Summit Switch Installation and User Guide: Summit - BK: FRONTMTR - FM Page I Thursday, June 18, 1998 9:27 AM
Summit Switch Installation and User Guide: Summit - BK: FRONTMTR - FM Page I Thursday, June 18, 1998 9:27 AM
Summit Switch
Installation and User
Guide
Copyright Extreme Networks, Inc., 1998. All rights reserved. No part of this documentation may be
reproduced in any form or by any means or used to make any derivative work (such as translation,
transformation, or adaptation) without permission from Extreme Networks, Inc.
Extreme Networks, ExtremeWare, Summit, SummitLink, ExtremeWare Vista,Summit Virtual Chassis,
and the Extreme Networks logo are trademarks of Extreme Networks.
PACE is a trademark of 3Com Corporation. 3Com is a registered trademark of 3Com Corporation. All
other brand and product names are registered trademarks or trademarks of their respective holders.
ii
Summit.bk : SUMMIT.TOC Page iii Thursday, June 18, 1998 9:27 AM
Contents
Introduction xvii
Terminology xviii
Conventions xviii
Related Publications xix
1 SUMMIT OVERVIEW
About the Summit Family of Switches 1-1
Summit Switch Models 1-2
Summary of Features 1-2
Port Connections 1-3
Media Types and Distances 1-4
Full-Duplex 1-5
Port Redundancy 1-5
Load Sharing 1-6
Virtual LANs (VLANs) 1-6
Spanning Tree Protocol (STP) 1-6
Quality of Service (QoS) 1-7
IP Unicast Routing 1-7
IP Multicast Routing 1-7
Network Configuration Example 1-8
Summit1 Front View 1-10
Summit2 Front View 1-11
Summit3 Front View 1-12
Summit4 Front View 1-13
Summit4/FX Front View 1-14
iii
Summit.bk : SUMMIT.TOC Page iv Thursday, June 18, 1998 9:27 AM
iv
Summit.bk : SUMMIT.TOC Page v Thursday, June 18, 1998 9:27 AM
v
Summit.bk : SUMMIT.TOC Page vi Thursday, June 18, 1998 9:27 AM
4 CONFIGURING PORTS
Enabling and Disabling Ports 4-1
Configuring Port Speed and Duplex Setting 4-2
Turning Off Autonegotiation for a Gigabit Ethernet Port 4-2
Port Commands 4-3
Load Sharing 4-5
Configuring Load Sharing 4-6
Verifying the Load Sharing Configuration 4-8
Port-Mirroring 4-8
Port-Mirroring Commands 4-9
Port-Mirroring Example 4-9
Summit Virtual Chassis 4-10
Summit Switch Port Connections 4-10
Extreme Discovery Protocol 4-11
Summit Virtual Chassis Commands 4-12
Configuring the Summit for User with the Summit Virtual
Chassis 4-12
VLANs and Summit Switches Using the Virtual Chassis 4-13
vi
Summit.bk : SUMMIT.TOC Page vii Thursday, June 18, 1998 9:27 AM
vii
Summit.bk : SUMMIT.TOC Page viii Thursday, June 18, 1998 9:27 AM
9 IP UNICAST ROUTING
Overview of IP Unicast Routing 9-1
Router Interfaces 9-2
Populating the Routing Table 9-3
Dynamic Routes 9-3
Static Routes 9-3
Multiple Routes 9-4
Proxy ARP 9-4
ARP-Incapable Devices 9-4
Proxy ARP Between Subnets 9-5
IP Multinetting 9-5
IP Multinetting Operation 9-6
IP Multinetting Examples 9-7
Configuring IP Unicast Routing 9-9
Verifying the IP Unicast Routing Configuration 9-10
Configuring DHCP/BOOTP Relay 9-10
Verifying the DHCP/BOOTP Relay Configuration 9-11
Routing Configuration Example 9-15
viii
Summit.bk : SUMMIT.TOC Page ix Thursday, June 18, 1998 9:27 AM
10 ROUTING PROTOCOLS
Overview 10-1
RIP Versus OSPF 10-2
Overview of RIP 10-3
Routing Table 10-3
Split Horizon 10-3
Poison Reverse 10-3
Triggered Updates 10-4
Route Advertisement of VLANs 10-4
RIP Version 1 versus RIP Version 2 10-4
Overview of OSPF 10-5
Link State Database 10-5
Areas 10-5
Area 0 10-6
Stub Areas 10-6
Virtual Links 10-7
Configuring RIP 10-8
RIP Configuration Example 10-10
Displaying RIP Settings 10-12
Resetting and Disabling RIP 10-13
Configuring OSPF 10-14
OSPF Configuration Example 10-16
Configuration for ABR1 10-17
Configuration for IR1 10-18
Displaying OSPF Settings 10-18
Resetting and Disabling OSPF Settings 10-19
ix
Summit.bk : SUMMIT.TOC Page x Thursday, June 18, 1998 9:27 AM
11 IP MULTICAST ROUTING
Overview 11-1
DVMRP Overview 11-2
IGMP Overview 11-2
IGMP Snooping 11-2
Configuring IP Multicasting Routing 11-2
Configuration Example 11-6
Configuration for IR1 11-7
Displaying IP Multicast Routing Settings 11-7
Deleting and Resetting IP Multicast Settings 11-8
x
Summit.bk : SUMMIT.TOC Page xi Thursday, June 18, 1998 9:27 AM
A SAFETY INFORMATION
Important Safety Information A-1
Power A-1
Power Cord A-2
Fuse A-3
Connections A-3
Lithium Battery A-4
B TECHNICAL SPECIFICATIONS
xi
Summit.bk : SUMMIT.TOC Page xii Thursday, June 18, 1998 9:27 AM
C TROUBLESHOOTING
LEDs C-1
Using the Command-Line Interface C-2
VLANs C-4
STP C-5
INDEX
INDEX OF COMMANDS
xii
Summit.bk : SUMMIT.LOF Page xiii Thursday, June 18, 1998 9:27 AM
Figures
xiii
Summit.bk : SUMMIT.LOF Page xiv Thursday, June 18, 1998 9:27 AM
xiv
Summit.bk : SUMMIT.LOT Page xv Thursday, June 18, 1998 9:27 AM
Tables
xv
Summit.bk : SUMMIT.LOT Page xvi Thursday, June 18, 1998 9:27 AM
xvi
Summit.bk : PREFACE.FM Page xvii Thursday, June 18, 1998 9:27 AM
Preface
This Preface provides an overview of this guide, describes guide conventions, and lists
other publications that may be useful.
INTRODUCTION
This guide provides the required information to install and configure the Summit
Family of Gigabit Ethernet Switches.
This guide is intended for use by network administrators who are responsible for
installing and setting up network equipment. It assumes a basic working knowledge of
If the information in the Release Notes shipped with your switch differs from the
information in this guide, follow the Release Notes.
PREFACE
TERMINOLOGY
When features, functionality, or operation is specific to a particular model of the
Summit family, the model name is used (for example, Summit1 or Summit4).
Explanations about features and operations that are the same among all members of the
Summit family simply refer to the product as the Summit.
CONVENTIONS
Table 1 and Table 2 list conventions that are used throughout this guide.
RELATED PUBLICATIONS
RELATED PUBLICATIONS
The Summit documentation set includes the following:
PREFACE
1 Summit Overview
By addressing the entire spectrum of Ethernet data rates (10/100/1000 Mbps), the
Summit family of LAN switches enables you to introduce high-speed Gigabit Ethernet
backbones into your existing network, while maintaining established connections to the
10 Mbps and 100 Mbps segments that already exist.
SUMMIT OVERVIEW
SUMMARY OF FEATURES
Summit switches support the following features:
Fully nonblocking operation
All ports transmit and receive packets at wire speed
Optional redundant power supply
128K addresses in the switch forwarding database in bridging mode
Redundant physical Gigabit Ethernet backbone connection
Autonegotiation for half- or full-duplex operation (Fast Ethernet ports, only)
Load-sharing on multiple ports
Virtual local area networks (VLANs) including support for 802.1Q
Spanning Tree Protocol (STP) (IEEE 802.1D) with multiple STP domains
Policy-based Quality of Service (QoS)
Wire-speed Internet Protocol (IP) routing
IP Multinetting using the Internet Group Multicast Protocol (IGMP)
DHCP/BOOTP Relay
Routing Information Protocol (RIP) version 1 and RIP version 2
Open Shortest Path First (OSPF) routing protocol
Wire-speed IP multicast routing support
IGMP snooping to control IP multicast traffic
SUMMARY OF FEATURES
PORT CONNECTIONS
The major difference between the models of the Summit switch is the port
configurations on each switch model. Summit switches use a combination of the
following types of ports:
Fixed 1000BASE-SX ports using 850nm duplex SC connectors
Modular 1000BASE-LX and 1000BASE-LX10 using Gigabit Interface Connectors
(GBICs)
10BASE-T/100BASE-TX ports using standard RJ-45 connectors
100BASE-FX ports using standard SC connectors
Table 1-1 describes port configurations available on the different Summit switch models.
SUMMIT OVERVIEW
Mhz/Km Maximum
Standard Media Type Rating Distance
1000BASE-SX 50/125um Multimode Fiber 400 500 Meters
50/125um Multimode Fiber 500 550 Meters
62.5/125um Multimode Fiber 160 220 Meters
62.5/125um Multimode Fiber 200 275 Meters
1000BASE-LX 50/125um Multimode Fiber 400 550 Meters
50/125um Multimode Fiber 500 550 Meters
62.5/125um Multimode Fiber 500 550 Meters
10u Single-mode Fiber 5,000 Meters
1000BASE-LX10* 10u Single-mode Fiber 10,000 Meters
100BASE-FX 50/125um Multimode Fiber 400 Meters
(half-duplex operation
50/125um Multimode Fiber 2000 Meters
(full-duplex operation)
62.5/125um Multimode Fiber 400 Meters
(half-duplex operation)
52.5/125um Multimode Fiber 2000 Meters
(full-duplex operation)
100BASE-TX Category 5 UTP Cable (100Mbps) 100 Meters
10BASE-T Category 3 UTP Cable (10Mbps) 100 Meters
*EXTREME NETWORKS PROPRIETARY. CAN BE CONNECTED TO 1000BASE-LX ON SINGLE-MODE FIBER USING A MAXIMUM DISTANCE
OF 5,000 METERS.
SUMMARY OF FEATURES
FULL-DUPLEX
The Summit switch provides full-duplex support for all ports. Full-duplex allows
frames to be transmitted and received simultaneously and, in effect, doubles the
bandwidth available on a link. All 10/100 Mbps ports on the Summit autonegotiate for
half- or full-duplex operation.
PORT REDUNDANCY
The Summit2, Summit3, and Summit48 have an optional redundant Gigabit Ethernet
port. Using the redundant port, you can dual-home these models to one or two
switches. Figure 1-1 illustrates a Summit2 dual-homed to two different switches.
Dual-homed
Backup Active
In the event that the active port fails or loses link status, the redundant port is
automatically activated. When the primary port resumes operation, the redundant port
becomes inactive. This feature can be disabled.
The redundant port cannot be used for load sharing when the primary port is active. If
the primary port becomes inactive, the redundant port is activated in the load sharing
configuration.
SUMMIT OVERVIEW
LOAD SHARING
Load sharing with Summit switches allows the user to increase bandwidth and
resilience between switches by using a group of ports to carry traffic in parallel between
switches. The sharing algorithm allows the switch to use multiple ports as a single
logical port. For example, VLANs see the load-sharing group as a single virtual port.
The algorithm also guarantees packet sequencing between clients.
SUMMARY OF FEATURES
IP UNICAST ROUTING
The Summit can route IP traffic between the VLANs that are configured as virtual
router interfaces. Both dynamic and static IP routes are maintained in the routing table.
The following routing protocols are supported:
RIP version 1
RIP version 2
OSPF
IP MULTICAST ROUTING
The Summit can use IP multicasting to allow a single IP host to transmit a packet to a
group of IP hosts. The Summit supports statically configured IP multicast routes, and
multicast routes that are learned by way of the Distance Vector Multicast Routing
Protocol (DVMRP).
SUMMIT OVERVIEW
Desktop switches
Segment switches
Desktop switches
Routers
Data Center
Integrated Server switch
Gigabit L2/L3
10/100 Mbps
In the gigabit core of the network, the Summit1 and Summit2 act as aggregators of
Gigabit Ethernet links from the edge and data center switches, as well as Ethernet and
Fast Ethernet links from legacy routers and hubs. In the core of the network, the
Summit1 and Summit2 can scale in port density and performance by connecting to a
Summit Virtual Chassis to support up to 32 non-blocking Gigabit Ethernet ports at 48
million packets per second (pps), or 128 non-blocking 10/100BASE-TX ports at 19
million pps.
In the data center or server farm, the Summit4 offers the right mix of ports and features
for servers. Data centers and server farms require integrated wire-speed routing to
eliminate the performance penalty associated with legacy routers when servers had to
be separated into different subnets. In addition, the Summit4 supports trunking of
either Ethernet, Fast Ethernet, or Gigabit Ethernet ports to match the performance of the
LAN connection to the performance of the server. The goal is to only buy the amount of
bandwidth that is needed and can be used. This is ideal for servers that can drive 400
Mbps on trunk Fast Ethernet ports, but would not be capable of more than 400 Mbps
performance on a Gigabit Ethernet port. The port density and performance of the
Summit4 can be scaled with the Summit Virtual Chassis to 16 Gigabit Ethernet ports,
and 128 10/100BASE-TX ports at 43 million pps.
SUMMIT OVERVIEW
1 8
AMBER = ACTIVITY
GREEN = LINK OK
FLASHING GREEN = DISABLED
ACTIVITY
1 2 3 4 5 6 7 8
9 10 11 12 13 14 15 16
LINK
2 3 4 5 6 7
The Summit1 has eight Gigabit Ethernet ports. Six of the ports use SC connectors and
support 1000BASE-SX over multimode fiber-optic cable. Ports 1 and 8 use modular
GBIC connectors.
For information on supported media types and distances, refer to Table 1-2.
1 2 3 4 5 6 7 8 18
AMBER = ACTIVITY
GREEN = LINK OK
FLASHING GREEN = DISABLED
1 2 3 4 5 6 7 8
9 10 11 12 13 14 15 16
9 10 11 12 13 14 15 16 17R 17
For information on supported media types and distances, refer to Table 1-2.
SUMMIT OVERVIEW
1 2 3 4 5 6 7 8 17 18 19 20 21 22 23 24
AMBER = ACTIVITY
GREEN = LINK OK
FLASHING GREEN = DISABLED
1 2 3 4 5 6 7 8
9 10 11 12 13 14 15 16 25 25 ACTIVITY
17 18 19 20 21 22 23 24 25 25 LINK
R
9 10 11 12 13 14 15 16 25R 25
For information on supported media types and distances, refer to Table 1-2.
AMBER = ACTIVITY
1 2 3 4 5 6 7 8 GREEN = LINK OK 9 10 11 12 13 14 15 16
FLASHING GREEN = DISABLED
1 2 3 4 5 6 7 8
9 10 11 12 13 14 15 16
ACTIVITY
17 18 19 20 21 22
17 18 19 20 21 22
17 18 19 LINK 20 21 22
For information on supported media types and distances, refer to Table 1-2.
SUMMIT OVERVIEW
1 2 3 4 5 6 7 8
FLASHING AMBER = TRAFFIC
SOLID AMBER = DISABLED
GREEN = ENABLED, LINK OK
1 2 3 4 5 6 7 8
9 10 11 12 13 14 15 16
9 10 11 12 LINK 13 14 15 16
1 2 3 4 5 6
1 2 3 4 5 6
ACTIVITY
1 2 3 4 5 6
The Summit4/FX has 16 100BASE-FX ports and 6 Gigabit Ethernet ports. All ports use
standard SC connectors. The Gigabit Ethernet ports support 1000BASE-SX over
multimode fiber-optic cable.
For information on supported media types and distances, refer to Table 1-2.
1 2 3 4 5 6 7 8 9 10 11 12
1 2 3 4 5 6
7 8 9 10 11 12
A 49 49R 13 14 15 16 17 18
L 49 49R 19 20 21 22 23 24
49 49R AMBER = ACTIVITY 13 14 15 16 17 18 19 20 21 22 23 24 10/100 BASE-X
GREEN = LINK OK 25 26 27 28 29 30 31 32 33 34 35 36 MDI-X
1000 BASE-X FLASHING GREEN = DISABLED
25 26 27 28 29 30
31 32 33 34 35 36 Power
A 50 50R 37 38 39 40 41 42 Mgmt.
L 50 50R 43 44 45 46 47 48
50 50R 37 38 39 40 41 42 43 44 45 46 47 48
For information on supported media types and distances, refer to Table 1-2.
SUMMIT OVERVIEW
LEDS
Table 1-3 describes the light emitting diode (LED) behavior on the Summit.
U C U
L L
PART NUMBER
SERIAL NUMBER
MAC ADDRESS
130001-00 Rev.03
POWER SOCKET
The Summit automatically adjusts to the supply voltage. The power supply operates
down to 90 V. The fuse is suitable for both 110 V AC and 220-240 V AC operation.
SERIAL NUMBER
Use this serial number for fault-reporting purposes.
CONSOLE PORT
Use the console port (9-pin, D type connector) for connecting a terminal and carrying
out local out-of-band management.
SUMMIT OVERVIEW
In addition, when connected to a Summit RPS or Summit Virtual Chassis, the Summit
switch can provide status on power and fan operation of the RPS through SNMP, the
command-line interface, and the Web interface (power supply status only).
The Summit RPS and Summit Virtual Chassis can simultaneously provide power for as
many as two Summit switches.
MAC ADDRESS
This label shows the unique Ethernet MAC address assigned to this device.
FACTORY DEFAULTS
Table 1-4 shows factory defaults for the Summit features.
Table 1-4: Summit Factory Defaults
FACTORY DEFAULTS
SUMMIT OVERVIEW
Mhz/Km Maximum
Standard Media Type Rating Distance
1000BASE-SX 50/125um Multimode Fiber 400 500 Meters
50/125um Multimode Fiber 500 550 Meters
62.5/125um Multimode Fiber 160 220 Meters
62.5/125um Multimode Fiber 200 275 Meters
1000BASE-LX 50/125um Multimode Fiber 400 550 Meters
50/125um Multimode Fiber 500 550 Meters
62.5/125um Multimode Fiber 500 550 Meters
10u Single-mode Fiber 5,000 Meters
1000BASE-LX10* 10u Single-mode Fiber 10,000 Meters
100BASE-FX 50/125um Multimode Fiber 400 Meters
(half-duplex operation
50/125um Multimode Fiber 2000 Meters
(full-duplex operation)
62.5/125um Multimode Fiber 400 Meters
(half-duplex operation)
52.5/125um Multimode Fiber 2000 Meters
(full-duplex operation)
100BASE-TX Category 5 UTP Cable (100Mbps) 100 Meters
10BASE-T Category 3 UTP Cable (10Mbps) 100 Meters
*EXTREME NETWORKS PROPRIETARY. CAN BE CONNECTED TO 1000BASE-LX ON SINGLE-MODE FIBER USING A MAXIMUM DISTANCE
OF 5,000 METERS.
