Extreme Networks Switch Summit1 User Manual

Summit Switch  
Installation and User  
Guide  
Extreme Networks, Inc.  
10460 Bandley Drive  
Cupertino, California 95014  
(888) 257-3000  
http://www.extremenetworks.com  
Published: June 1998  
Part number: 100000-00 rev.B  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Contents  
Introduction xvii  
Terminology xviii  
Conventions xviii  
Related Publications xix  
1
SUMMIT OVERVIEW  
About the Summit Family of Switches 1-1  
Summit Switch Models 1-2  
Summary of Features 1-2  
Port Connections 1-3  
Media Types and Distances 1-4  
Full-Duplex 1-5  
Port Redundancy 1-5  
Load Sharing 1-6  
Virtual LANs (VLANs) 1-6  
Spanning Tree Protocol (STP) 1-6  
Quality of Service (QoS) 1-7  
IP Unicast Routing 1-7  
IP Multicast Routing 1-7  
Network Configuration Example 1-8  
Summit1 Front View 1-10  
Summit2 Front View 1-11  
Summit3 Front View 1-12  
Summit4 Front View 1-13  
Summit4/ FX Front View 1-14  
iii  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Summit48 Front View 1-15  
LEDs 1-16  
Summit Rear View 1-17  
Power Socket 1-17  
Serial Number 1-17  
Console Port 1-17  
Redundant Power Supply Port 1-17  
MAC Address 1-18  
Factory Defaults 1-18  
2
INSTALLATION AND SETUP  
Following Safety Information 2-1  
Determining the Switch Location 2-1  
Media Types and Distances 2-2  
Installing the Summit 2-3  
Rack Mounting 2-3  
Free-Standing 2-4  
Stacking the Switch and Other Devices 2-4  
Connecting Equipment to the Console Port 2-4  
Powering On the Switch 2-6  
Checking the Installation 2-6  
Logging In for the First Time 2-6  
3
ACCESSING THE SWITCH  
Understanding the Command Syntax 3-2  
Syntax Helper 3-2  
Command Completion with Syntax Helper 3-2  
Abbreviated Syntax 3-3  
Command Shortcuts 3-3  
Numerical Ranges 3-3  
Names 3-3  
Symbols 3-4  
Line-Editing Keys 3-5  
Command History 3-5  
Common Commands 3-6  
iv  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Configuring Management Access 3-8  
Default Accounts 3-9  
Changing the Default Password 3-9  
Creating a Management Account 3-10  
Viewing Switch Accounts 3-10  
Deleting a Switch Account 3-11  
Methods of Managing the Summit 3-11  
Using the Console Interface 3-11  
Using Telnet 3-12  
Connecting to Another Host Using Telnet 3-12  
Configuring Switch IP Parameters 3-12  
Using a BOOTP Server 3-12  
Manually Configuring the IP Settings 3-13  
Disconnecting a Telnet Session 3-15  
Disabling Telnet Access 3-15  
IP Host Configuration Commands 3-16  
Using ExtremeWare Vista 3-17  
Disabling Web Access 3-17  
Using SNMP 3-18  
Accessing Switch Agents 3-18  
Supported MIBs 3-18  
Configuring SNMP Settings 3-19  
Displaying SNMP Settings 3-21  
Resetting and Disabling SNMP 3-21  
Checking Basic Connectivity 3-22  
Ping 3-22  
Traceroute 3-22  
Mtrace 3-23  
v
Download from Www.Somanuals.com. All Manuals Search And Download.  
4
CONFIGURING PORTS  
Enabling and Disabling Ports 4-1  
Configuring Port Speed and Duplex Setting 4-2  
Turning Off Autonegotiation for a Gigabit Ethernet Port 4-2  
Port Commands 4-3  
Load Sharing 4-5  
Configuring Load Sharing 4-6  
Verifying the Load Sharing Configuration 4-8  
Port-Mirroring 4-8  
Port-Mirroring Commands 4-9  
Port-Mirroring Example 4-9  
Summit Virtual Chassis 4-10  
Summit Switch Port Connections 4-10  
Extreme Discovery Protocol 4-11  
Summit Virtual Chassis Commands 4-12  
Configuring the Summit for User with the Summit Virtual  
Chassis 4-12  
VLANs and Summit Switches Using the Virtual Chassis 4-13  
5
VIRTUAL LANS (VLANS)  
Overview of Virtual LANs 5-1  
Benefits 5-1  
Types of VLANs 5-2  
Port-Based VLANs 5-2  
Spanning Switches with Port-Based VLANs 5-3  
Tagged VLANs 5-5  
Uses of Tagged VLANs 5-6  
Assigning a VLAN Tag 5-6  
Mixing Port-Based and Tagged VLANs 5-8  
Generic VLAN Registration Protocol 5-8  
GVRP Commands 5-10  
Protocol-Based VLANs 5-11  
Predefined Protocol Filters 5-12  
Defining Protocol Filters 5-12  
Deleting a Protocol Filter 5-13  
Precedence of Tagged Packets Over Protocol Filters 5-13  
vi  
Download from Www.Somanuals.com. All Manuals Search And Download.  
VLAN Names 5-13  
Default VLAN 5-14  
Configuring VLANs on the Summit 5-14  
VLAN Configuration Examples 5-16  
Displaying VLAN Settings 5-17  
Deleting VLANs 5-18  
6
SWITCH FORWARDING DATABASE (FDB)  
Overview of the FDB 6-1  
FDB Contents 6-1  
FDB Entry Types 6-1  
How FDB Entries Get Added 6-2  
Associating a QoS Profile with an FDB Entry 6-3  
Configuring FDB Entries 6-3  
FDB Configuration Examples 6-4  
Displaying FDB Entries 6-5  
Removing FDB Entries 6-6  
7
SPANNING TREE PROTOCOL (STP)  
Overview of the Spanning Tree Protocol 7-1  
Spanning Tree Domains 7-1  
Defaults 7-2  
STP Configurations 7-2  
Configuring STP on the Summit 7-5  
Configuration Example 7-7  
Displaying STP Settings 7-8  
Disabling and Resetting STP 7-9  
vii  
Download from Www.Somanuals.com. All Manuals Search And Download.  
