IP Redundancy information (VRRP) l2-tables - Show L2 Tables information logout - Log off the system multicast - Configure Multicast related parameters ping - Ping utility pvst - Show Per Vlan Spanning Tree Protocol (PVST) parameters statistics - Show or clear IA statistics stp - Show STP status telnet - Telnet utility traceroute - Traceroute utility vlan - Show VLAN-related parameters
You can also type the ? character following a command to see a description of the parameters or options that you can enter. Once the help information is displayed, the command line is redisplayed as before but without the ? character. The following is an example of invoking help while entering a command:
ia(config)# load-balance create ? group-name - Name of this Load Balanced group of servers vip-range-name - Name of this Virtual IP range ia(config)# load-balance create
If you enter enough characters of a command keyword to uniquely identify it and press the space bar, the CLI attempts to complete the command. If you do not enter enough characters or you enter the wrong characters, the CLI cannot complete the command. For example, if you enter the following in Enable mode and press the spacebar as indicated:
ia# system show e[space]
the CLI completes the command as follows:
ia# system show environmental
28 Internet Appliance User Reference Manual
Chapter 1: Introduction
If you are entering several commands for the same subsystem, you can enter the subsystem name from the CLI. Then, execute individual commands for the subsystem without typing the subsystem name each time. For example, if you are configuring several entries for the IP routing table, you can simply enter ip at the CLI Configure prompt. The prompt changes to indicate that the context for the commands to be entered has changed to that of the IP subsystem. If you type a ?, only those commands that are valid for the IP subsystem are displayed. The following is an example:
ia(config)# ip ia(config)(ip)# ?
add - Add a static route dos - Configure specific denial of service features disable - Disable certain IP function enable - Enable certain IP function helper-address - Specify IP helper address for an interface l3-hash - Change IP hash variant for channel set - Set ip stack properties Ctrl-z - Exits to previous level top - Exits to the top level ia(config)(ip)# [Ctrl-Z] ia(config)#
Line Editing Commands
The IA provides line editing capabilities that are similar to Emacs, a UNIX text editor. For example, you can use certain line editing keystrokes to move forwards or backwards on a line, delete or transpose characters, and delete portions of a line. To use the line editing commands, you need to have a VT-100 terminal or terminal emulator. The line editing commands that you can use with CLI are detailed in the following table:
Command Resulting Action
Ctrl-a
Ctrl-b
Ctrl-c
Ctrl-d
Ctrl-e
Ctrl-f
Ctrl-g
Ctrl-h
Ctrl-i
Move to beginning of line
Move back one character
Abort current line
Delete character under cursor
Move to end of line
Move forward one character
Abort current line
Delete character just prior to the cursor
Insert one space (tab substitution)
Ctrl-j
Internet Appliance User Reference Manual 29
Carriage return (executes command)
Chapter 1: Introduction
Command Resulting Action
Ctrl-k
Ctrl-l
Ctrl-m
Ctrl-n
Ctrl-o
Ctrl-p
Ctrl-q
Ctrl-r
Ctrl-s
Ctrl-t
Ctrl-u
Ctrl-v
Ctrl-w
Ctrl-x
Kill line from cursor to end of line
Refresh current line
Carriage return (executes command)
Next command from history buffer
None
Previous command from history buffer
None
Refresh current line
None
Transpose character under cursor with the character just prior to the cursor
Delete line from the beginning of line to cursor
None
None
Move forward one word
Ctrl-y
Ctrl-z
ESC-b
ESC-d
ESC-f
ESC­BackSpace
SPACE
!*
Paste back what was deleted by the previous Ctrl-k or Ctrl-w command. Text is pasted back at the cursor location.
If inside a subsystem, it exits back to the top level. If in Enable mode, it exits back to User mode. If in Configure mode, it exits back to Enable mode.
Move backward one word
Kill word from cursor’s current location until the first white space
Move forward one word
Delete backwards from cursor to the previous space (essentially a delete-word-backward command)
Attempts to complete command keyword. If word is not expected to be a keyword, the space character is inserted.
Show all commands currently stored in the history buffer.
30 Internet Appliance User Reference Manual
Loading...
+ 232 hidden pages