RACK MOUNTING
The switch is 2U high and will fit in most standard 19-inch racks.
The rack mount kits must not be used to suspend the switch from under a table
or desk, or attach it to a wall.
1 Place the switch the right way up on a hard flat surface, with the front facing toward
you.
2 Remove the existing screws from the sides of the chassis and retain for Step 4.
3 Locate a mounting bracket over the mounting holes on one side of the unit.
4 Insert the four screws and fully tighten with a suitable screwdriver, as shown in
Figure 2-1.
5 Repeat the three previous steps for the other side of the switch.
6 Insert the switch into the 19-inch rack and secure with suitable screws (not
provided). Ensure that ventilation holes are not obstructed.
7 Connect the Summit to the redundant power supply (if applicable).
8 Connect cables.
FREE-STANDING
The Summit is supplied with four self-adhesive rubber pads. Apply the pads to the
underside of the device by sticking a pad in the marked area at each corner of the
switch.
This section relates only to physically placing the devices on top of one another.
Apply the pads to the underside of the device by sticking a pad at each corner of the
switch. Place the devices on top of one another, ensuring that the corners align.
The terminal connected to the console port on the switch must be configured with the
same settings. This procedure will be described in the documentation supplied with the
terminal.
Appropriate cables are available from your local supplier. In order to make your own
cables, pin-outs for a DB-9 male console connector are described in Table 2-2.
Figure 2-2 shows the pin-outs for a 9-pin to RS-232 25-pin null-modem cable.
Summit PC/Terminal
Cable connector: 9-pin female Cable connector: 25-pin male/female
Screen Shell 1 Screen
TxD 3 3 RxD
RxD 2 2 TxD
Ground 5 7 Ground
RTS 7 4 RTS
CTS 8 20 DTR
DSR 6 5 CTS
DCD 1 6 DSR
DTR 4 8 DCD
Figure 2-2: Null-modem cable pin-outs
Figure 2-3 shows the pin-outs for a 9-pin to 9-pin PC-AT null-modem serial cable.
During the POST, all ports are temporarily disabled, the packet LED is off, the power
LED is on, and the MGMT LED flashes. The MGMT LED flashes until the switch has
successfully passed the POST.
If the switch passes the POST, the MGMT LED blinks at a slow rate (1 blink per
second). If the switch fails the POST, the MGMT LED shows a solid yellow light.
7 When you are finished using the facility, logout of the switch by typing
logout
After two incorrect login attempts, the Summit locks you out of the login facility.
You must wait a few minutes before attempting to log in again.
This chapter provides the following required information to begin managing the
Summit:
Understanding the command syntax
Line-editing commands
Command history substitution
Configuring the switch for management
Switch management methods
Configuring SNMP
Checking basic connectivity
SYNTAX HELPER
The command-line interface has a built-in syntax helper. If you are unsure of the
complete syntax for a particular command, enter as much of the command as possible.
The syntax helper provides a list of options for the remainder of the command.
The syntax helper also provides assistance if you have entered an incorrect command.
ABBREVIATED SYNTAX
Abbreviated syntax is the shortest, most unambiguous, allowable abbreviation of a
command, parameter, or value. Typically, this is the first three letters of the command.
COMMAND SHORTCUTS
All named components of the switch configuration must have a unique name.
Components are named using the create command. When you enter a command to
configure a named component, you do not need to use the keyword of the component.
For example, to create a VLAN, you must enter a unique VLAN name:
create vlan engineering
Once you have created the VLAN with a unique name, you can then eliminate the
keyword vlan from all other commands that require the name to be entered. For
example, instead of entering the command
NUMERICAL RANGES
Commands that require you to enter one or more port numbers use the parameter
<portlist> in the syntax. A portlist can be a range of numbers, for example:
port 1-3
You can add additional port numbers to the list, separated by a comma:
port 1-3,6,8
NAMES
All named components of the switch configuration must have a unique name. Names
must begin with an alphabetical character delimited by whitespace, unless enclosed in
quotation marks.
SYMBOLS
You may see a variety of symbols shown as part of the command syntax. These symbols
explain how to enter the command, and you do not type them as part of the command
itself. Table 3-1 summarizes command syntax symbols.
Symbol Description
angle brackets < > Enclose a variable or value. You must specify the variable or value. For
example, in the syntax
config vlan <name> ipaddress <ip_address>
you must supply a VLAN name for <name> and an address for
<ip_address> when entering the command. Do not type the angle
brackets.
square brackets [ ] Enclose a required value or list of required arguments. One or more
values or arguments can be specified. For example, in the syntax
disable vlan [<name> | all]
you must specify either the VLAN name for <name>, or the keyword all
when entering the command. Do not type the square brackets.
vertical bar | Separates mutually exclusive items in a list, one of which must be
entered. For example, in the syntax
config snmp community [read | write] <string>
you must specify either the read or write community string in the
command. Do not type the vertical bar.
braces { } Enclose an optional value or a list of optional arguments. One or more
values or arguments can be specified. For example, in the syntax
show vlan {<name> | all}
you can specify either a particular VLAN or the keyword all. If you do
not specify an argument, the command will show all VLANs. Do not type
the braces.
LINE-EDITING KEYS
LINE-EDITING KEYS
Table 3-2 describes the line-editing keys available using the command-line interface.
Key(s) Description
Backspace Deletes character to the left of cursor and shifts remainder of line to left.
Delete or [Ctrl] + D Deletes character under cursor and shifts remainder of line to left.
[Ctrl] + K Deletes characters from under cursor to the end of the line.
Insert Toggles on and off. When toggled on, inserts text and pushes previous
text to right.
Left Arrow Moves cursor to left.
Right Arrow Moves cursor to right.
Home or [Ctrl] + A Moves cursor to first character in line.
End or [Ctrl] + E Moves cursor to last character in line.
[Ctrl] + L Clears the screen and movers the cursor to the beginning of the line.
[Ctrl] + U Clears all characters typed from the cursor to the beginning of the line.
[Ctrl] + W Deletes the previous word.
Up Arrow Displays the previous command in the command history buffer, and
places cursor at end of command.
Down Arrow Displays the next command in the command history buffer, and places
cursor at end of command.
COMMAND HISTORY
The Summit remembers the last 49 commands you enter. You can display a list of
these commands by using the following command:
history
COMMON COMMANDS
Table 3-3 describes common commands used to manage the switch. Commands specific
to a particular feature are described in the other chapters of this guide.
Command Description
create account [admin | user] <username> Creates a user account.
{<password>}
create vlan <name> Creates a VLAN.
config account <username> {<password>} Configures a user account password.
config banner Configures the banner string. You can
enter up to 24 rows of 80-column text that
is displayed before the login prompt of
each session. Press [Return] at the
beginning of a line to terminate the
command and apply the banner. To clear
the banner, press [Return] at the beginning
of the first line.
config devicemode [bridging | iprouting | ipmc | Configures the operating mode of the
ipqos] switch. Specify the following:
bridging Layer 2 bridging
functions only
iprouting Bridging and IP unicast
routing functions
ipmc Bridging, IP unicast routing,
and IP multicast routing functions
ipqos IP flow-based QoS functions
If this command is used to change the
operating mode of the Summit once it is
up and running, it causes the switch to
save the configuration and reboot. The
default operating mode is ipmc.
config port <portlist> auto off {speed [10 | 100]} Manually configures the port speed and
duplex [half | full] duplex setting of one or more ports.
COMMON COMMANDS
Command Description
config time <date> <time> Configures the system date and time. The
format is as follows:
mm/dd/yyyy hh:mm:ss
The time uses a 24-hour clock format. You
cannot set the year past 2023.
config vlan <name> ipaddress <ip_address> Configures an IP address and subnet
{<mask>} mask for a VLAN.
enable bootp vlan [<name> | all] Enables BOOTP for one or more VLANs.
enable idletimeout Enables a fixed value timer that
disconnects all sessions (both Telnet and
console) after 20 minutes of inactivity.
The default setting is disabled.
clear session <number> Terminates a Telnet session from the
switch.
disable bootp vlan [<name> | all] Disables BOOTP for one or more VLANs.
disable idletimeout Disables the fixed value timer that
disconnects all sessions. Once disabled,
console sessions remain open until the
switch is rebooted. Telnet session remain
open until you close the Telnet client.
disable port <portlist> Disables a port.
disable telnet Disables Telnet access to the switch.
disable web Disables Web access to the switch.
delete account <username> Deletes a user account.
delete vlan <name> Deletes a VLAN.
unconfig switch {all} Resets all switch parameters (with the
exception of defined user accounts) to the
factory defaults. If you specify the
keyword all, the user account information
is reset as well.
show banner Displays the user-configured banner.
A user-level account has viewing access to all manageable parameters, with the
exception of the following:
User account database
SNMP community strings
A user-level account can use the ping command to test device reachability, and change
the password assigned to the account name. If you have logged on with user
capabilities, the command-line prompt will end with a (>) sign. For example:
Summit1:2>
An administrator-level account can view and change all switch parameters. It can also
add and delete users, and change the password associated with any account name. The
administrator can disconnect a management session that has been established by way of
a Telnet connection. If this happens, the user logged on by way of the Telnet connection
is notified that the session has been terminated.
If you have logged on with administrator capabilities, the command-line prompt will
end with a (#) sign. For example:
Summit1:18#
The prompt text is taken from the SNMP sysname setting. The number that follows the
colon indicates the sequential line/command number.
If an asterisk (*) appears in front of the command-line prompt, it indicates that you
have outstanding configuration changes that have not been saved. For example:
*Summit1:19#
DEFAULT ACCOUNTS
By default, the switch is configured with two accounts, as shown in Table 3-4.
If you forget your password while logged out of the command-line interface,
contact your local technical support representative, who will advise on your next
course of action.
#show account
The switch can support up to seven user sessions concurrently (for example, one
console port, one Web session, and five Telnet connections).
Once the connection is established, you will see the system prompt and you may log in.
USING TELNET
Any workstation with a Telnet facility should be able to communicate with the switch
over a TCP/IP network.
Up to eight active Telnet sessions can access the switch concurrently. The Telnet
connection will time out after twenty minutes of inactivity. If a connection to a Telnet
session is lost inadvertently, the switch terminates the session within two hours.
Before you can start a Telnet session, you must set up the IP parameters described in
the section Configuring Switch IP Parameters, later in this chapter. Telnet is enabled
by default.
To open the Telnet session, you must specify the IP address of the device that you want
to manage. Check the user manual supplied with the Telnet facility if you are unsure of
how to do this.
Once the connection is established, you will see the system prompt and you may log in.
If the TCP port number is not specified, the Telnet session defaults to port 23. Only
VT100 emulation is supported.
USING TELNET
The switch MAC address is found on the rear label of the switch.
Once this is done, the IP address and subnetwork mask for the switch will be
downloaded automatically. You can then start managing the switch without further
configuration.
You can enable BOOTP on a per-VLAN basis by using the following command:
If you configure the switch to use BOOTP, the switch IP address is not retained through
a power cycle, even if the configuration has been saved. To retain the IP address
through a power cycle, you must configure the IP address of the VLAN using the
command-line interface (CLI), Telnet, or Web interface.
All VLANs within a switch that are configured to use BOOTP to get their IP address
use the same MAC address. Therefore, if you are using BOOTP relay through a router,
the BOOTP server must be capable of differentiating its replay based on the gateway
portion of the BOOTP packet.
USING TELNET
8 When you are finished using the facility, log out of the switch by typing
logout
show session:
Command Description
config iparp add <ipaddress> <mac_address> Adds a permanent entry to the ARP table.
Specify the IP address and MAC address
of the entry.
config iparp delete <ipaddress> Deletes an entry from the ARP table.
Specify the IP address of the entry.
clear iparp [<ipaddress> | vlan <name> | all] Removes dynamic entries in the IP ARP
table. Permanent IP ARP entries are not
affected.
config iproute add <ipaddress> <mask> <gateway> Adds a static address to the routing table.
{<metric>} Use a value of 255.255.255.255 for mask
to indicate a host entry
config iproute delete <ipaddress> <mask> Deletes a static address from the routing
<gateway> table.
config iproute add default <gateway> {<metric>} Adds a default gateway to the routing
table. A default gateway must be located
on a configured IP interface. If no metric is
specified, the default metric of 1 is used.
config iproute delete default <gateway> Deletes a default gateway from the
routing table.
show ipconfig {vlan <name> | all} Displays configuration information for one
or more VLANs.
show ipstats {vlan [<name> | all]} Displays IP statistics for the CPU of the
switch.
show iparp {<ipaddress | vlan <name> | all | Displays the IP ARP table. You can filter
permanent} the display by IP address, VLAN, or
permanent entries.
The default home page of the switch can be accessed using the following command:
http://<ipaddress>
When you access the home page of the switch, you are presented with the Logon
screen.
enable web
USING SNMP
Any Network Manager running the Simple Network Management Protocol (SNMP) can
manage the switch, provided the Management Information Base (MIB) is installed
correctly on the management station. Each Network Manager provides its own user
interface to the management facilities.
The following sections describe how to get started if you want to use an SNMP
manager. It assumes you are already familiar with SNMP management. If not, refer to
the following publication:
The Simple Book
by Marshall T. Rose
ISBN 0-13-8121611-9
Published by Prentice Hall
SUPPORTED MIBS
Any Network Manager running SNMP can manage the Summit, provided the MIB is
installed correctly on the management station. In addition to private MIBs, the Summit
supports the standard MIBs listed in Table 3-6.
Table 3-6: Supported MIBs
USING SNMP
Command Description
enable snmp access Turns on SNMP support for the switch.
enable snmp trap Turns on SNMP trap support.
config snmp add <ipaddress> {<mask>} Adds the IP address of an SNMP
management station to the access list. Up
to 32 addresses can be specified.
config snmp add trapreceiver <ipaddress> Adds the IP address of a specified trap
community <string> receiver. The IP address can be a
unicast, multicast, or broadcast. A
maximum of 6 trap receivers is allowed.
config snmp add community [read | readwrite] Adds an SNMP read and write community
<string> string. Each community string can have a
maximum of 127 characters.
config snmp delete [<ipaddress> {<mask>} | all] Deletes the IP address of a specified
SNMP management station or all SNMP
management stations. If you delete all
addresses, any machine can have SNMP
management access to the switch.
config snmp delete trapreceiver [<ip_address> Deletes the IP address of a specified trap
community <string> | all] receiver or all authorized trap receivers.
config snmp delete community [read | readwrite] Deletes an SNMP community string.
<string>
config snmp syscontact <string> Configures the name of the system
contact. A maximum of 255 characters is
allowed.
config snmp sysname <string> Configures the name of the switch. A
maximum of 255 characters is allowed.
The default sysname is the model name of
the Summit, such as Summit1, Summit2,
Summit3, and so on. The sysname
appears in the Summit prompt.
config snmp syslocation <string> Configures the location of the switch. A
maximum of 255 characters is allowed.
USING SNMP
Command Description
disable snmp access Disables SNMP on the switch.
disable snmp trap Prevents SNMP traps from being sent from the switch.
Does not clear the SNMP trap receivers that have been
configured.
unconfig management Restores default values to all SNMP-related entries.
PING
The ping command enables you to send Internet Control Message Protocol (ICMP) echo
messages to a remote IP device. The ping command is available for both the user and
administrator privilege level.
Parameter Description
continuous Specifies ICMP echo messages to be sent continuously.
This option can be interrupted by pressing any key.
size <n> Specifies the size of the packet.
If a ping request fails, the switch continues to send ping messages until interrupted.
Press any key to interrupt a ping request.
TRACEROUTE
The traceroute command enables you to trace the routed path between the switch and
a destination endstation. The traceroute command syntax is
traceroute <ip_address>
MTRACE
The mtrace commands displays the multicast path from a source to a receiver. The
mtrace command syntax is
mtrace <group> <source> {<ttl>}
4 Configuring Ports
For example, to disable ports 3, 5, and 12 through 15 on the Summit2, enter the
following:
Even though a port is disabled, the link remains enabled for diagnostic purposes.
CONFIGURING PORTS
Gigabit Ethernet ports are statically set to 1 Gbps, and their speed cannot be modified.
All ports on the Summit can be configured for half-duplex or full-duplex operation. By
default, the ports autonegotiate the duplex setting.
To configure port speed and duplex setting, use the following command:
config port <portlist> auto off {speed [10 | 100]} duplex [half | full]
The following example turns autonegotiation off for port 49 (a Gigabit Ethernet port);
PORT COMMANDS
PORT COMMANDS
Table 4-1 describes the port commands.
Command Description
enable learning port <portlist> Enables MAC address learning on one or more
ports. The default setting is enabled.
enable port <portlist> Enables a port.
enable sharing <master_port> grouping Defines a load-sharing group of ports. The ports
<portlist> specified in <portlist> are grouped to the
master port.
enable smartredundancy <portlist> Enables the smart redundancy feature on the
redundant Gigabit Ethernet port. When the smart
redundancy feature is enabled, the switch
always uses the primary link when the primary
link is available. The default setting is enabled.
config port <portlist> auto on Enables autonegotiation for the particular port
type; 802.3u for 10/100 Mbps ports or 802.3z for
Gigabit Ethernet ports.
config port <portlist> auto off {speed [10 | Changes the configuration of a group of ports.
100]} duplex [half | full] Specify the following:
auto off the port will not autonegotiate
the settings
speed the speed of the port (for 10/100
Mbps ports only)
duplex the duplex setting (half- or
full-duplex)
config port <portlist> qosprofile <qosname> Configures one or more ports to use a particular
QoS profile.
disable learning port <portlist> Disables MAC address learning on one or more
ports for security purposes. If MAC address
learning is disabled, only broadcast traffic and
packets destined to a permanent MAC address
matching that port number, are forwarded. The
default setting is enabled.
disable port <portlist> Disables a port. Even when disabled, the link is
available for diagnostic purposes.
disable sharing <master_port> Disables a load-sharing group of ports.
CONFIGURING PORTS
Command Description
disable smartredundancy <portlist> Disables the smart redundancy feature. If the
feature is disabled, the switch changes the
active link only when the current active link
becomes inoperable.
show port {<portlist>} collisions Displays real-time collision statistics.
show port {<portlist>} config Displays the port configuration, including the
following:
Port state
Link state
Link speed
Duplex mode
Flow control
Load sharing information
Link media information
show port {<portlist>} information Displays detailed system-related information,
including the following:
Port state
Link state
Autonegotiation state
Link speed
Duplex mode
Load sharing information
EDP status
SummitLink mode status
VLAN information
QoS information
show port {<portlist>} packet Displays a histogram of packet statistics.
show port {<portlist>} qosmonitor Displays real-time QoS statistics. For more
information on QoS, refer to Chapter 8.
show port {<portlist>} rxerrors Displays real-time receive error statistics. For
more information on error statistics, refer to
Chapter 12.
show port {<portlist>} stats Displays real-time port statistics. For more
information on port statistics, refer to Chapter 12.
