3com CoreBuilder 3500 Implementation Manual

  • Hello! I am an AI chatbot trained to assist you with the 3com CoreBuilder 3500 Implementation Manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
®
http://www.3com.com/
CoreBuilder
®
3500
Implementation Guide
Release 3.0
Part No. 10013506
Published November 1999
3Com Corporation
5400 Bayfront Plaza
Santa Clara, California
95052-8145
Copyright © 1999, 3Com Corporation. All rights reserved. No part of this documentation may be reproduced
in any form or by any means or used to make any derivative work (such as translation, transformation, or
adaptation) without written permission from 3Com Corporation.
3Com Corporation reserves the right to revise this documentation and to make changes in content from time
to time without obligation on the part of 3Com Corporation to provide notification of such revision or change.
3Com Corporation provides this documentation without warranty, term, or condition of any kind, either
implied or expressed, including, but not limited to, the implied warranties, terms, or conditions of
merchantability, satisfactory quality, and fitness for a particular purpose. 3Com may make improvements or
changes in the product(s) and/or the program(s) described in this documentation at any time.
If there is any software on removable media described in this documentation, it is furnished under a license
agreement included with the product as a separate document, in the hardcopy documentation, or on the
removable media in a directory file named LICENSE.TXT or !LICENSE.TXT. If you are unable to locate a copy,
please contact 3Com and a copy will be provided to you.
UNITED STATES GOVERNMENT LEGEND
If you are a United States government agency, then this documentation and the software described herein are
provided to you subject to the following:
All technical data and computer software are commercial in nature and developed solely at private expense.
Software is delivered as “Commercial Computer Software” as defined in DFARS 252.227-7014 (June 1995) or
as a “commercial item” as defined in FAR 2.101(a) and as such is provided with only such rights as are
provided in 3Com’s standard commercial license for the Software. Technical data is provided with limited rights
only as provided in DFAR 252.227-7015 (Nov 1995) or FAR 52.227-14 (June 1987), whichever is applicable.
You agree not to remove or deface any portion of any legend provided on any licensed program or
documentation contained in, or delivered to you in conjunction with, this User Guide.
Unless otherwise indicated, 3Com registered trademarks are registered in the United States and may or may
not be registered in other countries.
3Com, the 3Com logo, CoreBuilder, DynamicAccess, NETBuilder II, PACE, SmartAgent, SuperStack, and
Transcend are registered trademarks of 3Com Corporation. 3Com Facts is a service mark of
3Com Corporation.
Postscript is a registered trademark of Adobe Systems, Inc. AppleTalk is a registered trademark of Apple
Computer, Incorporated. Banyan and VINES are registered trademarks of Banyan Worldwide. DEC, DECnet,
and PATHWORKS are registered trademarks of Compaq Computer Corporation. OpenView is a registered
trademark of Hewlett-Packard Company. AIX, IBM, and NetView are registered trademarks and NetBIOS is a
trademark of International Business Machines Corporation. Internet Explorer, Microsoft, MS-DOS, Windows,
and Windows NT are registered trademarks of Microsoft Corporation. Netscape, Netscape Navigator, and the
Netscape N and Ship’s Wheel logos are registered trademarks of Netscape Communications Corporation in the
United States and other countries. IPX, Novell, and NetWare are registered trademarks of Novell, Inc. Sun and
SunNet Manager are trademarks of Sun Microsystems, Inc. UNIX is a registered trademark in the United States
and other countries, licensed exclusively through X/Open Company, Ltd. Xerox and XNS are trademarks of
Xerox Corporation.
All other company and product names may be trademarks of the respective companies with which they are
associated.
Guide written by 3Com MSD Technical Publications, Marlborough, MA, USA.
