Cabletron Systems SSR-HFX11-08, CoreWatch, SSR-ATM29-02, SSR-GLX19-02, SSR-GLX70-01, SSR-GSX11-02, SSR-HFX29-08 User manual

  • Hello! I am an AI chatbot trained to assist you with the Cabletron Systems SSR-HFX11-08 User manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
CoreWatch User’s Guide
9032564
iii
Notice
Notice
Cabletron Systems reserves the right to make changes in specifications and other information contained
in this document without prior notice. The reader should in all cases consult Cabletron Systems to
determine whether any such changes have been made.
The hardware, firmware, or software described in this manual is subject to change without notice.
IN NO EVENT SHALL CABLETRON SYSTEMS BE LIABLE FOR ANY INCIDENTAL,
INDIRECT, SPECIAL, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING BUT
NOT LIMITED TO LOST PROFITS) ARISING OUT OF OR RELATED TO THIS MANUAL OR
THE INFORMATION CONTAINED IN IT, EVEN IF CABLETRON SYSTEMS HAS BEEN
ADVISED OF, KNOWN, OR SHOULD HAVE KNOWN, THE POSSIBILITY OF SUCH
DAMAGES.
© Copyright April 1998 by:
Cabletron Systems, Inc.
35 Industrial Way
Rochester, NH 03867-5005
All Rights Reserved
Printed in the United States of America
Order Number: 9032564
LANVIEW is a registered trademark, and SmartSwitch is a trademark of
Cabletron Systems, Inc.
CompuServe is a registered trademark of CompuServe, Inc.
i960 microprocessor is a registered trademark of Intel Corp.
Ethernet is a trademark of Xerox Corporation.
Notice
iv
FCC Notice
This device complies with Part 15 of the FCC rules. Operation is subject to the following two
conditions: (1) this device may not cause harmful interference, and (2) this device must accept any
interference received, including interference that may cause undesired operation.
NOTE: This equipment has been tested and found to comply with the limits for a Class A digital
device, pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable protection
against harmful interference when the equipment is operated in a commercial environment. This
equipment uses, generates, and can radiate radio frequency energy and if not installed in accordance
with the operator’s manual, may cause harmful interference to radio communications. Operation of this
equipment in a residential area is likely to cause interference in which case the user will be required to
correct the interference at his own expense.
WARNING: Changes or modifications made to this device which are not expressly approved by the
party responsible for compliance could void the user’s authority to operate the equipment.
VCCI Notice
This is a Class A product based on the standard of the Voluntary Control Council for Interference by
Information Technology Equipment (VCCI). If this equipment is used in a domestic environment, radio
disturbance may arise. When such trouble occurs, the user may be required to take corrective actions.
DOC Notice
This digital apparatus does not exceed the Class A limits for radio noise emissions from digital
apparatus set out in the Radio Interference Regulations of the Canadian Department of
Communications.
Le présent appareil numérique n’émet pas de bruits radioélectriques dépassant les limites applicables
aux appareils numériques de la class A prescrites dans le Règlement sur le brouillage radioélectrique
édicté par le ministère des Communications du Canada.
v
Notice
DECLARATION OF CONFORMITY
ADDENDUM
Application of Council Directive(s): 89/336/EEC
73/23/EEC
Manufacturer’s Name: Cabletron Systems, Inc.
Manufacturers Address: 35 Industrial Way
PO Box 5005
Rochester, NH 03867
European Representative Name: Mr. J. Solari
European Representative Address: Cabletron Systems Limited
Nexus House, Newbury
Business Park
London Road, Newbury
Berkshire RG13 2PZ, England
Conformance to Directive(s)/Product Standards:
EC Directive 89/336/EEC
EC Directive 73/23/EEC
EN 55022
EN 50082-1
EN 60950
Equipment Type/Environment: Networking Equipment, for
use in a Commercial or Light
Industrial Environment.
We the undersigned, hereby declare, under our sole responsibility, that the equipment
packaged with this notice conforms to the above directives.
Manufacturer Legal Representative in Europe
Mr. Ronald Fotino Mr. J. Solari
____________________________________________________ ____________________________________
Full Name Full Name
Principal Compliance Engineer Managing Director - E.M.E.A.