LOAD SHARING
Command Description
show port {<portlist>} txerrors Displays real-time transmit error statistics. For
more information on error statistics, refer to
Chapter 12.
show port {<portlist>} utilization Displays real-time port utilization information. Use
the [Spacebar] to toggle between packet, byte,
and bandwidth utilization information.
LOAD SHARING
Load sharing with Summit switches allows you to increase bandwidth and resilience
between switches by using a group of ports to carry traffic in parallel between switches.
The sharing algorithm allows the switch to use multiple ports as a single logical port.
For example, VLANs see the load-sharing group as a single logical port. The algorithm
also guarantees packet sequencing between clients.
Load sharing is most useful in cases where the traffic transmitted from the switch to the
load-sharing group is sourced from an equal or greater number of ports on the switch.
For example, traffic transmitted to a 2-port load-sharing group should originate from a
minimum of two other ports on the same switch.
This feature is supported between Summit switches only, but may be compatible with
third-party trunking or sharing algorithms. Check with an Extreme Networks
technical representative for more information.
CONFIGURING PORTS
Table 4-2, Table 4-3, Table 4-4, Table 4-5, and Table 4-6 show the possible load-sharing
port group combinations for the Summit1, Summit2, Summit3, Summit4 and
Summit4/FX, and Summit48, respectively.
Load-Sharing
Group 1 2 3 4 5 6 7 8
4-port groups x x x x
2-port groups x x x x x x
Load-Sharing
Group 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
4-port groups x x x x x x x x x x x x x x x x
2-port groups x x x x x x x x x x x x x x x x x x
Load-Sharing 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2
Group 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
4-port groups x x x x x x x x x x x x x x x x x x x x x x x x
2-port groups x x x x x x x x x x x x x x x x x x x x x x x x
LOAD SHARING
Load-Sharing 1 1 1 1 1 1 1 1 1 1 2 2 2
Group 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2
4-port groups x x x x x x x x x x x x x x x x x x x x
2-port groups x x x x x x x x x x x x x x x x x x x x x x
Load-Sharing 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2
Group 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4
4-port groups x x x x x x x x x x x x x x x x x x x x x x x x
2-port groups x x x x x x x x x x x x x x x x x x x x x x x x
Load-Sharing 2 2 2 2 2 3 3 3 3 3 3 3 3 3 3 4 4 4 4 4 4 4 4 4
Group 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8
4-port groups x x x x x x x x x x x x x x x x x x x x x x x x
2-port groups x x x x x x x x x x x x x x x x x x x x x x x x
Load-Sharing 4 5
Group 9 0
4-port groups
2-port groups x x
To define a load-sharing group, you assign a group of ports to a single, logical port
number. To enable or disable a load-sharing group, use the following commands:
The following example defines a load-sharing group that contains ports 9 through 12,
and uses the first port in the group as the master logical port 9:
CONFIGURING PORTS
When using load sharing, you should always reference the master logical port of
the load-sharing group (port 9 in the previous example) when configuring or
viewing VLANs. VLANs configured to use other ports in the load-sharing group
will have those ports deleted from the VLAN when load sharing becomes enabled.
PORT-MIRRORING
Port-mirroring configures the switch to copy all traffic associated with one or more
ports to a monitor port on the switch. The monitor port can be connected to a network
analyzer or RMON probe for packet analysis. The switch uses a traffic filter that copies
a group of traffic to the monitor port. The traffic filter can be defined based on one of
the following criteria:
MAC source address/destination address All data sent to or received from a
particular source or destination MAC address is copied to the monitor port.
Physical port All data that traverses the port, regardless of VLAN configuration,
is copied to the monitor port.
VLAN All data to and from a particular VLAN, regardless of the physical port
configuration, is copied to the monitor port.
Virtual port All data specific to a VLAN on a specific port is copied to the
monitor port.
Up to 8 mirroring filters and one monitor port can be configured on the switch. Once a
port is specified as a monitor port, it cannot be used for any other function.
PORT-MIRRORING
PORT-MIRRORING COMMANDS
Port-mirroring commands are described in Table 4-7.
Command Description
enable mirroring port <port> Dedicates a port on the switch to be the mirror port.
config mirroring add [mac <mac_address> Adds a single mirroring filter definition. Up to eight
| vlan <name> | port <port> | vlan mirroring definitions can be added. You can mirror
<name> port <port>] traffic from a MAC address, a VLAN, a physical
port, or a specific VLAN/port combination.
config mirroring delete [mac Deletes a particular mirroring filter definition, or all
<mac_address> | vlan <name> | port mirroring filter definitions.
<port> | vlan <name> port <port> | all}
disable mirroring Disables port-mirroring.
show mirroring Displays the port-mirroring configuration.
PORT-MIRRORING EXAMPLE
The following example selects port 3 as the mirror port, and sends all traffic coming
into or out of the switch on port 1 to the mirror port:
CONFIGURING PORTS
For detailed information about the Summit Virtual Chassis, refer to the Summit
Virtual Chassis Design and Installation Guide.
Table 4-8: Summit Ports to Use to Connect to the Summit Virtual Chassis
Table 4-8: Summit Ports to Use to Connect to the Summit Virtual Chassis (continued)
CONFIGURING PORTS
Command Description
show edp Displays connectivity information for neighboring
Summit switches.
enable summitlink port <portlist> Enables the port to connect to a SummitLink port
on the Summit Virtual Chassis. SummitLink cannot
be enabled if multiple STPDs are configured on
the port. The default setting is disabled.
disable summitlink port <portlist> Disables the connection to the SummitLink port on
the Summit Virtual Chassis.
enable edp port <portlist> Enables the generation and processing of Extreme
Discovery Protocol message on one or more ports.
The default setting is enabled.
disable edp port <portlist> Disables the Extreme Discovery Protocol on one or
more ports. EDP cannot be disabled on a port that
has SummitLInk enabled.
If you are using a parallel Virtual Chassis stack, you must configure load-sharing on the
Summit after the ports are designated as SummitLink ports. This is done using the
following command:
The VLAN default is joined by all Summit switches that are connected to a
Summit Virtual Chassis stack. This is because the VLAN name default exists on
all Summits, and the explicit 802.1Q tag value is 1 on each switch.
CONFIGURING PORTS
Setting up Virtual Local Area Networks (VLANs) on the Summit eases many
time-consuming tasks of network administration while increasing efficiency in network
operations.
This chapter describes the concept of VLANs and explains how to implement VLANs
on the Summit.
BENEFITS
Implementing VLANs on your networks has the following advantages:
VLANs help to control traffic.
With traditional networks, congestion can be caused by broadcast traffic that is
directed to all network devices, regardless of whether they require it. VLANs
increase the efficiency of your network because each VLAN can be set up to contain
only those devices that must communicate with each other.
TYPES OF VLANS
The Summit supports a maximum of 256 VLANs. Summit VLANs can be created
according to the following criteria:
Physical port
802.1Q tag
Ethernet, LLC SAP, or LLC/SNAP Ethernet protocol type
A combination of these criteria
PORT-BASED VLANS
In a port-based VLAN, a VLAN name is given to a group of one or more ports on the
switch. A switch port can be a member of only one port-based VLAN.
TYPES OF VLANS
For example, in Figure 5-1, ports 1, 2, and 5 are part of VLAN Marketing; ports 3, 4, and
6 are part of VLAN Sales; and ports 7 and 8 are in VLAN Finance.
Marketing Finance
1 8
2 3 4 5 6 7
Sales
Even though they are physically connected to the same switch, for the members of the
different VLANs to communicate, the traffic must go through the IP routing
functionality provided in the Summit. This means that each VLAN must be configured
as a router interface with a unique IP address.
To create a port-based VLAN that spans two switches, you must do two things:
Figure 5-2 illustrates a single VLAN that spans two switches. All ports on both switches
belong to VLAN Sales. The two switches are connected using port 2 on Switch 1, and
port 6 on Switch 2.
Sales
1 8
2 3 4 5 6 7
Switch 1
1 8
2 3 4 5 6 7
Switch 2
In a port-based VLAN, to create multiple VLANs that span two switches, a port on
Switch 1 must be cabled to a port on Switch 2 for each VLAN you want to have span
across the switches. At least one port on each switch must be a member of the
corresponding VLANs, as well.
TYPES OF VLANS
Figure 5-3 illustrates two VLANs spanning two switches. On Switch 1, ports 1-4 are part
of VLAN Accounting; ports 5 - 8 are part of VLAN Engineering. On Switch 2, ports 1-4
are part of VLAN Accounting; ports 5 - 8 are part of VLAN Engineering. VLAN
Accounting spans Switch 1 and Switch 2 by way of a connection between Switch 1 port 2
and Switch 2 port 4. VLAN Engineering spans Switch 1 and Switch 2 by way of a
connection between Switch 1 port 5 and Switch 2 port 8.
Accounting Engineering
1 8
2 3 4 5 6 7
Switch 1
1 8
2 3 4 5 6 7
Switch 2
Using these steps, you can create multiple VLANs that span multiple switch es, in a
daisy-chained fashion. Each switch must have a dedicated port for each VLAN. Each
dedicated port must be connected to a port that is a member its VLAN on the next
switch.
TAGGED VLANS
Tagging is a process that inserts a marker (called a tag) into the Ethernet frame. The tag
contains the identification number of a specific VLAN, called the VLANid.
The use of 802.1Q tagged packets may lead to the appearance of packets
slightly bigger than the current IEEE 802.3/Ethernet maximum of 1518 bytes.
This may affect packet error counters in other devices, and may also lead to
connectivity problems if non-802.1Q bridges or routers are placed in the path.
Tagging is most commonly used to create VLANs that span switches. The
switch-to-switch connections are typically called trunks. Using tags, multiple VLANs
can span multiple switches using one or more trunks. In a port-based VLAN, each
VLAN requires its own pair of trunk ports, as shown in Figure 5-3. Using tags, multiple
VLANs can span two switches with a single trunk.
Another benefit of tagged VLANs is the ability to have a port be a member of multiple
VLANs. This is particularly useful if you have a device (such as a server) that must
belong to multiple VLANs. The device must have a NIC that supports 802.1Q tagging.
A single port can be a member of only one port-based VLAN. All additional VLAN
membership for the port must be accompanied by tags. In addition to configuring the
VLAN tag for the port, the server must have a Network Interface Card (NIC) that
supports 802.1Q tagging.
Each VLAN may be assigned an 802.1Q VLAN tag. As ports are added to a VLAN with
an 802.1Q tag defined, you decide whether each port will use tagging for that VLAN.
The default mode of the switch is to have all ports assigned to the VLAN named
default, with an 802.1Q VLAN tag (VLANid) of 1 assigned.
Not all ports in the VLAN must be tagged. As traffic from a port is forwarded out of
the switch, the switch determines (in real time) if each destination port should use
tagged or untagged packet formats for that VLAN. The switch adds and strips tags, as
required, by the port configuration for that VLAN.
Packets arriving tagged with a VLANid that is not configured in the switch will be
discarded.
TYPES OF VLANS
Figure 5-4 illustrates the physical view of a network that uses tagged and untagged
traffic.
MS
M M S MS
Switch 1 M = Marketing
802.1Q S = Sales
Tagged server = Tagged port
M S
MS M S
Switch 2
Figure 5-4: Physical diagram of tagged and untagged traffic
*Tagged Ports
The trunk port on each switch carries traffic for both VLAN Marketing and VLAN
Sales.
The trunk port on each switch is tagged.
The server connected to port 1 on Switch 1 has a NIC that supports 802.1Q tagging.
The server connected to port 1 on Switch 1 is a member of both VLAN Marketing
and VLAN Sales.
All other stations use untagged traffic.
As data passes out of the switch, the switch determines if the destination port requires
the frames to be tagged or untagged. All traffic coming from and going to the server is
tagged. Traffic coming from and going to the trunk ports is tagged. The traffic that
comes from and goes to the other stations on this network is not tagged.
TYPES OF VLANS
VLAN
Switch A VLAN Red, Tag 10
Untag Red,
ged
d,
N Re d GVRP: "Send
A g e GVRP: "Send
VL ntag me traffic for me traffic for
U VLAN tag 10." VLAN tag 10."
Switch B
GVRP: "Send
me traffic for
VLAN tag 10."
In Figure 5-6, Switch A is a member of VLAN Red. VLAN Red has the VLANid 10. Port
1 and port 2 on Switch A are added to the VLAN as untagged.
Switch B does not need to be configured with VLAN or tagging information. Instead,
using GVRP, the server connected to Switch B, and the remainder of the network
connected to Switch B provide Switch B with the information it needs to forward traffic.
Switch A automatically adds port 3 to VLAN Red because Switch A now knows that
there are other devices on port 3 that need access to VLAN Red.
VLANs that are automatically created using GVRP with the VLANid 10 are given
names in the following format:
where xxxx is the VLANid (in decimal) that is discovered by GVRP. These VLANs are
not permanently stored in NVRAM, and you cannot add or remove ports from these
VLANs.
GVRP assumes that the VLANs for which it carries information operate using VLAN
tags, unless explicitly configured otherwise. Typically, you must configure any untagged
VLANs on the switches at the edges of the network, and the GVRP protocol is used
across the core of the network to automatically configure other switches using tagged
VLANs.
GVRP COMMANDS
Command Description
enable gvrp Enables the Generic VLAN Registration
Protocol (GVRP). The default setting is
disabled.
config gvrp {listen | send | both | none} {port Configures the sending and receiving GVRP
<portlist> | all} information on one or more ports. Options
include the following:
listen Receive GVRP packets.
send Send GVRP packets.
both Send and receive GVRP packets.
none Disable the port from participating
in GVRP operation.
The default setting is both.
disable gvrp Disables the GARP VLAN Registration
Protocol.
show gvrp Displays the current configuration and status
of GVRP.
TYPES OF VLANS
PROTOCOL-BASED VLANS
Protocol-based VLANs enable you to define a packet filter that the Summit uses as the
matching criteria to determine if a particular packet belongs to a particular VLAN.
Protocol-based VLANs are most often used in situations where network segments
contain hosts running multiple protocols. For example, in Figure 5-7, the hosts are
running both the IP and NetBIOS protocols.
The IP traffic has been divided into two IP subnets, 192.207.35.0 and 192.207.36.0. The
subnets are internally routed by the Summit. The subnets are assigned different VLAN
names, Finance and Personnel, respectively. The remainder of the traffic belongs to the
VLAN named MyCompany. All ports are members of the VLAN MyCompany.
192.207.35.1 192.207.36.1
My Company
192.207.35.0 192.207.36.0
Finance Personnel
1 2 3 4
= IP traffic
= All other traffic
IP
IPX
NetBIOS
DECNet
IPX_8022
IPX_SNAP
AppleTalk
VLAN NAMES
A maximum of seven protocol filters, each containing a maximum of six protocols, can
be defined, however no more than seven protocol should be active and configured for
use.
For more information on SNAP protocol for Ethernet protocol types, see TR
11802-5:1997 (ISO/IEC) [ANSI/IEEE std. 802.1H, 1997 Edition].
VLAN NAMES
The Summit supports up to 256 different VLANs. Each VLAN is given a name that can
be up to 32 characters. VLAN names can use standard alphanumeric characters. The
following characters are not permitted in a VLAN name:
Space
Comma
Quotation mark
VLAN names must begin with an alphabetical letter. Quotation marks can be used to
enclose a VLAN name that does not begin with an alphabetical character, or that
contains a space, comma, or other special character.
VLAN names are locally significant. That is, VLAN names used on one switch are only
meaningful to that switch. If another switch is connected to it, the VLAN names have
no significance to the other switch. The exception to this is when a switch is connected
to a Summit Virtual Chassis. In this case, the VLAN name is used as part of the
connectivity negotiation process. You should use VLAN names consistently across your
entire network.
DEFAULT VLAN
The Summit ships with one default VLAN that has the following properties:
The VLAN name is default.
It contains all the ports on a new or initialized switch.
The default VLAN is untagged on all ports. It has an internal VLANid of 1.
Command Description
create vlan <name> Creates a named VLAN.
create protocol <protocol_name> Creates a user-defined protocol.
Command Description
enable ignore-stp vlan <name> Enables a VLAN from using STP port
information. When enabled, all virtual ports
associated with the VLAN are in STP
forwarding mode. The default setting is
disabled.
config dot1p ethertype <ethertype> Configures an IEEE 802.1Q Ethertype. Use
this command only if you have another switch
that supports 802.1Q, but uses a different
Ethertype value than 8100.
config protocol <protocol_name> [add | delete] Configures a protocol filter. Supported
<protocol_type> <hex_value> <protocol_type> values include:
{<protocol_type> <hex_value>} ...
etype
llc
snap
The variable <hex_value> is a hexadecimal
number between 0 and FFFF that represents
either the Ethernet protocol type (for
EtherType), the DSAP/SSAP combination (for
LLC), or the SNAP-encoded Ethernet protocol
type (for SNAP).
config vlan <name> ipaddress <ipaddress> Assigns an IP address and an optional mask to
{<mask>} the VLAN.
config vlan <name> [add | delete] port Adds one or more ports to a VLAN. You can
<portlist> {tagged | untagged} specify tagged port(s), untagged port(s). By
default, ports are untagged.
config vlan <name> delete port <portlist> Deletes one or more ports from a VLAN.
{tagged | untagged}
config vlan <name> protocol Configures a protocol-based VLAN. If the
[<protocol_name> | any] keyword any is specified, then it becomes the
default VLAN. All packets that cannot be
classified into other protocol-based VLANs are
assigned to the default VLAN of that port.
config vlan <name> qosprofile <qosname> Configures a VLAN to use a particular QoS
profile. Dynamic FDB entries associated with
the VLAN are flushed once the change is
committed.
config vlan <name> tag <vlanid> Assigns a numerical VLANid. The valid range
is from 1 to 4095.
Because VLAN names are unique, you do not need to enter the keyword vlan
after you have created the unique VLAN name. You can use the VLAN name
alone.
The following example creates a tag-based VLAN named video. It assigns the VLANid
1000. Ports 4 through 8 are added as tagged ports to the VLAN.
The following example creates a VLAN named Sales, with the VLANid 120. The VLAN
uses both tagged and untagged ports. Ports 1 through 3 are tagged, and ports 4 and 7
are untagged. Note that when not explicitly specified, ports are added as untagged.
The following example creates a protocol-based VLAN named IPSales. Ports 6 through 8
are assigned to the VLAN.
The following example defines a protocol filter, myprotocol and applies it to the VLAN
named myvlan. This is an example only, and has no real-world application.
The show command displays summary information about each VLAN, and includes
the following:
Name
VLANid
How the VLAN was created (manually or by GVRP)
IP address
STPD information
Protocol information
QOS profile information
Ports assigned
Protocol name
List of protocol fields
VLANs that use the protocol
DELETING VLANS
To delete a VLAN, or to return VLAN settings to their defaults, use the commands
listed in Table 5-3.
Command Description
disable ignore-stp vlan <name> Allows a VLAN to use STP port information.
unconfig vlan <name> ipaddress Resets the IP address of the VLAN.
delete vlan <name> Removes a VLAN.
delete protocol <protocol> Removes a protocol.