We welcome your comments on this guide. Send e-mail to: sdtechpubs_comment[email protected]om
C
ONTENTS
A
BOUT
T
HIS
G
UIDE
Conventions 22
CoreBuilder 3500 Documentation 24
Paper Documents 24
Software and Documents on CD-ROM 26
Documentation Comments 26
Year 2000 Compliance 26
1
C
ONFIGURATION
O
VERVIEW
System Configuration Procedure 27
Procedure Summary 27
Configuration Procedure 28
2
M
ANAGEMENT
A
CCESS
Management Access Overview 31
Administration Console Overview 32
SNMP-Based Network Management Overview 34
Key Concepts 34
OSI Protocols 34
Protocols 35
Key Guidelines for Implementation 38
Access Methods 38
Administration Console Access 40
Password Levels 40
Terminal Port Access 41
Modem Port Access 41
Web Management Access 42
Browser Requirements 42
SNMP Access 43
3
S
YSTEM
P
ARAMETERS
System Parameters Overview 46
Features 46
Benefits 47
Key Concepts 47
Key Guidelines for Implementation 48
File Transfer 48
Implementing FTP 48
Implementing TFTP 49
Security 49
Security Options 50
Important Considerations 51
Software Update 52
Important Considerations 52
nvData Operations 53
Saving nvData 53
Restoring nvData 54
Resetting nvData 55
Viewing nvData 55
Simple Network Time Protocol (SNTP) 56
SNTP Overview 56
Implementing SNTP 57
Standards, Protocols, and Related Reading 57
4
P
HYSICAL
P
ORT
N
UMBERING
Port Numbering Overview 59
Numbering Rules 59
Supported Module Types 60
Key Guidelines for Implementation 61
Examples of Port Numbering 62
Example 1: Fully Loaded System 62
Example 2: Empty Slot in the System 63
Example 3: Gigabit Ethernet Module with Other Modules 64
Example 4: FDDI Module with Other Modules 65
Effects of Removing a Module 66
Port-Numbering Changes 66
VLAN Changes 66
Trunk Changes 67
Effects of Replacing Modules 68
Replacing Modules of the Same Type or Same Number of Ports 68
Replacing Modules of Different Types 68
5
E
THERNET
Ethernet Overview 72
Features 72
Benefits 73
Key Concepts 74
Ethernet Frame Processing 76
Key Guidelines for Implementation 78
Link Bandwidths 78
Trunks 78
Port Enable and Disable (Port State) 79
Important Considerations 79
Port Labels 79
Labeling Ports 79
Autonegotiation 80
Important Considerations 80
Port Mode 82
Important Considerations 82
Flow Control 83
Important Considerations 83
PACE Interactive Access 84
Important Considerations 84
Standards, Protocols, and Related Reading 84
Ethernet Protocols 84
Media Specifications 85
Related Reading 85
6
F
IBER
D
ISTRIBUTED
D
ATA
I
NTERFACE
(FDDI)
FDDI Overview 88
Features 88
Benefits 88
Key Concepts 89
Related Standards 89
FDDI Network Topologies 91
Nodes and Attachments 93
Dual Homing 97
FDDI Stations 97
Primary and Secondary Paths 99
Media Access Control 99
Ports 100
Key Guidelines for Implementation 101
FDDI Stations 102
Setting the Connection Policies 102
Setting Neighbor Notification Timer 104
Enabling and Disabling Status Reporting 104
FDDI Paths 104
Setting tvxLowerBound 104
Setting tmaxLowerBound 105
Setting maxT-Req 105
FDDI MACs 106
Setting the Frame Error Threshold 106
Setting the Not Copied Threshold 106
Enabling and Disabling LLC Service 107
FDDI Ports 107
Setting lerAlarm 107
Setting lerCutoff 108
Setting Port Labels 108
Station Mode (DAS and SAS) 109
Single Attachment Station (SAS) 109
Dual Attachment Stations 109
Sample FDDI Configurations 109
Standards, Protocols, and Related Reading 111
Requests For Comments (RFCs) 111
Standards Organizations 111
Related Reading 111