8
QUALITY OF SERVICE (QOS)  
Overview of Quality of Service 8-1  
Building Blocks 8-1  
QoS Mode 8-2  
Default QoS Profiles 8-2  
Traffic Groupings 8-3  
Ingress Traffic Groupings 8-3  
Egress Traffic Groupings 8-5  
Precedence 8-5  
Prioritization 8-6  
Creating and Configuring a QoS Profile 8-6  
Assigning a QoS Profile 8-6  
Port Queue Monitor 8-7  
Configuring QoS 8-8  
Sample Ingress Mode QoS Configuration 8-9  
Sample Egress Mode QoS Configuration 8-9  
Displaying QoS Information 8-10  
Resetting QoS 8-10  
9
IP UNICAST ROUTING  
Overview of IP Unicast Routing 9-1  
Router Interfaces 9-2  
Populating the Routing Table 9-3  
Dynamic Routes 9-3  
Static Routes 9-3  
Multiple Routes 9-4  
Proxy ARP 9-4  
ARP-Incapable Devices 9-4  
Proxy ARP Between Subnets 9-5  
IP Multinetting 9-5  
IP Multinetting Operation 9-6  
IP Multinetting Examples 9-7  
Configuring IP Unicast Routing 9-9  
Verifying the IP Unicast Routing Configuration 9-10  
Configuring DHCP/ BOOTP Relay 9-10  
Verifying the DHCP/ BOOTP Relay Configuration 9-11  
Routing Configuration Example 9-15  
viii  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Displaying Router Settings 9-17  
Resetting and Disabling Router Settings 9-18  
10 ROUTING PROTOCOLS  
Overview 10-1  
RIP Versus OSPF 10-2  
Overview of RIP 10-3  
Routing Table 10-3  
Split Horizon 10-3  
Poison Reverse 10-3  
Triggered Updates 10-4  
Route Advertisement of VLANs 10-4  
RIP Version 1 versus RIP Version 2 10-4  
Overview of OSPF 10-5  
Link State Database 10-5  
Areas 10-5  
Area 0 10-6  
Stub Areas 10-6  
Virtual Links 10-7  
Configuring RIP 10-8  
RIP Configuration Example 10-10  
Displaying RIP Settings 10-12  
Resetting and Disabling RIP 10-13  
Configuring OSPF 10-14  
OSPF Configuration Example 10-16  
Configuration for ABR1 10-17  
Configuration for IR1 10-18  
Displaying OSPF Settings 10-18  
Resetting and Disabling OSPF Settings 10-19  
ix  
Download from Www.Somanuals.com. All Manuals Search And Download.  
11 IP MULTICAST ROUTING  
Overview 11-1  
DVMRP Overview 11-2  
IGMP Overview 11-2  
IGMP Snooping 11-2  
Configuring IP Multicasting Routing 11-2  
Configuration Example 11-6  
Configuration for IR1 11-7  
Displaying IP Multicast Routing Settings 11-7  
Deleting and Resetting IP Multicast Settings 11-8  
12 STATUS MONITORING AND STATISTICS  
Status Monitoring 12-1  
Port Statistics 12-7  
Port Errors 12-8  
Port Monitoring Display Keys 12-9  
Switch Logging 12-10  
Local Logging 12-11  
Real-time Display 12-11  
Remote Logging 12-12  
Logging Commands 12-12  
RMON 12-14  
About RMON 12-14  
RMON Features of the Switch 12-15  
Statistics 12-15  
History 12-15  
Alarms 12-16  
Events 12-16  
RMON and the Switch 12-16  
Event Actions 12-17  
x
Download from Www.Somanuals.com. All Manuals Search And Download.  
13 USING EXTREMEWARE VISTA  
Enabling and Disabling Web Access 13-1  
Setting Up Your Browser 13-2  
Accessing ExtremeWare Vista 13-3  
Navigating ExtremeWare Vista 13-3  
Task Frame 13-4  
Content Frame 13-4  
Browser Controls 13-4  
Status Messages 13-5  
Standalone Buttons 13-5  
Saving Changes 13-5  
Do a GET When Configuring a VLAN 13-6  
Sending Screen Output to Extreme Networks 13-6  
14 SOFTWARE UPGRADE AND BOOT OPTIONS  
Downloading a New Image 14-1  
Rebooting the Switch 14-2  
Saving Configuration Changes 14-3  
Returning to Factory Defaults 14-3  
Using TFTP to Upload the Configuration 14-4  
Using TFTP to Download the Configuration 14-4  
Boot Option Commands 14-5  
A
B
SAFETY INFORMATION  
Important Safety Information A-1  
Power A-1  
Power Cord A-2  
Fuse A-3  
Connections A-3  
Lithium Battery A-4  
TECHNICAL SPECIFICATIONS  
xi  
Download from Www.Somanuals.com. All Manuals Search And Download.  
C
TROUBLESHOOTING  
LEDs C-1  
Using the Command-Line Interface C-2  
VLANs C-4  
STP C-5  
INDEX  
INDEX OF COMMANDS  
xii  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Figures  
1-1  
1-2  
Dual-homing configuration 1-5  
Network configuration using the Summit family of  
switches 1-8  
1-3  
1-4  
1-5  
1-6  
1-7  
1-8  
1-9  
2-1  
2-2  
2-3  
5-1  
5-2  
5-3  
5-4  
5-5  
5-6  
5-7  
7-1  
7-2  
9-1  
9-2  
10-1  
10-2  
Summit1 front view 1-10  
Summit2 front view 1-11  
Summit3 front view 1-12  
Summit4 front view 1-13  
Summit4/ FX front view 1-14  
Summit48 front view 1-15  
Summit rear view 1-17  
Fitting the mounting bracket 2-3  
Null-modem cable pin-outs 2-5  
PC-AT serial null-modem cable pin-outs 2-5  
Example of a port-based VLAN 5-3  
Single port-based VLAN spanning two switches 5-4  
Two port-based VLANs spanning two Switches 5-5  
Physical diagram of tagged and untagged traffic 5-7  
Logical diagram of tagged and untagged traffic 5-7  
Network example using GVRP 5-9  
Protocol-based VLANs 5-11  
Multiple Spanning Tree Domains 7-3  
Tag-based STP configuration 7-4  
Routing between VLANs 9-2  
Unicast routing configuration example 9-16  
Stub area 10-6  
Virtual link for stub area 10-7  
xiii  
Download from Www.Somanuals.com. All Manuals Search And Download.  
