IA1100

Cabletron Systems IA1100, IA1200 User's Reference Manual

  • Hello! I am an AI chatbot trained to assist you with the Cabletron Systems IA1100 User's Reference Manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Internet Appliance
User Reference Manual
9033371
Changes
Cabletron Systems, Inc., reserves the right to make changes in specifications and other information
contained in this document without prior notice. The reader should in all cases consult Cabletron
Systems, Inc., to determine whether any such changes have been made.
The hardware, firmware, or software described in this manual is subject to change without notice.
Disclaimer
IN NO EVENT SHALL CABLETRON SYSTEMS BE LIABLE FOR ANY INCIDENTAL, INDIRECT,
SPECIAL, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING BUT NOT LIMITED
TO LOST PROFITS) ARISING OUT OF OR RELATED TO THIS MANUAL OR THE INFORMATION
CONTAINED IN IT, EVEN IF CABLETRON SYSTEMS HAS BEEN ADVISED OF, KNOWN, OR
SHOULD HAVE KNOWN, THE POSSIBILITY OF SUCH DAMAGES.
Copyright
© 2000 by Cabletron Systems, Inc. All rights reserved.
Cabletron Systems, Inc.
35 Industrial Way
Rochester, NH 03867-5005
Printed in the United States of America
Trademarks
AppleTalk is a registered trademark of Apple Computer, Inc.
Cabletron Systems is a registered trademark and Cabletron, SmartSwitch, and GIGAswitch are
trademarks of Cabletron Systems, Inc.
Catalyst and EtherChannel are registered trademarks of Cisco Systems, Inc.
DEC is a registered trademark and Decnet is a trademark of Digital Equipment Corporation.
All other product names mentioned in this manual may be trademarks or registered trademarks of
their respective companies.
Regulatory Compliance Information
Internet Appliance User Reference Manual iii
Regulatory Compliance Information
This product complies with the following:
Safety
UL 1950; CSA C22.2, No. 950; 73/23/EEC; EN 60950; IEC 950
Electromagnetic
FCC Part 15; CSA C108.8; 89/336/EEC; EN 55022; EN 61000-3-2
Compatibility (EMC)
EN 61000-3-3; EN 50082-1, AS/NZS 3548; VCCI V-3
Regulatory Compliance Statements
FCC Compliance Statement
This device complies with Part 15 of the FCC rules. Operation is subject to the following two
conditions: (1) this device may not cause harmful interference, and (2) this device must accept any
interference received, including interference that may cause undesired operation.
NOTE: This equipment has been tested and found to comply with the limits for a Class A digital
device, pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable
protection against harmful interference when the equipment is operated in a commercial environment.
This equipment uses, generates, and can radiate radio frequency energy and if not installed in
accordance with the operator’s manual, may cause harmful interference to radio communications.
Operation of this equipment in a residential area is likely to cause interference in which case the user
will be required to correct the interference at his own expense.
WARNING: Changes or modifications made to this device that are not expressly approved by the
party responsible for compliance could void the user’s authority to operate the equipment.
Industry Canada Compliance Statement
This digital apparatus does not exceed the Class A limits for radio noise emissions from digital
apparatus set out in the Radio Interference Regulations of the Canadian Department of
Communications.
Le présent appareil numérique n’émet pas de bruits radioélectriques dépassant les limites applicables
aux appareils numériques de la class A prescrites dans le Règlement sur le brouillage radioélectrique
édicté par le ministère des Communications du Canada.
Regulatory Compliance Statements
iv Internet Appliance User Reference Manual
NOTICE: The Industry Canada label identifies certified equipment. This certification means that the
equipment meets telecommunications network protective, operational, and safety requirements as
prescribed in the appropriate Terminal Equipment Technical Requirements document(s). The
department does not guarantee the equipment will operate to the user’s satisfaction.
Before installing this equipment, users should ensure that it is permissible to be connected to the
facilities of the local telecommunications company. The equipment must also be installed using an
acceptable method of connection. The customer should be aware that compliance with the above
conditions may not prevent degradation of service in some situations.
Repairs to certified equipment should be coordinated by a representative designated by the supplier.
Any repairs or alterations made by the user to this equipment, or equipment malfunctions, may give
the telecommunications company cause to request the user to disconnect the equipment.
Users should ensure for their own protection that the electrical ground connections of the power
utility, telephone lines, and internal metallic water pipe system, if present, are connected together. This
precaution may be particularly important in rural areas. CAUTION: Users should not attempt to
make such connections themselves, but should contact the appropriate electric inspection authority, or
electrician, as appropriate.
NOTICE: The Ringer Equivalence Number (REN) assigned to each terminal device provides an
indication of the maximum number of terminals allowed to be connected to a telephone interface. The
termination on an interface may consist of any combination of devices subject only to the requirement
that the sum of the Ringer Equivalence Numbers of all the devices does not exceed 5.
VCCI Compliance Statement
This is a Class A product based on the standard of the Voluntary Control Council for Interference by
Information Technology Equipment (VCCI). If this equipment is used in a domestic environment,
radio disturbance may arise. When such trouble occurs, the user may be required to take corrective
actions.
Safety Information: Class 1 Laser Transceivers
Internet Appliance User Reference Manual v
Safety Information: Class 1 Laser Transceivers
This product may use Class 1 laser transceivers. Read the following safety information before
installing or operating this product.