This chapter describes the contents of the switch forwarding database (FDB), how the
FDB works, and how to configure the FDB.
FDB CONTENTS
The database holds up to a maximum of 128K entries. Each entry consists of the MAC
address of the device, an identifier for the port on which it was received, and an
identifier for the VLAN to which the device belongs. Frames destined for devices that
are not in the FDB are flooded to all members of the VLAN.
switch is reset or a power off/on cycle occurs. For more information about setting
the aging time, refer to the section Configuring FDB Entries, later in this chapter.
Non-aging entries If the aging time is set to zero, all aging entries in the database
are defined as static, non-aging entries. This means that they do not age, but they are
still deleted if the switch is reset.
Permanent entries Permanent entries are retained in the database if the switch is
reset or a power off/on cycle occurs. The system administrator must make entries
permanent. A permanent entry can either be a unicast or multicast MAC address.
All entries entered by way of the command-line interface are stored as permanent.
The switch can support a maximum of 64 permanent entries.
Once created, permanent entries stay the same as when they were created. For
example. the permanent entry store is not updated when any of the following take
place:
A VLAN is deleted
A VLANid is changed
A port mode is changed (tagged/untagged)
A port is deleted from a VLAN
A port is disabled
A port enters blocking state
A port QoS setting is changed
A port goes down (link down)
Blackhole entries A blackhole entry configures packets with a specified MAC
destination address to be discarded. Blackhole entries are useful as a security
measure or in special circumstances where a specific destination address must be
discarded. Blackhole entries are treated like permanent entries in the event of a
switch reset or power off/on cycle. Blackhole entries are never aged out of the
database.
Command Description
create fdbentry <mac_address> vlan Creates an FDB entry. Specify the following:
<name> [blackhole | <portlist> | dynamic]
mac_address Device MAC address, using
{qosprofile <qosname>}
colon separated bytes.
name VLAN associated with MAC address.
blackhole Configures the MAC address as
a blackhole entry.
portlist Port numbers associated with
MAC address.
dynamic Specifies that the entry will be
learned dynamically. Used to associated a QoS
profile with a dynamically learned entry.
qosname QoS profile associated with MAC
address.
If more than one port number is associated with a
permanent MAC entry, packets are multicast to the
multiple destinations.
config fdb agingtime <number> Configures the FDB aging time. The range is 15
through 1,000,000 seconds. The default value is
300 seconds. A value of 0 indicates that the entry
should never be aged out.
enable learning port <portlist> Enables MAC address learning on one or more
ports.
Command Description
disable learning port <portlist> Disables MAC address learning on one or more
ports for security purposes. If MAC address
learning is disabled, only broadcast traffic and
packets destined to a permanent MAC address
matching that port number, are forwarded. The
default setting is enabled.
This example associates the QoS profile qp2 with a dynamic entry that will be learned
by the FDB:
The following sample output shows the information displayed when you request
output for all FDB entries:
show fdb
Command Description
delete fdbentry <mac_address> vlan <name> Deletes a permanent FDB entry.
clear fdb [all | <mac_address> | vlan <name> | Clears dynamic FDB entries that match
<portlist>] the filter. Use the keyword all to clear all
dynamic entries.
Using the Spanning Tree Protocol (STP) functionality of the Summit makes your
network more fault tolerant.
The following sections explain more about STP and the STP features supported by the
switch.
STP is a part of the 802.1D bridge specification defined by the IEEE Computer
Society. To explain STP in terms used by the 802.1D specification, the Summit
will be referred to as a bridge.
A port can belong to only one STPD. If a port is a member of multiple VLANs, then all
those VLANs must belong to the same STPD.
The key points to remember when configuring VLANs and STP are the following:
Care must be taken to ensure that STPD instances within a single Summit
switch do not see each other in the same broadcast domain. This could happen
if, for example, another external bridge is used to connect VLANs belonging to
separate STPDs.
If you delete a STPD, the VLANs that were members of that STPD are also deleted. You
must remove all VLANs associated with the STP before deleting the STPD.
DEFAULTS
The default device configuration contains a single STPD called s0. The default VLAN is
a member of STPD s0.
STP CONFIGURATIONS
When you assign VLANs to an STPD, pay careful attention to the STP configuration
and its effect on the forwarding of VLAN traffic.
Figure 7-1 illustrates a network that uses VLAN tagging for trunk connections. The
following four VLANs have been defined:
Sales is defined on Switch A, Switch B, and Switch M.
Personnel is defined on Switch A, Switch B, and Switch M.
Manufacturing is defined on Switch Y, Switch Z, and Switch M.
Engineering is defined on Switch Y, Switch Z, and Switch M.
Marketing is defined on all switches (Switch A, Switch B, Switch Y, Switch Z, and
Switch M).
STP CONFIGURATIONS
The VLAN Marketing is a member of the default STPD, but not assigned to either
STPD1 or STPD2.
Switch A Switch Y
Switch B Switch Z
When the switches in this configuration start up, STP configures each STP domain such
that there are no active loops in the topology. STP could configure the topology in a
number of ways to make it loop-free.
In Figure 7-1, the connection between Switch A and Switch B is put into blocking state,
and the connection between Switch Y and Switch Z is put into blocking state. After STP
converges, all the VLANs can communicate, and all bridging loops are prevented.
The VLAN Marketing, which has not been assigned to either STPD1 or STPD2,
communicates using all five switches. The topology has no loops, because STP has
already blocked the port connection between Switch A and Switch B, and between
Switch Y and Switch Z.
Within a single STPD, you must be extra careful when configuring your VLANs.
Figure 7-2 illustrates a network that has been incorrectly set up using a single STPD so
that the STP configuration disables the ability of the switches to forward VLAN traffic.
Switch 1 Switch 3
Switch 2
Sales & Engineering
STP may block traffic between Switch 1 and Switch 3 by disabling the trunk ports for
that connection on each switch.
Switch 2 has no ports assigned to VLAN marketing. Therefore, if the trunk for VLAN
marketing on Switches 1 and 3 is blocked, the traffic for VLAN marketing will not be
able to traverse the switches.
STPD, VLAN, and QoS profile names must all be unique. For example, a name
used to identify a VLAN cannot be used when you create an STPD or a QoS
profile.
Add one or more VLANs to the STPD using the following command:
config stpd <stpd_name> add vlan <name>
Enable STP for one or more STP domains using the following command:
enable stpd [<stpd_name> | all]
All VLANs belong to a STPD. If you do not want to run STP on a VLAN, you
must ad the VLAN to a STPD that is disabled.
Once you have created the STPD, you can optionally configure STP parameters for the
STPD.
You should not configure any STP parameters unless you have considerable
knowledge and experience with STP. The default STP parameters are adequate
for most networks.
The device supports the RFC 1493 Bridge MIB. Parameters of only the s0 default
STPD are accessible through this MIB.
Command Description
create stpd <stpd_name> Creates an STPD. When created, an STPD has
the following default parameters:
Bridge priority 32,768
Hello time 2 seconds
Forward delay 15 seconds
enable stpd [<stpd_name> | all] Enables the STP protocol for one or all STPDs.
The default setting is disabled.
enable stpd port <portlist> Enables the STP protocol on one or more ports.
If STPD is enabled for a port, BPDUs will be
generated on that port if STP is enabled for the
associated STPD. The default setting is enabled.
config stpd <stpd_name> add vlan <name> Adds a VLAN to the STPD.
config stpd <stpd_name> hellotime <value> Specifies the time delay (in seconds) between
the transmission of BPDUs from this STPD when
it is the Root Bridge.
The range is 1 through 10. The default setting is
2 seconds.
config stpd <stpd_name> forwarddelay Specifies the time (in seconds) that the ports in
<value> this STPD spend in the listening and learning
states when the switch is the Root Bridge.
The range is 4 through 30. The default setting is
15 seconds.
config stpd <stpd_name> maxage <value> Specifies the maximum age of a BPDU in this
STPD.
The range is 6 through 40. The default setting is
20 seconds.
Note that the time must be greater than, or equal
to 2 X (Hello Time + 1) and less than, or equal to
2 X (Forward Delay 1).
config stpd <stpd_name> priority <value> Specifies the priority of the STPD. By changing
the priority of the STPD, you can make it more or
less likely to become the Root Bridge.
The range is 0 through 65,535. The default
setting is 32,768. A setting of 0 indicates the
highest priority.
Command Description
config stpd <stpd_name> port cost <value> Specifies the path cost of the port in this STPD.
<portlist>
The range is 1 through 65,535. The switch
automatically assigns a default path cost based
on the speed of the port, as follows:
For a 10Mbps port, the default cost is 100.
For a 100Mbps port, the default cost is 19.
For a 1000Mbps port, the default cost is 4.
config stpd <stpd_name> port priority Specifies the priority of the port in this STPD. By
<value> <portlist> changing the priority of the port, you can make it
more or less likely to become the Root Port.
The range is 0 through 255. The default setting
is 128. A setting of 0 indicates the lowest priority.
CONFIGURATION EXAMPLE
The following example creates and enables an STPD named Backbone_st. It assigns the
Manufacturing VLAN to the STPD. It disables STP on ports 1 through 7, and port 12.
create stpd backbone_st
config stpd backbone_st add vlan manufacturing
enable stpd backbone_st
disable stpd backbone_st port 1-7,12
Command Description
delete stpd <stpd_name> Removes an STPD. An STPD can only be removed if
all VLANs have been deleted from it.
disable stpd [<stpd_name> | all] Disables the STP mechanism on a particular STPD,
or for all STPDs.
disable stpd port <portlist> Disables STP on one or more ports. Disabling STP
on one or more ports puts those ports in
FORWARDING state; all BPDUs received on those
ports will be disregarded.
unconfig stpd {<stpd_name> | all} Restores default STP values to a particular STPD or
to all STPDs.
This chapter describes the concept of Quality of Service (QoS) and explains how to
implement QoS on the Summit.
BUILDING BLOCKS
Quality of Service is determined by one or more of the following building blocks:
QoS mode Indicates whether the switch should use egress or ingress traffic
classifications. Ingress is the default.
QoS profile Includes bandwidth and priority parameters.
Traffic classification A method of grouping traffic that has one or more attributes
in common.
QoS profiles are assigned to traffic classifications, independent of the QoS mode chosen,
in order to modify switch forwarding behavior.
QOS MODE
There are two modes of QoS. Ingress mode, the default, can use a wide variety of traffic
classifications, but has a limitation of being able to use only the default four QoS
profiles. You can modify the bandwidth parameters of the default QoS profiles.
Using egress mode, you can define additional QoS profiles, but you must use a smaller
selection of traffic classifications. You can modify both the prioritization and bandwidth
parameters of user-defined QoS profiles.
The default QoS profiles exist in either ingress or egress mode. In ingress mode, only
the default QoS profiles are observed. In egress mode, up to 28 additional custom
profiles may be defined, for a total of 32. You cannot create custom profiles in ingress
mode.
BUILDING BLOCKS
Medium
High
A QoS profile does not alter the behavior of the switch until it is assigned to a
traffic classification.
You can modify the minimum and maximum bandwidth parameters of the default QoS
profiles in either ingress or egress mode. The priority parameter can not be modified in
ingress mode.
TRAFFIC GROUPINGS
Different traffic groupings are available, depending on the QoS mode configured for the
switch. In the event that a given packet matches two or more grouping criteria, there is
a predetermined precedence for which traffic grouping will apply. By default, all traffic
groupings are placed in the QoS profile named qp1.
The available traffic groupings are listed in the following sections, in order of highest to
lowest precedence.
Destination MAC address When making a permanent FDB entry, you can provide
a QoS profile. You can also provide a QoS profile that will be bound to a dynamic
FDB entry when the MAC address is learned. This is configured using the following
command:
create fdbentry <mac addr> vlan <vlan name> [blackhole | port
<portlist> | dynamic] qosprofile <qosname>
For example:
create fdbentry 00:11:22:33:44:55 vlan default port 1 qosprofile qp1
IEEE 802.1p When traffic that contains 802.1p prioritization bits are seen, the
traffic is mapped to the four default QoS profiles. No user configuration is required
for this type of traffic grouping. Table 8-2 describes 802.1p values and their
associated QoS profiles.
PACE When 3Com PACE traffic is seen, it is mapped to the profile named qp3.
Observance of PACE can be controlled by using the following command:
{enable | disable} pace
Source port You can configure a QoS profile to all the traffic being received from a
particular port. This is controlled by using the following command:
config port <portlist> qosprofile <qosname>
VLAN This is controlled by using the following command:
config vlan <name> qosprofile <qosname>
BUILDING BLOCKS
In order to use ipqos traffic groupings, you must change the devicemode of the
switch to ipqos, before configuring QoS.
PRECEDENCE
If traffic falls into multiple traffic groupings, the following order of precedence applies:
Ingress Mode
IP destination address
Destination MAC address
802.1p prioritization bits
PACE
Source port
VLAN
Egress Mode
IP destination address
Destination MAC address
VLAN
PRIORITIZATION
Each of the default values is configurable by using the following command in egress
mode:
config qosprofile <qosname> {minbw <percent>} {maxbw <percent>}
{priority <level>}
In ingress mode, use the same command syntax to modify the bandwidth parameters of
the default QoS profiles, however the priority level specified is ignored.
or
You can assign a QoS profile to a MAC entry by using the following command:
You can assign a QoS profile to an IP address by using the following command:
Command Description
show qosmonitor Displays the QoS monitor results. An
asterisk (*) indicates the port currently
being monitored.
show port {<portlist>} qosmonitor Displays real-time QoS statistics for one or
more ports.
CONFIGURING QOS
Table 8-4 describes the commands used to configure QoS.
Command Description
enable pace Enables recognition of the PACE bit.
Available in ingress mode, only.
create qosprofile <qosname> Creates a QoS profile. The default values
assigned to a created QoS profile are:
Minimum bandwidth 0%
Maximum bandwidth 100%
Priority low
config qosmode [ingress | egress] Changes the QoS mode to ingress mode
or egress mode.
config qosprofile <qosname> {minbw <percent>} Configures a QoS profile. Specify:
{maxbw <percent>} {priority <level>}
minbw The minimum bandwidth
percentage guaranteed to be available
to this queue. The default setting is 0.
maxbw The maximum bandwidth
percentage this queue is permitted to
use. The default setting is 100.
priority The service priority for
this queue. Settings include low,
medium-low, medium, high. The default
setting is low. Available in egress mode,
only.
config port <portlist> qosprofile <qosname> Allows you to configure one or more ports
to use a particular QoS profile. Available
in ingress mode, only.
config vlan <name> qosprofile <qosname> Allows you to configure a VLAN to use a
particular QoS profile.
disable pace Disables recognition of the PACE bit.
Available in ingress mode, only.
CONFIGURING QOS
1 Configure the switch for the egress mode, by typing the following:
config qosmode egress
2 Reboot the switch.
3 Configure the switch for the correct devicemode, by typing the following:
config devicemode ipqos
4 Reboot the switch.
5 Create and configure the QoS profile mktgqos,, by typing the following:
create qosprofile mktgqos
config qosprofile mktgqos minbw 0% maxbw 10% priority low
6 Apply the QoS profile to a range of IP addresses, by typing the following:
config ipqos add 128.1.0.0/16 qosprofile mktgqos
Additionally, QoS information can be displayed from the traffic group perspective by
using one of the following commands:
RESETTING QOS
To delete a QoS profile use the following command:
delete qosprofile <qosname>
9 IP Unicast Routing
This chapter describes how to configure IP routing on the Summit. It assumes that
you are already familiar with IP unicast routing. If not, refer to the following
publications for additional information:
RFC 1058 Routing Information Protocol
RFC 1256 ICMP Router Discovery Messages
RFC 1812 Requirements for IP Version 4 Routers
Each host using the IP unicast routing functionality of the Summit must have a unique
IP address assigned. In addition, the default gateway assigned to the host must be the
IP address of the Summit router interface.
IP UNICAST ROUTING
ROUTER INTERFACES
The routing software and hardware routes IP traffic between router interfaces. A router
interface is simply a VLAN that has an IP address assigned to it.
As you create VLANs with IP addresses belonging to different IP subnets, you can also
choose to route between the VLANs. Both the VLAN switching and IP routing function
occur within the Summit.
In Figure 9-1, A Summit is depicted with two VLANs defined; Finance and Personnel.
Ports 1 and 3 are assigned to Finance; ports 2 and 4 are assigned to Personnel. Finance
belongs to the IP network 192.207.35.0; the router interface for Finance is assigned the IP
address 192.206.35.1. Personnel belongs to the IP network 192.207.36.0; its router
interface is assigned IP address 192.207.36.1. Traffic within each VLAN is switched
using the Ethernet MAC addresses. Traffic between the two VLANs is routed using the
IP addresses.
192.207.35.1 192.207.36.1
192.207.35.0 192.207.36.0
Finance Personnel
1 2 3 4
If you define a default route, and subsequently delete the VLAN on the subnet
associated with the default route, the invalid default route entry remains. You
must manually delete the configured default route.
DYNAMIC ROUTES
Dynamic routes are typically learned by way of RIP or OSPF. Routers that use RIP or
OSPF exchange information in their routing tables in the form of advertisements. Using
dynamic routes, the routing table contains only networks that are reachable.
Dynamic routes are aged out of the table when an update for the network is not
received for a period of time, as determined by the routing protocol.
STATIC ROUTES
Static routes are manually entered into the routing table. Static routes are used to reach
networks not advertised by routers. You can configure up to 64 static unicast routes on
the Summit.
Static routes can also be used for security reasons, to control which routes you want
advertised by the router. You can decide if you want all static routes to be advertised,
using one of the following commands:
The default setting is enabled. Static routes are never aged out of the routing table.
IP UNICAST ROUTING
A static route must be associated with a valid IP subnet. An IP subnet is associated with
a single VLAN by its IP address and subnet mask. If the VLAN is subsequently deleted,
the static route entries using that subnet must be deleted manually.
MULTIPLE ROUTES
When there are multiple, conflicting choices of a route to a particular destination, the
router picks the route with the longest matching network mask. If these are still equal,
the router picks the route using the following criterion (in the order specified):
Directly attached network interfaces
ICMP redirects (refer to Table 9-3)
Static routes
Directly attached network interfaces that are not active.
If you define multiple default routes, the route that has the lowest metric is used.
If there are multiple default routes that have the same lowest metric, the Summit
picks one of the routes.
You can also configure blackhole routestraffic to these destinations is silently dropped.
PROXY ARP
Proxy ARP was first invented so that ARP-capable devices could respond to ARP
Request packets on behalf of ARP-incapable devices. The usage and scope of proxy
ARP has been expended since its introduction. Currently, proxy ARP can be used to
achieve router redundancy and simplify IP client configuration. The Summit switch
supports proxy ARP for this type of network configuration. Up to 64 proxy ARP entries
can be configured. The section describes some example of how to use proxy ARP with
the Summit.
