Cabletron Systems reserves the right to make changes in speciÞcations and other information
contained in this document without prior notice. The reader should in all cases consult Cabletron
Systems to determine whether any such changes have been made.
The hardware, Þrmware, or software described in this manual is subject to change without notice.
IN NO EVENT SHALL CABLETRON SYSTEMS BE LIABLE FOR ANY INCIDENTAL, INDIRECT,
SPECIAL, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING BUT NOT LIMITED
TO LOST PROFITS) ARISING OUT OF OR RELATED TO THIS MANUAL OR THE INFORMATION
CONTAINED IN IT, EVEN IF CABLETRON SYSTEMS HAS BEEN ADVISED OF, KNOWN, OR
SHOULD HAVE KNOWN, THE POSSIBILITY OF SUCH DAMAGES.
Virus Disclaimer
Cabletron has tested its software with current virus checking technologies. However, because no antivirus system is 100% reliable, we strongly caution you to write protect and then verify that the
Licensed Software, prior to installing it, is virus-free with an anti-virus system in which you have
conÞdence.
Cabletron Systems makes no representations or warranties to the effect that the Licensed Software is
virus-free.
EMM-E6, ETWMIM, FDMMIM, FDCMIM, MicroMMAC, MRXI, MRXI-24, NB20E, NB25E, NB30,
NB35E, NBR, SEHI, STHI, TRBMIM, TRMM, TRMM-2, TRMM-4, TRMMIM, TRXI, Media
Interface Module, MIM, and Flexible Network Bus are trademarks of Cabletron Systems, Inc.
UNIX and OPENLOOK are trademarks of Unix System Laboratories, Inc. OSF/Motif and Motif are
trademarks of the Open Software Foundation, Inc. X Window System is a trademark of X Consortium,
Inc. Ethernet and XNS are trademarks of Xerox Corporation. Apple and AppleTalk are registered
trademarks of Apple Computer, Inc. Banyan is a registered trademark of Banyan Systems, Inc.
DECnet is a registered trademark of Digital Equipment Corporation. Novell is a registered trademark
of Novell, Inc. CompuServe is a registered trademark of CompuServe. Sun Microsystems is a
registered trademark, and Sun, SunNet, and OpenWindows are trademarks of Sun Microsystems,
Inc.
i
Restricted Rights Notice
(Applicable to licenses to the United States Government only.)
1.Use, duplication, or disclosure by the Government is subject to restrictions as set forth in
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS
252.227-7013.
Cabletron Systems, Inc., 35 Industrial Way, Rochester, New Hampshire 03867-0505.
2.(a) This computer software is submitted with restricted rights. It may not be used, reproduced, or
disclosed by the Government except as provided in paragraph (b) of this Notice or as otherwise
expressly stated in the contract.
(b) This computer software may be:
(1)Used or copied for use in or with the computer or computers for which it was acquired,
including use at any Government installation to which such computer or computers may
be transferred;
(2)Used or copied for use in a backup computer if any computer for which it was acquired
is inoperative;
(3)Reproduced for safekeeping (archives) or backup purposes;
(4)Modified, adapted, or combined with other computer software, provided that the
modified, combined, or adapted portions of the derivative software incorporating
restricted computer software are made subject to the same restricted rights;
(5)Disclosed to and reproduced for use by support service contractors in accordance with
subparagraphs (b) (1) through (4) of this clause, provided the Government makes such
disclosure or reproduction subject to these restricted rights; and
(6)Used or copied for use in or transferred to a replacement computer.
(c) Notwithstanding the foregoing, if this computer software is published copyrighted computer
software, it is licensed to the Government, without disclosure prohibitions, with the minimum
rights set forth in paragraph (b) of this clause.
(d) Any other rights or limitations regarding the use, duplication, or disclosure of this computer
software are to be expressly stated in, or incorporated in, the contract.
(e) This Notice shall be marked on any reproduction of this computer software, in whole or in part.
ii
Chapter 1Introduction
Using the BRIM UserÕs Guide..................................................................................... 1-2
Related Manuals............................................................................................................ 1-3
Adding a New Connection................................................................................... 5-4
Deleting a Connection........................................................................................... 5-5
Index
v
Contents
vi
Chapter 1
Introduction
Using this guide; related manuals; management applications available for BRIMs; software
conventions; getting help; contacting Cabletron Systems Global Call Center
Welcome to the Cabletron SystemsÕ SPECTRUM
Bridge/Router Interface (BRIM) UserÕs Guide. We have designed this guide
to serve as a reference for using SPECTRUM Element Manager for all types
of BRIMs.
Cabletron SystemsÕ Bridge/Router Interface Modules (BRIMs) provide ßexible,
integrated bridging functionality (including trafÞc Þltering by destination, source,
type Þeld, and 64-byte data offset, and support for the Spanning Tree Algorithm)
or routing functionality to the network hub. By accommodating several media
types and topologies, these network interfaces connect to any standard Local Area
Network (LAN) or Wide Area Network (WAN).
Since BRIMs plug into CabletronÕs Intel i960-based products (e.g., EMM-E6,
ESXMIM, MicroMMAC, and MicroMMAC-T), SPECTRUM Element Manager
views the hub and bridge/router as a single entity. The following BRIMs are
supported by SPECTRUM Element Manager:
BRIM-A6
BRIM-A6DP
The ATM Bridge/Router Interface Modules feature high
speed ATM connectivity (at rates up to 155 Mbps). They
are fully compatible with the 9A000 ATM Switch Module
for the SmartSwitch
They support the IETF AToM MIB, Multi-Protocol
Encapsulation over AAL5, and many other protocols,
and meet ATM Forum UNI speciÞcations. The BRIM-A6
supports a single ATM interface, and the BRIM-A6DP
supports two redundant ATM interfaces.