10-3  
10-4  
10-5  
11-1  
Virtual link providing redundancy 10-7  
RIP configuration example 10-11  
OSPF configuration example 10-16  
IP multicast routing configuration example 11-6  
xiv  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Tables  
1
Notice Icons xviii  
2
Text Conventions xviii  
1-1  
1-2  
1-3  
1-4  
2-1  
2-2  
3-1  
3-2  
3-3  
3-4  
3-5  
3-6  
3-7  
3-8  
3-9  
4-1  
4-2  
4-3  
4-4  
4-5  
4-6  
4-7  
4-8  
Summit Switch Port Configurations 1-3  
Media Types and Distances 1-4  
Summit LEDs 1-16  
Summit Factory Defaults 1-18  
Media Types and Distances 2-2  
Console Connector Pin-Outs 2-5  
Command Syntax Symbols 3-4  
Line-Editing Keys 3-5  
Common Commands 3-6  
Default Accounts 3-9  
IP Host Configuration Commands 3-16  
Supported MIBs 3-18  
SNMP Configuration Commands 3-20  
SNMP Reset and Disable Commands 3-21  
Ping Command Parameters 3-22  
Port Commands 4-3  
Port Combinations for the Summit1 4-6  
Port Combinations for the Summit2 4-6  
Port Combinations for the Summit3 4-6  
Port Combinations for the Summit4 and Summit4/ FX 4-7  
Port Combinations for the Summit48 4-7  
Port-Mirroring Configuration Commands 4-9  
Summit Ports to Use to Connect to the Summit Virtual  
Chassis 4-10  
xv  
Download from Www.Somanuals.com. All Manuals Search And Download.  
4-9  
Summit Virtual Chassis Commands 4-12  
GVRP Commands 5-10  
5-1  
5-2  
VLAN Configuration Commands 5-14  
VLAN Delete and Reset Commands 5-18  
FDB Configuration Commands 6-3  
Removing FDB Entry Commands 6-6  
STP Configuration Commands 7-6  
STP Disable and Reset Commands 7-9  
Default QoS Profiles 8-3  
5-3  
6-1  
6-2  
7-1  
7-2  
8-1  
8-2  
802.1p Values and Associated QoS Profiles 8-4  
PQM Commands 8-7  
8-3  
8-4  
QoS Configuration Commands 8-8  
Basic IP Commands 9-11  
9-1  
9-2  
Route Table Configuration Commands 9-13  
ICMP Configuration Commands 9-14  
Router Show Commands 9-17  
9-3  
9-4  
9-5  
Router Reset and Disable Commands 9-18  
RIP Configuration Commands 10-8  
RIP Show Commands 10-12  
10-1  
10-2  
10-3  
10-4  
10-5  
10-6  
11-1  
11-2  
11-3  
11-4  
12-1  
12-2  
12-3  
12-4  
12-5  
12-6  
13-1  
14-1  
RIP Reset and Disable Commands 10-13  
OSPF Configuration Commands 10-14  
OSPF Show Commands 10-18  
OSPF Reset and Disable Commands 10-19  
IP Multicast Routing Configuration Commands 11-3  
IGMP Configuration Commands 11-4  
IP Multicast Routing Show Commands 11-7  
IP Multicast Routing Reset and Disable Commands 11-8  
Switch Monitoring Commands 12-1  
Port Monitoring Display Keys 12-9  
Fault Levels Assigned by the Switch 12-10  
Fault Log Subsystems 12-10  
Logging Commands 12-13  
Event Actions 12-17  
Multi-Select List Box Key Definitions 13-4  
Boot Option Commands 14-5  
xvi  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Preface  
This Preface provides an overview of this guide, describes guide conventions, and lists  
other publications that may be useful.  
INTRODUCTION  
This guide provides the required information to install and configure the Summit  
Family of Gigabit Ethernet Switches.  
This guide is intended for use by network administrators who are responsible for  
installing and setting up network equipment. It assumes a basic working knowledge of  
Local Area Networks (LANs)  
Ethernet concepts  
Ethernet switching and bridging concepts  
Routing concepts  
Simple Network Management Protocol (SNMP)  
If the information in the Release Notes shipped with your switch differs from the  
information in this guide, follow the Release Notes.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
XVII  
Download from Www.Somanuals.com. All Manuals Search And Download.  
PREFACE  
TERMINOLOGY  
When features, functionality, or operation is specific to a particular model of the  
Summit family, the model name is used (for example, Summit1 or Summit4).  
Explanations about features and operations that are the same among all members of the  
Summit family simply refer to the product as the Summit.  
CONVENTIONS  
Table 1 and Table 2 list conventions that are used throughout this guide.  
Table 1: Notice Icons  
Icon  
Notice Type  
Alerts you to...  
Note  
Important features or instructions.  
Caution  
Warning  
Risk of personal injury, system damage,  
or loss of data.  
Risk of severe personal injury.  
Table 2: Text Conventions  
Convention  
Description  
Screen displays  
This typeface represents information as it appears on the screen.  
The words “enter”  
and “type”  
When you see the word “enter” in this guide, you must type  
something, and then press the Return or Enter key. Do not press the  
Return or Enter key when an instruction simply says “type.”  
[Key] names  
Key names appear in text in one of two ways:  
Referred to by their labels, such as “the Return key” or “the  
Escape key”  
Written with brackets, such as [Return] or [Esc]  
If you must press two or more keys simultaneously, the key names  
are linked with a plus sign (+). Example:  
Press [Ctrl]+[Alt]+[Del].  
XVIII  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
RELATED PUBLICATIONS  
Table 2: Text Conventions (continued)  
Convention Description  
Words in italicized type Italics emphasize a point or denote new terms at the place where  
they are defined in the text.  
The command syntax is explained in Chapter 3.  