ARP-INCAPABLE DEVICES
To configure the Summit to respond to ARP Requests on behalf of devices that are
incapable of doing so, you must configure the IP address and MAC address of the
ARP-incapable device using the use the following command:
config iparp add proxy <ipaddress> {<mask>} <mac_address> {always}
Once configured, the Summit responds to ARP Requests on behalf of the device as long
as the following conditions are satisfied:
Once all the proxy ARP conditions are met, the Summit formulates an ARP Response
using the configured MAC address in the packet.
When the IP host tries to communicate with the host at address 100.101.45.67, the IP
hosts communicates as if the two hosts are on the same subnet, and sends out an IP
ARP Request. The Summit answers on behalf of the device at address 100.101.45.67,
using its own MAC address. All subsequent data packets from 100.101.102.103 are sent
to the switch, and the switch routes the packets to 100.101.45.67.
IP MULTINETTING
IP multinetting is used in many legacy IP networks when there is a need to overlap
multiple subnets into one physical segment. On the Summit, you can only assign a
single IP address to a router interface (one IP address per VLAN). To support IP
multinetting, you must assign multiple VLANs to the same physical port. The Summit
routes IP traffic from one subnet to another, all within the same physical port.
IP UNICAST ROUTING
IP MULTINETTING OPERATION
To use IP multinetting, follow these steps:
1 Select a port on which IP multinetting is to run.
For example, port 2.
2 Remove the default VLAN from the selected port.
config default delete port 2
3 Create a dummy protocol.
create protocol mnet
4 Create the multinetted subnets.
create vlan net21
create vlan net22
5 Assign IP addresses to the net VLANs.
config net21 ipaddress 123.45.21.1 255.255.255.0
config net22 ipaddress 192.24.22.1 255.255.255.0
6 Assign one of the subnets to the IP protocol.
config net21 protocol ip
7 Assign the other subnets to the dummy protocol.
config net22 protocol mnet
IP MULTINETTING EXAMPLES
The following example configures the switch to have one multinetted segment (port 5)
that contains three subnets (192.67.34.0, 192.67.35.0, and 192.67.37.0).
config default delete port 5
create protocol mnet
create vlan net34
create vlan net35
create vlan net37
config net34 ipaddress 192.67.34.1
config net35 ipaddress 192.67.35.1
config net37 ipaddress 192.67.37.1
config net34 protocol ip
config net35 protocol mnet
config net37 protocol mnet
config net34 add port 5
config net35 add port 5
config net37 add port 5
enable ipforwarding
enable multinetting
IP UNICAST ROUTING
The following example configures the switch to have one multinetted segment (port 5)
that contains three subnets (192.67.34.0, 192.67.35.0, and 192.67.37.0). It also configures a
second multinetted segment consisting of two subnets (192.67.36.0 and 192.99.45.0). The
second multinetted segment spans three ports (port 8, port 9, and port 10). RIP is
enabled on both multinetted segments.
config default delete port 5
create protocol mnet
create vlan net34
create vlan net35
create vlan net37
config net34 ipaddress 192.67.34.1
config net35 ipaddress 192.67.35.1
config net37 ipaddress 192.67.37.1
config net34 protocol ip
config net35 protocol mnet
config net37 protocol mnet
config net34 add port 5
config net35 add port 5
config net37 add port 5
config default delete port 8-10
create vlan net36
create vlan net45
config net36 ipaddress 192.67.36.1
config net45 ipaddress 192.99.45.1
config net36 protocol ip
config net45 protocol mnet
config net36 add port 8-10
config net45 add port 8-10
config rip delete vlan all
config rip add net34
config rip add net36
enable rip
enable ipforwarding
enable multinetting
Assign each VLAN that will be using routing an IP address, using the following
command:
config vlan <name> ipaddress <ipaddress> {<mask>}
Ensure that each VLAN has a unique IP address.
Configure a default route, using the following command:
config iproute add default <gateway> {<metric>}
Default routes are used when the router has no other dynamic or static route to the
requested destination.
Turn on IP routing for one or more VLANs, using the following command:
enable ipforwarding {vlan <name> | all}
Turn on RIP or OSPF using one of the following commands:
enable rip
enable ospf
Only one routing protocol, either RIP or OSPF, can be enabled on the switch at
any given time.
IP UNICAST ROUTING
show iparp
Displays the IP ARP table of the switch.
show ipfdb
Displays the hosts that have been transmitting or receiving packets, and the port and
VLAN for each host.
show ipconfig
Displays configuration information for one or more VLANs.
This command displays the configuration of the BOOTP relay service, and the
addresses that are currently configured.
Table 9-1 describes the commands used to configure basic IP settings on the switch.
Command Description
enable bootp vlan [<name> | all] Enables the generation and processing of
BOOTP packets on a VLAN to obtain an
IP address for the VLAN from a BOOTP
server. The default setting is enabled for
all VLANs.
enable bootprelay Enables the forwarding of BOOTP and
Dynamic Host Configuration Protocol
(DHCP) requests.
enable ipforwarding {vlan <name> | all} Enables IP routing for one or more VLANs.
If no argument is provided, enables routing
for all VLANs that have been configured
with an IP address. The default setting for
ipforwarding is disabled.
enable ipforwarding broadcast {vlan <name> | all} Enables forwarding IP broadcast traffic for
one or more VLANs. If no argument is
provided, enables broadcast forwarding
for all VLANs. To enable, ipforwarding
must be enabled on the VLAN. The default
setting is enabled.
enable multinetting Enables IP multinetting on the switch/
config bootprelay add <ipaddress> Adds the IP destination address to
forward BOOTP packets.
config bootprelay delete [<ipaddress> | all] Removes one or all IP destination
addresses for forwarding BOOTP packets.
config iparp add <ipaddress> <mac_address> Adds a permanent entry to the ARP table.
Specify the IP address and MAC address
of the entry.
config iparp delete <ipaddress> Deletes an entry from the ARP table.
Specify the IP address of the entry.
IP UNICAST ROUTING
Command Description
disable bootp vlan [<name> | all] Disables the generation and processing of
BOOTP packets.
config iparp add proxy <ipaddress> {<mask>} Configures proxy ARP entries. Up to 64
{<mac_address>} {always} proxy ARP entries can be configured.
When <mask> is not specified, a how
address with the mask 255.255.255.255 is
assumed. When <mac_address> is not
specified, the MAC address of the switch
is used in the ARP Response. When
always is specified, the switch answers
ARP Requests without filtering requests
that belong to the same subnet of the
receiving router interface.
config iparp delete proxy [<ipaddress> {<mask>} | Deletes one or all proxy ARP entries.
all]
disable bootprelay Disables the forwarding of BOOTP
requests.
disable ipforwarding {vlan <name> | all} Disables routing for one or more VLANs.
disable ipforwarding broadcast {vlan <name> | all} Disables routing of broadcasts to other
networks.
disable multinetting Disables IP multinetting on the switch.
clear iparp [<ipaddress> <mask> | vlan <name> | Removes dynamic entries in the IP ARP
all] table. Permanent IP ARP entries are not
affected.
clear ipfdb [<ipaddress> | vlan <name> | all] Removes the dynamic entries in the IP
forwarding database.
Table 9-2 describes the commands used to configure the IP route table.
Command Description
enable iproute sharing Enables load sharing if multiple routes to the
same destination are available. Only paths with
the same lowest cost are shared. The default
setting is enabled.
config ipqos add <ip_destination_address> Adds a QoS profile to an IP destination
<mask> qosprofile <qosname> address.
config ipqos delete <ip_destination_address> Deletes a QoS profile from an IP destination
<mask> address.
config iproute add <ipaddress> <mask> Adds a static address to the routing table. Use
<gateway> <metric> a value of 255.255.255.255 for mask to
indicate a host entry
config iproute delete <ipaddress> <mask> Deletes a static address from the routing table.
<gateway>
config iproute add blackhole <ipaddress> Adds a blackhole address to the routing
<mask> table. All traffic destined for the configured IP
address is dropped, and no Internet Control
Message Protocol (ICMP) message is
generated.
config iproute delete blackhole <ipaddress> Deletes a blackhole address from the routing
<mask> table.
config iproute add default <gateway> Adds a default gateway to the routing table. A
{<metric>} default gateway must be located on a
configured IP interface. If no metric is
specified, the default metric of 1 is used.
config iproute delete default <gateway> Deletes a default gateway from the routing
table.
disable iproute sharing Disables load sharing for multiple routes.
IP UNICAST ROUTING
Table 9-3 describes the commands used to configure the ICMP protocol.
Command Description
enable icmp redirects {vlan <name> | all} Enables generation of ICMP redirect messages
on one or more VLANs. The default setting is
enabled.
enable icmp unreachables {vlan <name> | all} Enables the generation of ICMP unreachable
messages on one or more VLANs. The default
setting is enabled.
enable icmp useredirects Enables the modification of route table
information when an ICMP redirect message
is received. The default setting is disabled.
enable irdp {vlan <name> | all} Enables the generation of ICMP router
advertisement messages on one or more
VLANs. The default setting is enabled.
config irdp [multicast | broadcast] Configures the destination address of the
router advertisement messages. The default
setting is multicast.
config irdp <mininterval> <maxinterval> Configures the router advertisement message
<lifetime> <preference> timers, using seconds. Specify:
mininterval The minimum amount of
time between router advertisements. The
default setting is 450 seconds.
maxinterval The maximum time
between router advertisements. The default
setting is 600 seconds.
lifetime The default setting is 1,800
seconds.
preference The preference level of
the router. An IRDP client always uses the
router with the highest preference level.
Change this setting to encourage or
discourage the use of this router. The
default setting is 0.
unconfig icmp Resets all ICMP settings to the default values.
unconfig irdp Resets all router advertisement settings to the
default values.
disable icmp redirects {vlan <name> | all} Disables the generation of ICMP redirects on
one or more VLANs.
Command Description
disable icmp unreachables {vlan <name> | all} Disables the generation of ICMP unreachable
messages on one or more VLANs.
disable icmp useredirects Disables the changing of routing table
information when an ICMP redirect message
is received.
disable irdp {vlan <name> | all} Disables the generation of router advertisement
messages on one or more VLANs.
IP UNICAST ROUTING
192.207.35.1 192.207.36.1
My Company
192.207.35.0 192.207.36.0
Finance Personnel
1 2 3 4
IP IP IP IP
NetBIOS NetBIOS NetBIOS NetBIOS
= IP traffic
= NetBIOS traffic
In this configuration, all IP traffic from stations connected to ports 1 and 3 have access
to the router by way of the VLAN Finance. Ports 2 and 4 reach the router by way of the
VLAN Personnel. All other traffic (NetBIOS) is part of the VLAN MyCompany.
Command Description
show iparp proxy {<ipaddress> {<mask>} | all} Displays the proxy ARP table.
show ipconfig {vlan <name> | all} Displays configuration information for one or
more VLANs, including the following:
IP address, subnet mask
IP forwarding information
BOOTP configuration
VLAN name, VLANid
Global ICMP configuration
Global IGMP configuration
Global router advertisement configuration
show ipqos {<ip_destination_address> <mask> | Displays the IP QoS table.
all}
show ipstats {vlan [<name> | all]} Displays IP statistics for the CPU of the
switch.
show iparp {<ipaddress | vlan <name> | all | Displays the IP Address Resolution Protocol
permanent} (ARP) table. You can filter the display by IP
address, VLAN, or permanent entries. Each
entry displayed includes the following:
IP address
MAC address
Aging timer value
VLAN name, VLANid, and port number
Flags
IP UNICAST ROUTING
Command Description
show ipfdb {<ipaddress> <netmask> | vlan Displays the contents of the IP forwarding
<name> | all} database table. Used for technical support
purposes.
show iproute vlan {<name> | all | permanent | Displays the contents of the IP routing table.
<ipaddress> <mask>}
Command Description
clear iparp [<ipaddress> | vlan <name> | all] Removes dynamic entries in the IP ARP table.
Permanent IP ARP entries are not affected.
clear ipfdb [<ipaddress> <netmask> | vlan Removes the dynamic entries in the IP
<name> | all] forwarding database.
disable bootp vlan [<name> | all] Disables the generation and processing of
BOOTP packets.
disable bootprelay Disables the forwarding of BOOTP requests.
disable icmp redirects {vlan <name> | all} Disables the generation of ICMP redirects on one
or more VLANs.
disable icmp unreachables Disables the generation of ICMP unreachable
messages on one or more VLANs.
disable icmp useredirects Disables the changing of routing table information
when an ICMP redirect message is received.
disable ipforwarding {vlan <name> | all} Disables routing for one or more VLANs.
disable ipforwarding broadcast {vlan Disables routing of broadcasts to other networks.
<name> | all}
disable irdp {vlan <name> | all} Disables the generation of router advertisement
messages on one or more VLANs.
unconfig icmp Resets all ICMP settings to the default values.
unconfig irdp Resets all router advertisement settings to the
default values.
10 Routing Protocols
This chapter describes the IP unicast routing protocols available on the Summit. It
assumes that you are already familiar with IP unicast routing. If not, refer to the
following publications for additional information:
RFC 1058 Routing Information Protocol (RIP)
RFC 1256 ICMP Router Discovery Messages
RFC 1723 RIP Version 2
RFC 2178 OSPF Version 2
OVERVIEW
The Summit switch supports the use of either the Routing Information Protocol (RIP) or
the Open Shortest Path First (OSPF) protocol for IP unicast routing.
RIP is a distance vector protocol, based on the Bellman-Ford (or distance vector)
algorithm. The distance vector algorithm has been in use for many years, and is widely
deployed and understood.
OSPF is a link state protocol, based on the Dijkstra link state algorithm. OSPF is a newer
Interior Gateway Protocol (IGP), and solved a number of problems associated with
using RIP on todays complex networks.
ROUTING PROTOCOLS
The biggest advantage of using RIP is that it is relatively simple to understand and
implement, and it has been the de facto routing standard for many years.
RIP has a number of limitations that can cause problems in large networks, including
the following:
The details of RIP and OSPF are explained later in this chapter.
OVERVIEW OF RIP
OVERVIEW OF RIP
RIP is an Interior Gateway Protocol (IGP) first used in computer routing in the
ARPAnet as early as 1969. It is primarily intended for use in homogeneous networks of
moderate size.
To determine the best path to a distant network, a router using RIP always selects the
path that has the least number of hops. Each router that data must traverse is
considered to be one hop.
ROUTING TABLE
The routing table in a router using RIP contains an entry for every known destination
network. Each routing table entry contains the following information:
IP address of the destination network
Metric (hop count) to the destination network
IP address of the next router
Timer that tracks the amount of time since the entry was last updated
The router exchanges an update message with each neighbor every 30 seconds (default
value), or if there is a change to the overall routed topology (also called triggered
updates). If a router does not receive an update message from its neighbor within the
route timeout period (180 seconds by default), the router assumes the connection
between it and its neighbor is no longer available.
SPLIT HORIZON
Split horizon is a scheme for avoiding problems caused by including routes in updates
sent to the router from which the route was learned. Split horizon omits routes learned
from a neighbor in updates sent to that neighbor.
POISON REVERSE
Like split horizon, poison reverse is a scheme for eliminating the possibility of loops in
the routed topology. In this case, a router advertises a route over the same port that
supplied the route, but the route uses a hop count of 16, defining it as unreachable.
ROUTING PROTOCOLS
TRIGGERED UPDATES
Triggered updates occur whenever a router changes the metric for a route, and it is
required to send an update message immediately, even if it is not yet time for a regular
update message to be sent. This will generally result in faster convergence, but may also
result in more RIP-related traffic.
Multicasting
RIP version 2 packets can be multicast instead of being broadcast, reducing the
load on hosts that do not support routing protocols.
OVERVIEW OF OSPF
OVERVIEW OF OSPF
OSPF is a link state protocol that distributes routing information between routers
belonging to a single IP domain, also known as an autonomous system. In a link state
routing protocol, each router maintains a database describing the topology of the
autonomous system. Each participating router has an identical database maintained
from the perspective of that router.
From the link state database (LSDB), each router constructions a tree of shortest paths,
using itself as the root. The shortest path tree provides the route to each destination in
the Autonomous System. When several equal-cost routes to a destination exist, traffic
can distributed among them. The cost of a route is described by a single metric.
LSAs are collected by each router and entered into the LSDB of each router. OSPF uses
flooding to distribute LSAs between routers. Any change in routing information is sent
to all of the routers in the network. All routers within an area have the exact same
LSDB.
AREAS
OSPF allows parts of a networks to be grouped together into areas. The topology within
an area is hidden from the rest of the autonomous system. Hiding this information
enables a significant reduction in LSA traffic, and reduces the computations needed to
maintain the LSDB. Routing within the area is determined only by the topology of the
area.
ROUTING PROTOCOLS
AREA 0
Any OSPF network that contains more than one area is required to have an area
configured as area 0, also called the backbone. All areas in an autonomous system must
be connected to the backbone. When designing networks, you should start with area 0,
and then expand into other areas.
The backbone allows summary information to be exchanged between ABRs. Every ABR
hears the area summaries from all other ABRs. The ABR then forms a picture of the
distance to all network outside of its area by examining the collected advertisements,
and adding in the backbone distance to each advertising router.
STUB AREAS
OSPF allows certain areas to be configured as stub areas. A stub area is connected to
only one other area and contains a single exit point. The area that connects to a stub
area can be the backbone area. All routing out of a stub area is based on default routes.
Stub areas are used to reduce memory and computation requirements on OSPF routers.
Figure 10-1 shows a stub area.
ABR
Area 0 Stub Area
OVERVIEW OF OSPF
VIRTUAL LINKS
In the situation when a new area is introduced that does have a direct physical
attachment to the backbone, a virtual link is used. A virtual link provides a logical path
between the ABR of the disconnected area and the ABR of the backbone. A virtual link
must be established between two ABRs that have a common area, with one ABR
connected to the backbone. Figure 10-2 illustrates a virtual link.
Area 2
ABR
ABR
Area 1
Area 0
Virtual link
Figure 10-2: Virtual link for stub area
Virtual links are also used to repair a discontiguous backbone area. For example, in
Figure 10-3, if the connection between ABR1 and the backbone fails, the connection
using ABR2 provides redundancy so that the discontiguous area can continue to
communicate with the backbone using the virtual link.
Area 0
ABR 1 ABR 2
ROUTING PROTOCOLS
CONFIGURING RIP
Table 10-1 describes the commands used to configure RIP.
Command Description
enable rip Enables RIP. The default setting is disabled.
enable rip aggregation Enables RIP aggregation of subnet information
an interface configured to sent RIP v2 or RIP
v2-compatible traffic. The switch summarizes
subnet routes to the nearest class network
route. The following rules apply when using
RIP aggregation:
Subnet routes are aggregated to the
nearest class network route when crossing
a class boundary.
Within a class boundary, no routes are
aggregated.
If aggregation is enabled, the behavior is
the same as in RIP v1.
If aggregation is disabled, subnet routes
are never aggregated, even when crossing
a class boundary.
The default setting is enabled.
enable rip exportstatic Enables the advertisement of static routes
using RIP. The default setting is enabled.
enable rip poisonreverse Enables the split horizon with poison-reverse
algorithm for RIP. The default setting is
enabled. If you enable poison reverse and
split horizon, poison reverse takes precedence.
enable rip splithorizon Enables the split horizon algorithm for RIP.
