Instruction/ maintenance manual of the product 35516 Asante Technologies
Go to page of 77
IntraCore ® 35516 Series Layer 2/3/ 4 Gigabit Switches User ’ s Manual.
2 IntraCore 35 516 Serie s Layer 2/3/ 4 Gigabit Switches User’ s Manual Asanté Techno logies, Inc. 821 Fox Lane San Jose, CA 95131 USA SALES 800-662-9686 H ome/Offi ce So lutions 800-303-9121 Ent erprise Solutions 408-435-8388 TECHNIC A L SUPPORT 801-566-8991: Worldw ide www .
3 Table of Contents Chapter 1. Introducti on 5 1.1 Features 5 1.2 Package C ontent s 6 1.3 LEDs 6 1.4 Front and Ba ck Pane l Descriptions 7 1.5 Managem ent and Co nfigur ation 8 Chapter 2. Hardw are Installation an d Setup 9 2.1 Installat ion Overview 9 2.
4 Appendix D. Console Port Pin O uts 76 Appendix E. Online W arranty Registr ation 77.
5 Chapter 1. Introduction Thank you for purchasing the Asanté IntraCore 3551 6 Serie s Gigabit switch. T he IC3 5516 is fro m a family of multi-me dia and mu lti-protocol sw itches capab le of supportin g Layer 2 sw itching and Layer 3 and Layer 4 protocols.
6 1.2 Package Contents The follow ing ite ms are i nclud ed in the switch’ s package : • Switch • AC power cord • Rack mou nt brac kets w ith screw s • Rubber feet • Setup Guide • IntraCore 355 16 CD-RO M Contact your de aler immediat ely if any of the se items i s mis sing.
7 LED Col or De script ion Power Gr een Off Power i s on. Power is o ff, or ma in power su pply ha s failed. Emerg ency Pow er Gree n Off Primar y pow er has fail ed an d opti onal power su pply i s po werin g the s wit ch. Optio nal po wer s upply is i n st andby m ode and pri mar y power is wor ki ng.
8 1.4.2 IC35516-G The front panel of the IC 35516 -G contains the fol lowing: p ower and port LEDs; 12 GB IC ports; 4 dual- function Gi gabit p orts that support either 1000Bas eT or GB IC-style Giga bit Ethern et ports; and a co nsole port.
9 Chapter 2. Hard ware Installa tion and Setup The follow ing guid elines w ill help the user t o easi ly install the switch, and to ensur e that it has t he proper power supp ly and env ironment . 2.1 Install ation Ov er view Follow the se steps to install the IntraCor e switc h: 1.
10 2.1.3 Po wer Requireme nts The elect rical o utlet shoul d be located near t he switch and b e eas ily acce ssible . It mus t also be properly grounded. Make sure th e power s ource a dheres to the f ollowing guidel ines: • Power: Auto Sw itching 90-260 VAC • Frequency ran ge: 50/6 0 Hz 2.
11 2.3 Gigabit Interf ace Convert ers The GBIC Interface is th e industry standard for Gigabi t Ethernet Int erfaces. So me of the benefit s of GBIC include r educing th e components need ed in a “ .
12 2. 3. 2 Re mo vin g a G BIC Caution : GBIC 1000T module s run hot under nor mal oper ating c ondition s. W hen it has be en removed from the system , place it on a heat- resistant surfac e and a llow the module t o cool before h andling.
13 2.5 Connecting Po w er Important: Carefu lly review the power requirement s (Chapte r 2.1.3) bef ore conn ecting power to t he switc h. Use the fol lowing pr ocedure to con nect pow er to the sw itch: 1. Plug one end o f the supplied p ow er cord into the p ower connector on t he bac k of the sw itch.
14 1000BaseT requ ires tha t all four pair s (8 w ires) be con nected corr ectly, using Category 5 o r better Unshielde d Tw isted Pair (UTP ) cable (t o a distanc e of 100 meters).
15 • Under the Settin gs tab, choo se VT 100 for Emulatio n mode • Select Termin al key s for Funct ion, Arrow , and Ctrl keys. Be s ure the se tting is for T erminal keys, NOT W indow s keys • .
16 2.8 Setting Pa sswords The sw itch ship s with a d efault of no ena ble pas sword, w hich allow s anyone on the netw ork access to various privile ge levels. T o prevent unauthoriz ed changes to the switc h’s config uration, you should set an enable passw ord for access to sw itch mana gement.