RELATED PUBLICATIONS  
The Summit documentation set includes the following:  
Summit Quick Reference Guide  
Summit Release Notes  
You may find the following Web site of interest:  
Extreme Networks Home Page: http:/ / www.extremenetworks.com/  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
XIX  
Download from Www.Somanuals.com. All Manuals Search And Download.  
PREFACE  
XX  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Summit Overview  
1
This chapter describes the following:  
Summit switch models  
Summit features  
How to use the Summit family of switches in your network configuration  
Summit front views  
Summit rear view  
Summit LEDs  
Factory default settings  
ABOUT THE SUMMIT FAMILY OF SWITCHES  
Network managers are currently faced with the challenge of creating networks that can  
provide ultra-fast speed and high performance to serve the needs of todays network  
users, while simultaneously preserving the investment they have made in Ethernet and  
Fast Ethernet technology.  
By addressing the entire spectrum of Ethernet data rates (10/ 100/ 1000 Mbps), the  
Summit family of LAN switches enables you to introduce high-speed Gigabit Ethernet  
backbones into your existing network, while maintaining established connections to the  
10 Mbps and 100 Mbps segments that already exist.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
1-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SUMMIT OVERVIEW  
SUMMIT SWITCH MODELS  
The Summit family of switches is comprised of six models, as follows:  
Summit1  
Summit2  
Summit3  
Summit4  
Summit4/ FX  
Summit48  
SUMMARY OF FEATURES  
Summit switches support the following features:  
Fully nonblocking operation  
All ports transmit and receive packets at wire speed  
Optional redundant power supply  
128K addresses in the switch forwarding database in bridging mode  
Redundant physical Gigabit Ethernet backbone connection  
Autonegotiation for half- or full-duplex operation (Fast Ethernet ports, only)  
Load-sharing on multiple ports  
Virtual local area networks (VLANs) including support for 802.1Q  
Spanning Tree Protocol (STP) (IEEE 802.1D) with multiple STP domains  
Policy-based Quality of Service (QoS)  
Wire-speed Internet Protocol (IP) routing  
IP Multinetting using the Internet Group Multicast Protocol (IGMP)  
DHCP/ BOOTP Relay  
Routing Information Protocol (RIP) version 1 and RIP version 2  
Open Shortest Path First (OSPF) routing protocol  
Wire-speed IP multicast routing support  
IGMP snooping to control IP multicast traffic  
1-2  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SUMMARY OF FEATURES  
Distance Vector Multicast Routing Protocol (DVMRP)  
Console command line interface (CLI) connection  
Telnet CLI connection  
ExtremeWareVistaWeb-based management interface  
Simple Network Management Protocol (SNMP) support  
PORT CONNECTIONS  
The major difference between the models of the Summit switch is the port  
configurations on each switch model. Summit switches use a combination of the  
following types of ports:  
Fixed 1000BASE-SX ports using 850nm duplex SC connectors  
Modular 1000BASE-LX and 1000BASE-LX10 using Gigabit Interface Connectors  
(GBICs)  
10BASE-T/ 100BASE-TX ports using standard RJ-45 connectors  
100BASE-FX ports using standard SC connectors  
Table 1-1 describes port configurations available on the different Summit switch models.  
Table 1-1: Summit Switch Port Configurations  
Gigabit Ethernet Ports  
Fixed  
Redundant  
GBIC  
10BASE-T/  
100BASE-TX 100BASE-FX  
Switch Model 1000BASE-SX  
GBIC  
Summit1  
Summit2  
Summit3  
Summit4  
Summit4/FX  
Summit48  
6
2
2
1
1
1
16  
24  
16  
16  
48  
6
6
2
2
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
1-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
SUMMIT OVERVIEW  
MEDIA TYPES AND DISTANCES  
Table 1-2 describes the media types and distances for the different types of Summit  
ports.  
Table 1-2: Media Types and Distances  
Mhz/Km Maximum  
Standard  
Media Type  
Rating  
Distance  
1000BASE-SX  
50/125um Multimode Fiber  
50/125um Multimode Fiber  
62.5/125um Multimode Fiber  
62.5/125um Multimode Fiber  
50/125um Multimode Fiber  
50/125um Multimode Fiber  
62.5/125um Multimode Fiber  
10u Single-mode Fiber  
400  
500 Meters  
550 Meters  
220 Meters  
275 Meters  
550 Meters  
550 Meters  
550 Meters  
5,000 Meters  
10,000 Meters  
400 Meters  
500  
160  
200  
1000BASE-LX  
400  
500  
500  
1000BASE-LX10* 10u Single-mode Fiber  
100BASE-FX  
50/125um Multimode Fiber  
(half-duplex operation  
50/125um Multimode Fiber  
(full-duplex operation)  
2000 Meters  
400 Meters  
2000 Meters  
62.5/125um Multimode Fiber  
(half-duplex operation)  
52.5/125um Multimode Fiber  
(full-duplex operation)  
100BASE-TX  
10BASE-T  
Category 5 UTP Cable (100Mbps)  
Category 3 UTP Cable (10Mbps)  
100 Meters  
100 Meters  
*EXTREME NETWORKS PROPRIETARY. CAN BE CONNECTED TO 1000BASE-LX ON SINGLE-MODE FIBER USING A MAXIMUM DISTANCE  
OF 5,000 METERS.  
For more information on 1000BASE-SX and 1000BASE-LX link characteristics,  
refer to IEEE Draft P802.3z/D4.2, Table 38-2 and Table 38-6.  
1-4  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
SUMMARY OF FEATURES  
FULL-DUPLEX  
The Summit switch provides full-duplex support for all ports. Full-duplex allows  
frames to be transmitted and received simultaneously and, in effect, doubles the  
bandwidth available on a link. All 10/ 100 Mbps ports on the Summit autonegotiate for  
half- or full-duplex operation.  
PORT REDUNDANCY  
The Summit2, Summit3, and Summit48 have an optional redundant Gigabit Ethernet  
port. Using the redundant port, you can dual-home these models to one or two  
switches. Figure 1-1 illustrates a Summit2 dual-homed to two different switches.  
Dual-homed  
Active  
Backup  
Figure 1-1: Dual-homing configuration  
In the event that the active port fails or loses link status, the redundant port is  
automatically activated. When the primary port resumes operation, the redundant port  
becomes inactive. This feature can be disabled.  