¨
Element Manager
¨
9000, and Fore SystemsÕ ASX-200.
BRIM-E6
The Ethernet BRIM has a user-conÞgurable Ethernet Port
Interface Module (EPIM) port that provides media
ßexibility for AUI, UTP, STP, Þber or coax cable.
1-1
Introduction
NOTE
BRIM-E100
BRIM-F6
BRIM-W6
Cabletron Systems has discontinued manufacturing several BRIMs, including the
BRIM-WT1, the Cisco BRIM-W/E, the BRIM-A100, the BRIM-T6, the BRIM-FO, the
BRIM-FD1, the BRIM-FD2, and the BRIM-F5.
The Fast Ethernet BRIM has a user-conÞgurable Fast
Ethernet Port Interface Module (FEPIM) port that
provides either 100BASE-TX connectivity (via an RJ-45
interface) or 100BASE-FX connectivity (via an MMF
interface with an SC connector).
The FDDI Bridge/Router Interface Module is a
translational FDDI to Ethernet bridge, via media
conÞgurable Fiber Port Interface Module (FPIM)
connectors using MMF or SMF Þber, or UTP or STP
copper. The BRIM-F6 supports the IETF FDDI MIB and
dual homing. Its DAS attachment is ANSI-compliant.
The WAN Bridge/Router Interface Module supports
Synchronous, T1 and E1 connections. It carries PPP,
Frame Relay and X.25 protocols through its WAN Port
Interface Modules.
Using the BRIM User’s Guide
Each chapter in this guide describes one major functionality or a collection of
several smaller functionalities that the BRIM adds to the device. This guide
contains information about software functions which are accessed directly from
the device icon; for information about management functions which are accessed
via the SPECTRUM Element Manager platform, consult the SPECTRUM Element
Manager UserÕs Guide,and SPECTRUM Element Manager Tools Guide, and the
Remote Administration Tools UserÕs Guide.
Chapter 1, Introduction, provides a list of related documentation, describes
certain software conventions, and shows you how to contact Cabletron SystemsÕ
Global Call Center.
Chapter 2, Bridging, provides a comprehensive look at all management options
associated with the bridge portion of the device, including Bridge Performance
Graphs, Spanning Tree, and the Filtering and Special Filtering Databases.
Chapter 3, FDDI Applications, describes the FDDI management windows,
including ConÞguration, Connection Policy, Station List, and Performance.
Chapter 4, WAN Applications, describes the windows available for WAN Port
conÞguration, and the Synchronous Port Statistics window.
Chapter 5, ATM ConÞguration, describes how to conÞgure Permanent Virtual
Circuits (PVCs) for the ATM interface(s) available on the ATM BRIM.
1-2Using the BRIM User’s Guide
We assume that you have a general working knowledge of Ethernet IEEE 802.3,
FDDI, WAN, and ATM type data communications networks and their physical
layer components, and that you are familiar with general bridging concepts.
Related Manuals
The BRIM UserÕs Guide is only part of a complete document set designed to
provide comprehensive information about the features available to you through
SPECTRUM Element Manager. Other guides which include important
information related to managing the BRIM include:
Cabletron SystemsÕ SPECTRUM Element Manager UserÕs Guide
Cabletron SystemsÕ SPECTRUM Element Manager Tools Guide
Cabletron SystemsÕ SPECTRUM Element Manager Remote Administration Tools
UserÕs Guide
Introduction
Cabletron SystemsÕ SPECTRUM Element Manager Remote Monitoring (RMON)
UserÕs Guide
Cabletron SystemsÕ SPECTRUM Element Manager Alarm and Event Handling
UserÕs Guide
Cabletron SystemsÕ Network Troubleshooting Guide
Microsoft CorporationÕs Microsoft Windows UserÕs Guide
For more information about the capabilities of the BRIM and the host device in
which it is installed, consult the appropriate hardware documentation.
For more information about the capabilities of SPECTRUM Element Manager for
the host device, consult its UserÕs Guide.
BRIM Management Applications
When a device (e.g., MicroMMAC, NBR-620, EMM-E6, or ESXMIM) has a BRIM
installed and enabled, additional applications will be available from the Chassis
View window. These applications will depend on the type of BRIM installed in
your device.
¥Bridge Status will be available from the Device menufor all devices with
BRIMs installed. The Bridging options that are available from the Bridge Status
window will vary depending on the device and the type of BRIM you have
installed; see Chapter 2, Bridging, for details on the bridge applications.
¥Router Utilities (Basic Router ConÞguration and Advanced Router
ConÞguration) will be available from the Tools menu when a BRIM is
installed and enabled on your device. For more information, see the Routing
Services ConÞguration Guide.
Related Manuals1-3
Introduction
¥FDDI menu will be available on devices that have an FDDI BRIM installed and
enabled; see Chapter 3, FDDI Applications, for details.
¥WAN Status will be available from the Device menu for devices that have a
WAN BRIM installed and enabled; see Chapter 4, WAN Applications, for
details.
¥ATM Connections will be available from the Device menu for devices that
have an ATM BRIM installed and enabled; see Chapter 5, ATM ConÞguration,
for details.
If you cannot determine if you have a BRIM installed in your device or are unsure of the
TIP
type of installed BRIM, the I/F Summary window can help you Þnd the answer. To access
this window, select DeviceÐ>I/F Summary from your deviceÕs Chassis View window.