17 2.9 Configuring an IP Address The sw itch ship s with the default IP address 192.168.0.1/ 24 . Connect via the s erial por t in o rder to as sign the switc h an IP addres s on y our netw ork. The physic al ports (or switc hports) of the IC35516 are L2 po rts, and cannot hav e an IP add ress as signed to them.
18 2.10 Restoring Factory Defaults If you ever n eed to re store the switch to its fact ory default settings, follow the commands sh own in the following scr een. Router> enable Router# reload ? factory-default Reset ALL system parameters to factory default <cr> Router# reload factory-default The sw itch is now ready for configur ation.
19 Chapter 3. Understanding the Command Li ne Interface (CLI) The sw itch utilizes Comman d Line Interface (CLI) to prov ide access to severa l differe nt comma nd mode s. Each comma nd mode provide s a group of relate d comman ds. After logging i nto the syste m, the user i s auto matically in the user t op (user EXEC) mode .
20 User top co mmands: Router> ? enable Turn on privileged mode command exit Exit current mode and down to previous mode help Description of the interactive help system ping Send echo messages quit.
21 Router> enable Router# ? clear Reset functions clock Manage the system clock configure Enter configuration mode copy Copy from one file to another debug Debugging functions disable Turn off priv.
22 Router# configure terminal Router(config)# ? access-list Add an access list entry arp Set static arp entry boot Modify system boot parameters duplicate-ip Duplicate IP Address detection Global Comm.
23 3.3.2 Router Configuration Mode Router conf iguratio n comman ds are us ed to c onfigure an IP routing protocol and a lway s follow a router command. T o list t he availab l e router config uration key words, enter the router comman d follow ed by a space and a questi on mark ( ? ) at the gl obal co nfigurat ion pro mpt.
24 3.4 A dvanced Features Supported within the Command Mode Entering a que stion mark (?) a t the syste m prompt displ ays a list of co mmands availabl e for eac h comm and mode. Y ou can al so get a li st of any comman d's asso ciated keyw ords and argu ments w ith the context- sensitive hel p feature.
25 Example of Cont ext Sensitive H elp The follow ing ex ample illustrates h ow the con tex t-sensitiv e help f eature cr eates an acce ss l ist from t he configura tion mo de. Enter the letter s “co” at the sys tem prom pt follow ed by a q uestion mark (?).
26 In the ex ample abov e, a co mmand ha s been i ssued that is unknown or amb iguous. Router(config)# router % Command incomplete. Router(config)# In the ex ample abov e a co mmand has been issued that i s in complete. In the following ex amples, various correct com mands ( using rout e ) are dis played.
27 • Editing Com mand Line s that Wrap • Deleting Entr ies • Scrolling D own a Lin e or a Scr een • Redisplayin g the Current Command Line • Transpos ing Misty ped Chara cters • Controlling Capitaliz ation 3.
28 The comman d is n ot immed iately ex ecuted, so that you may modify the c ommand if neces sary. If you ente r a set of ch aracters t hat coul d indicate more tha n one c ommand, t he system simply lists al l poss ible commands. You may also enter a quest ion mark (?) to obtai n a list of c ommand s that beg in with that set of char acters.
29 Press Ctrl-U or Ctrl-X . Delete all charact ers from the curs or to the beginning of the comman d line. Press Ctrl-W . Delete the w ord to the left of the cursor.
30 3.9 Pass words and Priv ileges Commands The follow ing sectio ns descr ibe the pas sword and priv ilege s command s used to control access to d ifferent levels of th e router: • enable passw ord • passw ord • service pa ssw ord-encryptio n 3.
31 3.9.3 Service Pass word-Encryption To encrypt pa sswords , use th e service p assword-en cr y pti on command in glob al conf iguration mode. U se the no form of t his command t o restore t he defau lt.
32 Chapter 4. Managing the System and Configuration Fil es This ch apter ex plains how to manage the sys tem inf ormatio n, as w ell as how to manag e the c onfigurat ion files for the IC 35516.
33 4.1.4 Trace Packet Routes To discov er the route s that p acket s will a ctually ta ke when tr aveling to their des tinatio ns, u se the follow ing command in top mo de. Command Purposes tracert addres s Trace pa cket rout es throu gh th e network.