____________________________________________________ ____________________________________
Title Title
Rochester, NH, USA Newbury, Berkshire, England
____________________________________________________ ____________________________________
Location Location
Notice
vi
Contents
Preface..................................................................................................... 15
About This Guide...................................................................................................................15
Who Should Read This Manual? .........................................................................................15
How to Use This Guide.........................................................................................................15
Related Documentation.........................................................................................................17
Chapter 1: A Look at CoreWatch ........................................................... 19
What Are CoreWatch’s Features?........................................................................................19
System Requirements ............................................................................................................20
CoreWatch Capabilities.........................................................................................................20
A Look at the Modes of CoreWatch ....................................................................................21
Which MIBs Does the SSR Support? ...................................................................................21
Chapter 2: CoreWatch Installation ........................................................ 23
Installing CoreWatch.............................................................................................................23
Installing on a Solaris System........................................................................................23
Installing on a Windows NT or Windows 95 System................................................24
Chapter 3: Learning CoreWatch Basics.................................................. 25
Starting CoreWatch................................................................................................................25
Starting CoreWatch in Solaris .......................................................................................26
Starting CoreWatch in Windows NT or Windows 95 ...............................................26
Starting CoreWatch from within SPECTRUM Enterprise Manager .......................26
Starting CoreWatch from within HP OpenView 5.x .................................................27
A Look at the CoreWatch Interface .....................................................................................27
Front Panel View.............................................................................................................28
A Look at the Modules............................................................................................29
Schematic View ...............................................................................................................30
Opening the Schematic View.................................................................................30
Using the Schematic View......................................................................................31
CoreWatch Menus ..........................................................................................................31
CoreWatch Toolbar.........................................................................................................31
CoreWatch Passwords...........................................................................................................31
Changing the Login Password......................................................................................32
Changing the Privileged Password..............................................................................32
Accessing Help .......................................................................................................................33
Exiting CoreWatch.................................................................................................................34
Chapter 4: Learning Configuration Expert Basics................................. 35
What Is Configuration Expert?............................................................................................ 35
Starting Configuration Expert............................................................................................. 36
Opening Configuration Expert from the Front Panel View .................................... 36
Opening Configuration Expert from the Schematic View ....................................... 37
A Look at the Configuration Expert Window................................................................... 38
Configuration Tree......................................................................................................... 39
Configuration Files ................................................................................................. 41
A Look at the Configuration Tree Icons .............................................................. 42
Wizards and Dialog Boxes............................................................................................ 42
Configuration Expert Toolbar...................................................................................... 43
Copying Objects..................................................................................................................... 43
Copying and Pasting an Object.................................................................................... 44
Dragging Objects to Copy Their Configuration Settings ......................................... 44
Finding Objects...................................................................................................................... 45
Deleting Objects..................................................................................................................... 45
Order of Configuration Tasks.............................................................................................. 45
Committing Your Configuration Changes........................................................................ 46
Discarding Your Configuration Settings ........................................................................... 48
Exiting Configuration Expert .............................................................................................. 48
Chapter 5: Changing System Settings ................................................... 49
Providing System Information............................................................................................ 49
Configuring Ports.................................................................................................................. 50
Configuring Global Settings on All Ports................................................................... 51
Configuring an Individual Port ................................................................................... 52
Configuring the SSR for a SYSLOG Server........................................................................ 56
Configuring for DNS ............................................................................................................ 58
Configuring the SSR for SNMP........................................................................................... 59
Setting Up a Target for SNMP Traps .......................................................................... 59
Establishing Community Strings................................................................................. 61
Chapter 6: Configuring SSR Bridging..................................................... 63
A Look at Bridging on the SSR............................................................................................ 63
Configuring the Bridging Mode of Ports........................................................................... 64
Configuring a Port for Flow-Based Bridging............................................................. 65
Configuring a Port for Address-Based Bridging....................................................... 66