This windowÕs Description Þeld lists the interface descriptions for the device, including
the type of BRIM installed in the device (e.g., Ctron FDDI BRIM port). The BRIM port(s)
will always be listed at the end of the interface list, after all the non-BRIM interfaces.
Software Conventions
SPECTRUM Element ManagerÕs device user interface contains a number of
elements which are common to most windows and which operate the same
regardless of which window they appear in. A brief description of some of the
most common elements appears below; note that the information provided here is
not repeated in the descriptions of speciÞc windows and/or functions.
In accordance with Year 2000 compliance requirements, SPECTRUM Element Manager
NOTE
displays and allows you to set all dates with four-digit year values.
Using the Mouse
This document assumes you are using a Windows-compatible mouse with two
buttons; if you are using a three button mouse, you should ignore the operation of
the middle button when following procedures in this document. Procedures
within the SPECTRUM Element Manager document set refer to these buttons as
follows:
1-4Software Conventions
Introduction
Left Mouse Button
Right Mouse Button
Figure 1-1. Mouse Buttons
For many mouse operations, this document assumes that the left (primary) mouse
button is to be used, and references to activating a menu or button will not
include instructions about which mouse button to use.
However, in instances in which right (secondary) mouse button functionality is
available, instructions will explicitly refer to right mouse button usage. Also, in
situations where you may be switching between mouse buttons in the same area
or window, instructions may also explicitly refer to both left and right mouse
buttons.
Instructions to perform a mouse operation include the following terms:
¥Pointing means to position the mouse cursor over an area without pressing
either mouse button.
¥Clicking means to position the mouse pointer over the indicated target, then
press and release the appropriate mouse button. This is most commonly used
to select or activate objects, such as menus or buttons.
¥Double-clicking means to position the mouse pointer over the indicated
target, then press and release the mouse button two times in rapid succession.
This is commonly used to activate an objectÕs default operation, such as
opening a window from an icon. Note that there is a distinction made between
Òclick twiceÓ and Òdouble-click,Ó since Òclick twiceÓ implies a slower motion.
¥Pressing means to position the mouse pointer over the indicated target, then
press and hold the mouse button until the described action is completed. It is
often a pre-cursor to Drag operations.
¥Dragging means to move the mouse pointer across the screen while holding
the mouse button down. It is often used for drag-and-drop operations to copy
information from one window of the screen into another, and to highlight
editable text.
Software Conventions1-5
Introduction
Common Device Window Fields
Similar descriptive information is displayed in boxes at the top of most
device-speciÞc windows in SPECTRUM Element Manager, as shown in
Figure 1-2.
IP Address
Figure 1-2. Sample Window Showing Group Boxes
Device
Name
Location
MAC
Address
Device Name
Displays the user-deÞned name of the device. The device name can be changed
via the System Group window; see the Generic SNMP UserÕs Guide for details.
IP Address
Displays the deviceÕs IP (Internet Protocol) address; this will be the IP address
used to deÞne the device icon. IP addresses are assigned via Local Management
for the device; they cannot be changed via SPECTRUM Element Manager.
Location
Displays the user-deÞned location of the device. The location is entered through
the System Group window; see the Generic SNMP UserÕs Guide for details.
1-6Software Conventions
Introduction
MAC Address
The physical layer address assigned to the interface associated with the IP address
used to deÞne the device icon when it was added to SPECTRUM Element
Manager. MAC addresses are hard-coded in the device, and are not conÞgurable.
Informational Þelds describing the boards and/or ports being modeled are also
displayed in most windows:
Board Number
Displays the number indicating the position of the monitored board in the chassis.
Port Number
Displays the number of the monitored port.
Active Users
Indicates the number of users processing information through the deviceÕs
repeater channel, board, or port, as determined by MAC addresses.
Uptime
Displays the amount of time, in a days hh:mm:ss format, that the device has been
running since the last start-up.
Using Window Buttons
The Cancel button that appears at the bottom of most windows allows you to exit
a window and terminate any unsaved changes you have made. You may also
have to use this button to close a window after you have made any necessary
changes and set them by clicking on the OK, Set, or Apply button.
An OK, Set, or Apply button appears in windows that have conÞgurable values;
it allows you to conÞrm and SET changes you have made to those values. In some
windows, you may have to use this button to conÞrm each individual set; in other
windows, you can set several values at once and conÞrm the sets with one click
on the button.
The Help button brings up a Help text box with information speciÞc to the
current window. For more information on the Help button, see Using On-line
Help, page 1-8.
The command buttons, for example Bridge, call up a menu listing the windows,
screens, or commands available for that topic.
Any menu topic followed by ... (three dots) Ñ for example Statistics... Ñ calls up
a window or screen associated with that topic.
Software Conventions1-7
Introduction
Getting Help
This section describes different methods of getting help for questions or concerns
you may have while using SPECTRUM Element Manager.
Using On-line Help
You can use the BRIM window Help buttons to obtain information speciÞc to the
device. When you click on a Help button, a window will appear which contains
context-sensitive on-screen documentation that will assist you in the use of the
window and its associated command and menu options. Note that if a Help
button is grayed out, on-line help has not yet been implemented for the associated
window.
From the Help menu accessed from the host deviceÕs Chassis View window menu
bar, you can access on-line Help speciÞc to the Chassis View window, as well as
bring up the Chassis Manager window for reference. Refer to the deviceÕs userÕs
guide for information on the Chassis View and Chassis Manager windows.