The Class 1 laser transceivers use an optical feedback loop to maintain Class 1 operation limits. This
control loop eliminates the need for maintenance checks or adjustments. The output is factory set and
does not allow any user adjustment. Class 1 laser transceivers comply with the following safety
standards:
21 CFR 1040.10 and 1040.11, U.S. Department of Health and Human Services (FDA)
IEC Publication 825 (International Electrotechnical Commission)
CENELEC EN 60825 (European Committee for Electrotechnical Standardization)
When operating within their performance limitations, laser transceiver output meets the Class 1
accessible emission limit of all three standards. Class 1 levels of laser radiation are not considered
hazardous.
Laser Radiation and Connectors
When the connector is in place, all laser radiation remains within the fiber. The maximum amount of
radiant power exiting the fiber (under normal conditions) is –12.6 dBm or 55 x 10
-6
watts.
Removing the optical connector from the transceiver allows laser radiation to emit directly from the
optical port. The maximum radiance from the optical port (under worst case conditions) is 0.8 W cm
-2
or 8 x 10
3
W m
2
sr–1.
Do not use optical instruments to view the laser output. The use of optical instruments to view
laser output increases eye hazard. When viewing the output optical port, power must be removed
from the network adapter.
Cabletron Systems, Inc. Program License Agreement
vi Internet Appliance User Reference Manual
Cabletron Systems, Inc.
Program License Agreement
IMPORTANT: THIS LICENSE APPLIES FOR USE OF PRODUCT IN THE FOLLOWING
GEOGRAPHICAL REGIONS:
CANADA
MEXICO
CENTRAL AMERICA
SOUTH AMERICA
BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT, CAREFULLY READ THIS
LICENSE AGREEMENT.
This document is an agreement (“Agreement”) between You, the end user, and Cabletron Systems, Inc.
(“Cabletron”) that sets forth your rights and obligations with respect to the Cabletron software
program (“Program”) in the package. The Program may be contained in firmware, chips or other
media. UTILIZING THE ENCLOSED PRODUCT, YOU ARE AGREEING TO BECOME BOUND BY
THE TERMS OF THIS AGREEMENT, WHICH INCLUDES THE LICENSE AND THE LIMITATION
OF WARRANTY AND DISCLAIMER OF LIABILITY. IF YOU DO NOT AGREE TO THE TERMS OF
THIS AGREEMENT, RETURN THE UNOPENED PRODUCT TO CABLETRON OR YOUR DEALER,
IF ANY, WITHIN TEN (10) DAYS FOLLOWING THE DATE OF RECEIPT FOR A FULL REFUND.
IF YOU HAVE ANY QUESTIONS ABOUT THIS AGREEMENT, CONTACT CABLETRON SYSTEMS
(603) 332-9400. Attn: Legal Department.
1. LICENSE. You have the right to use only the one (1) copy of the Program provided in this
package subject to the terms and conditions of this License Agreement.
You may not copy, reproduce or transmit any part of the Program except as permitted by the
Copyright Act of the United States or as authorized in writing by Cabletron.
2. OTHER RESTRICTIONS. You may not reverse engineer, decompile, or disassemble the
Program.
3. APPLICABLE LAW. This License Agreement shall be interpreted and governed under the laws
and in the state and federal courts of New Hampshire. You accept the personal jurisdiction and
venue of the New Hampshire courts.
4. EXPORT REQUIREMENTS. You understand that Cabletron and its Affiliates are subject to
regulation by agencies of the U.S. Government, including the U.S. Department of Commerce,
which prohibit export or diversion of certain technical products to certain countries, unless a
license to export the product is obtained from the U.S. Government or an exception from obtaining
such license may be relied upon by the exporting party.
If the Program is exported from the United States pursuant to the License Exception CIV under the
U.S. Export Administration Regulations, You agree that You are a civil end user of the Program and
agree that You will use the Program for civil end uses only and not for military purposes.
If the Program is exported from the United States pursuant to the License Exception TSR under the
U.S. Export Administration Regulations, in addition to the restriction on transfer set forth in
Cabletron Systems, Inc. Program License Agreement
Internet Appliance User Reference Manual vii
Sections 1 or 2 of this Agreement, You agree not to (i) reexport or release the Program, the source
code for the Program or technology to a national of a country in Country Groups D:1 or E:2
(Albania, Armenia, Azerbaijan, Belarus, Bulgaria, Cambodia, Cuba, Estonia, Georgia, Iraq,
Kazakhstan, Kyrgyzstan, Laos, Latvia, Libya, Lithuania, Moldova, North Korea, the People’s
Republic of China, Romania, Russia, Rwanda, Tajikistan, Turkmenistan, Ukraine, Uzbekistan,
Vietnam, or such other countries as may be designated by the United States Government), (ii)
export to Country Groups D:1 or E:2 (as defined herein) the direct product of the Program or the
technology, if such foreign produced direct product is subject to national security controls as
identified on the U.S. Commerce Control List, or (iii) if the direct product of the technology is a
complete plant o r any major component of a plant, export to Country Groups D:1 or E:2 the direct
product of the plant or a major component thereof, if such foreign produced direct product is
subject to national security controls as identified on the U.S. Commerce Control List or is subject to
State Department controls under the U.S. Munitions List.
5. UNITED STATES GOVERNMENT RESTRICTED RIGHTS. The enclosed Product (i) was
developed solely at private expense; (ii) contains “restricted computer software” submitted with
restricted rights in accordance with section 52.227-19 (a) through (d) of the Commercial Computer
Software-Restricted Rights Clause and its successors, and (iii) in all respects is proprietary data
belonging to Cabletron and/or its suppliers. For Department of Defense units, the Product is
considered commercial computer software in accordance with DFARS section 227.7202-3 and its
successors, and use, duplication, or disclosure by the Government is subject to restrictions set
forth herein.