34 4.2 Managing Configuration Files This se ction dis cusse s how to download configura tion fi les fr om remote server s, and store conf iguration files on the router at system startup . Configurati on file s conta in the commands t he router uses t o cust omize the function of the I C35516.
35 4.2.2 Copying Configuration Files to a Net work Server You can c opy confi guration f iles fro m the rout er to a fi le serve r using T FTP . You might w ish to ba ck up a current confi guration file to a server befor e changing its co ntents, thereby allow ing you to l ater restore the original con figurati on file from t he server.
36 In order to r estore a configurat ion file to an ex act copy of a fil e stored o n a server, y ou nee d to copy the configurat ion file d i rectly to t he startup conf iguration (us ing th e copy tftp startup-config command) and reload the rout er.
37 Create or Modify Access Co ntrol for SNMP Community You can confi gure a communit y string, w hich acts like a pa ssw ord, to permit a ccess to the agent on the router. Read Only (ro) : The string t hat defines acce ss right s for rea ding SNM P data objects.
38 but where the re is o nly one pa th between a ny two points (th e con nections span the entire n etwork, and the paths are bran ched, l ike a tr ee). All of the brid ges (a switch i s a complex bridge) on the netw ork com municat e with ea ch oth er using spe cial packets of data ca lled Brid ge Protocol D ata Unit s (BPDUs).
39 Spanning Tree Port Configuration You can confi gure the follow ing parameters fr om interface c onfigur ation mode: Router(config)# interface eth1 Router(config-if-eth1)# spanning-tree ? path-cost .
40 Chapter 5. Configuri ng IP The Internet Proto c ol (IP) is a pac ket-based pro tocol u sed to ex change data over co mputer networks. It is the foundatio n on w hich all ot her IP pro tocols are built. IP is a network-lay er proto col that contains addressing and contr ol information that allow s data packets to be routed.
41 CIDR Prefix Class C Equivalent Host Addr esses /27 1/8 Class C 32 Hosts /26 1/4 Class C 64 Hosts /25 1/2 Class C 128 Hosts /24 1 Class C 256 Hosts /23 2 Class C 512 Hosts /22 4 Class C 1,024 Host s.
42 To assign m ultipl e IP addre sses to netw ork interfaces, use t he follow ing comman d in int erface configur ation mode: Command Purpose ip address a ddress I mask secondary Assign mult iple IP addresse s to netw ork interfaces.
43 Interior gatew ay protocols are used to ex change ro uting in formation a m ong rout ers in an a utono mous network, su ch as a company ’s LAN. A rout ing protocol deter mines how routers in a netw ork share a nd update in formation an d report changes , enabling a netw ork to be dyn amic i nstead of stati c.
44 5.4 Configuring RIP The Routing Informat ion Proto col (RIP) is a common ly used i nterior gat eway protocol (IGP ) created for use in small, h omogen eous netw orks. It is a dis tance-vect or routing protocol, d o cumented in RFC 1058. RIP uses broad c ast User D atagram Pr otocol (UDP ) data pac kets to ex change routing infor mation.
45 5.4.3 Specify a RIP Version By default, the software receiv es RIP Versio n 1 and V ersion 2 packet s, but sends only Vers ion 1 pa ckets. You can confi gure the softw are to receiv e and send only Version 1 pac kets or only Version 2 pa ckets. To do so, perfor m the follow ing task in router confi guration mod e.
46 Router(config)# route-map map-tag permit 10 Router(config-route-map)# ? end End current mode and change to enable mode. exit Exit current mode and down to previous mode help Description of the inte.
47 process. By specifyi ng admi nistrative distance values , you enable the rout er to inte lligent ly discrim inate between so urces o f routing informat ion. The router w ill alw ays pick th e route w hose rout ing proto col h as the low est admini strativ e distance.
48 Apply Offsets to Routing Metrics An offset list is the mecha nism for in creasi ng inco ming and o utgoing metrics to ro utes learned via RIP. Y ou can limit t he offse t list w ith an access li st. To i ncrease the value of routing metrics , perform t he following task in router configurat ion mode.
49 Important! Do not use pl ain tex t authentication in RIP pa ckets for security purpo ses, becau se the unencrypted authenti cation key is se nt in ev ery RIP Vers ion 2 packet . Use pla in tex t authentication w hen security i s not an issue (f or exampl e, to en sure that incorre ctly configured ho sts do not participa te in routing).