All of the online help windows use the standard Microsoft Windows help facility. If you
NOTE
are unfamiliar with this feature of Windows, you can select Help from the Windows
Start menu, or Help Ñ>How to Use Help from the primary SPECTRUM Element
Manager window, or consult your Microsoft Windows product UserÕs Guide.
Accessing On-line Documentation
The complete suite of documents available for SPECTRUM Element Manager
can be accessed via a menu option from the primary window menu bar:
Help Ñ> Online Documents. If you chose to install the documentation when you
installed SPECTRUM Element Manager, selecting this option will launch AdobeÕs
Acrobat Reader and a menu Þle which provides links to all other available
documents.
If you have not yet installed the documentation, the Online Documents option will not
TIP
be able to access the menu Þle. In order to activate this option, you must run the
setup.exe again to install the documentation component. See your Installation Guide
for details.
1-8Getting Help
Getting Help from the Cabletron Systems Global Call Center
If you need technical support related to SPECTRUM Element Manager, or if you
have any questions, comments, or suggestions related to this manual or any of
our products, please feel free to contact the Cabletron Systems Global Call Center
via one of the following methods:
By phone: (603) 332-9400
24 hours a day, 365 days a year
By mail:Cabletron Systems, Inc.
PO Box 5005
Rochester, NH 03866-5005
By Internet mail:support@ctron.com
FTP:ftp.ctron.com (134.141.197.25)
Loginanonymous
Passwordyour email address
By BBS:(603) 335-3358
Introduction
Modem Setting8N1: 8 data bits, 1 stop bit, No parity
For additional information about Cabletron Systems products, visit our
World Wide Web site: http://www.cabletron.com/. For technical support,
select Service and Support.
Getting Help1-9
Introduction
1-10Getting Help
Chapter 2
Bridging
About bridging methods; viewing and managing bridging interfaces; using the Bridge Status window;
viewing bridge statistics; using Spanning Tree; using the Filtering Database; configuring duplex
modes; using the Interface Configuration window; and setting Bridge Translation
Bridging Basics
Bridges are used in local area networks to connect two or more network segments
and to control the ßow of packets between the segments. Ideally, bridges forward
packets to another network segment only when necessary.
Bridges are also used to increase the fault tolerance in a local area network by
creating redundant bridge paths between network segments. In the event of a
bridge or bridge segment failure, an alternate bridge path will be available to
network trafÞc, without signiÞcant interruption to its ßow.
The method a bridge uses to forward packets, choose a bridge path, and ensure
that a sending stationÕs messages take only one bridge path depends on the
bridgeÕs type: Transparent (generally used in Ethernet or FDDI environments) or
Source Routing (generally used in Token Ring environments), source
routing-transparent, or source route-transparentÑthe two latter being
combinations that are found in a mixed network environment.
About T ransparent Bridging
Transparent bridges are most common in Ethernet networks. Individual
Transparent bridges monitor packet trafÞc on attached network segments to learn
where end stations reside in relation to each segment by mapping the Source
Address of each received frame to the port (and segment) it was detected on. This
information gets stored in the bridgeÕs Filtering Database.
When in the Forwarding state, the bridge compares a packetÕs destination address
to the information in the Filtering Database to determine if the packet should be
forwarded to another network segment or Þltered (i.e., not forwarded). A bridge
2-1
Bridging
Þlters a packet if it determines that the packetÕs destination address exists on the
same side of the bridge as the source address.
If two or more bridges are connected to the same Ethernet LAN segmentÑplaced
in parallelÑonly a single bridge must be allowed to forward data frames onto
that segment. If two or more bridges were forwarding data frames onto the same
Ethernet segment, the network would soon be ßooded.
With a data loop in the topology, bridges would erroneously associate a single
source address with multiple bridge ports, and keep proliferating data by
forwarding packets in response to the ever-changing (but incorrect) information
stored in their Filtering Database.
To avoid such data storms, Transparent bridges communicate with one another
on the network by exchanging Bridge Protocol Data Units (BPDUs) to determine
the network topology and collectively implement a Spanning Tree Algorithm
(STA) that selects a controlling bridge for each LAN segment. This ensures that
only a single data route exists between any two end stations and that topology
information remains current.
About Source Route Bridging
Source Routing is typically used to connect two or more Token Ring network
segments. Source Route bridges differ from Transparent bridges in that they do
not build and then use a physical address database to make forwarding decisions.
Instead, the source end station transmits packets with a header that contains
routing information (added by bridges in the network topology during a route
discovery process between end stations); once a route has been determined, a
Source Route bridge simply reads the header of a source routed packet to
determine whether it is a participant in routing the packet.
In Source Routing, sending and receiving devices employ broadcast
packetsÑknown as explorer packetsÑto determine the most efÞcient route for a
message to travel. Generally, before a station sends a message, it will Þrst send a
test packet to all stations on the same ring; if the sending station receives a
response to this packet, it assumes that the destination station is on the same ring
and therefore it will not include routing information in frames sent to that station
in the future. Any further packets issued between stations will appear to be
transparent-style frames without embedded routing information.
If the sending station does not receive a response to the test packet, it will send
explorer packets to the destination; the explorer packets will be propagated by the
networkÕs bridges as either All Paths Explorer (APE) packets or as Spanning Tree
Explorer (STE) packets. The task of both packet types is to get the destination
station to return speciÞc route information to the sending station. They achieve
this by including an identiÞer for each ring the explorer packet traversed and for
each bridge between any rings).