6. EXCLUSION OF WARRANTY. Except as may be specifically provided by Cabletron in writing,
Cabletron makes no warranty, expressed or implied, concerning the Program (including its
documentation and media).
CABLETRON DISCLAIMS ALL WARRANTIES, OTHER THAN THOSE SUPPLIED TO YOU BY
CABLETRON IN WRITING, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED
TO IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE, WITH RESPECT TO THE PROGRAM, THE ACCOMPANYING WRITTEN
MATERIALS, AND ANY ACCOMPANYING HARDWARE.
7. NO LIABILITY FOR CONSEQUENTIAL DAMAGES. IN NO EVENT SHALL CABLETRON OR
ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT
LIMITATION, DAMAGES FOR LOSS OF BUSINESS, PROFITS, BUSINESS INTERRUPTION,
LOSS OF BUSINESS INFORMATION, SPECIAL, INCIDENTAL, CONSEQUENTIAL, OR
RELIANCE DAMAGES, OR OTHER LOSS) ARISING OUT OF THE USE OR INABILITY TO USE
THIS CABLETRON PRODUCT, EVEN IF CABLETRON HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. BECAUSE SOME STATES DO NOT ALLOW THE
EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL
DAMAGES, OR IN THE DURATION OR LIMITATION OF IMPLIED WARRANTIES IN SOME
INSTANCES, THE ABOVE LIMITATION AND EXCLUSIONS MAY NOT APPLY TO YOU.
Cabletron Systems Sales and Service, Inc. Program License Agreement
viii Internet Appliance User Reference Manual
Cabletron Systems Sales and Service, Inc.
Program License Agreement
IMPORTANT: THIS LICENSE APPLIES FOR USE OF PRODUCT IN THE UNITED STATES OF
AMERICA AND BY UNITED STATES OF AMERICA GOVERNMENT END USERS.
BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT, CAREFULLY READ THIS
LICENSE AGREEMENT.
This document is an agreement (“Agreement”) between You, the end user, and Cabletron Systems
Sales and Service, Inc. (“Cabletron”) that sets forth your rights and obligations with respect to the
Cabletron software program (“Program”) in the package. The Program may be contained in firmware,
chips or other media. UTILIZING THE ENCLOSED PRODUCT, YOU ARE AGREEING TO BECOME
BOUND BY THE TERMS OF THIS AGREEMENT, WHICH INCLUDES THE LICENSE AND THE
LIMITATION OF WARRANTY AND DISCLAIMER OF LIABILITY. IF YOU DO NOT AGREE TO THE
TERMS OF THIS AGREEMENT, RETURN THE UNOPENED PRODUCT TO CABLETRON OR YOUR
DEALER, IF ANY, WITHIN TEN (10) DAYS FOLLOWING THE DATE OF RECEIPT FOR A FULL
REFUND.
IF YOU HAVE ANY QUESTIONS ABOUT THIS AGREEMENT, CONTACT CABLETRON SYSTEMS
(603) 332-9400. Attn: Legal Department.
1. LICENSE. You have the right to use only the one (1) copy of the Program provided in this
package subject to the terms and conditions of this License Agreement.
You may not copy, reproduce or transmit any part of the Program except as permitted by the
Copyright Act of the United States or as authorized in writing by Cabletron.
2. OTHER RESTRICTIONS. You may not reverse engineer, decompile, or disassemble the
Program.
3. APPLICABLE LAW. This License Agreement shall be interpreted and governed under the laws
and in the state and federal courts of New Hampshire. You accept the personal jurisdiction and
venue of the New Hampshire courts.
4. EXPORT REQUIREMENTS. You understand that Cabletron and its Affiliates are subject to
regulation by agencies of the U.S. Government, including the U.S. Department of Commerce,
which prohibit export or diversion of certain technical products to certain countries, unless a
license to export the product is obtained from the U.S. Government or an exception from obtaining
such license may be relied upon by the exporting party.
If the Program is exported from the United States pursuant to the License Exception CIV under the
U.S. Export Administration Regulations, You agree that You are a civil end user of the Program and
agree that You will use the Program for civil end uses only and not for military purposes.
If the Program is exported from the United States pursuant to the License Exception TSR under the
U.S. Export Administration Regulations, in addition to the restriction on transfer set forth in
Sections 1 or 2 of this Agreement, You agree not to (i) reexport or release the Program, the source
code for the Program or technology to a national of a country in Country Groups D:1 or E:2
(Albania, Armenia, Azerbaijan, Belarus, Bulgaria, Cambodia, Cuba, Estonia, Georgia, Iraq,
Kazakhstan, Kyrgyzstan, Laos, Latvia, Libya, Lithuania, Moldova, North Korea, the People’s
Cabletron Systems Sales and Service, Inc. Program License Agreement
Internet Appliance User Reference Manual ix
Republic of China, Romania, Russia, Rwanda, Tajikistan, Turkmenistan, Ukraine, Uzbekistan,
Vietnam, or such other countries as may be designated by the United States Government), (ii)
export to Country Groups D:1 or E:2 (as defined herein) the direct product of the Program or the
technology, if such foreign produced direct product is subject to national security controls as
identified on the U.S. Commerce Control List, or (iii) if the direct product of the technology is a
complete plant o r any major component of a plant, export to Country Groups D:1 or E:2 the direct
product of the plant or a major component thereof, if such foreign produced direct product is
subject to national security controls as identified on the U.S. Commerce Control List or is subject to
State Department controls under the U.S. Munitions List.