50 IGMP The Internet Group M anagem ent Protocol (IG M P) manages the m ultica st group s on a LAN . IP hosts use IGMP to report t heir group me mbershi p to directly conn ected multicast r outers. Router s executi ng a multica st routing pr otocol maintain f orwarding tables t o forward mu lticast datagrams.
51 Changing the IGMP V ersion By default, the router u ses IGM P Version 2, w hich all ows su ch feature s as the IGM P query timeout and the maximum q uery r esponse t ime. All system s on the subnet mus t support t he same v ersion. T he route r does n ot auto maticall y detect Version 1 systems and sw itch to Ver sion 1.
52 5.5.2 Configuri ng DVMRP This se ction pr esents the commands for co nfigurin g DVM RP IP M ulticast Rout ing Proto col. T he following commands are avai lable fr om globa l configura tion mode: Ro.
53 DVMRP must be enable d on t he router for this command to be operati onal. Command Purpose probe-interval <5–30 secon ds> Define s how ofte n neighbor probe messages are sent to the ALL-DVM RP-ROUTER S IP multicast group addres s.
54 5.6 Using A ccess Lists An access l ist is a collection of criter ia statements that the switch uses t o determine w hether to allow or block tr affic based on IP addresse s. Acce ss lists can be configured t o provide basi c security on your network, an d to prevent unnecessary traffi c betw een network segments.
55 Router(config)# access-list 1 deny 192.168.123.254 ? A.B.C.D Source wildcard. e.g. 0.0.0.255 <cr> Router(config)# access-list 1 deny 192.168.123.
56 eq Operator - equal to gt Operator - greater then lt Operator - less then neq Operator - NOT equal to <cr> Router(config)# $ list 101 deny tcp 192.168.123.0 0.0.0.255 192.168.124.0 eq ? <0-65535> Protocol port number Router(config)# $ eny tcp 192.
57 Router(config)# access-list 101 permit tcp 192.168.123.0 0.0.0.255 any eq 25 Router(config)# access-list 101 deny any Router(config)# interface eth1 Router(config-if-eth1)# ip ? access-group Apply .
58 5.7.3 Con figu re Co mpatib ility Compatibi lity confi guration enable s the router to be co mpati ble with a v ariety of R FCs tha t deal w ith OSPF.
59 To configure t he OSPF network type, u s e the f ollow ing command in inter face c onfigurat ion mode. Command Purpose ip ospf net work {broadcast | non-broadcast | point-to-multipoint | poi nt-to-point} Configure th e OSPF netw ork type for a specified i nterface .
60 specific ex ternal routes as Ty pe 7 LSAs into th e NSSA. In addition, w hen translati ng Ty pe 7 LSAs into T ype 5 LSAs by NSSA ABR, summ arization an d filteri ng are supp orted during the translatio n.
61 5.7.11 Control Default Metrics OSPF calcula tes the OSPF metric for a n interfa ce accord ing to the bandw idth of the interfa ce. For ex ample, a 64K link get s a me tric of 1 562, w hile a T1 l ink gets a metric of 64.
62 To force the a utonomous syst em boundary router to g enerate a defau lt route, p erform th e follow ing tas k in router configur ation mode. Command Purpose redistribute {ker nel | connec ted | static | rip | bgp} [metric metric -val ue ] [metric- type {1|2}][route-map m ap-tag ] Redistribut e routes into OSPF routing domain.
63 To display variou s routing stati stics, use the fol lowing c ommands in top m ode. Command Purpose show ip ospf Display gener al information about the O SPF routing proce ss.
64 debug ospf event Display infor m ation on OSPF-relate d events, such as ad jacencie s, flood ing i nformation, designated ro uter selection, a nd SPF calculatio n. debug ospf ism [ev ents | sta tus | timers] Displ ay floo ding inf ormation, S PF calculation on internal are a-related events .
65 The follow ing co mmands are av ailable un der EXEC or Enab le mo de: Command Purpose show vrrp [brief | VRID] Displays a br ief or detailed sta tus of on e or all VRRP VRID groups on the ro uter. show vrrp interface IFNAME [brief] Displays the VRRP grou ps an d their st atus on a specified i nterface .
66 Use any of the follow ing commands in t op mod e. Command Purpose show arp [ int erfa ce ] Display the entrie s in the AR P table. show access-lists [ ac cess-l ist- name ] Display the contents of one or all current acce ss lists. show ip prefix-list [ prefix-lis t-nam e ] Display the cont ents of current IP prefix lists.