Since the data ßow on a Source Routed network is determined by end stations
(unlike a Transparently bridged network), a looped bridge topology is not an
issue for data ßow. APE packets are sent from the source station over every
2-2Bridging Basics
Bridging
possible bridge path to the end station. The original APE frame contains no
routing information (e.g., bridge numbers and ring numbers). As the frame is
propagated along all available paths to the destination station, each bridge along
the way adds its own bridge and ring numbers to the packetÕs RIF before
forwarding it, thereby providing route information.
In response to each received APE packet, the destination station directs a reply to
the sending station. On receiving the replies, the sending station ideally assumes
that the Þrst returned reply contains the most efÞcient route. The sending station
then stores the route information and uses it to send subsequent transmissions to
the same station.
Because APE frames do increase network trafÞc, some sites may use STE explorer
frames as an alternate method of route discovery. With STE exploration, a
Spanning Tree Algorithm (either conÞgured automatically via BPDUs or
manually via management) is maintained for the sole purpose of determining
how to direct an explorer frame during route discovery.
During the discovery process, a source station will send out STE explorer frames
into a bridged topology. If a bridge is in a forwarding state according to Spanning
Tree, it will forward an explorer frame onto its attached LAN segment (appending
the Bridge and LAN Segment IdentiÞers in the appropriate area of the RIF); if the
bridge is Þltering, it will discard the explorer frames. In this fashion, only a single
explorer frame will reach each individual LAN segment.
Ultimately, the destination station will receive only a single STE packet, and will
respond with APE packets (that return to the sending station on all possible
bridge paths) or an STE packet (that returns to the sending station via in the
reverse route of the STE explorer packet).
Although the Spanning Tree Algorithm determines the bridge path an STE takes
to the destination station, during future communication between the stations,
bridges along the route will use Source Routing to forward the packet (i.e., the
bridges will read the Routing Information Field in the header of speciÞcally
routed frames to decide whether to forward them).
About Source Route-Transparent Bridges
Because network topologies have developed in which bridges must be able to
handle network trafÞc from end stations which support source routing and others
which do not, a hybrid type of bridgeÑSource Route-Transparent (SRT) Ñ
combines elements of both bridging methods.
An end stationÕs network drivers can be conÞgured in software to use a bit setting
in the source address portion of a data frame to indicate whether the station is to
operate in a Source Route or Transparently bridged network environment. The
Routing Information Indicator (RII) bit of the source address is set to 1 if the
station is to use Source Routing; if the station is to operate in a Transparently
bridged environment, the RII bit is left unchanged (i.e., at 0).
Bridging Basics2-3
Bridging
Not all end stations in a Token Ring environment have network drivers which
support Source RoutingÑwhether the drivers are improperly conÞgured via
management or they simply are not source-route capable.
In a network with a mix of Source Route and Transparent end stations, data
frames from both station types must be bridged correctly. An SRT bridge inspects
the RII bit setting of incoming frames to determine whether they should be
Transparently bridged (if the RII bit was at 0) or Source Routed (if the RII bit was
set to 1) to their destination and will use the appropriate bridge method to
forward the frame.
Cabletron has extended the functionality of Ethernet ports on translational bridges, so the
NOTE
ports can be set to Source Route mode. When an Ethernet port is in Source Route mode
and receives an SR packet from a Token Ring port, it will save the Source Routing
information and send out the packet transparently. When the response comes back, the
source routing information will be restored and then sent to the Token Ring port.
About Source Route-Translational Bridges
Because SmartSwitch 2000, 6000, and 9000 modules have the ability to combine
mixed network topologies, yet another hybrid bridge methodÑcalled a Source
Route Translational bridge (SR-TB)Ñis used by a number of these SmartSwitch
modules.
An SR-TB bridge supports both Source Routing and Transparent bridging
capabilities, with the added requirement of maintaining Source Route
information across an FDDI interfaceÑeither the SmartSwitch 9000 FNB
backplane, or an installed FDDI High Speed Interface Module (HSIM).
An SR-TB bridge does this by ÒtranslatingÓ the Token Ring physical frame format
(by stripping out routing information, if necessary) so that the frameÕs source
address can be recognized on an FDDI, Ethernet, or ATM segment; then, when
data is returned to the source, the bridge restores the necessary route information
to forward it along a bridged Token Ring environment.
For data that is restricted to the Token Ring networks available from the SR-TB
bridgeÕs front panel, the bridging method is user-conÞgurable via local
management to be Source Route-only (bridged packets must include RIF
information and will be source routed; no transparent bridging is enabled),
Source Route-Transparent (bridging method will be determined by whether the
RII bit is set), or Transparent only (no source routed packets will be bridged).
Remote management of these interfaces is based upon their current mode (as set
through local management).
For data that will ultimately be sent across an FDDI interface to an ATM, Ethernet,
FDDI, or another Token Ring segment, the Routing Information Field will be
stripped from the packet so the packet can be transparently bridged onto Ethernet
or FDDI media; however, the RIF information as well as the source address of the
packet is stored in a RIF cache of the SR-TB bridge. When data is returned to that
source address, the SR-TB bridge can look up the address information in its RIF
2-4Bridging Basics
Bridging
cache, append the proper Routing Information onto the packet, and then forward
the data to the Token Ring segment.
The RIF cache is a software table that can store up to 8192 entries. An SR-TB
bridge updates its RIF cache much like a Transparent bridge dynamically updates
its Filtering Database: it learns new address information by listening to incoming
packets on each port, saves that information to an Address Database, andÑif the
address was learned to be Source-Route capableÑupdates routing information
for that source address in the RIF cache. Every time a packet arrives from an FDDI
interface for a MAC address that is communicating through the SR-TB bridgeÕs
front panel, the RIF cache table is searched for an address/RIF match.