The redundant port cannot be used for load sharing when the primary port is active. If  
the primary port becomes inactive, the redundant port is activated in the load sharing  
configuration.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
1-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
SUMMIT OVERVIEW  
LOAD SHARING  
Load sharing with Summit switches allows the user to increase bandwidth and  
resilience between switches by using a group of ports to carry traffic in parallel between  
switches. The sharing algorithm allows the switch to use multiple ports as a single  
logical port. For example, VLANs see the load-sharing group as a single virtual port.  
The algorithm also guarantees packet sequencing between clients.  
For information on load sharing, refer to Chapter 4.  
VIRTUAL LANS (VLANS)  
The Summit has a VLAN feature that enables you to construct your broadcast domains  
without being restricted by physical connections. Up to 255 VLANs can be defined on  
the Summit. A VLAN is a group of location- and topology-independent devices that  
communicate as if they were on the same physical local area network (LAN).  
Implementing VLANs on your network has the following three advantages:  
It helps to control broadcast traffic. If a device in VLAN marketing transmits a  
broadcast frame, only VLAN marketing devices receive the frame.  
It provides extra security. Devices in VLAN marketing can only communicate with  
devices on VLAN sales using a device that provides routing services.  
It eases the change and movement of devices on networks. If a device in VLAN  
marketing is moved to a port in another part of the network, all you must do is  
specify that the new port belongs to VLAN marketing.  
For more information on VLANs, refer to Chapter 5.  
SPANNING TREE PROTOCOL (STP)  
The Summit supports the IEEE 802.1D Spanning Tree Protocol (STP), which is a  
bridge-based mechanism for providing fault tolerance on networks. STP enables you to  
implement parallel paths for network traffic, and ensure the following:  
Redundant paths are disabled when the main paths are operational.  
Redundant paths are enabled if the main traffic paths fail.  
1-6  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SUMMARY OF FEATURES  
The Summit supports up to 64 Spanning Tree Domains (STPDs).  
For more information on STP, refer to Chapter 7.  
QUALITY OF SERVICE (QOS)  
The Summit has policy-based Quality of Service (QoS) features that enable you to  
specify service levels for different traffic groups. By default, all traffic is assigned with  
the “normal” QoS policy profile. If needed, you can create other QoS policies and apply  
them to different traffic types so that they have different guaranteed minimum  
bandwidth, maximum bandwidth, and priority.  
For more information on Quality of Service, refer to Chapter 8.  
IP UNICAST ROUTING  
The Summit can route IP traffic between the VLANs that are configured as virtual  
router interfaces. Both dynamic and static IP routes are maintained in the routing table.  
The following routing protocols are supported:  
RIP version 1  
RIP version 2  
OSPF  
For more information on IP unicast routing, refer to Chapter 9.  
IP MULTICAST ROUTING  
The Summit can use IP multicasting to allow a single IP host to transmit a packet to a  
group of IP hosts. The Summit supports statically configured IP multicast routes, and  
multicast routes that are learned by way of the Distance Vector Multicast Routing  
Protocol (DVMRP).  
For more information on IP multicast routing, refer to Chapter 11.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
1-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SUMMIT OVERVIEW  
NETWORK CONFIGURATION EXAMPLE  
As shown in Figure 1-2, the family of Summit switches offer a unique end-to-end LAN  
system solution. From the desktop, to the gigabit core, to the data center/ server farm,  
there are Summit switches with an optimized hardware configuration to match the  
requirements. ExtremeWare software is common to all Summit switches, and allows for  
the same services to operate across the entire product family. All Summit switches  
deliver wire-speed throughput and end-to-end policy based Quality of Service.  
Intranet Switching Architecture  
Desktop switches  
Segment switches  
Desktop switches  
Routers  
Data Center  
Integrated Server switch  
L2/L3  
Gigabit  
10/100 Mbps  
Figure 1-2: Network configuration using the Summit family of switches  
1-8  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
NETWORK CONFIGURATION EXAMPLE  
In the gigabit core of the network, the Summit1 and Summit2 act as aggregators of  
Gigabit Ethernet links from the edge and data center switches, as well as Ethernet and  
Fast Ethernet links from legacy routers and hubs. In the core of the network, the  
Summit1 and Summit2 can scale in port density and performance by connecting to a  
Summit Virtual Chassis to support up to 32 non-blocking Gigabit Ethernet ports at 48  
million packets per second (pps), or 128 non-blocking 10/ 100BASE-TX ports at 19  
million pps.  
In the data center or server farm, the Summit4 offers the right mix of ports and features  
for servers. Data centers and server farms require integrated wire-speed routing to  
eliminate the performance penalty associated with legacy routers when servers had to  
be separated into different subnets. In addition, the Summit4 supports trunking of  
either Ethernet, Fast Ethernet, or Gigabit Ethernet ports to match the performance of the  
LAN connection to the performance of the server. The goal is to only buy the amount of  
bandwidth that is needed and can be used. This is ideal for servers that can drive 400  
Mbps on trunk Fast Ethernet ports, but would not be capable of more than 400 Mbps  
performance on a Gigabit Ethernet port. The port density and performance of the  
Summit4 can be scaled with the Summit Virtual Chassis to 16 Gigabit Ethernet ports,  
and 128 10/ 100BASE-TX ports at 43 million pps.  
At the edge of the network, higher-performance desktops need dedicated throughput,  
while other devices can use small, shared segments. For higher-performance  
connections, use the Summit3 and Summit48 switches (which offer 24 10/ 100BASE-TX  
ports) and a single Gigabit Ethernet port, or 48 10/ 100BASE-TX ports and two Gigabit  
Ethernet ports, respectively. For shared desktop segments, the Summit2 offers 16  
10/ 100BASE-TX ports and two Gigabit Ethernet ports. Combining the Summit3 and the  
Summit48 with the Summit Virtual Chassis, desktop switching port densities can scale  
to 192 10/ 100BASE-TX ports at 28 million pps, and 384 10/ 100BASE-TX ports at 28  
million pps, respectively.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
1-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SUMMIT OVERVIEW  
SUMMIT1 FRONT VIEW  
Figure 1-3 shows the Summit1 front view.  