7
B
RIDGE
-W
IDE
AND
B
RIDGE
P
ORT
P
ARAMETERS
Bridging Overview 114
Benefits 114
Features 115
Key Bridging Concepts 116
Learning Addresses 116
Aging Addresses 116
Forwarding, Filtering, and Flooding Packets 116
Spanning Tree Protocol 117
How the Spanning Tree Protocol Works 119
CBPDUs at Work 119
How a Single Bridge Interprets CBPDUs 123
How Multiple Bridges Interpret CBPDUs 124
Spanning Tree Port States 129
Reconfiguring the Bridged Network Topology 131
Key Guidelines for Implementation 132
STP Bridge and Port Parameters 134
Administering Bridge-wide STP Parameters 134
Administering STP Parameters on Bridge Ports 136
Frame Processing 137
MAC Address Table 138
Aging Time 138
Address Threshold 138
Important Considerations 138
IP Fragmentation 139
IPX SNAP Translation 139
Broadcast and Multicast Limit for Bridge Ports 140
Important Considerations 140
GARP VLAN Registration Protocol (GVRP) 141
Important Considerations 141
Standards, Protocols, and Related Reading 142
8
T
RUNKING
Trunking Overview 144
Features 144
Benefits 144
Key Concepts 145
Port Numbering in a Trunk 145
Trunk Control Message Protocol (TCMP) 146
Key Guidelines for Implementation 147
General Guidelines 147
Trunk Capacity Guidelines 148
Defining Trunks 150
Important Considerations 150
Modifying Trunks 152
Important Considerations 152
Removing Trunks 153
Important Considerations 153
Standards, Protocols, and Related Reading 154
9
V
IRTUAL
LAN
S
VLAN Overview 156
Need for VLANs 156
Benefits 157
Features 158
Key Concepts 159
Related Standards and Protocols 159
VLAN IDs 160
Terminology 161
Key Guidelines for Implementation 163
Network-based VLANs vs. Multiple Interfaces per VLAN 163
VLANs Created by Router Port IP Interfaces 164
Number of VLANs 165
General Guidelines 167
VLAN allOpen or allClosed Mode 169
Important Considerations 169
Modifying the VLAN Mode 170
Mode Requirements 171
Ignore STP Mode 172
Important Considerations 172
VLAN Aware Mode 174
Port-based VLANs 175
The Default VLAN 175
Static Port-based VLANs 178
Dynamic Port-based VLANs Using GVRP 182
Protocol-based VLANs 186
Important Considerations 186
Selecting a Protocol Suite 187
Establishing Routing Between VLANs 189
Network-based IP VLANs 192
Important Considerations 192
Example of Network-based VLANs 193
Rules of VLAN Operation 195
Ingress Rules 195
Egress Rules 198
Examples of Flooding and Forwarding Decisions 200
Rules for Network-based (Layer 3) VLANs 202
Modifying and Removing VLANs 206
Monitoring VLAN Statistics 207
10
P
ACKET
F
ILTERING
Packet Filtering Overview 210
What Can You Filter? 210
When Is a Filter Applied?Paths 211
Path Assignment 212
Key Concepts 213
Standard Packet Filters 213
Custom Packet Filters 214
Important Considerations 215
Managing Packet Filters 215
Tools for Writing Filters 217
ASCII Text Editor 217
Built-in Line Editor 217
Web Management Filter Builder Tool 219
Downloading Custom Packet Filters 221
Download with
Filter Builder 221
Download an
ASCII File 222
The Packet Filtering Language 224
Principles for Writing a Custom Filter 224
How the Packet Filter Language Works 224
Procedure for Writing a Custom Filter 225
Packet Filter Opcodes 228
Implementing Sequential Tests in a Packet Filter 233
Common Syntax Errors 235
Custom Packet Filter Examples 237
Destination Address Filter 237
Source Address Filter 237
Length Filter 237
Type Filter 238
Ethernet Type IPX and Multicast Filter 238