5. UNITED STATES GOVERNMENT RESTRICTED RIGHTS. The enclosed Product (i) was
developed solely at private expense; (ii) contains “restricted computer software” submitted with
restricted rights in accordance with section 52.227-19 (a) through (d) of the Commercial Computer
Software-Restricted Rights Clause and its successors, and (iii) in all respects is proprietary data
belonging to Cabletron and/or its suppliers. For Department of Defense units, the Product is
considered commercial computer software in accordance with DFARS section 227.7202-3 and its
successors, and use, duplication, or disclosure by the Government is subject to restrictions set
forth herein.
6. EXCLUSION OF WARRANTY. Except as may be specifically provided by Cabletron in writing,
Cabletron makes no warranty, expressed or implied, concerning the Program (including its
documentation and media).
CABLETRON DISCLAIMS ALL WARRANTIES, OTHER THAN THOSE SUPPLIED TO YOU BY
CABLETRON IN WRITING, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED
TO IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE, WITH RESPECT TO THE PROGRAM, THE ACCOMPANYING WRITTEN
MATERIALS, AND ANY ACCOMPANYING HARDWARE.
7. NO LIABILITY FOR CONSEQUENTIAL DAMAGES. IN NO EVENT SHALL CABLETRON
OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING,
WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS, PROFITS, BUSINESS
INTERRUPTION, LOSS OF BUSINESS INFORMATION, SPECIAL, INCIDENTAL,
CONSEQUENTIAL, OR RELIANCE DAMAGES, OR OTHER LOSS) ARISING OUT OF THE USE
OR INABILITY TO USE THIS CABLETRON PRODUCT, EVEN IF CABLETRON HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. BECAUSE SOME STATES DO NOT
ALLOW THE EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR
INCIDENTAL DAMAGES, OR IN THE DURATION OR LIMITATION OF IMPLIED
WARRANTIES IN SOME INSTANCES, THE ABOVE LIMITATION AND EXCLUSIONS MAY
NOT APPLY TO YOU.
Cabletron Systems Limited Program License Agreement
x Internet Appliance User Reference Manual
Cabletron Systems Limited
Program License Agreement
IMPORTANT: THIS LICENSE APPLIES FOR THE USE OF THE PRODUCT IN THE FOLLOWING
GEOGRAPHICAL REGIONS:
EUROPE
MIDDLE EAST
AFRICA
ASIA
AUSTRALIA
PACIFIC RIM
BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT, CAREFULLY READ THIS
LICENSE AGREEMENT.
This document is an agreement (“Agreement”) between You, the end user, and Cabletron Systems
Limited (“Cabletron”) that sets forth your rights and obligations with respect to the Cabletron
software program (“Program”) in the package. The Program may be contained in firmware, chips or
other media. UTILIZING THE ENCLOSED PRODUCT, YOU ARE AGREEING TO BECOME BOUND
BY THE TERMS OF THIS AGREEMENT, WHICH INCLUDES THE LICENSE AND THE
LIMITATION OF WARRANTY AND DISCLAIMER OF LIABILITY. IF YOU DO NOT AGREE TO THE
TERMS OF THIS AGREEMENT, RETURN THE UNOPENED PRODUCT TO CABLETRON OR YOUR
DEALER, IF ANY, WITHIN TEN (10) DAYS FOLLOWING THE DATE OF RECEIPT FOR A FULL
REFUND.
IF YOU HAVE ANY QUESTIONS ABOUT THIS AGREEMENT, CONTACT CABLETRON SYSTEMS
(603) 332-9400. Attn: Legal Department.
1. LICENSE. You have the right to use only the one (1) copy of the Program provided in this
package subject to the terms and conditions of this License Agreement.
You may not copy, reproduce or transmit any part of the Program except as permitted by the
Copyright Act of the United States or as authorized in writing by Cabletron.
2. OTHER RESTRICTIONS. You may not reverse engineer, decompile, or disassemble the
Program.
3. APPLICABLE LAW. This License Agreement shall be governed in accordance with English law.
The English courts shall have exclusive jurisdiction in the event of any disputes.
4. EXPORT REQUIREMENTS. You understand that Cabletron and its Affiliates are subject to
regulation by agencies of the U.S. Government, including the U.S. Department of Commerce,
which prohibit export or diversion of certain technical products to certain countries, unless a
license to export the product is obtained from the U.S. Government or an exception from obtaining
such license may be relied upon by the exporting party.
If the Program is exported from the United States pursuant to the License Exception CIV under the
U.S. Export Administration Regulations, You agree that You are a civil end user of the Program and
agree that You will use the Program for civil end uses only and not for military purposes.
Cabletron Systems Limited Program License Agreement
Internet Appliance User Reference Manual xi
If the Program is exported from the United States pursuant to the License Exception TSR under the
U.S. Export Administration Regulations, in addition to the restriction on transfer set forth in
Sections 1 or 2 of this Agreement, You agree not to (i) reexport or release the Program, the source
code for the Program or technology to a national of a country in Country Groups D:1 or E:2
(Albania, Armenia, Azerbaijan, Belarus, Bulgaria, Cambodia, Cuba, Estonia, Georgia, Iraq,
Kazakhstan, Kyrgyzstan, Laos, Latvia, Libya, Lithuania, Moldova, North Korea, the People’s
Republic of China, Romania, Russia, Rwanda, Tajikistan, Turkmenistan, Ukraine, Uzbekistan,
Vietnam, or such other countries as may be designated by the United States Government), (ii)
export to Country Groups D:1 or E:2 (as defined herein) the direct product of the Program or the
technology, if such foreign produced direct product is subject to national security controls as
identified on the U.S. Commerce Control List, or (iii) if the direct product of the technology is a
complete plant o r any major component of a plant, export to Country Groups D:1 or E:2 the direct
product of the plant or a major component thereof, if such foreign produced direct product is
subject to national security controls as identified on the U.S. Commerce Control List or is subject to
State Department controls under the U.S. Munitions List.