Port status LEDs  
Unit status LEDs  
1
8
AMBER  
GREEN  
=
=
ACTIVITY  
LINK OK  
FLASHING GREEN =DISABLED  
ACTIVITY  
1
9
2
3
4
5
6
7
8
10 11 12 13 14 15 16  
LINK  
2
3
4
5
6
7
Gigabit Ethernet ports  
Gigabit Ethernet ports  
Figure 1-3: Summit1 front view  
The Summit1 has eight Gigabit Ethernet ports. Six of the ports use SC connectors and  
support 1000BASE-SX over multimode fiber-optic cable. Ports 1 and 8 use modular  
GBIC connectors.  
For information on supported media types and distances, refer to Table 1-2.  
For information on Summit LEDs, refer to “LEDs,” on page 1-16.  
1-10  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
SUMMIT2 FRONT VIEW  
SUMMIT2 FRONT VIEW  
Figure 1-4 shows the Summit2 front view.  
Port status LEDs  
Unit status LEDs  
18  
1
9
2
3
4
5
6
7
8
AMBER  
GREEN  
=
=
ACTIVITY  
LINK OK  
FLASHING GREEN =DISABLED  
1
9
2
3
4
5
6
7
8
10 11 12 13 14 15 16  
10  
11  
12  
13  
14  
15  
16  
17R  
17  
10/100 Mbps ports  
Gigabit Ethernet ports  
Figure 1-4: Summit2 front view  
The Summit2 has 16 autosensing 10BASE-T/ 100BASE-TX ports and two Gigabit  
Ethernet ports, one of which has a redundant Gigabit Ethernet port.  
For information on supported media types and distances, refer to Table 1-2.  
For information on Summit LEDs, refer to “LEDs,” on page 1-16.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
1-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
SUMMIT OVERVIEW  
SUMMIT3 FRONT VIEW  
Figure 1-5 shows the Summit3 front view.  
Unit status LEDs  
10/100 Mbps ports  
1
2
3
4
5
6
7
8
17  
18  
19  
20  
21  
22  
23  
24  
AMBER  
GREEN  
=
=
ACTIVITY  
LINK OK  
FLASHING GREEN=DISABLED  
1
9
2
3
4
5
6
7
8
10 11 12 13 14 15 16  
25 25  
ACTIVITY  
LINK  
17 18 19 20 21 22 23 24  
25 25  
R
9
10  
11  
12  
13  
14  
15  
16  
25R  
25  
10/100 Mbps ports  
Port status LEDs  
Gigabit Ethernet ports  
Figure 1-5: Summit3 front view  
The Summit3 has 24 autosensing 10BASE-T/ 100BASE-TX ports, one Gigabit Ethernet  
port, and one redundant Gigabit Ethernet port.  
For information on supported media types and distances, refer to Table 1-2.  
For information on Summit LEDs, refer to “LEDs,” on page 1-16.  
1-12  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
SUMMIT4 FRONT VIEW  
SUMMIT4 FRONT VIEW  
Figure 1-6 shows the Summit4 front view.  
Port status  
Unit status LEDs  
LEDs  
10/100 Mbps ports  
10/100 Mbps ports  
AMBER  
GREEN  
=
=
ACTIVITY  
LINK OK  
1
2
3
4
5
6
7
8
9
10  
11  
12  
13  
14  
15  
16  
FLASHING GREEN=DISABLED  
1
9
2
3
4
5
6
7
8
10 11 12 13 14 15 16  
ACTIVITY  
17 18 19 20 21 22  
17 18 19 20 21 22  
LINK  
17  
18  
19  
20  
21  
22  
Gigabit Ethernet ports  
Gigabit Ethernet ports  
Figure 1-6: Summit4 front view  
The Summit4 has 16 autosensing 10BASE-T/ 100BASE-TX ports and 6 Gigabit Ethernet  
ports. The Gigabit Ethernet ports use standard SC connectors and support 1000BASE-SX  
over multimode fiber-optic cable.  
For information on supported media types and distances, refer to Table 1-2.  
For information on Summit LEDs, refer to “LEDs,” on page 1-16.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
1-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
SUMMIT OVERVIEW  
SUMMIT4/FX FRONT VIEW  
Figure 1-7 shows the Summit4/ FX front view.  
Port status  
Unit status LEDs  
LEDs  
100 Mbps ports  
100 Mbps ports  
1
9
2
3
4
5
6
7
8
FLASHING AMBER  
SOLID AMBER  
GREEN  
=
=
=
TRAFFIC  
DISABLED  
ENABLED, LINK OK  
1
9
2
3
4
5
6
7
8
10 11 12 13 14 15 16  
LINK  
10  
11  
12  
13  
14  
15  
16  
1
1
2
2
3
3
4
4
5
5
6
6
ACTIVITY  
1
2
3
4
5
6
Gigabit Ethernet ports  
Gigabit Ethernet ports  
Figure 1-7: Summit4/FX front view  
The Summit4/ FX has 16 100BASE-FX ports and 6 Gigabit Ethernet ports. All ports use  
standard SC connectors. The Gigabit Ethernet ports support 1000BASE-SX over  
multimode fiber-optic cable.  
For information on supported media types and distances, refer to Table 1-2.  
For information on Summit LEDs, refer to “LEDs,” on page 1-16.  
1-14  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
SUMMIT48 FRONT VIEW  
SUMMIT48 FRONT VIEW  
Figure 1-8 shows the Summit48 front view.  
10/100 Mbps ports  
1
2
3
4
5
6
7
8
9
10  
11  
12  
1
7
2
8
3
9
4
5
6
10 11 12  
A
L
49 49R 13 14 15 16 17 18  
49 49R 19 20 21 22 23 24  
13  
25  
14  
26  
15  
27  
16  
28  
17  
29  
18  
30  
19  
31  
20  
32  
21  
33  
22  
34  
23  
35  
24  
36  
49  
50  
49R  
50R  
10/100 BASE-X  
MDI-X  
AMBER  
GREEN  
=
=
ACTIVITY  
LINK OK  
1000 BASE-X  
FLASHING GREEN =DISABLED  
25 26 27 28 29 30  
Power  
Mgmt.  