Multiple Destination Address Filter 238
Source Address and Type Filter 239
Accept XNS or IP Filter 239
XNS Routing Filter 240
Port Group Filter 240
Limits to Filter Size 241
Using Port Groups in Custom Packet Filters 242
Port Group Packet Filter Example 242
Port Group Filter Operation 242
Port Group Management and Control Functions 245
Defining Port Groups 245
Long Custom Filter Example 247
Filtering Problem 247
Packet Filter Solution 247
Optimizing the Filter with Accept and Reject Commands 254
11
I
NTERNET
P
ROTOCOL
(IP)
Routing Overview 258
Routing in a Subnetted Environment 259
Integrating Bridging and Routing 260
IP Routing Overview 261
Features and Benefits 262
Key Concepts 263
Multiple IP Interfaces per VLAN 263
Media Access Control (MAC) Address 263
Network-Layer Address 264
IP Addresses 264
Variable Length Subnet Masks (VLSMs) 268
Router Interfaces 271
Routing Table 272
Routing Models: Port-based and VLAN-based 274
Role of VLANs in IP Routing 275
Port-based Routing 276
VLAN-based Routing 280
Key Guidelines for Implementing IP Routing 282
Configure Trunks (Optional) 282
Configure IP VLANs (VLAN-based Routing) 282
Establish Your IP Interfaces 283
Enable IP Routing 285
Administering IP Routing 285
Address Resolution Protocol (ARP) 286
Important Considerations 288
ARP Proxy 288
Important Considerations 288
Example 288
Internet Control Message Protocol (ICMP) 290
ICMP Redirect 292
Important Considerations 292
Example 293
ICMP Router Discovery 294
Important Considerations 294
Example 294
Broadcast Address 295
Important Considerations 295
Directed Broadcast 295
Important Considerations 295
Routing Information Protocol (RIP) 296
Basic RIP Parameters 296
RIP Mode 297
Compatibility Mode 297
Cost 297
Poison Reverse 298
Advertisement Address 298
Route Aggregation 299
RIP-1 Versus RIP-2 299
Important Considerations 300
Routing Policies 300
How Routing Policies Work 301
Important Considerations 303
Implementing RIP Routing Policies 303
Setting Up RIP Routing Policies 306
Creating RIP Routing Policies 307
Example 308
Domain Name System (DNS) 310
Important Considerations 310
User Datagram Protocol (UDP) Helper 311
Configuring Overlapped Interfaces 312
Important Considerations 313
Standards, Protocols, and Related Reading 313
Requests For Comments (RFCs) 313
Standards Organizations 314
Related Reading 314
12
V
IRTUAL
R
OUTER
R
EDUNDANCY
P
ROTOCOL
(VRRP)
VRRP Overview 316
Router to Router 316
Host to Host and Host to Gateway 316
Example 317
Key Concepts 318
How VRRP Works 319
Virtual Router Decision-making 320
Important Considerations 322
Implementing VRRP 323
Create VLANs 324
Configure IP Interfaces 324
Configure the Router Protocol 325
Enable Routing 325
Configure VRRP 325
Enable VRRP 326
VRRP and Other Networking Operations 326
Spanning Tree Protocol (STP) 327
Dynamic Routing Protocols (RIP, RIP-2, OSPF) 327
IGMP Queries 328
ICMP Redirect 329
Quality of Service 329
IP Routing Policies 329
Dynamic Host Configuration Protocol (DHCP) 329
Standards, Protocols, and Related Reading 329
13
IP M
ULTICAST
R
OUTING
IP Multicast Overview 332
Unicast Model 332
Broadcast Model 332
Multicast Model 332
Benefits of IP Multicast 333
How a Network Supports IP Multicast 334
IP Multicast Routing 334
IP Multicast Tunnels 335
IP Multicast Filtering 336
Internet Support for IP Multicast 337
Key Concepts 338
Traffic Movement 338
IP Multicast Groups 338
Source-Group Pairs 338
Multicast Addresses 339