5. UNITED STATES GOVERNMENT RESTRICTED RIGHTS. The enclosed Product (i) was
developed solely at private expense; (ii) contains “restricted computer software” submitted with
restricted rights in accordance with section 52.227-19 (a) through (d) of the Commercial Computer
Software-Restricted Rights Clause and its successors, and (iii) in all respects is proprietary data
belonging to Cabletron and/or its suppliers. For Department of Defense units, the Product is
considered commercial computer software in accordance with DFARS section 227.7202-3 and its
successors, and use, duplication, or disclosure by the Government is subject to restrictions set
forth herein.
6. EXCLUSION OF WARRANTY. Except as may be specifically provided by Cabletron in writing,
Cabletron makes no warranty, expressed or implied, concerning the Program (including its
documentation and media).
CABLETRON DISCLAIMS ALL WARRANTIES, OTHER THAN THOSE SUPPLIED TO YOU BY
CABLETRON IN WRITING, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED
TO IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE, WITH RESPECT TO THE PROGRAM, THE ACCOMPANYING WRITTEN
MATERIALS, AND ANY ACCOMPANYING HARDWARE.
7. NO LIABILITY FOR CONSEQUENTIAL DAMAGES. IN NO EVENT SHALL CABLETRON OR
ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT
LIMITATION, DAMAGES FOR LOSS OF BUSINESS, PROFITS, BUSINESS INTERRUPTION,
LOSS OF BUSINESS INFORMATION, SPECIAL, INCIDENTAL, CONSEQUENTIAL, OR
RELIANCE DAMAGES, OR OTHER LOSS) ARISING OUT OF THE USE OR INABILITY TO USE
THIS CABLETRON PRODUCT, EVEN IF CABLETRON HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. BECAUSE SOME STATES DO NOT ALLOW THE
EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL
DAMAGES, OR IN THE DURATION OR LIMITATION OF IMPLIED WARRANTIES IN SOME
INSTANCES, THE ABOVE LIMITATION AND EXCLUSIONS MAY NOT APPLY TO YOU.
Declaration of Conformity Addendum
xii Internet Appliance User Reference Manual
Declaration of Conformity
Addendum
Application of Council Directive(s) 89/336/EEC
73/23/EEC
Manufacturers Name Cabletron Systems, Inc.
Manufacturers Address 35 Industrial Way
PO Box 5005
Rochester, NH 03867
European Representative’s Name Mr. J. Solari
European Representative’s Address Cabletron Systems Limited
Nexus House, Newbury
Business Park
London Road, Newbury
Berkshire RG13 2PZ, England
Conformance to Directive(s)/Product
Standards
EC Directive 89/336/EEC
EC Directive 73/23/EEC
EN 55022
EN 50082-1
EN 60950
Equipment Type/Environment Networking equipment for use in a commercial
or light-industrial environment
We the undersigned, hereby declare, under our sole responsibility, that the equipment packaged
with this notice conforms to the above directives.
Manufacturer Legal Representative in Europe
Mr. Ronald Fotino
Full Name
Mr. J. Solari
Full Name
Principal Compliance Engineer
Title
Managing Director, E.M.E.A.
Title
Rochester, NH, USA
Location
Newbury, Berkshire, England
Location
Internet Appliance User Reference Manual xiii
Contents
Preface.................................................................................................. xxiii
About This Manual............................................................................................................xxiii
Who Should Read This Manual? .....................................................................................xxiii
Related Documentation.....................................................................................................xxiii
Chapter 1: Introduction.......................................................................... 25
Reviewing Configuration Files ............................................................................................25
Using the Command Line Interface ....................................................................................26
Command Modes............................................................................................................26
User Mode.................................................................................................................26
Enable Mode.............................................................................................................27
Configure Mode.......................................................................................................27
Boot PROM Mode....................................................................................................27
Getting Help with CLI Commands..............................................................................28
Line Editing Commands................................................................................................29
Displaying and Changing Configuration Information.....................................................31
Identifying Ports on the IA-1100 and IA-1200 ...................................................................33
Chapter 2: Bridging Configuration Guide............................................. 35
Bridging Overview.................................................................................................................35
Spanning Tree (IEEE 802.1d).........................................................................................35
Bridging Modes (Flow-Based and Address-Based)...................................................36
VLAN Overview ....................................................................................................................36
Port-Based VLANs..........................................................................................................37
MAC Address-Based VLANs........................................................................................37
Protocol-Based VLANs ..................................................................................................37
Subnet-Based VLANs.....................................................................................................38
Policy-Based VLANs ......................................................................................................38
IA VLAN Support..................................................................................................................38
VLANs and the IA ..........................................................................................................38
Ports, VLANs, and Layer-3 Interfaces .........................................................................39
Access Ports and Trunk Ports (802.1Q Support)........................................................39
Explicit and Implicit VLANs.........................................................................................40
Contents
xiv Internet Appliance User Reference Manual
Configuring IA Bridging Functions.................................................................................... 40
Configuring Address-Based or Flow-Based Bridging .............................................. 40
Configuring Spanning Tree.......................................................................................... 42
Adjusting Spanning-Tree Parameters......................................................................... 42
Setting the Bridge Priority ..................................................................................... 43
Setting a Port Priority............................................................................................. 43
Assigning Port Costs .............................................................................................. 43
Adjusting Bridge Protocol Data Unit (BPDU) Intervals.................................... 44
Adjusting the Interval between Hello Times............................................... 44
Defining the Forward Delay Interval............................................................ 44
Defining the Maximum Age .......................................................................... 45
Configuring a Port- or Protocol-Based VLAN........................................................... 45
Creating a Port- or Protocol-Based VLAN .......................................................... 45
Adding Ports to a VLAN ....................................................................................... 45
Configuring VLAN Trunk Ports.................................................................................. 46
Configuring VLANs for Bridging................................................................................ 46
Monitoring Bridging.............................................................................................................46
Configuration Examples....................................................................................................... 47
Creating an IP VLAN .................................................................................................... 47
Creating a Non-IP VLAN.............................................................................................. 47
Chapter 3: SmartTRUNK Configuration Guide...................................... 49
Overview ................................................................................................................................ 49
Configuring SmartTRUNKs ................................................................................................ 50
Creating a SmartTRUNK .............................................................................................. 50
Add Physical Ports to the SmartTRUNK.................................................................... 51
Specify Traffic Distribution Policy (Optional) ........................................................... 51
Monitoring SmartTRUNKs.................................................................................................. 52
Example Configurations....................................................................................................... 53
Chapter 4: IP Routing Configuration Guide .......................................... 55
IP Routing Overview ............................................................................................................ 55
IP Routing Protocols ...................................................................................................... 56
Configuring IP Interfaces and Parameters ........................................................................ 56
Configuring IP Addresses to Ports.............................................................................. 56
Configuring IP Interfaces for a VLAN ........................................................................ 57
Specifying Ethernet Encapsulation Method............................................................... 57