There are conÞguration issues when a Token Ring module receives a packet from
an FDDI interface for a destination address that is unknown, and not in its
Address Database or RIF cache. You must conÞgure your SR-TB bridge to treat
incoming packets with an unknown destination address as either a Source Route
or Transparently bridged packet (since Token Ring end stations attached to the
module may or may not support Source Routing).
If the bridge is conÞgured to treat an incoming packet with unknown addresses as
a Source Routed frame, it will forward it using either STE or ARE frames. If the
bridge is conÞgured to treat an incoming packet with an unknown destination as
a Transparently bridged frame, it simply forwards the frame.
After a packet with a previously unknown destination has been bridged
successfully, and communication begins between the two end nodes, the RIF
cache will be updated and packets will be translated as described previously.
Viewing and Managing Bridging Interfaces
With SPECTRUM Element Manager, you can view and manage each bridging
interface supported by your device, including any installed interface modules,
such as BRIMs (Bridge/Router Interface Modules) and HSIMs (High Speed
Interface Modules).
You can manage your bridge by using the following windows:
¥The Bridge Status window provides you with basic information about the
current status of the deviceÕs bridging interfaces, and allow you to enable or
disable bridging at each of those interfaces. The Bridge Status window also lets
you access further windows to conÞgure bridging at the device. See The
Bridge Status Window, page 2-7, for details.
¥Bridge statisticsÑincluding the Performance Graph, Interface Statistics,
CSMACD Statistics, PPP Link Statistics, Dot5 Error Statistics, and Source
Route Statistics windowsÑgraphically display the trafÞc passing between
your bridged networks, and let you compare and contrast trafÞc and errors
processed by each interface. See Bridge Statistics, page 2-15 for details.
Viewing and Managing Bridging Interfaces2-5
Bridging
¥The Spanning Tree window shows bridge port information and protocol
parameters relating to the Spanning Tree AlgorithmÑthe method of
determining the controlling bridge when a series of bridges are placed in
parallel; see Spanning Tree, page 2-34, for details.
¥With the Filtering Database window, you can see the contents of the Static and
Learned databasesÑthe two address databases which construct the IEEE 802.1
Source Address Table. The bridge uses the contents of these databases to make
its packet Þltering and forwarding decisions. You can conÞgure entries in these
databases to increase bridging efÞciency across your network. See Filtering
Database, page 2-41, for details.
¥The Ethernet Special Filter Database and Token Ring Special Filter Database
windows let you conÞgure special Þltering schemes. With these schemes, you
can enter Þlter parameters for a frame based on the contents of its source or
destination address Þeld, type Þeld, or data Þeld (with offset)Ñthen specify
the bridging action to take place at each port when a frame matching your
speciÞcations is encountered (see Special Filter Databases, page 2-47).
¥The I/F ConÞguration port-level menu option invokes the Interface
ConÞguration window, which allows you to select a bridging method for a
Token Ring bridging interface. This window also allows you to select one of
three transmission methods that should be used when unknown addresses are
received from end stations attached to the selected bridge port. See Using the
Novell Translation Window, page 2-97, for details.
¥The Source Route ConÞguration option enables you to conÞgure source
routed trafÞc passing between bridge ports; see Source Route ConÞguration,
page 2-57, for details.
¥The Bridge ConÞguration option allows you to set address and routing
information for all interfaces on a Token Ring bridging device, including the
Bridge Number and the Virtual Ring Number. It also allows you to set source
route bridging parameters at the device level. See Using the Token Ring
Bridge and Port ConÞguration Windows, page 2-65, for details.
¥The Port ConÞguration option allows you to view the address and routing
information for an individual Token Ring bridging interface. This window
displays information that is set at the device level via the Bridge ConÞguration
window, such as the Bridge Number and the Virtual Ring Number. It also
allows you to set source route bridging parameters for that port. See Using the
Token Ring Bridge and Port ConÞguration Windows, page 2-65, for details.
¥The Duplex Modes window lists each interface on your device and whether
or not it is operating in Full Duplex mode. The window allows you to switch
full duplex mode on and off for each interface on the device. Full Duplex
Switched Ethernet (FDSE) mode allows the interface to transmit and receive
information simultaneously, effectively doubling the available bandwidth. See
Using the Token Ring Bridge and Port ConÞguration Windows, page 2-65,
for details.
2-6Viewing and Managing Bridging Interfaces
Bridging
¥The SmartTrunk option invokes the SmartTrunk ConÞguration and Status
window, which enables you to group interfaces logically to achieve greater
bandwidth between devices that support this feature. There is no limit to the
number of ports that can be included in a single trunk, nor is there a limit to
the number of trunked instances that can be supported. See ConÞguring
SmartTrunking, page 2-85, for details.
¥The Broadcast Suppression window enables you to monitor the number of
broadcast packets received by each interface of a selected device, and
conÞgure the maximum number of broadcast packets that will be forwarded
to other interfaces; see ConÞguring SmartTrunking, page 2-85, for details.
¥The Token Ring Bridge Mode window lets you select which type of bridging
will be used by the Token Ring bridging deviceÑTransparent, Source Routing,
or Source Route Transparent; see Token Ring Bridge Mode, page 2-89, for
details.
¥The Bridge Translation window allows you to control the necessary
translation of frames that must occur for Token Ring frames to be bridged to
Ethernet. This window offers Auto and Dual modes for translation and
includes the IBM and SNAP Translation tables. See Setting Bridge
Translation, page 2-91, for details.