How IGMP Supports IP Multicast 341
Electing the Querier 341
Host Messages 341
Role of IGMP in IP Multicast Filtering 342
How DVMRP Supports IP Multicast 343
Spanning Tree Delivery 343
Managing the Spanning Tree 344
DVMRP Interface Characteristics 346
Key Guidelines for Implementation 347
Configuration Procedure 347
Impact of Multicast Limits 348
Impact of IEEE 802.1Q on Multicasts 348
Protocol Interoperability 348
Configuring IGMP Options 349
Querying and Snooping Modes 349
Important Considerations 349
Configuring DVMRP Interfaces 349
Important Considerations 349
Configuring DVMRP Tunnels 350
Important Considerations 350
Configuring DVMRP Default Routes 352
How Default Routes Work 352
How to Configure A Default Route 352
Viewing the DVMRP Routing Table 353
Viewing the DVMRP Cache 353
Using IP Multicast Traceroute 354
Standards, Protocols, and Related Reading 355
14
O
PEN
S
HORTEST
P
ATH
F
IRST
(OSPF)
OSPF Overview 358
Features 358
Benefits 360
Key Concepts 363
Autonomous Systems 363
Areas 363
Neighbors and Adjacency 363
Router Types 364
Protocol Packets 365
How OSPF Routing Works 366
Key Guidelines for Implementing OSPF 369
Autonomous System Boundary Routers 370
Configuring an ASBR 370
Areas 372
Types of Areas 373
Area Border Routers 375
Routing Databases 375
Configuring Route Summarization in ABRs 376
Important Considerations 376
Default Route Metric 379
OSPF Interfaces 380
Mode 380
Priority 380
Area ID 381
Cost 381
Delay 382
Hello Interval 383
Retransmit Interval 383
Dead Interval 384
Password 384
Statistics 384
Important Considerations 385
Link State Databases 387
Router Link State Advertisements 387
Network Link State Advertisements 388
Summary Link State Advertisements 389
External Link State Advertisements 389
Important Considerations 391
Neighbors 392
Neighbor Information 392
Static Neighbors 395
Important Considerations 395
Router IDs 396
Important Considerations 396
OSPF Memory Partition 397
Default Memory Allocation 397
Running Out of Memory — Soft Restarts 398
Manual Memory Allocation 399
System Memory Allocation 399
Stub Default Metrics 400
Important Considerations 400
Virtual Links 401
Important Considerations 402
OSPF Routing Policies 403
Important Considerations 404
Implementing Import Policies 405
Implementing Export Policies 408
OSPF Statistics 416
Standards, Protocols, and Related Reading 417
15
IPX R
OUTING
IPX Routing Overview 419
Features 420
Benefits 420
Key Concepts 421
How IPX Routing Works 421
Terminology 426
Key Guidelines for Implementation 427
Procedural Guidelines 427
General Guidelines 427
IPX Interfaces 428
Important Considerations 428
Per-Interface Options 429
IPX Routes 430
Important Considerations 430
Primary and Secondary Routes 431
Static Routes 431
Dynamic Routes Using RIP 431
Routing Tables 432
Selecting the Best Route 433
IPX Servers 434
Important Considerations 434
Primary and Secondary Servers 435
Static Servers 435
Dynamic Servers Using SAP 435
Maintaining Server Information 435
Server Tables 436
IPX Forwarding 437
Important Considerations 437
IPX RIP Mode 438
Important Considerations 438
RIP Policies 439
IPX SAP Mode 441
Important Considerations 441
SAP Policies 441
IPX Statistics 443
Standards, Protocols, and Related Reading 444
16
A
PPLE
T
ALK
AppleTalk Overview 445
Features 446
Benefits 447
Key Concepts 448
AppleTalk Protocols 448
AppleTalk Network Elements 454
Terminology 455
Key Implementation Guidelines 457