Configuring Address Resolution Protocol (ARP) ..................................................... 57
Configuring ARP Cache Entries ........................................................................... 58
Configuring Proxy ARP......................................................................................... 58
Configuring DNS Parameters ...................................................................................... 58
Configuring IP Services (ICMP)................................................................................... 59
Configuring IP Helper................................................................................................... 59
Configuring Direct Broadcast....................................................................................... 60
Configuring Denial of Service (DOS).......................................................................... 60
Monitoring IP Parameters............................................................................................. 61
Configuration Examples....................................................................................................... 61
Assigning IP Interfaces.................................................................................................. 61
Internet Appliance User Reference Manual xv
Contents
Chapter 5: VRRP Configuration Guide................................................... 63
VRRP Overview .....................................................................................................................63
Configuring VRRP .................................................................................................................64
Basic VRRP Configuration.............................................................................................64
Configuration of Router R1....................................................................................65
Configuration for Router R2 ..................................................................................65
Symmetrical Configuration...........................................................................................65
Configuration of Router R1....................................................................................67
Configuration of Router R2....................................................................................67
Multi-Backup Configuration.........................................................................................68
Configuration of Router R1....................................................................................69
Configuration of Router R2....................................................................................70
Configuration of Router R3....................................................................................71
Additional Configuration..............................................................................................72
Setting the Backup Priority ....................................................................................72
Setting the Advertisement Interval.......................................................................72
Setting Pre-empt Mode ...........................................................................................73
Setting an Authentication Key...............................................................................73
Monitoring VRRP...................................................................................................................74
ip-redundancy trace........................................................................................................74
ip-redundancy show.......................................................................................................74
VRRP Configuration Notes...................................................................................................75
Chapter 6: RIP Configuration Guide ...................................................... 77
RIP Overview..........................................................................................................................77
Configuring RIP .....................................................................................................................78
Enabling and Disabling RIP ..........................................................................................78
Configuring RIP Interfaces............................................................................................78
Configuring RIP Parameters .........................................................................................79
Configuring RIP Route Preference...............................................................................80
Configuring RIP Route Default-Metric........................................................................80
Monitoring RIP.......................................................................................................................81
Configuration Example.........................................................................................................82
Chapter 7: OSPF Configuration Guide................................................... 83
OSPF Overview ......................................................................................................................83
OSPF Multipath...............................................................................................................84
Configuring OSPF..................................................................................................................84
Enabling OSPF.................................................................................................................84
Configuring OSPF Interface Parameters .....................................................................85
Configuring an OSPF Area............................................................................................86
Configuring OSPF Area Parameters ............................................................................87
Creating Virtual Links....................................................................................................88
Configuring Autonomous System External (ASE) Link Advertisements ..............88
Configuring OSPF over Non-Broadcast Multiple Access.........................................89
Monitoring OSPF....................................................................................................................89
OSPF Configuration Examples.............................................................................................90
Exporting All Interface and Static Routes to OSPF....................................................91
Exporting All RIP, Interface, and Static Routes to OSPF ..........................................92
Contents
xvi Internet Appliance User Reference Manual
Chapter 8: BGP Configuration Guide ..................................................... 97
BGP Overview ....................................................................................................................... 97
The Internet Appliance (IA) BGP Implementation ................................................... 98
Basic BGP Tasks..................................................................................................................... 98
Setting the Autonomous System Number.................................................................. 99
Setting the Router ID ..................................................................................................... 99
Configuring a BGP Peer Group.................................................................................. 100
Adding and Removing a BGP Peer........................................................................... 101
Starting BGP.................................................................................................................. 101
Using AS-Path Regular Expressions ......................................................................... 102
AS-Path Regular Expression Examples ............................................................. 103
Using the AS Path Prepend Feature.......................................................................... 104
Notes on Using the AS Path Prepend Feature.................................................. 104
BGP Configuration Examples............................................................................................ 105
BGP Peering Session Example.................................................................................... 105
IBGP Configuration Example..................................................................................... 107
IBGP Routing Group Example............................................................................ 108
IBGP Internal Group Example............................................................................ 111
EBGP Multihop Configuration Example.................................................................. 114
Community Attribute Example ................................................................................. 117
Notes on Using Communities............................................................................. 124
Local_Pref Attribute Example.................................................................................... 124
Notes on Using the Local_Pref Attribute .......................................................... 126
Multi-Exit Discriminator Attribute Example ........................................................... 126
EBGP Aggregation Example....................................................................................... 128
Route Reflection Example........................................................................................... 129
Notes on Using Route Reflection........................................................................ 132
Chapter 9: Routing Policy Configuration Guide.................................. 133
Route Import and Export Policy Overview..................................................................... 133
Preference......................................................................................................................134
Import Policies.............................................................................................................. 135
Import-Source........................................................................................................ 135
Route-Filter ............................................................................................................ 136