¥The Novell Translation window enables you to conÞgure each module port
for translation of Novell packets that are received and transmitted across a
Token Ring bridge; see Using the Novell Translation Window, page 2-97, for
details.
The menu options that are available will vary depending on the type of device you are
NOTE
monitoring, and on the type of bridge interfaces supported by the device.
The following sections detail how to use each of the bridge management
windows.
The Bridge Status Window
The Bridge Status window provides you with basic information about the current
status of bridging across your device. Color-coding of each port display allows
you to quickly ascertain the status of each interface. The Bridge Status window
also lets you access further windows to control bridging at your device.
To access the Bridge Status window from the Chassis View window:
1. Click on the Device selection in the menu bar. A menu will appear.
2. Click on Bridge Status. The Bridge Status window, Figure 2-1, will appear.
The Bridge Status Window2-7
Bridging
NOTE
Figure 2-1. The Bridge Status Window
When you Þrst open the Bridge Status window the Prev and Next buttons will be grayed
out, and a message will appear stating that the application is initializing and processing
each interface. You will not be able to scroll the display until after all the bridging
interfaces have been processed. The Prev and Next buttons are activated when a device
supports over four bridge interfaces, so that you can scroll the display to show all
interfaces.
The following information is provided by the Bridge Status window for the
monitored device as a whole and for each individual bridging interface.
Up Time
At the top of the Bridge Status window, you can see the time period (in a days,
hours, minutes, seconds format) that has elapsed since the device was last reset or
initialized.
2-8The Bridge Status Window
Bridging
Bridge State on Interface
Indicates the state of bridging over the port interface. Possible bridge states and
their corresponding colors are:
¥Forwarding (green)ÑThe port is on-line and forwarding packets across the
bridge from one network segment to another.
¥Disabled (blue)ÑBridging at the port has been disabled by management; no
trafÞc can be received or forwarded on this port, including conÞguration
information for the bridged topology.
¥Listening (magenta)ÑThe port is not adding information to the Þltering
database. It is monitoring Bridge Protocol Data Unit (BPDU) trafÞc while
preparing to move to the forwarding state.
¥Learning (magenta)ÑThe Forwarding database is being created, or the
Spanning Tree Algorithm is being executed because of a network topology
change. The port is monitoring network trafÞc, and learning network
addresses.
¥Blocking (orange)ÑThe port is on-line, but Þltering trafÞc from going across
the bridge from one network segment to another. Bridge topology information
will be forwarded by the port.
Interface Type
Indicates the interface type which applies to each device bridging port interface
(e.g., ethernet). The interface type (ifType) is a mandatory object type from the
SNMP MIB II Interface (if) Group.
Bridge Address
Indicates the physical address of the bridge interface.
Speed
Indicates the speed of the interface in Mbps or Gbps.
Accessing Bridge Status Window Options
At the top of the Bridge Status window, you can click Bridge to access a menu
that provides other bridge management options. Depending on which device you
are monitoring via SPECTRUM Element Manager, the following bridge
management options will be available:
¥The Module Type window displays a description of the device that is
currently being monitored.
¥The Find Source Address window allows you to discover the bridge interface
through which a particular MAC address is communicating; see Using the
Find Source Address Feature, page 2-62, for details.
¥The Performance Graph window displays statistics for trafÞc across the entire
bridge; see Performance Graphs, page 2-15, for details.
The Bridge Status Window2-9
Bridging
¥The Spanning Tree window allows you to set the Spanning Tree Algorithm
parameters for bridging on your device; see Spanning Tree, page 2-34, for
details.
¥The SmartTrunk option invokes the SmartTrunk ConÞguration and Status
window, which enables you to group interfaces logically to achieve greater
bandwidth between devices, if both devices support the SmartTrunk feature.
There is no limit to the number of ports that can be included in a single
Òtrunk,Ó nor is there a limit to the number of trunked ÒinstancesÓ that can be
supported. See ConÞguring SmartTrunking, page 2-85, for details.
¥The Filtering Database window lets you see the contents of the Static and
Learned databasesÑthe two address databases which construct the IEEE 802.1
Source Address Table. The bridge uses the contents of these databases to make
its packet Þltering and forwarding decisions. You can conÞgure the bridgeÕs
acquired and permanent Þltering databases to Þlter or forward trafÞc across
the device. See Filtering Database, page 2-41, for details.
¥The Ethernet Special Filter Database window lets you conÞgure a special
Þltering scheme at your bridge. With this scheme, you can enter Þlter
parameters for a frame based on the contents of its source or destination
address Þeld, type Þeld, or data Þeld (with offset); you can then specify the
bridging action to take place at each port when a frame matching your
speciÞcations is encountered. See Special Filter Databases, page 2-47, for
details.
¥The Token Ring Special Filter Database window enables you to deÞne
complex Þlters for transparently-bridged Token Ring frames based upon
receive port, source or destination MAC address, Token Ring data type, or data
Þeld information (up to 64 bytes); see Special Filter Databases, page 2-47, for
details.
¥The Token Ring Bridge Mode window lets you select which type of bridging
will be used by the Token Ring bridging deviceÑTransparent, Source Routing,
or Source Route Transparent; see Token Ring Bridge Mode, page 2-89, for
details.
¥The Bridge Translation window allows you to control the necessary
translation of frames that must occur for Token Ring frames to be bridged to
Ethernet. This window offers Auto and Dual modes for translation and
includes the IBM and SNAP Translation tables. See Setting Bridge
Translation, page 2-91, for details.