67 Chapter 6. VLAN Configuration Up to 4094 Vi rtual LANs (VLA Ns) are supported on the IC35 516. The switch i s shipped w ith a default VLAN with VLAN ID (VID ) 1. All sw itchports (eth 1-eth16) are includ ed in the default VID 1. The d efault VID 1 cannot be deleted .
68 First, a VLAN is creat ed and n amed tester . Router# configure terminal Router(config)# vlan 2 Router(config-vlan)# name tester Router(config-vlan)# exit Router(config)# exit Router# show vlan From the show vl an command, the new VLAN will be list ed, but w ill not y et be activ e.
69 6.2 VLA N Port Membership Modes A switchport can be assi gned t o a VLAN by d esignat ing a member ship mo de. The member ship mode determine s the kind of tr affic t he port carr ies an d the numbe r of VLANs to which it can belong. The membership mo des are as follow s: • Static Access • Trunk (IEEE 802.
70 Use the fol lowing c ommands t o config ure the VLAN Allowed List for t he trunk port: Command Purpose Router(config)# inter face I FNA ME Enter the interface name to ac cess the in terface configura tion no de. Router(config-if-IFNA ME)# switchport mode trunk This command des ignates the interf ace as IEEE 802.
71 Use the follow ing commands to co nfigure a n interface as an IEEE 802.1q tu nnel por t: Command Purpose Router(config)# inter face I FNA ME Enter the interface name to ac cess the in terface configura tion no de. Router(config-if-IFNA ME)# switchport mode dot1q-tunnel This comm and will put the interface into IEEE 802.
72 A ppendix A. Basic Troubleshooting In the unlik ely ev ent the switch does not operate properly, fol low the troubles hooting tip s bel ow. If more h elp is needed, contact Asanté’ s technica l support at www .asante.com/support . Problem Possible Solutions The Pow er LED is not lit .
73 Appendix B. Specifi cations The sect ions below list the features and prod uct spe cificatio ns for t he IntraCor e 35516 Series Gig abit Ethernet sw itches.
74 Appendix C. FCC Compliance and Warr anty Statements FCC Complia nce Statement This equ ipment has been te sted an d found t o comply with th e limits for a Cla ss A di gital de vice, pursu ant to part 15 of t he FCC Ru les.
75 and used. If A s anté re ceives n otice of su ch defe cts duri ng the w arranty period , Asanté w ill repla ce software me dia that does n ot ex ecute its prog ramming i nstructi ons due to suc h defects. 3. Asanté does n ot warrant t hat the operation of Asa n té prod ucts w ill be uninterr upted or error free.
76 Appendix D. Consol e Port Pin Outs The console port is used to connec t with a ter minal using a s erial mo dem RS- 232C cab l e (av ailable fr om Radio Shac k’s w ebsite, ww w.radio shack. com , cata log # 26-117). T he setting i s 9600-N8 1. T he table bel ow lists the p in outs.
77 Appendix E. Online Warrant y Registr ation Please regist er the sw itch online at w ww .asante.com/ suppor t/registrat ion.html . By doing so, you’ll be entitled to special offers, u p-to-date informat ion, and important pr oduct bulletins. You may als o regist er the sw itch by using the warranty card f ound in t he printe d Setup G uide.
An important point after buying a device Asante Technologies 35516 (or even before the purchase) is to read its user manual. We should do this for several simple reasons:
If you have not bought Asante Technologies 35516 yet, this is a good time to familiarize yourself with the basic data on the product. First of all view first pages of the manual, you can find above. You should find there the most important technical data Asante Technologies 35516 - thus you can check whether the hardware meets your expectations. When delving into next pages of the user manual, Asante Technologies 35516 you will learn all the available features of the product, as well as information on its operation. The information that you get Asante Technologies 35516 will certainly help you make a decision on the purchase.
If you already are a holder of Asante Technologies 35516, but have not read the manual yet, you should do it for the reasons described above. You will learn then if you properly used the available features, and whether you have not made any mistakes, which can shorten the lifetime Asante Technologies 35516.
However, one of the most important roles played by the user manual is to help in solving problems with Asante Technologies 35516. Almost always you will find there Troubleshooting, which are the most frequently occurring failures and malfunctions of the device Asante Technologies 35516 along with tips on how to solve them. Even if you fail to solve the problem, the manual will show you a further procedure – contact to the customer service center or the nearest service center