Export Policies .............................................................................................................. 136
Export-Destination................................................................................................ 136
Export-Source ........................................................................................................ 137
Route-Filter ............................................................................................................ 137
Specifying a Route Filter ............................................................................................. 138
Aggregates and Generates.......................................................................................... 139
Aggregate-Destination ......................................................................................... 139
Aggregate-Source.................................................................................................. 139
Route-Filter ............................................................................................................ 140
Authentication.............................................................................................................. 140
Authentication Methods...................................................................................... 141
Authentication Keys and Key Management..................................................... 141
Internet Appliance User Reference Manual xvii
Contents
Configuring Simple Routing Policies................................................................................142
Redistributing Static Routes........................................................................................142
Redistributing Directly Attached Networks.............................................................143
Redistributing RIP into RIP.........................................................................................143
Redistributing RIP into OSPF......................................................................................143
Redistributing OSPF to RIP .........................................................................................144
Redistributing Aggregate Routes ...............................................................................144
Simple Route Redistribution Examples.....................................................................144
Example 1: Redistribution into RIP.....................................................................144
Exporting a Given Static Route to All RIP Interfaces................................146
Exporting All Static Routes to All RIP Interfaces.......................................146
Exporting All Static Routes Except the Default Route to All RIP
Interfaces...................................................................................................146
Example 2: Redistribution into OSPF .................................................................146
Exporting All Interface & Static Routes to OSPF .......................................147
Exporting All RIP, Interface & Static Routes to OSPF...............................148
Configuring Advanced Routing Policies..........................................................................148
Export Policies...............................................................................................................149
Creating an Export Destination ..................................................................................150
Creating an Export Source...........................................................................................150
Import Policies...............................................................................................................150
Creating an Import Source ..........................................................................................151
Creating a Route Filter .................................................................................................151
Creating an Aggregate Route......................................................................................152
Creating an Aggregate Destination............................................................................153
Creating an Aggregate Source ....................................................................................153
Examples of Import Policies........................................................................................153
Example 1: Importing from RIP...........................................................................153
Importing a Selected Subset of Routes from One RIP Trusted
Gateway....................................................................................................155
Importing a Selected Subset of Routes from All RIP Peers
Accessible Over a Certain Interface......................................................156
Example 2: Importing from OSPF .......................................................................157
Importing a Selected Subset of OSPF-ASE Routes ....................................159
Examples of Export Policies ........................................................................................160
Example 1: Exporting to RIP................................................................................160
Exporting a Given Static Route to All RIP Interfaces................................161
Exporting a Given Static Route to a Specific RIP Interface ......................162
Exporting All Static Routes Reachable Over a Given Interface to a
Specific RIP-Interface..............................................................................163
Exporting Aggregate-Routes into RIP.........................................................164
Example 2: Exporting to OSPF.............................................................................165
Exporting All Interface & Static Routes to OSPF .......................................166
Exporting All RIP, Interface & Static Routes to OSPF...............................167
Contents
xviii Internet Appliance User Reference Manual
Chapter 10: IP Policy-Based Forwarding Configuration Guide .......... 171
Overview .............................................................................................................................. 171
Configuring IP Policies....................................................................................................... 172
Defining an ACL Profile.............................................................................................. 172
Associating the Profile with an IP Policy.................................................................. 173
Creating Multi-statement IP Policies ................................................................. 173
Setting Load Distribution for Next-Hop Gateways......................................... 174
Setting the IP Policy Action................................................................................. 174
Checking the Availability of Next-Hop Gateways .......................................... 175
Applying an IP Policy to an Interface ....................................................................... 176
Applying an IP Policy to Locally Generated Packets ...................................... 176
IP Policy Configuration Examples.................................................................................... 176
Routing Traffic to Different ISPs................................................................................ 176
Prioritizing Service to Customers.............................................................................. 178
Authenticating Users through a Firewall ................................................................. 179
Firewall Load Balancing.............................................................................................. 180
Monitoring IP Policies ........................................................................................................ 181
Chapter 11: Network Address Translation Configuration Guide ...... 185
Overview .............................................................................................................................. 185
Configuring NAT ................................................................................................................ 186
Setting Inside and Outside Interfaces ....................................................................... 186
Setting NAT Rules........................................................................................................ 187
Static........................................................................................................................ 187
Dynamic ................................................................................................................. 187
Managing Dynamic Bindings............................................................................................ 187
NAT and FTP....................................................................................................................... 188
Monitoring NAT..................................................................................................................188
Configuration Examples..................................................................................................... 189
Static Configuration ..................................................................................................... 189
Using Static NAT .................................................................................................. 190
Dynamic Configuration............................................................................................... 190
Using Dynamic NAT............................................................................................ 191
Dynamic NAT with IP Overload (PAT) Configuration ......................................... 192
Using Dynamic NAT with IP Overload ............................................................ 193
Dynamic NAT with Outside Interface Redundancy .............................................. 193
Using Dynamic NAT with Matching Interface Redundancy......................... 194
Chapter 12: Web Hosting Configuration Guide.................................. 195
Overview .............................................................................................................................. 195
Load Balancing .................................................................................................................... 196
Configuring Load Balancing ...................................................................................... 196