Controlling the Aging State of SSR Bridging .................................................................... 68
Setting Up a Default Aging Timeout........................................................................... 68
Overriding the Default Timeout Interval on a Port .................................................. 69
Disabling Aging on a Port............................................................................................. 70
Enabling Aging on a Port.............................................................................................. 72
Setting Up STP on the SSR................................................................................................... 74
Defining STP Settings for SSR Bridging...................................................................... 75
Defining STP Attributes on an Individual Port......................................................... 76
Enabling STP on a Port.................................................................................................. 77
Disabling STP on a Port................................................................................................. 79
Chapter 7: Configuring VLANs on the SSR............................................ 81
A Look at VLANs on the SSR...............................................................................................81
VLAN Configuration Tips....................................................................................................82
Defining Access Ports and Trunk Ports..............................................................................83
Creating a Protocol-Based VLAN........................................................................................85
Creating a Port-Based VLAN ...............................................................................................90
Modifying VLANs .................................................................................................................94
Changing a Port-Based VLAN’s Name or ID.............................................................95
Changing a Protocol-Based VLAN’s Name, ID, or Protocol Binding.....................96
Replacing an Interface’s VLAN............................................................................................97
Changing Which Ports a VLAN Includes...........................................................................97
Dragging Ports to Add Them to a VLAN ...................................................................97
Adding and Removing a VLAN’s Ports Through a Dialog Box..............................98
Chapter 8: Configuring IP Interfaces for the SSR ............................... 101
What Is IP? ............................................................................................................................101
A Look at IP Addresses................................................................................................102
Creating IP Interfaces ..........................................................................................................103
Creating IP Interfaces Bound to a Single Port ..........................................................104
Creating IP Interfaces Bound to a VLAN..................................................................110
Modifying IP Interface Definitions....................................................................................115
What to Do Next...................................................................................................................118
Chapter 9: Configuring Unicast Routing on the SSR.......................... 119
Configuring Unicast Global Parameters and Static Entries...........................................119
Setting Global Parameters for Unicast Routing........................................................120
Defining Static ARP Entries.........................................................................................121
Defining Static Route Entries ......................................................................................123
A Look at RIP Routing in the IP Environment ................................................................125
What Is Preference? ......................................................................................................126
Configuring the SSR for RIP...............................................................................................127
Setting RIP Global Parameters....................................................................................127
Defining IP RIP Interfaces............................................................................................129
Adding Trusted Gateways ..........................................................................................132
Adding Source Gateways ............................................................................................132
What to Do Next................................................................................................................ ...133
Chapter 10: Configuring Multicast Routing on the SSR..................... 135
What Is DVMRP? ................................................................................................................. 135
Configuring DVMRP Routing on the SSR........................................................................136
Setting DVMRP Global Parameters on the SSR........................................................137
Configuring DVMRP Interfaces..................................................................................138
Defining DVMRP Tunnels...........................................................................................139
Enabling or Disabling DVMRP on Tunnels..............................................................141
What Is IGMP?......................................................................................................................142
Configuring IGMP Interfaces on the SSR .........................................................................143
Setting IGMP Global Parameters................................................................................143
Enabling or Disabling IGMP on Interfaces ...............................................................144
What to Do Next...................................................................................................................146
Chapter 11: Configuring the SSR for IPX Routes ................................147
What Is IPX?......................................................................................................................... 147
Creating IPX Interfaces....................................................................................................... 149
Creating IPX Interfaces Bound to a Single Port....................................................... 149
Creating IPX Interfaces Bound to a VLAN............................................................... 155
Modifying IPX Interface Definitions ................................................................................ 160
Configuring Static IPX SAP Entries.................................................................................. 163
What to Do Next.................................................................................................................. 166
Chapter 12: Configuring QoS on the SSR............................................ 167
What Is QoS?........................................................................................................................ 167
Establishing the SSR’s Queuing Policy ............................................................................ 168
Associating Precedences to Layer-3/Layer-4 Flows...................................................... 169
Assigning IP QoS Precedence............................................................................................ 169
Assigning IPX QoS Precedence.................................................................................. 171
Creating QoS Profiles.......................................................................................................... 172