31 32 33 34 35 36  
A
L
50 50R 37 38 39 40 41 42  
50 50R 43 44 45 46 47 48  
37  
38  
39  
40  
41  
42  
43  
44  
45  
46  
47  
48  
Gigabit Ethernet Port status  
ports LEDs  
Unit status  
LEDs  
Figure 1-8: Summit48 front view  
The Summit48 has 48 autosensing 10BASE-T/ 100BASE-TX ports, 2 Gigabit Ethernet  
ports, and 2 redundant Gigabit Ethernet ports. All the Gigabit Ethernet ports use GBIC  
connectors.  
For information on supported media types and distances, refer to Table 1-2.  
For information on Summit LEDs, refer to “LEDs,” on page 1-16.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
1-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
SUMMIT OVERVIEW  
LEDS  
Table 1-3 describes the light emitting diode (LED) behavior on the Summit.  
Table 1-3: Summit LEDs  
LED  
Color  
Indicates  
Power  
Green  
The Summit is powered up.  
Yellow  
The Summit is indicating a power, overheat, or fan failure.  
MGMT  
Green flashing  
Slow  
Fast  
The Summit is operating normally.  
Power On Self Test (POST) in progress, or software download  
in progress.  
Yellow  
The Summit has failed its POST.  
10/100Mbps Port Status LEDs  
Green  
Yellow  
Link is present; port is enabled.  
Frames are being transmitted/received on this port.  
Green flashing Link is present; port is disabled.  
Off  
Link is not present.  
Gigabit Ethernet Port Status LEDs  
Packet  
Yellow  
Off  
Frames are being transmitted/received on this port.  
No activity on this port.  
Status  
Green on  
Link is present; port is enabled;  
full-duplex operation.  
Green flashing Link is present; port is disabled.  
Off Link is not present.  
1-16  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
SUMMIT REAR VIEW  
SUMMIT REAR VIEW  
Figure 1-9 shows the rear view for the Summit switch.  
Power socket and fuse  
RPS port  
Console port  
U
L
U
L
C
!
MADE IN USA  
MODEL/NUMBER  
PART NUMBER  
SERIAL NUMBER  
MAC ADDRESS  
130001-00 Rev.03  
Figure 1-9: Summit rear view  
POWER SOCKET  
The Summit automatically adjusts to the supply voltage. The power supply operates  
down to 90 V. The fuse is suitable for both 110 V AC and 220-240 V AC operation.  
SERIAL NUMBER  
Use this serial number for fault-reporting purposes.  
CONSOLE PORT  
Use the console port (9-pin, “D” type connector) for connecting a terminal and carrying  
out local out-of-band management.  
REDUNDANT POWER SUPPLY PORT  
The redundant power supply (RPS) port is used to connect to a Summit RPS or a  
Summit Virtual Chassis. Both the Summit RPS and the Summit Virtual Chassis provide  
a redundant, load-shared power source to the Summit. If the primary power source for  
the switch fails, the RPS in either the Summit RPS or the Summit Virtual Chassis takes  
over, ensuring uninterrupted network operation.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
1-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
SUMMIT OVERVIEW  
In addition, when connected to a Summit RPS or Summit Virtual Chassis, the Summit  
switch can provide status on power and fan operation of the RPS through SNMP, the  
command-line interface, and the Web interface (power supply status only).  
The Summit RPS and Summit Virtual Chassis can simultaneously provide power for as  
many as two Summit switches.  
MAC ADDRESS  
This label shows the unique Ethernet MAC address assigned to this device.  
FACTORY DEFAULTS  
Table 1-4 shows factory defaults for the Summit features.  
Table 1-4: Summit Factory Defaults  
Item  
Default Setting  
Port status  
Enabled on all ports.  
Serial or Telnet user account  
Console port configuration  
admin with no password and user with no password.  
9600 baud, eight data bits, one stop bit, no parity,  
XON/XOFF flow control enabled.  
Web network management  
SNMP read community string  
SNMP write community string  
RMON history session  
RMON alarms  
Enabled.  
public.  
private.  
Enabled.  
Disabled.  
BOOTP  
Enabled on the default VLAN (default).  
All traffic is part of the default queue in ingress mode.  
Recognition enabled.  
QoS  
802.1p priority  
802.3x flow control  
Virtual LANs  
Enabled.  
One VLAN named default; all ports belong to the default  
VLAN. The default VLAN belongs to the STPD named s0.  
802.1Q tagging  
All packets are untagged on the default VLAN (default).  
Disabled for the switch; enabled for each port in the STPD.  
Disabled.  
Spanning Tree Protocol  
IP Routing  
Forwarding database aging period  
300 seconds (5 minutes).  
1-18  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
FACTORY DEFAULTS  
Table 1-4: Summit Factory Defaults (continued)  
Item  
Default Setting  
RIP  
Disabled for the switch; enabled on each VLAN  
configured with an IP address.  
OSPF  
Disabled for the switch; enabled for each VLAN  
configured with an IP address. All VLANs belong to the  
backbone area.  
IP multicast routing  
DVMRP  
Disabled.  
Disabled for the switch; enabled for each VLAN  
configured with an IP address.  
IGMP snooping  
GVRP  
Disabled.  
Disabled.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
1-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SUMMIT OVERVIEW  
1-20  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Installation and Setup  
2
This chapter describes the following:  
How to decide where to install the Summit  
Gigabit Ethernet configuration rules  
How to install the switch in a rack or free-standing  
How to connect equipment to the console port  
How to check the installation using the Power On Self-Test (POST)  
FOLLOWING SAFETY INFORMATION  
Before installing or removing any components of the switch, or before carrying out any  
maintenance procedures, you must read the safety information provided in Appendix A  
of this guide.  
DETERMINING THE SWITCH LOCATION  
The Summit is suited for use in the office, where it can be free-standing or mounted in a  
standard 19-inch equipment rack. Alternatively, the device can be rack-mounted in a  
wiring closet or equipment room. Two mounting brackets are supplied with the switch.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
2-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
INSTALLATION AND SETUP  
When deciding where to install the switch, ensure that:  
The switch is accessible and cables can be connected easily.  
Water or moisture cannot enter the case of the unit.  
Air-flow around the unit and through the vents in the side of the case is not  
restricted. You should provide a minimum of 25mm (1-inch) clearance.  