Creating the Server Group................................................................................... 196
Adding Servers to the Load Balancing Group.................................................. 197
Optional Group or Server Operating Parameters ................................................... 197
Specifying Load Balancing Policy ...................................................................... 197
Specifying a Connection Threshold ................................................................... 198
Verifying Servers and Applications................................................................... 198
Verifying Extended Content................................................................................ 199
Internet Appliance User Reference Manual xix
Contents
Setting Server Status.....................................................................................................200
Load Balancing and FTP ..............................................................................................201
Allowing Access to Load Balancing Servers.............................................................201
Setting Timeouts for Load Balancing Mappings......................................................201
Specifying the VPN Port Number ..............................................................................202
Displaying Load Balancing Information ...................................................................202
Configuration Examples ..............................................................................................203
Web Hosting with One Virtual Group and Multiple Destination Servers....203
Web Hosting with Multiple Virtual Groups and Multiple Destination
Servers..............................................................................................................204
Virtual IP Address Ranges ...................................................................................205
Web Caching.........................................................................................................................206
Configuring Web Caching...........................................................................................207
Creating the Cache Group....................................................................................207
Specifying the Client(s) for the Cache Group (Optional).................................207
Redirecting HTTP Traffic on an Interface ..........................................................208
Configuration Example................................................................................................208
Other Configurations ...................................................................................................209
Bypassing Cache Servers ......................................................................................209
Proxy Server Redundancy....................................................................................209
Distributing Frequently-Accessed Sites Across Cache Servers.......................210
Monitoring Web Caching ............................................................................................210
Chapter 13: Access Control List Configuration Guide ........................ 211
ACL Basics ............................................................................................................................212
Defining Selection Criteria in ACL Rules..................................................................212
How ACL Rules are Evaluated...................................................................................213
Implicit Deny Rule........................................................................................................214
Allowing External Responses to Established TCP Connections............................215
Creating and Modifying ACLs...........................................................................................216
Editing ACLs Offline....................................................................................................216
Maintaining ACLs Using the ACL Editor.................................................................217
Using ACLs...........................................................................................................................218
Applying ACLs to Interfaces.......................................................................................218
Applying ACLs to Services .........................................................................................219
Using ACLs as Profiles.................................................................................................219
Using Profile ACLs with the IP Policy Facility .................................................220
Using Profile ACLs with the Traffic Rate Limiting Facility ............................221
Using Profile ACLs with Dynamic NAT............................................................222
Using Profile ACLs with the Port Mirroring Facility .......................................222
Using Profile ACLs with the Web Caching Facility .........................................223
Redirecting HTTP Traffic to Cache Servers................................................223
Preventing Web Objects From Being Cached.............................................224
Enabling ACL Logging........................................................................................................225
Monitoring ACLs .................................................................................................................225
Contents
xx Internet Appliance User Reference Manual
Chapter 14: Security Configuration Guide .......................................... 227
Security Overview...............................................................................................................227
Configuring IA Access Security ........................................................................................ 228
Configuring RADIUS .................................................................................................. 228
Monitoring RADIUS............................................................................................. 229
Configuring TACACS ................................................................................................. 229
Monitoring TACACS............................................................................................ 229
Configuring TACACS Plus......................................................................................... 230
Monitoring TACACS Plus................................................................................... 231
Configuring Passwords............................................................................................... 231
Chapter 15: QoS Configuration Guide................................................. 233
QoS & Layer-2, -3, and -4 Flow Overview....................................................................... 233
Layer-2, -3, and -4 Flow Specification ....................................................................... 234
Precedence for Layer-3 Flows .................................................................................... 234
IA Queuing Policies ..................................................................................................... 235
Traffic Prioritization for Layer-2 Flows............................................................................ 235
Configuring Layer-2 QoS............................................................................................ 236
Traffic Prioritization for Layer-3 and -4 Flows ............................................................... 236
Configuring IP QoS Policies ....................................................................................... 236
Setting an IP QoS Policy....................................................................................... 237
Specifying Precedence for an IP QoS Policy ..................................................... 237
Configuring IA Queueing Policy ...................................................................................... 237
Allocating Bandwidth for a Weighted-Fair Queuing Policy ................................. 238
ToS Rewrite .......................................................................................................................... 238
Configuring ToS Rewrite for IP Packets................................................................... 239
Monitoring QoS................................................................................................................... 241
Limiting Traffic Rate...........................................................................................................241
Example Configuration............................................................................................... 242
Displaying Rate Limit Information ........................................................................... 242
Chapter 16: Performance Monitoring Guide....................................... 243
Performance Monitoring Overview ................................................................................. 243
Configuring the IA for Port Mirroring............................................................................. 245
Monitoring Broadcast Traffic............................................................................................. 245
Chapter 17: RMON Configuration Guide............................................. 247
RMON Overview ................................................................................................................ 247
Configuring and Enabling RMON.................................................................................... 248
Example of RMON Configuration Commands ....................................................... 248
RMON Groups ............................................................................................................. 249
Lite RMON Groups .............................................................................................. 250
Standard RMON Groups..................................................................................... 250
Professional RMON Groups................................................................................ 250
Control Tables............................................................................................................... 251
Using RMON ....................................................................................................................... 252
/