Default setting is enabled.
enable rip triggerupdate Enables triggered updates. Triggered updates
are a mechanism for immediately notifying a
routers neighbors when the router adds or
deletes routes, or changes the metric of a
route. The default setting is enabled.
CONFIGURING RIP
Command Description
config rip add {vlan <name> | all} Configures RIP on an IP interface. If no VLAN
is specified, then all is assumed. When an
IP interface is created, per interface RIP
configuration is disabled by default.
config rip delete [vlan <name> | all] Disables RIP on an IP interface. When RIP is
disabled on the interface, the parameters are
not reset to their defaults.
config rip garbagetime {<delay>} Configures the RIP garbage time. The timer
granularity is 10 seconds. The default setting is
120 seconds.
config rip routetimeout {<delay>} Configures the route timeout. The timer
granularity is 10 seconds. The default setting is
180 seconds.
config rip rxmode [none | v1only | v2only | Changes the RIP receive mode for one or
any] {vlan <name> | all} more VLANs. Specify:
none Drop all received RIP packets.
v1only Accept only RIP version 1
format packets.
v2only Accept only RIP version 2
format packets.
any Accept both version 1 and version
2 packets.
If no VLAN is specified, the setting is applied to
all VLANs. The default setting is any.
config rip txmode [none | v1only | v1comp | Changes the RIP transmission mode for one or
v2only] {vlan <name> | all} more VLANs. Specify:
none Do not transmit any packets on
this interface.
v1only Transmit RIP version 1 format
packets to the broadcast address.
v1comp Transmit version 2 format
packets to the broadcast address.
v2only Transmit version 2 format
packets to the RIP multicast address
If no VLAN is specified, the setting is applied to
all VLANs. The default setting is v2only.
ROUTING PROTOCOLS
Command Description
config rip updatetime {<delay>} Changes the periodic RIP update timer. The
timer granularity is 10 seconds. The default
setting is 30 seconds.
192.207.35.1 192.207.36.1
My Company
192.207.35.0 192.207.36.0
Finance Personnel
1 2 3 4
IP IP IP IP
NetBIOS NetBIOS NetBIOS NetBIOS
= IP traffic
= NetBIOS traffic
In this configuration, all IP traffic from stations connected to ports 1 and 3 have access
to the router by way of the VLAN Finance. Ports 2 and 4 reach the router by way of the
VLAN Personnel. All other traffic (NetBIOS) is part of the VLAN MyCompany.
ROUTING PROTOCOLS
Command Description
show rip {vlan <name> | all} Displays RIP configuration and statistics for
one or more VLANs.
show rip stat {vlan <name> | all} Displays RIP-specific statistics. Statistics
include the following per interface:
Packets transmitted
Packets received
Bad packets received
Bad routes received
Number of RIP peers
Peer information
Command Description
config rip delete [vlan <name> | all] Disables RIP on an IP interface. When RIP is
disabled on the interface, the parameters are not
reset to their defaults.
disable rip Disables RIP.
disable rip aggregation Disables the RIP aggregation of subnet
information on a RIP version 2 interface.
disable rip splithorizon Disables split horizon.
disable rip poisonreverse Disables poison reverse.
disable rip triggerupdate Disables triggered updates.
disable rip exportstatic Disables the filtering of static routes.
unconfig rip {vlan <name> | all} Resets all RIP parameters to the default VLAN.
Does not change the enable/disable state of the
RIP settings.
ROUTING PROTOCOLS
CONFIGURING OSPF
Table 10-4 describes the commands used to configure OSPF.
Command Description
create ospf area <areaid> Creates an OSPF area. By default, the OSPF
area 0.0.0.0 is created.
enable ospf Enables OSPF process for the router.
enable ospf exportstatic type [1 | 2] Exports statically configured routes to other
OSPF routers. The default setting is disabled.
config ospf [vlan <name> | area <areaid> | Specifies the authentication password (up to 8
virtual-link <routerid> <areaid>] authentication characters) or MD5 key for one or all interfaces
[simple-password <password> | md5 in an area. The <md5_key> is a numeric value
<md5_key_id> <md5_key>| none] with the range 0 - 65536. When the OSPF
area is specified, authentication information is
applied to all OSPF interfaces within the area.
config ospf vlan <name> area <areaid> Associates a VLAN (router interface) with an
OSPF area. All router interfaces must have an
associated OSPF area. The default <areaid>
is 0 (backbone area).
config ospf [vlan <name> | area <areaid> | all] Configures the cost metric of one or all
cost <number> interface(s). The default cost is 1.
config ospf [vlan <name> | area <areaid> | all] Configures the priority used in the designated
priority <number> router election algorithm for one or all IP
interface(s) of for all the interfaces within the
area. The range is 0 through 255, and the
default setting is 1.
config ospf add [vlan <name> | all] Enables OSPF on one or all VLANs (router
interfaces). The default setting is disabled.
config ospf delete [vlan <name> | all] Disables OSPF on one or all VLANs (router
interfaces).
config ospf add virtual-link <routerid> <areaid> Adds a virtual link connected to another ABR.
Specify the following:
routerid Far end router interface
number.
areaid Transit area used for connecting
the two end-points. The transit area cannot
have the IP address 0.0.0.0.
CONFIGURING OSPF
Command Description
config ospf delete virtual-link <routerid> Removes a virtual link.
<areaid>
config ospf area <areaid> normal Configures an OSFP area as a normal area.
The default setting is normal.
config ospf area <areaid> stub [summary | Configures an OSPF area as a stub area. The
nosummary] stub-default-cost <cost> default setting is normal.
config ospf area add range <ipaddress> Configures a range of IP addresses in an
<mask> [advertise | noadvertise] OSPF area. If advertised, the range is exported
as a single summary link state advertisement
by the ABR.
config ospf area delete range <ipaddress> Deletes a range of IP addresses in an OSPF
<mask> area.
config ospf routerid [automatic | <routerid>] Configures the OSPF router ID. If automatic is
specified, the switch uses the largest IP
interface address as the OSPF router ID. The
default setting is automatic.
config ospf [vlan <name> | area <areaid> | Configures the timers for one interface or all
virtual-link <routerid>] timer interfaces in the same OSPF area. The
<retransmission_interval> following default, minimum, and maximum
<transmission_delay> <hello_interval> values (in seconds) are used:
<dead_interval>
Retransmission interval
Default: 5
Minimum: 0
Maximum: 3600
Transmission delay
Default: 1
Minimum: 0
Maximum: 3600
Hello interval
Default: 10
Minimum: 1
Maximum: 65535
Dead interval
Default: 40
Minimum: 1
Maximum: 2147483647
ROUTING PROTOCOLS
Area 0 IR 2 IR 1
10.0.1.1 10.0.1.2
10.0.3.2 10.0.2.2
HQ
2
Headquarters
0_
_1
0_
0_
_1
0_
HQ
3
61
6_
Virtual link _4
_2
8_
60
2
i_1
161.48.2.1
Ch
160.26.26.2
160.26.25.2 Chicago
Area 0 is the backbone area. It is located at the headquarters and has the following
characteristics:
Area 5 is connected to the backbone area by way of ABR1 and ABR2. It is located in
Chicago and has the following characteristics:
Area 6 is a stub area connected to the backbone by way of ABR1. It is located in Los
Angeles and has the following characteristics:
enable ipforwarding
ROUTING PROTOCOLS
enable ospf
Command Description
show ospf Displays global OSPF information.
show ospf area {<areaid> | all} Displays information about a particular OSPF
area, or all ospf areas.
show ospf interfaces {vlan <name> | area Displays information about one or all OSPF
<areaid> | all} interfaces. If no argument is specific, all
OSPF interfaces are displayed.
show ospf lsdb {detail} {area <areaid> | all} Displays a table of the current link state
{router | network | summary_net | summary_asb database. You can filter the display using
| as_external | all} either the area ID or the remote routers
router ID, or the link state ID. The default is
all with no detail. If detail is specified,
each entry includes complete LSA
information.
show ospf virtual-link {<areaid> <routerid> | all} Displays virtual link information about a
particular router or all routers.
Command Description
config ospf delete [vlan <name> | all] Disables OSPF on one or all VLANs (router
interfaces).
delete ospf area [<areaid> | all] Deletes and OSPF area. Once an OSPF area is
removed, the associated OSPF area and OSPF
interface information is removed.
disable ospf Disables OSPF.
disable ospf exportstatic Disables exporting of statically configured routes.
ROUTING PROTOCOLS
11 IP Multicast Routing
This chapter describes the components of IP multicast routing, and how to configure IP
multicast routing on the Summit.
OVERVIEW
IP multicast routing is a function that allows a single IP host to send a packet to a group
of IP hosts. This group of hosts can include devices that reside on the local network,
within a private network, or outside of the local network.
IP MULTICAST ROUTING
DVMRP OVERVIEW
DVMRP is a distance vector protocol that is used to exchange routing and multicast
information between routers. Like RIP, DVMRP periodically sends the entire routing
table to its neighbors.
DVMRP has a mechanism that allows it to prune and graft multicast trees in order to
reduce the bandwidth that is consumed by IP multicast traffic.
IGMP OVERVIEW
IGMP is a protocol used by an IP host to register its IP multicast group membership
with the router. Periodically, the router queries the multicast group to see if the group is
still in use. If the group is still active, a single IP host responds to the query, and group
registration is maintained.
IGMP SNOOPING
IGMP snooping adds intelligence to a layer 2 device (such as a switch), to reduce the
flooding of IP multicast traffic. The goal of IGMP snooping is to optimize the usage of
network bandwidth and prevent multicast traffic from being flooded to parts of the
network that do not need to see it.
Command Description
enable dvmrp Enables DVMRP on the switch. The default
setting is disabled.
enable ipmcforwarding {<vlan <name> | all>} Enables IP multicast forwarding on an IP
interface. If all is specified, all configured IP
interfaces are affected. When new IP interfaces
are added, ipforwarding is disabled by default.
config dvmrp add {vlan <name> | all} Enables DVMRP on an IP interface. When an IP
interface is created, DVMRP is enabled by
default.
config dvmrp delete {vlan <name> | all} Disables DVMRP on an IP interface.
config dvmrp vlan <name> timer Configures DVMRP interface timers. Specify the
<probe_interval> following:
<neighbor_timeout_interval>
probe_interval The amount of time that
the switch waits between transmitting
DVMRP probe messages. The range is 1 to
4294967296 seconds (136 years). The
default setting is 10 seconds.
neighbor_timeout_interval The
amount of time before a DVMRP neighbor
route is declared to be down. The range is 1
to 4294967296 seconds (136 years). The
default setting is 35 seconds.
IP MULTICAST ROUTING
Command Description
config dvmrp timer <route_report_interval> Configures the global DVMRP timers. Specify
<route_replacement_time> the following:
route_report_interval The amount
of time the switch waits between transmitting
periodic route report packets. The range is 1
to 4294967296 seconds (136 years). The
default setting is 60 seconds.
route_replacement_time The
hold-down time before a new route is
learned, once the previous route has been
deleted. The range is 1 to 4294967296
seconds (136 years). The default setting is
140 seconds.
config ipmc cache timeout <seconds> Configures the aging time for IP multicast cache
entries. The default setting is 300 seconds.
Table 11-2 describes the command used to configure the Internet Gateway Message
Protocol (IGMP).
Command Description
enable igmp {vlan <name> | all} Enables IGMP on a router interface. The default
setting is enabled.
enable igmp snooping {vlan <name> | all} Enables IGMP snooping. The default setting is
disabled.
Command Description
config igmp <query_interval> Configures the IGMP timers. Timers are based
<query_response_interval> on RFC2236. Specify the following:
<last_member_query_interval>
query_interval The amount of time, in
seconds, the switch waits between sending
out General Queries. The range is 1 to
4294967296 seconds (136 years). The
default setting is 125 seconds.
query_response_interval The
maximum response time inserted into the
periodic General Queries. The range is 1 to
25 seconds. The default setting is 10 seconds.
last_member_query_interval The
maximum response time inserted into a
Group-Specific Query sent in response to a
Leave group message. The range is 1 to 25
seconds. The default setting is 1 second.
config igmp snooping <router_timeout> Configures the IGMP snooping timers. Timers
<host_timeout> should be set to approximately 2.5 times the
router query interval in use on the network.
Specify the following:
router_timeout The interval, in
seconds, between the last time the router
was discovered and the current time. The
range is 10 to 4294967296 seconds (136
years). The default setting is 260 seconds.
host_timeout The interval, in seconds,
between the last IGMP group report message
from the host and the current time. The range
is 10 to 4294967296 seconds (136 years).
The default setting is 260 seconds.
IP MULTICAST ROUTING
CONFIGURATION EXAMPLE
Figure 11-1 is used in Chapter 10 to describe the OSPF configuration on a Summit. Refer
to Chapter 10 for more information about configuring OSPF. In this example, the switch
labeled IR1 is configured for IP multicast routing.
Area 0 IR 2 IR 1
10.0.1.1 10.0.1.2
10.0.3.2 10.0.2.2
HQ
2
Headquarters
0_
_1
0_
0_
_1
0_
HQ
3
61
6_
Virtual link _4
_2
8_
60
2
i_1
161.48.2.1
Ch
160.26.26.2
160.26.25.2 Chicago
Command Description
show dvmrp {vlan <name> | route | all} Displays the DVMRP configuration and
statistics, or the unicast route table. The
default setting is all.
show igmp snooping {<vlan <name> | all} Displays IGMP snooping registration
information, and a summary of all IGMP
timers and states.
show ipmc cache {<group> {<src_ipaddress> Displays the IP multicast forwarding cache.
<mask>}} | all} Information displayed includes the following:
IP group address
IP source address and mask
Upstream neighbor
Interface to upstream neighbor
Route expiration timer
Routing protocol
List of next hop interfaces and protocols
IP MULTICAST ROUTING
Command Description
disable dvmrp Disables DVMRP on the switch.
disable ipmcforwarding {vlan <name> | all} Disables IP multicast forwarding.
disable igmp {vlan <name> | all} Disables IGMP on a router interface.
disable igmp snooping {vlan <name> | all} Disables IGMP snooping.
unconfig dvmrp [vlan <name> | all] Resets the DVMRP timers to their default
settings.
unconfig igmp Resets all IGMP settings to their default values
and clears the IGMP group table.
clear igmp snooping [vlan <name> | all] Removes one or more IGMP snooping entries.
clear ipmc cache {<group> Resets the IP multicast cache table. If no option
{<src_ipaddress> <mask>}} | all] is specified, all IP multicast cache entries are
flushed.
This chapter describes how to view the current operating status of the switch, how to
display information in the switch log, and how to take advantage of the RMON
capabilities available in the switch.
Viewing statistics on a regular basis allows you to see how well your network is
performing. If you keep simple daily records, you will see trends emerging and notice
problems arising before they cause major network faults. This way, statistics can help
you get the best out of your network.
STATUS MONITORING
The status monitoring facility provides information about the switch. This information
may be useful for your technical support representative if you have a problem.
Command Description
show account Displays the account names, access level, number of
successful and failed login attempts, and the number
of active sessions in the user database. This
command is available only to admin level users.
show banner Displays the user-configured banner.
Command Description
show config Displays the current switch configuration to the
terminal. You can then capture the output and store
it as a file.
show diag Displays switch software diagnostics.
show dvmrp {vlan <name> | route | all} Displays the DVMRP configuration and statistics, or
the unicast route table. The default setting is all.
show edp Displays connectivity information for neighboring
Summit switches.
show fdb {all | <macaddress> | vlan Displays the forwarding database contents including
<name> | <portlist> | permanent | qos} MAC address, associated VLAN, port, age-of-entry
configuration method, and status. Providing one of the
options acts as a filter on the display. Providing a
VLAN name displays all entries for the VLAN. Use the
MAC address to locate a specific entry in the FDB.
show gvrp Displays the current configuration and status of
GVRP.
show igmp snooping {<vlan <name> | Displays IGMP snooping registration information, and
all} a summary of all IGMP timers and states.
show iparp {<ip_address> | vlan Displays the IP Address Resolution Protocol (ARP)
<name> | all | permanent} table. You can filter the display by IP address, VLAN,
or permanent entries.
show iparp proxy {<ipaddress> {<mask} Displays the proxy ARP table.
| all}
show ipconfig {vlan <name> | all} Displays configuration information for one or more
VLANs, including the following:
IP address, subnet mask
IP forwarding information
BOOTP configuration
VLAN name, VLANid
Global ICMP configuration
Global IGMP configuration
Global IRDP configuration
show ipfdb {<ipaddress> | vlan <name> Displays the contents of the IP forwarding database
| all} table.
STATUS MONITORING
Command Description
show ipmc cache {<group> Displays the IP multicast route table. Information
{<src_ipaddress> <mask>}} | all} displayed includes the following:
IP group address
IP source address and mask
Upstream neighbor
Interface to upstream neighbor
Route expiration timer
Routing protocol
List of next hop interfaces and protocols
show ipqos {<ip_destination_address> Displays the IP QoS table.
<mask> | all}
show iproute vlan {<name> | all | Displays the contents of the IP routing table.
permanent | <ipaddress> <mask>}
show ipstats {vlan [<name> | all]} Displays statistics of packets handled by the CPU,
including the following:
inpackets, outpackets
ICMP/IGMP statistics
IRDP statistics
show log {<priority>} {<subsystem>} Displays the current snapshot of the log. Options
include:
priority Filters the log to display message
with the selected priority or higher (more critical).
Priorities include critical, warning, and
informational. If not specified, informational priority
messages and higher are displayed.
subsystem Filters the log to display
messages associated with the selected switch
subsystem. Subsystems include Syst, STP Brdg,
SNMP, Telnet, VLAN, and Port. If not specified,
all subsystems are displayed.
show log config Displays the log configuration, including the syslog
host IP address, the priority level of messages being
logged locally, and the priority level of messages
being sent to the syslog host.