¥The Novell Translation window enables you to conÞgure each module port
for translation of Novell packets that are received and transmitted across a
Token Ring bridge; see Using the Novell Translation Window, page 2-97, for
details.
¥The Duplex Modes window allows you to conÞgure duplex mode (on or off)
for supporting interfaces on the device; see Using the Token Ring Bridge and
Port ConÞguration Windows, page 2-65, for details.
2-10The Bridge Status Window
Bridging
¥Enable Bridge and Disable Bridge options allow you to administratively
activate or deactivate bridging at the device level; see (Enabling and
Disabling Bridging, page 2-14, for details.
¥The Bridge ConÞguration option opens a window that allows you to set
address and routing information for all interfaces on a Token Ring bridging
device, including the Bridge Number and the Virtual Ring Number. It also
allows you to set source route bridging parameters at the device level. See
Using the Token Ring Bridge and Port ConÞguration Windows, page 2-65,
for details.
The individual bridge port index () menu that you can access from the Bridge
Status window will provide the following options, depending on which device
you are monitoring through SPECTRUM Element Manager:
¥The Connection Type window displays a text description of the connection
type of the selected bridge interface.
¥The Description option displays a text description of a bridge interface from
the ifDescr value of the ifIndex related to the selected port.
¥The Performance Graph window graphically displays the trafÞc passing
between your bridged networks, and lets you compare and contrast trafÞc
processed by each interface; see Performance Graphs, page 2-15, for details.
¥The Source Addressing window displays the contents of the deviceÕs Filtering
Database with respect to a selected port. This will display the source MAC
addresses that have been detected by the port as it forwards data across the
network. The window also lets you set the aging timer that controls how long
an inactive MAC address will continue to be stored in the Source Address
Database before being aged out. See Source Route ConÞguration, page 2-62,
for details.
¥The PPP Link Status option invokes the PPP Link Statistics Window, which
enables you to view color-coded statistics related to the PPP (Point-to-Point
Protocol) link at the selected interface; see PPP Link Statistics, page 2-25, for
details.
¥The Source Route Statistics option opens a window that allows you to view
statistics for source routed trafÞc passing between bridging ports. The window
enables you to view the frames that were received, transmitted, and discarded
by the bridge. See Source Route Statistics, page 2-31, for details.
¥The I/F ConÞguration port-level menu option invokes the Interface
ConÞguration window, which allows you to select a bridging method for a
Token Ring bridging interface. This window also allows you to select one of
three transmission methods that should be used when unknown addresses are
received from end stations attached to the selected bridge port. See Using the
Novell Translation Window, page 2-97, for details.
¥The Source Route ConÞguration option opens a window that enables you to
conÞgure source routed trafÞc passing between bridging ports; see Source
Route ConÞguration, page 2-57, for details.
The Bridge Status Window2-11
Bridging
¥The Port ConÞguration option opens a window that allows you to view the
address and routing information for an individual Token Ring bridging
interface. This window displays information that is set at the device level via
the Bridge ConÞguration window, such as the Bridge Number and the Virtual
Ring Number. It also allows you to set source route bridging parameters for
that port. See Using the Token Ring Bridge and Port ConÞguration
Windows, page 2-65, for details.
¥The Dot5 Errors invokes a window that allows you to view 802.5 statistics for
the selected bridging interface on a Token Ring bridging device; see Dot5
Errors, page 2-28, for details.
¥The RMON MAC Layer option opens the Token Ring Statistics window for
Token Ring devices that support RMON, which enables you to view a
statistical breakdown of trafÞc on the monitored Token Ring interface
(network segment). Note that if the RMON Default MIB component is
disabled, the RMON MAC Layer menu option will launch the Interface
Statistics window. Refer to the RMON UserÕs Guide for more information on
how to enable and disable RMON MIB components. For more information
about this menu option, refer to the Statistics chapter in the Remote
Monitoring (RMON) UserÕs Guide, and/or the appropriate device-speciÞc
UserÕs Guide.
¥The RMON Promiscuous Stats option opens the Token Ring Promiscuous
Statistics window, which allows you to view statistical information about
those packets that carry the normal data ßow across a bridging interface
(network segment). Note that if the RMON Default MIB component is
disabled, the RMON Promiscuous Stats menu option will launch the Interface
Statistics window. Refer to the Remote Monitoring (RMON) UserÕs Guide for
more information on how to enable and disable RMON MIB components. For
more information about this menu option, refer to the Statistics chapter in the
RMON UserÕs Guide, and/or the appropriate device-speciÞc UserÕs Guide.
¥The I/F Statistics option activates the Interface Statistics Port window, which
allows you to view color-coded statistical information about each individual
bridge port on the currently monitored device; see Interface Statistics,
page 2-20, for details.
¥The ConÞguration option opens a window that enables you to conÞgure the
selected bridge interface for either full duplex or standard mode; see Ethernet
Port ConÞguration, page 2-72, for details.
¥The Alarm ConÞguration option appears as a menu choice for Ethernet
devices which support RMON, and invokes the RMON Basic Alarm
ConÞguration window that enables you to create alarms or actions at a speciÞc
bridge interface based on rising and falling thresholds for Broadcast/Multicast
packets, Kilobits, or Total Errors. Note that if the RMON Default MIB
component is disabled, the Alarm ConÞguration menu option will still appear
and the window will still display; however, you will not have the ability to set
anything. Refer to the Remote Monitoring (RMON) UserÕs Guide for more
information on how to enable and disable RMON MIB components. For more
2-12The Bridge Status Window
Loading...
+ 132 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.