Creating a QoS Profile for an IP Flow....................................................................... 173
Creating a QoS Profile for an IPX Flow .................................................................... 178
Creating a QoS Profile for a Layer-2 Flow................................................................ 183
Modifying QoS Profiles...................................................................................................... 187
Redefining an IP Flow ................................................................................................. 187
Redefining an IPX Flow Definition............................................................................ 188
Redefining a Layer-2 Flow Definition....................................................................... 189
Changing an IP or IPX Flow’s Interface List............................................................ 190
Adding or Deleting a Flow’s Interfaces through a Dialog Box...................... 191
Dragging an Interface to Apply a Flow to the Interface.................................. 192
Changing a Layer-2 Port List...................................................................................... 192
Chapter 13: Configuring Security on the SSR ..................................... 195
A Look at ACLs ................................................................................................................... 195
Setting IP Security ............................................................................................................... 196
Setting IPX Security............................................................................................................. 200
Configuring an IPX ACL............................................................................................. 200
Setting Up IPX RIP Filters........................................................................................... 205
Setting Up IPX SAP Filters.......................................................................................... 209
Applying ACLs to IP or IPX Interfaces ............................................................................ 212
Copying an ACL to Apply It to an Interface............................................................ 213
Applying an ACL by Editing an Interface’s Definition.......................................... 214
Setting Layer-2 Security...................................................................................................... 216
Configuring Layer-2 Address Filters ........................................................................ 217
Configuring Layer-2 Port-to-Address Lock Filters ................................................. 219
Configuring Layer-2 Static-Entry Filters .................................................................. 222
Configuring Layer-2 Secure Port Filters ................................................................... 226
Modifying the SSR’s Security Settings ............................................................................. 229
Changing an ACL’s Name.......................................................................................... 230
Adding or Modifying ACL Rules.............................................................................. 231
Modifying Layer-2 Security Filters............................................................................ 231
Modifying a Filter’s Settings ............................................................................... 231
Modifying a Filter’s Port Bindings ..................................................................... 232
Chapter 14: Configuring OSPF on the SSR .......................................... 235
Setting OSPF Global Parameters........................................................................................235
Configuring OSPF Area Tables...................................................................................236
Creating OSPF Area Tables..................................................................................237
Modifying Area Tables .........................................................................................253
Chapter 15: Checking System Status................................................... 255
Obtaining Chassis Information..........................................................................................255
Obtaining Port Information................................................................................................256
Chapter 16: Monitoring Real-Time Performance................................ 259
Monitoring System Performance.......................................................................................259
Setting the Scaling of Dials ..........................................................................................261
Monitoring Port Utilization................................................................................................262
Obtaining Statistics About an Individual Port.................................................................264
Obtaining Packet Statistics ..........................................................................................265
Obtaining Port Byte Statistics......................................................................................266
Obtaining Port Error Statistics ....................................................................................267
Monitoring IP Interface Statistics.......................................................................................269
Obtaining IP Packet Statistics......................................................................................269
Obtaining IP Reassembly Statistics ............................................................................270
Obtaining IP Error Statistics........................................................................................272
Monitoring IPX Interface Statistics....................................................................................273
Obtaining IPX Packet Statistics...................................................................................274
Obtaining IPX Error Statistics ............................................................................................275
Using the Graph Toolbar ....................................................................................................277
Chapter 17: Checking the Status of Bridge Tables ............................. 279
Obtaining VLAN Information............................................................................................279
Obtaining STP Port Information........................................................................................280
Chapter 18: Checking the Status of Routing Tables........................... 283
Checking IP Routing Status................................................................................................283
Obtaining IP Interface Information............................................................................284
Obtaining IP Forwarding Information ......................................................................285
Checking IPX Routing Status .............................................................................................286
Obtaining IPX Interface Information .........................................................................287
Obtaining IPX Forwarding Information....................................................................289
Checking OSPF Routing Status..........................................................................................291
Obtaining OSPF Interface Information......................................................................291
Obtaining OSPF Area Information.............................................................................295
Obtaining OSPF Neighbor Information ....................................................................296
Obtaining OSPF Link-State Database Information ..................................................298
Obtaining OSPF Area Aggregate Information .........................................................300
Checking RIP Routing Status .............................................................................................302