AppleTalk Interfaces 458
Important Considerations 459
AppleTalk Routes 460
Important Considerations 460
AppleTalk Address Resolution Protocol (AARP) Cache 462
AppleTalk Zones 464
Important Considerations 465
Changing Zone Names 466
Forwarding AppleTalk Traffic 468
Enabling Forwarding 468
Disabling Forwarding 468
Important Considerations 468
Checksum Error Detection 469
Important Considerations 469
AppleTalk Echo Protocol (AEP) 469
AppleTalk Statistics 470
Datagram Delivery Protocol 470
Routing Table Maintenance Protocol 471
Zone Information Protocol 472
Name Binding Protocol 473
Standards, Protocols, and Related Reading 474
17
Q
O
S
AND
RSVP
QoS Overview 476
Features 476
Benefits 476
Methods of Using QoS 477
Key Concepts 478
Related Standards and Protocols 478
Terminology 479
Key Guidelines for Implementation 482
Procedural Guidelines 482
General Guidelines 482
QoS Classifiers 483
Important Considerations 483
Using Predefined Classifiers 483
Assigning Flow and Nonflow Classifier Numbers 484
Defining Flow Classifiers 485
Defining Nonflow Classifiers 488
QoS Controls 489
Important Considerations 489
Assigning Control Numbers 490
Specifying Rate Limits 492
Specifying Service Levels 493
Specifying TCP Drop Control 494
Setting the QoS Timer Control 495
Examples of Classifiers and Controls 497
Example 1: Traffic to and from a Specific Server 497
Example 2: Filtering Traffic to a Destination 499
Example 3: Using Two Classifiers to Filter Traffic 501
Example 4: Assigning High Priority to Specific Traffic 504
Example 5: Nonflow Multimedia Tagged Traffic 506
Example 6: Bridged Nonflow IP Unicast Traffic 508
Modifying and Removing Classifiers and Controls 510
Important Considerations 510
QoS Excess Tagging 511
Example of QoS Excess Tagging 511
Transmit Queues and QoS Bandwidth 513
LDAP 514
Important Considerations 514
Operation 515
RSVP 516
RSVP Terminology 517
Example of RSVP 518
Setting RSVP Parameters 520
18
D
EVICE
M
ONITORING
Device Monitoring Overview 522
Key Concepts and Tools 522
Administration Console 522
Web Management Tools 522
Network Management Platform 523
SmartAgent Embedded Software 523
Other Commonly Used Tools 523
Event Logging 524
Important Consideration 524
Displaying the Event Log Configuration 524
Configuring the Output Devices 524
Configuring the Services 524
Baselining 525
Important Considerations 525
Displaying the Current Baseline 525
Setting a Baseline 525
Enabling or Disabling Baselines 525
Roving Analysis 526
Key Guidelines for Implementation 527
Important Considerations 527
Ping 530
Important Consideration 530
Using Ping 530
Ping Responses 530
Strategies for Using ping 531
traceRoute 532
Using traceRoute 532
traceRoute Operation 532
SNMP 533
SNMP Overview 533
Setting Up SNMP on Your System 538
Remote Monitoring (RMON) 541
Overview of RMON 542
RMON Benefits 543
RMON in Your System 544
3Com Transcend RMON Agents 545
Important Considerations 546
RMON-1 Groups 547
RMON-2 Groups 552
Management Information Base (MIB) 556
MIB Files 556
Compiler Support 558
MIB Objects 559
MIB Tree 560
MIB-II 562
RMON-1 MIB 563
RMON-2 MIB 564
3Com Enterprise MIBs 565
A
T
ECHNICAL
S
UPPORT
Online Technical Services 567
World Wide Web Site 567
3Com Knowledgebase Web Services 567
3Com FTP Site 568
3Com Bulletin Board Service 568
3Com Facts Automated Fax Service 569
Support from Your Network Supplier 569
Support from 3Com 569
Returning Products for Repair 571
I
NDEX
/