Command Description
show management Displays network management configuration and
statistics including enable/disable states for Telnet
and SNMP, SNMP community strings, authorized
SNMP station list, SNMP trap receiver list, and login
statistics.
show memory Displays the current system memory information.
show mirroring Displays the port-mirroring configuration.
show ospf Displays global OSPF information.
show ospf area {<areaid> | all} Displays information about a particular OSPF area,
or all ospf areas.
show ospf interfaces {vlan <name> | Displays information about one or all OSPF
area <areaid> | all} interfaces. If no argument is specific, all OSPF
interfaces are displayed.
show ospf lsdb {detail} {area <areaid> | Displays a table of the current link state database.
all} {router | network | summary_net | You can filter the display using either the area ID or
summary_asb | as_external | all} the remote routers router ID, or the link state ID. The
default is all with no detail. If detail is specified,
each entry includes complete LSA information.
show ospf virtual-link {<areaid> Displays virtual link information about a particular
<routerid> | all} router or all routers.
show port {<portlist>} collisions Displays real-time collision statistics.
show port {<portlist>} config Displays the port configuration, including the
following:
Port state
Link state
Link speed
Duplex mode
Flow control
Load sharing information
Link media information
QoS information
STATUS MONITORING
Command Description
show port {<portlist>} information Displays detailed system-related information, including
the following:
Port state
Link state
Autonegotiation state
Link speed
Duplex mode
Load sharing information
EDP status
SummitLink mode
VLAN information
QoS information
show port {<portlist>} packet Displays a histogram of packet statistics.
show port {<portlist>} qosmonitor Displays real-time QoS statistics.
show port {<portlist>} rxerrors Displays real-time receive error statistics.
show port {<portlist>} stats Displays real-time port statistics.
show port {<portlist>} txerrors Displays real-time transmit error statistics.
show port {<portlist>} utilization Displays real-time port utilization information. Use the
[Spacebar] to toggle between packet, byte, and
bandwidth utilization information.
show protocol {<protocol> | all} Displays protocol information including protocol name,
protocol fields, and the list of VLANs that use this
protocol.
show qosmonitor Displays the QoS monitor configuration and results.
show qosprofile {<qosname> | all} Displays QoS profile information including the QoS
profile name, minimum bandwidth, maximum
bandwidth, and priority levels. Also displays the
groupings to which this QoS profile is applied.
show rip {vlan <name> | all} Displays RIP configuration and statistics for one or
more VLANs.
Command Description
show rip stat {vlan <name> | all} Displays RIP-specific statistics. Statistics include the
following per interface:
Packets transmitted
Packets received
Bad packets received
Bad routes received
Number of RIP peers
Peer information
show session Displays the currently active Telnet and console
sessions communicating with the switch. Provides
the user name, IP address of the incoming Telnet
session, whether a console session is currently
active, and login time. Sessions are numbered.
show stpd {<stpd_name> | all} Displays STP information for the one or all STP
domains.
show stpd <stpd_name> port <portlist> Displays port-specific STP information including STP
port configuration and state.
show switch Displays the current switch information, including:
sysName, sysLocation, sysContact
MAC address
Current time and time, and system uptime
Operating environment (temperature, fans, and
power supply status)
NVRAM image information (primary/secondary
image, date, time, size, version)
NVRAM configuration information
(primary/secondary configuration, date, time, size,
version)
Scheduled reboot information
802.1p information
System serial number and reworks indicator
Software platform
System ID
Power supply and fan status
PORT STATISTICS
Command Description
show version Displays the hardware and software versions currently
running on the switch. Also displays the switch serial
number.
show vlan {<name> | all} When used with the keyword all, or with no named
VLANs, displays a summary list of VLAN names with
a portlist and associated status of each. When used
with a named identifier, displays port information
including membership list, IP address, tag information.
PORT STATISTICS
The Summit provides a facility for viewing port statistic information. The summary
information lists values for the current counter against every port on the switch, and it
is refreshed approximately every two seconds. Values are displayed to nine digits of
accuracy.
Received Byte Count (RX Byte Count) The total number of bytes that were
received by the port, including bad or lost frames. This number includes bytes
contained in the Frame Check Sequence (FCS), but excludes bytes in the preamble.
Receive Broadcast (RX Bcast) The total number of frames received by the port
that are addressed to a broadcast address.
Receive Multicast (RX Mcast) The total number of frames received by the port
that are addressed to a multicast address.
PORT ERRORS
The Summit keeps track of errors for each port.
Key(s) Description
U Displays the previous page of ports.
D Displays the next page of ports.
[Esc] or [Return] Exits from the screen.
0 Clears all counters.
[Space] Cycles through the following screens:
Packets per second
Bytes per second
Percentage of bandwidth
Available using the show port
utilization command only.
SWITCH LOGGING
The Summit log tracks all configuration and fault information pertaining to the device.
Each entry in the log contains the following information:
Timestamp The timestamp records the month and day of the event, along with
the time (hours, minutes, and seconds) in the form HH:MM:SS. If the event was
caused by a user, the user name is also provided.
Fault level Table 12-3 describes the three levels of importance that the switch can
assign to a fault.
Level Description
Critical A desired switch function is inoperable. The switch may need to
be reset.
Warning A noncritical error that may lead to a function failure.
Informational Actions and events that are consistent with expected behavior.
Subsystem The facility refers to the specific functional area of the switch to which
the error refers. Table 12-4 describes the subsystems.
Subsystem Description
Syst General system-related information. Examples include memory,
power supply, security violations, fan failure, overheat
condition, and configuration mode.
STP STP information. Examples include an STP state change.
Brdg Bridge-related functionality. Examples include low table space
and queue overflow.
SNMP SNMP information. Examples include community string
violations.
Telnet Information related to Telnet login and configuration performed
by way of a Telnet session.
VLAN VLAN-related configuration information.
Port Port management-related configuration. Examples include port
statistics and errors.
Message The message contains the log information with text that is specific to the
problem.
SWITCH LOGGING
LOCAL LOGGING
The switch maintains 1,000 messages in its internal log. You can display a snapshot of
the log at any time by using the command
show log {<priority>} {<subsystem>}
REAL-TIME DISPLAY
In addition to viewing a snapshot of the switch log, you can configure the switch to
maintain a running real-time display of log messages on the console. To turn on the log
display, enter the following command:
enable log display
If priority is not specified, only messages of critical priority are displayed. If the
subsystem is not specified, all subsystems are displayed.
If you enable the log display on a terminal connected to the console port, your settings
will remain in effect even after your console session is ended (unless you explicitly
disable the log display).
When using a Telnet connection, if your Telnet session is disconnected (because of the
inactivity timer, or for other reasons), the log display is automatically halted. You must
restart the log display by using the enable log display command.
REMOTE LOGGING
In addition to maintaining an internal log, the Summit supports remote logging by way
of the UNIX Syslog host facility. To enable remote logging, do the following:
Configure the Syslog host to accept and log messages.
Enable remote logging by using the following command:
enable syslog
Configure remote logging by using the following command:
config syslog <ipaddress> <facility> {<priority>} {<subsystem>}
Specify:
ipaddress The IP address of the syslog host.
facility The syslog facility level for local use. Options include local0 through
local7.
priority Filters the log to display message with the selected priority or higher
(more critical). Priorities include critical, warning, and informational. If not specified,
only critical priority messages are sent to the syslog host.
subsystem Filters the log to display messages associated with the selected switch
subsystem. Subsystems include Syst, STP Brdg, SNMP, Telnet, VLAN, and Port. If
not specified, all subsystems are sent to the syslog host.
Refer to your UNIX documentation for more information about the Syslog host
facility.
LOGGING COMMANDS
The commands described in Table 12-5 allow you to configure logging options, reset
logging options, display the log, and clear the log.
SWITCH LOGGING
Command Description
config log display {<priority>} {<subsystem>} Configures the real-time log display. Options
include:
priority Filters the log to display
messages with the selected priority or
higher (more critical). Priorities include
critical, warning, and informational. If not
specified, informational priority messages
and higher are displayed.
subsystem Filters the log to display
messages associated with the selected
switch subsystem. Subsystems include
Syst, STP Brdg, SNMP, Telnet, VLAN, and
Port. If not specified, all subsystems are
displayed.
config syslog <ip_address> <facility> Configures the syslog host address and filter
{<priority>} {<subsystem>} messages sent to the syslog host. Options
include:
ipaddress The IP address of the
syslog host.
facility The syslog facility level for
local use.
priority Filters the log to display
messages with the selected priority or
higher (more critical). Priorities include
critical, warning, and informational. If not
specified, only critical priority messages
and are sent to the syslog host.
subsystem Filters the log to display
messages associated with the selected
switch subsystem. Subsystems include
Syst, STP Brdg, SNMP, Telnet, VLAN, and
Port. If not specified, all subsystems are
sent to the syslog host.
enable log display Enables the log display.
enable syslog Enables logging to a remote syslog host.
disable log display Disables the log display.
disable syslog Disables logging to a remote syslog host.
Command Description
show log {<priority>} {<subsystem>} Displays the current snapshot of the log.
Options include:
priority Filters the log to display
message with the selected priority or higher
(more critical). Priorities include critical,
warning, and informational. If not specified,
informational priority messages and higher
are displayed.
subsystem Filters the log to display
messages associated with the selected
switch subsystem. Subsystems include
Syst, STP Brdg, SNMP, Telnet, VLAN, and
Port. If not specified, all subsystems are
displayed.
show log config Displays the log configuration, including the
syslog host IP address, the priority level of
messages being logged locally, and the
priority level of messages being sent to the
syslog host.
clear counters Clears all switch statistics and port counters.
clear log {static} Clears the log. If static is specified, the
critical log messages are also cleared.
RMON
Using the Remote Monitoring (RMON) capabilities of the switch allows network
administrators to improve switch efficiency and reduce the load on the network.
The following sections explain more about the RMON concept and the RMON features
supported by the Summit.
You can only use the RMON features of the switch if you have an RMON
management application.
ABOUT RMON
RMON is the common abbreviation for the Remote Monitoring Management
Information Base (MIB) system defined by the Internet Engineering Task Force (IETF)
documents RFC 1271 and RFC 1757, which allows you to monitor LANs remotely.
RMON
This section describes these groups, and discusses how they can be used.
STATISTICS
The RMON Ethernet Statistics group provides traffic and error statistics showing
packets, bytes, broadcasts, multicasts, and errors on a LAN segment or VLAN.
Information from the Statistics group is used to detect changes in traffic and error
patterns in critical areas of the network.
HISTORY
The History group provides historical views of network performance by taking periodic
samples of the counters supplied by the Statistics group. The group features
user-defined sample intervals and bucket counters for complete customization of trend
analysis.
The group is useful for analysis of traffic patterns and trends on a LAN segment or
VLAN, and to establish baseline information indicating normal operating parameters.
ALARMS
The Alarms group provides a versatile, general mechanism for setting threshold and
sampling intervals to generate events on any RMON variable. Both rising and falling
thresholds are supported, and thresholds can be on the absolute value of a variable or
its delta value. In addition, alarm thresholds may be autocalibrated or set manually.
Alarms inform you of a network performance problem and can trigger automated
action responses through the Events group.
EVENTS
The Events group creates entries in an event log and/or sends SNMP traps to the
management workstation. An event is triggered by an RMON alarm. The action taken
can be configured to ignore it, to log the event, to send an SNMP trap to the receivers
listed in the trap receiver table, or to both log and send a trap. The RMON traps are
defined in RFC 1757 for rising and falling thresholds.
Effective use of the Events group saves you time. Rather than having to watch real-time
graphs for important occurrences, you can depend on the Event group for notification.
Through the SNMP traps, events can trigger other actions, providing a mechanism for
an automated response to certain occurrences.
For example, statistics can be related to individual ports. Also, because a probe must be
able to see all traffic, a stand-alone probe must be attached to a nonsecure port.
Implementing RMON in the switch means that all ports can have security features
enabled.
RMON
EVENT ACTIONS
The actions that you can define for each alarm are shown in Table 12-6.
To be notified of events using SNMP traps, you must configure one or more trap
receivers, as described in Chapter 3.
enable web
You will need to reboot the switch in order for these changes to take effect.
To use ExtremeWare Vista, at least one VLAN on the switch must be assigned an IP
address.
http://<ip_address>
When you access the home page of the switch, you are presented with the Login screen.
Enter your user name and password in the appropriate fields, and click OK.
If you have entered the name and password of an administrator-level account, you have
access to all ExtremeWare Vista pages. If you have used a user-level account name and
password, you only have access to the Statistics and Support information.
For more information on assigning user names, levels, and passwords, refer to
Chapter 3.
If multiple people access the same switch using ExtremeWare Vista, you might see the
following error message:
Web:server busy
To correct this situation, log out of the switch and log in again.
TASK FRAME
The task frame has two sections. At the top of the task frame are the task tabs. There are
four task tabs, as follows:
Configuration
Statistics
Support
Logout
Below the task tabs are options. Options are specific to the task tab that you select.
When you select an option, the information displayed in the content frame changes.
However, when you select a new task tab, the content frame does not change until you
select a new option.
CONTENT FRAME
The content frame contains the main body of information in ExtremeWare Vista. For
example, if you select an option from the Configuration task tab, enter configuration
parameters in the content frame. If you select the Statistics task tab, statistics are
displayed in the content frame.
BROWSER CONTROLS
Browser controls include drop-down list boxes, check boxes, and multi-select list boxes.
A multi-select list box has a scrollbar on the right side of the box. Using a multi-select
list box, you can select a single item, all items, a set of contiguous items, or multiple
non-contiguous items. Table 13-1 describes how to make selections from a multi-select
list box.
SAVING CHANGES
STATUS MESSAGES
Status messages are displayed at the top of the content frame. There are four types of
status messages, as follows:
InformationDisplays information that is useful to know prior to, or as a result of,
changing configuration options.
WarningDisplays warnings about the switch configuration
ErrorDisplays errors caused by incorrectly configured settings
SuccessDisplays informational messages after you click Submit. The message
displayed reads, Request was submitted successfully.
STANDALONE BUTTONS
At the bottom of some of the content frames is a section that contains standalone
buttons. Standalone buttons are used to perform tasks that are not associated with a
particular configuration option. An example of this is the Reboot Switch button.
SAVING CHANGES
There are two ways to save your changes to non-volatile RAM storage using
ExtremeWare Vista:
Select Save Configuration from the Configuration task tab, Switch option.
This field contains a drop-down list box that allows you to select either the primary
or secondary configuration area. After you select the configuration area, click Submit
to save the changes.
For more information on the primary and secondary configuration areas, refer to
Chapter 14.
If you configure a VLAN and then delete it, the Default VLAN is shown in the VLAN
name window, but the VLAN information contained in the lower portion of the page is
not updated. Click on the get button to update the display.
This chapter describes the procedure for upgrading the switch software image. This
chapter also discusses how to save and load a primary and secondary image and
configuration file on the switch.
The image is upgraded by using a download procedure from either a TFTP server on
the network or from a PC connected to the serial port using the XMODEM protocol.
Downloading a new image involves the following steps:
Load the new image onto a TFTP server on your network, if you will be using TFTP.
Load the new image onto a PC, if you will be using XMODEM.
The Summit can store up to two images: a primary and a secondary. When you
download a new image, you must select into which image space (primary or secondary)
you want the new image to be placed.
You can select which image the switch will load on the next reboot by using the
following command:
use image {primary | secondary}
If you do not specify which image to use, the switch automatically loads the primary
image.
where date is the date and time is the time (using a 24-hour clock format) when the
switch will be rebooted. The values use the following format:
mm/dd/yyyy hh:mm:ss
If you do not specify a reboot time, the reboot happens immediately following the
command, and any previously scheduled reboots are cancelled. To cancel a previously
scheduled reboot, use the cancel option.
The Summit can store two different configurations: a primary and a secondary. When
you save configuration changes, you can select to which configuration you want the
changes saved. If you do not specify, the changes are saved to the configuration area
currently in use.
If you have made a mistake, or you must revert to the configuration as it was before
you started making changes, you can tell the switch to use the secondary configuration
on the next reboot.
If the switch is rebooted while in the middle of a configuration save, the switch
boots to factory default settings. The configuration that is not in the process of
being saved is unaffected.
This command resets the entire configuration, with the exception of user accounts and
passwords that have been configured.
After the ASCII configuration file is downloaded by way of TFTP, you are prompted to
reboot the switch. The downloaded configuration file is stored in an area of switch
memory, and is not retained if the switch has a power failure. When the switch is
rebooted, it treats the downloaded configuration file as a scrip of CLI commands. After
the script is executed, you are prompted to save the configuration.
Command Description
show config Displays the current switch configuration to the
terminal. You can then capture the output and
store it as a file.
download config <ipaddress> <filename> Downloads a previously saved ASCII
configuration file from a specific IP host.
download image [xmodem | <ipaddress> Downloads a new image by way of XMODEM
<filename>] {primary | secondary} using the serial port, or from a TFTP server
over then network. If no parameters are
specified, the image is saved to the current
image.
reboot {<date> <time> | cancel} Reboots the switch at the date and time
specified. If you do not specify a reboot time,
the reboot happens immediately following the
command, and any previously scheduled
reboots are cancelled. To cancel a previously
scheduled reboot, use the cancel option.
save {config} {primary | secondary} Saves the current configuration of the switch to
NVRAM. You can specify the primary or
secondary configuration area. If not specified,
the configuration is saved to the configuration
area currently in use.
upload config <ipaddress> <filename> {every Uploads the current runtime configuration to
<time> | cancel} the specified TFTP server. If every <time>
is specified, the switch automatically saves the
configuration to the server once per day, at
the specified time. To cancel automatic
upload, use the cancel option. If no options
are specified, the current configuration is
uploaded immediately.
use config {primary | secondary} Configures the switch to use a particular
configuration on the next reboot. Options
include the primary configuration area, or the
secondary configuration area. If not specified,
the switch uses the primary configuration area.
use image [primary | secondary] Configures the switch to use a particular image
on the next reboot.
A Safety Information
Installation and removal of the unit must be carried out by qualified personnel only.
To reduce the risk of fire or electrical shock, install the unit in a temperature- and
humidity-controlled indoor area free of conductive contaminants.
POWER
Disconnect power from the unit before removing the cover of the unit.
To ensure compliance with international safety standards, only use the power
adapter that is supplied with the unit.
Disconnect the power adapter before removing the unit.
The unit must be grounded.
The unit must be connected to a grounded outlet to comply with European safety
standards.
Do not connect the unit to an A C outlet (power supply) without a ground
connection.
The socket outlet must be near to the unit and easily accessible. You can only remove
power from the unit by disconnecting the power cord from the outlet.
SAFETY INFORMATION
This unit operates under Safety Extra Low Voltage (SELV) conditions according to
IEC 950. The conditions are only maintained if the equipment to which it is
connected also operates under SELV conditions.
The appliance coupler (the connector to the unit and not the wall plug) must have a
configuration for mating with an EN60320/IEC320 appliance inlet.
France and Peru only
This unit cannot be powered from IT supplies. If your supplies are of IT type, this
unit must be powered by 230V (2P+T) via an isolation transformer ratio 1:1, with the
secondary connection point labeled Neutral, connected directly to ground.
POWER CORD
This must be approved for the country where it is used:
USA and The cord set must be UL-approved and CSA-
Canada certified.
The minimum specification for the flexible cord is
No. 18 AWG, Type SV or SJ, 3-conductor.
The cord set must have a rated current capacity of
at least 10A.
The attachment plug must be an earth-grounding
type with a NEMA 5-15P (15A, 125V) or NEMA
6-15P (15A, 250V) configuration.
Denmark The supply plug must comply with section
107-2-D1, standard DK2-1a or DK2-5a.
Switzerland The supply plug must comply with SEV/ASE 1011.
If the power cord plug is unsuitable and must be replaced, you may find other
codings for the respective connections. Connect the power supply wires for the unit
according to the following scheme:
Brown wire to the Live (Line) plug terminal, which may be marked with the
letter L or colored red.
Blue wire to the Neutral plug terminal, which may be marked with the letter N
or colored black.
Yellow/Green wire to the Ground plug terminal, which may be marked with the
letter E or the Earth symbol or colored yellow/green.