Obtaining RIP Interface Information .........................................................................302
Obtaining RIP Peer Information.................................................................................303
Checking DVMRP Routing Status.....................................................................................305
Obtaining DVMRP Interface Information ................................................................ 305
Obtaining DVMRP Neighbor Information............................................................... 307
Obtaining DVMRP Routing Information ................................................................. 309
Checking IGMP Status........................................................................................................ 311
Obtaining IGMP Interface Information .................................................................... 312
Obtaining IGMP Cache Information......................................................................... 314
Chapter 19: Checking the Status of QoS Tables ................................. 317
Obtaining Layer-2 Priority Information........................................................................... 317
Obtaining Flow Priority Information ............................................................................... 319
Obtaining Layer-2 Switching Information ...................................................................... 321
Obtaining Layer-3 and Layer-4 Switching Information ................................................ 322
Chapter 20: Monitoring Faults ............................................................. 325
Obtaining Boot Log Information....................................................................................... 325
Chapter 21: Obtaining Reports ............................................................ 327
Saving Multiple Tables or the Boot Log as a Report...................................................... 327
Saving a Single Table as a Report ..................................................................................... 329
Appendix A: Working with Tables....................................................... 331
Finding Text in a Table....................................................................................................... 331
Controlling the Contents of Tables................................................................................... 332
Refreshing a Table............................................................................................................... 333
Restoring Table Information.............................................................................................. 333
Obtaining Table Records.................................................................................................... 333
Saving a Single Table as a Report ..................................................................................... 333
Exporting Data from a Table ............................................................................................. 334
Sorting Table Information.................................................................................................. 334
Appendix B: CoreWatch Menus ........................................................... 335
File Menu.............................................................................................................................. 335
Monitor Menu...................................................................................................................... 336
Performance State Submenu....................................................................................... 336
System State Submenu ................................................................................................ 338
Bridging State Submenu.............................................................................................. 338
Routing State Submenu............................................................................................... 339
QoS State Submenu...................................................................................................... 341
Window Menu.....................................................................................................................342
Help Menu............................................................................................................................ 342
Appendix C: A Look at OSPF Routing on the SSR............................... 345
Appendix D: Supported Regular Expressions ..................................... 347
Appendix E: Error Messages ................................................................ 351
Missing or Invalid Field Error Messages..........................................................................351
Duplicate Objects Error Messages .....................................................................................355
Already Exists or in Use Error Messages..........................................................................355
Unavailable Objects Error Messages.................................................................................356
Miscellaneous Error Messages ...........................................................................................357
Glossary................................................................................................. 363
Index...................................................................................................... 373
Preface
About This Guide
This guide provides a general overview of CoreWatch and provides procedures for using
that application to configure and monitor a SmartSwitch Router (SSR). For product
information not available in this guide, see the manuals listed in “Related
Documentation” on page 17.
Who Should Read This Manual?
Read this manual if you are responsible for configuring or monitoring the SSR and you want to do
so using CoreWatch rather than using Command Line Interface (CLI) commands.
How to Use This Guide
If You Want To See
Get an overview of CoreWatch Chapter 1 on page 19
Start CoreWatch or familiarize yourself with other basic
tasks and the CoreWatch interface
Chapter 3 on page 25
Start Configuration Expert and familiarize yourself with
its interface
Chapter 4 on page 35
Change system information that is needed before an SSR
can be configured
Chapter 5 on page 49
Configure bridging on the SSR Chapter 6 on page 63
Configure virtual local area networks (VLANs) on the SSR Chapter 7 on page 81
Configure Internet Protocol (IP) interfaces that you want
to use for unicast or multicast routing
Chapter 8 on page 101
Configure the SSR for the Routing Information Protocol
(RIP)
Chapter 9 on page 119
Configure the SSR for the Distance Vector Multicast
Routing Protocol (DVMRP) and Internet Group
Management Protocol (IGMP), which IP uses to perform
multicast routing
Chapter 10 on page 135
Configure Internet Packet Exchange (IPX) routes on the
SSR
Chapter 11 on page 147
Configure Quality of Service (QoS) policies Chapter 12 on page 167
Configure security on the SSR Chapter 13 on page 195
Configure OSPF on the SSR Chapter 14 on page 235
Check the status of the SSR chassis and ports Chapter 15 on page 255
Monitor real-time performance on the SSR Chapter 16 on page 259
Display tables that contain bridge information and data
about the SSR’s VLANs
Chapter 17 on page 279
Display tables that contain information about the routing
protocols you are using on the SSR
Chapter 18 on page 283
Obtain information about Layer-2, Layer-3, and
Layer-4
Chapter 19 on page 317
Obtain boot log information to perform fault monitoring Chapter 20 on page 325
Obtain reports that include information CoreWatch
displays in its tables
Chapter 21 on page 327
Work in CoreWatch tables Appendix A on page 331
Learn about the commands available on each CoreWatch
menu
Appendix B on page 335
Read an overview of OSPF routing on the SSR Appendix C on page 345
Learn about the regular expressions CoreWatch supports Appendix D on page 347
Obtain information about CoreWatch error messages Appendix E on page 351
If You Want To See
Related Documentation
The Cabletron Systems documentation set includes the following items. Refer to these other docu-
ments to learn more about your product.
For Information About See the
The SmartSwitch Router (SSR) features and the
procedures for installing the SSR and setting it up
for management using CoreWatch software.
SmartSwitch Router Getting
Started Guide
How to use Command Line Interface (CLI)
commands to configure and manage the SSR
SmartSwitch Router User
Reference Manual
The complete syntax for all CLI commands SmartSwitch Router Command
Line Interface Reference Manual
SYSLOG messages and SNMP traps SmartSwitch Router Error Message
Reference Manual
Chapter 1
A Look at
CoreWatch
Cabletron Systems’ CoreWatch is a comprehensive, easy-to-use, device management and
configuration application for SmartSwitch Routers (SSRs). Based on Java Programming
Language, CoreWatch provides configuration, monitoring, and reporting capabilities with
the assistance of wizards, property sheets, and drag-and-drop operations.
CoreWatch provides access to Configuration Expert, a utility that makes tasks such as
configuring routers, virtual local area networks (VLANs), application-level Quality of
Service (QoS) policies, and security filters simple and easy.
You can run CoreWatch in the Solaris, Windows NT, or Windows 95 environments.
This chapter
Summarizes the features of CoreWatch
Describes the system requirements of CoreWatch
Provides an overview of CoreWatch capabilities
Discusses the different modes of CoreWatch
Provides a list of the Management Information Bases (MIBs) CoreWatch supports
What Are CoreWatchs Features?
CoreWatch management features include the following:
Java-based graphical user interface (GUI).
Simplified bridging configuration.
Simplified routing configuration.
Quality of Service (QoS) policy management.
QoS is a set of parameters that assign priorities to different types of traffic, define flows
for Internet Protocol (IP) and Internetwork Packet Exchange (IPX) packet fields, assign
a precedence to the fields of the flows you define, and establish queuing policies.
Configuration of security filters and access control lists (ACLs). An ACL is a list the
SSR keeps to control access to or from various services.
Drag-and-drop VLAN setup and administration.
Detailed reporting in the hypertext markup language (HTML) format.
System Requirements
CoreWatch can run in the Solaris, Windows NT, and Windows 95 environments. As
shown in the following table, CoreWatch’s system requirements depend upon your
operating system. The table identifies which browser to use with each operating system
and gives the minimum hardware requirements for each environment.
CoreWatch Capabilities
CoreWatch lets you perform the following operations:
Access Configuration Expert, which is a Cabletron Systems utility that you use to
configure your SSR as discussed later in this guide.
Perform the following monitoring tasks on the SSR as discussed later in this guide:
Monitor the status of an SSR’s ports, modules, power supplies, and other hardware
components.
Solaris 2.5.1 or 2.6) Windows NT 4.0x Windows 95
Browser
Netscape Navigator 3.0 or
above
Netscape Navigator 3.0 or
above, or Microsoft Internet
Explorer 4.0 or above
Netscape Navigator 3.0 or
above, or Microsoft Internet
Explorer 4.0 or above
CPU
Sparc20 or above Pentium 133 or above Pentium 133 or above
RAM
128 MB 64 MB 64 MB
Disk
40 MB Free 20 MB Free 20 MB Free
/