FUSE
Disconnect power from the unit before opening the fuse holder cover. The unit
automatically adjusts to the supply voltage. The fuse is suitable for both 110V A.C.
and 220-240V A.C. operation.
To change the fuse, release the fuse holder by gently levering a small screwdriver
under the fuse holder catch. Only fuses of the same manufacturer, rating, and type
as the original must be used with the unit. Close the fuse holder.
Fuse
To comply with European safety standards, a spare fuse must not be fitted to the
appliance inlet. Only fuses of the same manufacturer, make, and type must be used
with the unit.
CONNECTIONS
Fiber Optic ports - Optical Safety. Never look at the transmit LED/laser through a
magnifying device while it is powered on. Never look directly at the fiber TX port
and fiber cable ends when they are powered on.
CLASS 1 LASER DEVICE
SAFETY INFORMATION
LITHIUM BATTERY
Replace the lithium battery with the same or equivalent type, as recommended by
the manufacturer.
B Technical Specifications
Physical Dimensions Height: 3.5 inches x Width: 17.32 inches x Depth: 17.32
inches
Weight: 10 kg
Environmental Requirements
Operating Temperature 0 to 40 C
Storage Temperature -10 to 70 C
Operating Humidity 10% to 95% relative humidity, noncondensing
Standards EN60068 (IEC68)
Safety
Agency Certifications UL 1950 3rd Edition, listed
cUL listed to CSA 22.2#950
TUV GS mark & GOST safety approval to the following
EN standards:
EN60960:1992/A3:1995 plus ZB/ZC Deviations
EN60825-1
Electromagnetic Compatibility FCC part 15 Class A
CSA C108.8-M11983 (A)
VCCI Class 2
EN55022 Class B
EN50082 -1 (1997)
C-Tick mark to AS/NZS 3548:1995
Summit products that have RJ-45 ports comply with EN55022 Class B when
used with shielded UTP cable.
TECHNICAL SPECIFICATIONS
C Troubleshooting
If you encounter problems when using the switch, this appendix may be helpful. If you
have a problem not listed here or in the release notes, contact your local technical
support representative.
LEDS
Power LED does not light:
Check that the power cable is firmly connected to the device and to the supply outlet.
Check the unit fuse. For information on changing the fuse, see Appendix A.
The device has failed its Power On Self Test (POST) and you should contact your
supplier for advice.
Check that:
All connections are secure.
Cables are free from damage.
The devices at both ends of the link are powered-up.
Both ends of the gigabit link are set to the same autonegotiation state.
TROUBLESHOOTING
Both sides if the gigabit link must be enabled or disabled. It the two are different,
typically the side with autonegotiation disabled will have the link LED list, and the
side with autonegotiation enabled will not list. The default configuration for a
gigabit port is autonegotiation enabled. This can be verified by entering the
following command:
show port config
For console port access, you may need to press [Return] several times before the
welcome prompt appears.
Check the settings on your terminal or terminal emulator. The settings are 9600 baud, 8
data bits, 1 stop bit, no parity, XON/OFF flow control enabled.
Check that the device's IP address, subnet mask, and default router are correctly
configured, and that the device has been reset.
Check that the device's IP address is correctly recorded by the SNMP Network Manager
(refer to the user documentation for the Network Manager).
Check that the community strings configured for the switch and Network Manager are
the same.
Check that SNMP access was not disabled for the switch.
Check that the device's IP address, subnet mask and default router are correctly
configured, and that the device has been reset. Ensure that you enter the IP address of
the switch correctly when invoking the Telnet facility. Check that Telnet access was not
disabled for the switch. If you attempt to log in and the maximum number of Telnet
sessions are being used, you should receive an error message indicating so.
Check that the SNMP Network Manager's IP address and community string are
correctly configured, and that the IP address of the Trap Receiver is configured properly
on the switch.
The SNMP Network Manager or Telnet workstation can no longer access the device:
Check that the port through which you are trying to access the device has not been
disabled. If it is enabled, check the connections and network cabling at the port.
Check that the port through which you are trying to access the device is in a correctly
configured VLAN.
Try accessing the device through a different port. If you can now access the device, a
problem with the original port is indicated. Re-examine the connections and cabling.
A network problem may be preventing you accessing the device over the network. Try
accessing the device through the console port.
Check that the community strings configured for the switch and the Network Manager
are the same.
Check that SNMP access was not disabled for the switch.
If you have made a permanent entry in the FDB (which requires you to specify the
VLAN to which it belongs and then delete the VLAN) the FDB entry will remain.
Though causing no harm, you must manually delete the entry from the FDB if you
want to remove it.
If you have defined static or default routes, those routes will remain in the
configuration independent of whether the VLAN and VLAN IP address that used them
remains. You should manually delete the routes if no VLAN IP address is capable of
using them.
TROUBLESHOOTING
If you are not an administrator, another user having administrator access level can log
in, delete your user name, and create a new user name for you, with a new password.
Alternatively, another user having administrator access level can log in and initialize the
device. This will return all configuration information (including passwords) to the
initial values.
In the case where no one knows a password for an administrator level user, contact
your supplier.
VLANS
You cannot add a port to a VLAN:
If you attempt to add a port to a VLAN and get an error message similar to
you already have a VLAN using untagged traffic on a port. Only one VLAN using
untagged traffic can be configured on a single physical port. VLAN configuration can
be verified by using the command
The solution for this error is to remove ports 1 and 2 from the VLAN currently using
untagged traffic on those ports. If this were the default VLAN, the command would
be
which should now allow you to re-enter the previous command without error as
follows:
VLAN names:
There are restrictions on VLAN names. They cannot contain white spaces and cannot
start with a numeric value unless you use quotation marks around the name. If a name
contains white spaces, starts with a numeric, or contains non-alphabetical characters,
you must use quotation marks whenever referring to the VLAN name.
Remember that VLAN names are only locally significant through the command-line
interface. For two switches to communicate across a 802.1Q link, the VLAN ID for the
VLAN on one switch should have a corresponding VLAN ID for the VLAN on the
other switch.
If you are connecting to a third-party device and have checked that the VLAN IDs are
the same, the Ethertype field used to identify packets as 802.1Q packets may differ
between the devices. The default value used by the switch is 8100. If the third-party
device differs from this and cannot be changed, you may change the 802.1Q Ethertype
used by the switch with the following command:
Changing this parameter changes how the switch recognizes all tagged frames received,
as well as the value it inserts in all tagged frames it transmits.
Recall that the switch can have an IP address for each configured VLAN. It is only
necessary to have an IP address associated with a VLAN if you intend to manage
(telnet, SNMP, ping) through that VLAN. You can also configure multiple default routes
for the switch. The switch first tries the default route with the lowest cost metric.
STP
You have connected an endstation directly to the switch and the endstation fails to
boot correctly:
The switch has STP enabled, and the endstation is booting before the STP initialization
process is complete. Specify that STP has been disabled for that VLAN, or turn off STP
for the switch ports of the endstation and devices it is attempting to connect to, and
then reboot the endstation.
TROUBLESHOOTING
The switch keeps aging out endstation entries in the switch Forwarding Database
(FDB):
Reduce the number of topology changes by disabling STP on those switches that do not
use redundant paths.
Index
configuration
A primary and secondary 14-3
access levels 3-8 saving changes 14-3
accounts, creating 3-10 uploading to file 14-4
admin account 3-9 console port 1-17
aging entries 6-1 connecting equipment to 2-4
alarm actions 12-17 conventions
Alarms, RMON 12-16 notice icons, About This Guide xviii
area 0, OSPF 10-6 text, About This Guide xviii
areas, OSPF 10-5 creating a QoS profile 8-6
autonegotiation 4-2
D
B default
backbone area, OSPF 10-6 passwords 3-9
blackhole entries 6-2 settings 1-18
boot option commands (table) 14-5 users 3-9
BOOTP relay, configuring 9-10 default STP domain 7-2
BOOTP, using 3-12 Default VLAN 5-14
bridge priority 7-5 deleting a session 3-15
browser device mode, configuring 9-9
controls 13-4 DHCP relay, configuring 9-10
fonts 13-2 disabling a port 4-1
setting up 13-2 disabling route advertising (RIP) 10-4
disabling Telnet 3-15
disconnecting a Telnet session 3-15
C Distance Vector Multicast Routing Protocol. See
DVMRP
cable types and distances 1-4, 2-2
distance vector protocol, description 10-2
command
domains, Spanning Tree Protocol 7-1
history 3-5
duplex setting 4-2
shortcuts 3-3
syntax, understanding 3-2
common commands (table) 3-6
community strings 3-19
Summit.bk : SUMMIT.IX Page ii Thursday, June 18, 1998 9:27 AM
DVMRP
configuring 11-3 G
description 11-2 GARP VLAN Registration Protocol. See GVRP
dynamic entries 6-1 GVRP
dynamic routes 9-3 commands (table) 5-10
description 5-8
example 5-9
E
EDP
commands 4-12 H
connected to SummitLink port 4-11 hardware address 1-18
description 4-11 hello time 7-5
enabling a port 4-1 history command 3-5
errors, port 12-8 History, RMON 12-15
Events, RMON 12-16 home page 3-17, 13-3
Extreme Discovery Protocol See EDP host configuration commands (table) 3-16
ExtremeWare Vista
accessing 13-3
browser controls 13-4 I
browser setup 13-2
ICMP configuration commands (table) 9-14
capturing screen output 13-6 IEEE 802.1Q 5-5
description 13-1
IGMP
disabling 3-17, 13-1
configuration commands (table) 11-4
enabling 13-1 description 11-2
fonts 13-2
snooping 11-2
home page 3-17, 13-3
image
navigating 13-3 downloading 14-1
saving changes 13-5
primary and secondary 14-2
screen layout 13-3
upgrading 14-1
screen resolution 13-2 installing the switch 2-3
status messages 13-5
interfaces, router 9-2
VLAN configuration 13-2
Internet Group Management Protocol. See IGMP
IP address, entering 3-13
IP multicast routing
F configuration commands (table) 11-3
FDB configuring 11-2
adding an entry 6-2 description 1-7, 11-1
agingin entries 6-1 disabling 11-8
blackhole entries 6-2 DVMRP
clear and delete commands (table) 6-6 configuring 11-3
configuration commands (table) 6-3 description 11-2
configuring 6-3 example 11-6
contents 6-1 IGMP
creating a permanent entry example 6-4 configuration commands (table) 11-4
displaying 6-5 description 11-2
dynamic entries 6-1 snooping 11-2
entries 6-1 reset and disable commands (table) 11-8
non-aging entries 6-2 resetting 11-8
permanent entries 6-2 settings, displaying 11-7
QoS profile association 6-3 show commands (table) 11-7
removing entries 6-6 IP multinetting
fonts, browser 13-2 description 9-5
forward delay 7-5 example 9-7
Forwarding Database. See FDB
free-standing installation 2-4
full-duplex 1-5
ii - Index
Summit.bk : SUMMIT.IX Page iii Thursday, June 18, 1998 9:27 AM
K
keys N
line-editing 3-5 names, VLANs 5-13
port monitoring 12-9 non-aging entries 6-2
L O
LED, description 1-16 Open Shortest Path First. See OSPF
line-editing keys 3-5 OSPF
link state database 10-5 advantages 10-2
link state protocol, description 10-2 area 0 10-6
load sharing areas 10-5
configuring 4-6 backbone area 10-6
description 4-5 configuration commands (table) 10-14
example 4-7 configuration example 10-16
group combinations (table) 4-6 description 10-2, 10-5
load-sharing group, description 4-5 disabling 10-19
master port 4-6 enabling 9-9
verifying the configuration 4-8 link state database 10-5
local logging 12-11 reset and disable commands (table) 10-19
location 1-17 resetting 10-19
log display 12-11 router types 10-6
settings, displaying 10-18
show commands (table) 10-18
stub area 10-6
virtual link 10-7
Index - iii
Summit.bk : SUMMIT.IX Page iv Thursday, June 18, 1998 9:27 AM
P Q
PACE 8-4 QoS
passwords building blocks 8-1
default 3-9 configuration commands (table) 8-8
forgetting 3-10 configuration examples 8-9
path cost 7-5 configuring 8-8
permanent entries 6-2 default QoS profiles 8-2
ping command 3-22 description 1-6, 8-1
poison reverse 10-3 FDB entry association 6-3
port information, displaying 8-10
autonegotiation 4-2 mode 8-1
commands (table) 4-3 PACE recognition 8-4
configuring 4-1 Port Queue Monitor (PQM), description 8-7
connections 1-3 precedence 8-5
console 1-17 prioritization 8-6
duplex 4-2 profiles
enabling and disabling 4-1 configuring 8-8
errors,viewing 12-8 creating 8-6
load-sharing groups 4-6 deleting 8-10
master port 4-6 description 8-2
monitoring display keys 12-9 resetting 8-10
priority, STP 7-5 traffic classification 8-1
receive errors 12-8 traffic groupings, description 8-3
redundant power supply 1-17 Quality of Service. See QoS
speed 4-2
statistics, viewing 12-7
STP state, displaying 7-8 R
STPD membership 7-2 rack mounting the switch 2-3
SummitLink 4-10 rebooting 14-2
transmit errors 12-8 receive errors 12-8
Port Queue Monitor. See PQM redundant power supply port 1-17
port-based VLANs 5-2 remote logging 12-12
port-mirroring Remote Monitoring. See RMON
configuration commands (table) 4-9 reset button 1-17
description 4-8 reset to factory defaults 14-3
example 4-9 RIP
virtual port 4-8 advantages 10-2
power socket 1-17 configuration commands (table) 10-8
power supply 1-17 configuration example 10-10
powering on the switch 2-6 description 10-2, 10-3
PQM disabling route advertising 10-4
commands (table) 8-7 enabling 9-9
description 8-7 limitations 10-2
primary image 14-2 poison reverse 10-3
profiles, QoS 8-2 reset and disable commands (table) 10-13
protocol filters 5-12 routing table entries 10-3
protocol-based VLANs 5-11 settings, displaying 10-12
proxy ARP, description 9-4 show commands (table) 10-12
split horizon 10-3
triggered updates 10-4
version 2 10-4
iv - Index
Summit.bk : SUMMIT.IX Page v Thursday, June 18, 1998 9:27 AM
Index - v
Summit.bk : SUMMIT.IX Page vi Thursday, June 18, 1998 9:27 AM
routing 9-9
T tagged 5-5
tagging, VLAN 5-5 trunks 5-6
Telnet types 5-2
disabling 3-15
disconnecting a session 3-15
logging 12-11 W
using 3-12 Web access
TFTP disabling 3-17, 13-1
server 14-1 enabling 13-1
using 14-4
traceroute command 3-22
traffic groupings, QoS 8-3 X
transmit errors 12-8
xmodem 14-2
triggered updates 10-4
trunks 5-6
U
upgrading the image 14-1
uploading the configuration 14-4
users
access levels 3-8
creating 3-10
default 3-9
viewing 3-10
V
verifying the installation 2-6
viewing accounts 3-10
Virtual LANs. See VLANs
virtual link, OSPF 10-7
VLAN tagging 5-5
VLANs
and ExtremeWare Vista 13-2
and STP 7-2
assigning a tag 5-6
benefits 5-1
configuration commands (table) 5-14
configuration examples 5-16
configuring 5-14
Default 5-14
delete and reset commands (table) 5-18
description 1-6
disabling route advertising 10-4
displaying settings 5-17
mixing port-based and tagged 5-8
names 5-13
port-based 5-2
protocol filters 5-12
protocol-based 5-11
restoring default values 5-18
vi - Index
Summit.bk : SUMMIT.BKIX Page i Thursday, June 18, 1998 9:27 AM
Index of Commands
config snmp add trapreceiver 3-20 disable learning port 4-3, 6-4
config snmp community 3-20 disable log display 12-13
config snmp delete 3-20 disable mirroring 4-9
config snmp delete trapreceiver 3-20 disable multinetting 9-12
config snmp syscontact 3-20 disable ospf 10-19
config snmp syslocation 3-20 disable ospf exportstatic 10-19
config snmp sysname 3-20 disable pace 8-4, 8-8
config stpd add vlan 7-6 disable port 3-7, 4-3
config stpd forwarddelay 7-6 disable rip 10-13
config stpd hellotime 7-6 disable rip aggregation 10-13
config stpd maxage 7-6 disable rip exportstatic 10-13
config stpd port cost 7-7 disable rip poisonreverse 10-13
config stpd port priority 7-7 disable rip splithorizon 10-13
config stpd priority 7-6 disable rip triggerupdate 10-13
config syslog 12-13 disable sharing 4-3
config time 3-7 disable smartredundancy 4-4
config vlan 3-7 disable snmp access 3-21
config vlan add port 5-15 disable snmp trap 3-21
config vlan delete port 5-15 disable stpd 7-9
config vlan ipaddress 5-15 disable stpd port 7-9
config vlan protocol 5-15 disable summitlink port 4-12
config vlan qosprofile 5-15, 8-8 disable syslog 12-13
config vlan tag 5-15 disable telnet 3-7
create account 3-6 disable web 3-7, 13-1
create fdbentry 6-3 download config 14-5
create ospf area 10-14 download image 14-5
create protocol 5-14
create qosprofile 8-8
create stpd 7-6 E
create vlan 3-6, 5-14 enable bootp 3-7, 9-11
enable bootprelay 9-11
enable dvmrp 11-3
D enable edp port 4-12
delete account 3-7 enable gvrp 5-10
delete fdbentry 6-6 enable icmp redirects 9-14
delete ospf area 10-19 enable icmp unreachables 9-14
delete protocol 5-18 enable icmp useredirects 9-14
delete qosprofile 8-10 enable idletimeout 3-7
delete stpd 7-9 enable igmp 11-4
delete vlan 3-7, 5-18 enable igmp snooping 11-4
disable bootp 3-7, 9-12, 9-18 enable ignore-stp 5-15
disable bootprelay 9-12, 9-18 enable ipforwarding 9-11
disable dvmrp 11-8 enable ipforwarding broadcast 9-11
disable edp port 4-12 enable ipmcforwarding 11-3
disable gvrp 5-10 enable iproute sharing 9-13
disable icmp redirects 9-14, 9-18 enable irdp 9-14
disable icmp unreachables 9-15, 9-18 enable learning port 4-3, 6-3
disable icmp useredirects 9-15, 9-18 enable log display 12-13
disable idletimeout 3-7 enable mirroring 4-9
disable igmp 11-8 enable multinetting 9-11
disable igmp snooping 11-8 enable ospf 10-14
disable ignore-stp 5-18 enable ospf exportstatic type 10-14
disable ipforwarding 9-12, 9-18 enable pace 8-4, 8-8
disable ipforwarding broadcast 9-12, 9-18 enable port 4-3
disable ipmcforwarding 11-8 enable rip 10-8
disable iproute sharing 9-13 enable rip aggregation 10-8
disable irdp 9-15, 9-18 enable rip exportstatic 10-8
ii-Index of Commands
Summit.bk : SUMMIT.BKIX Page iii Thursday, June 18, 1998 9:27 AM
Index of Commands-iii