No objects are placed on top of the unit.  
Units are not stacked more than four high if the switch is free-standing.  
MEDIA TYPES AND DISTANCES  
The connectors, media types, and maximum distances are described in Table 2-1.  
Table 2-1: Media Types and Distances  
Mhz/Km Maximum  
Standard  
Media Type  
Rating  
Distance  
1000BASE-SX  
50/125um Multimode Fiber  
50/125um Multimode Fiber  
62.5/125um Multimode Fiber  
62.5/125um Multimode Fiber  
50/125um Multimode Fiber  
50/125um Multimode Fiber  
62.5/125um Multimode Fiber  
10u Single-mode Fiber  
400  
500 Meters  
550 Meters  
220 Meters  
275 Meters  
550 Meters  
550 Meters  
550 Meters  
5,000 Meters  
10,000 Meters  
400 Meters  
500  
160  
200  
1000BASE-LX  
400  
500  
500  
1000BASE-LX10* 10u Single-mode Fiber  
100BASE-FX  
50/125um Multimode Fiber  
(half-duplex operation  
50/125um Multimode Fiber  
(full-duplex operation)  
2000 Meters  
400 Meters  
2000 Meters  
62.5/125um Multimode Fiber  
(half-duplex operation)  
52.5/125um Multimode Fiber  
(full-duplex operation)  
100BASE-TX  
10BASE-T  
Category 5 UTP Cable (100Mbps)  
Category 3 UTP Cable (10Mbps)  
100 Meters  
100 Meters  
*EXTREME NETWORKS PROPRIETARY. CAN BE CONNECTED TO 1000BASE-LX ON SINGLE-MODE FIBER USING A MAXIMUM DISTANCE  
OF 5,000 METERS.  
2-2  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
INSTALLING THE SUMMIT  
For more information on 1000BASE-SX and 1000BASE-LX link characteristics,  
refer to IEEE Draft P802.3z/D4.2, Table 38-2 and Table 38-6.  
INSTALLING THE SUMMIT  
The Summit can be mounted in a rack, or placed free-standing on a tabletop.  
RACK MOUNTING  
The switch is 2U high and will fit in most standard 19-inch racks.  
The rack mount kits must not be used to suspend the switch from under a table  
or desk, or attach it to a wall.  
To rack mount the Summit, follow these steps:  
1
Place the switch the right way up on a hard flat surface, with the front facing toward  
you.  
2
3
4
Remove the existing screws from the sides of the chassis and retain for Step 4.  
Locate a mounting bracket over the mounting holes on one side of the unit.  
Insert the four screws and fully tighten with a suitable screwdriver, as shown in  
Figure 2-1.  
Figure 2-1: Fitting the mounting bracket  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
2-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
INSTALLATION AND SETUP  
5
6
Repeat the three previous steps for the other side of the switch.  
Insert the switch into the 19-inch rack and secure with suitable screws (not  
provided). Ensure that ventilation holes are not obstructed.  
7
8
Connect the Summit to the redundant power supply (if applicable).  
Connect cables.  
FREE-STANDING  
The Summit is supplied with four self-adhesive rubber pads. Apply the pads to the  
underside of the device by sticking a pad in the marked area at each corner of the  
switch.  
STACKING THE SWITCH AND OTHER DEVICES  
Up to four Summit switches can be placed on top of one another.  
This section relates only to physically placing the devices on top of one another.  
Apply the pads to the underside of the device by sticking a pad at each corner of the  
switch. Place the devices on top of one another, ensuring that the corners align.  
CONNECTING EQUIPMENT TO THE CONSOLE PORT  
Connection to the console port is used for direct local management. The switch console  
port settings are set as follows:  
Baud rate — 9600  
Data bits — 8  
Stop bit — 1  
Parity None  
Flow control — XON/ XOFF  
The terminal connected to the console port on the switch must be configured with the  
same settings. This procedure will be described in the documentation supplied with the  
terminal.  
2-4  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CONNECTING EQUIPMENT TO THE CONSOLE PORT  
Appropriate cables are available from your local supplier. In order to make your own  
cables, pin-outs for a DB-9 male console connector are described in Table 2-2.  
Table 2-2: Console Connector Pin-Outs  
Function  
Pin Number  
TXD (transmit data)  
RXD (receive data)  
GND (ground)  
3
2
5
Figure 2-2 shows the pin-outs for a 9-pin to RS-232 25-pin null-modem cable.  
Summit  
PC/Terminal  
Cable connector: 9-pin female  
Cable connector: 25-pin male/female  
Screen Shell  
1
3
Screen  
RxD  
TxD  
3
2
5
7
8
6
1
4
RxD  
2
TxD  
Ground  
RTS  
CTS  
DSR  
DCD  
DTR  
7
Ground  
RTS  
4
20  
5
DTR  
CTS  
6
DSR  
DCD  
8
Figure 2-2: Null-modem cable pin-outs  
Figure 2-3 shows the pin-outs for a 9-pin to 9-pin PC-AT null-modem serial cable.  
Summit  
PC-AT Serial Port  
Cable connector: 9-pin female  
Cable connector: 9-pin female  
Screen Shell  
Shell Screen  
DTR  
TxD  
4
3
2
8
5
6
7
1
1
2
3
4
5
6
7
8
DCD  
RxD  
RxD  
TxD  
CTS  
Ground  
DSR  
RTS  
DCD  
DTR  
Ground  
DSR  
RTS  
CTS  
Figure 2-3: PC-AT serial null-modem cable pin-outs  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
2-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
INSTALLATION AND SETUP  
POWERING ON THE SWITCH  
To turn on power to the switch, connect the AC power cable to the switch and then to  
the wall outlet, and turn the on/ off switch to the on position.  
CHECKING THE INSTALLATION  
After turning on power to the Summit, the device performs a Power On Self-Test  
(POST).  
During the POST, all ports are temporarily disabled, the packet LED is off, the power  
LED is on, and the MGMT LED flashes. The MGMT LED flashes until the switch has  
successfully passed the POST.  
If the switch passes the POST, the MGMT LED blinks at a slow rate (1 blink per  
second). If the switch fails the POST, the MGMT LED shows a solid yellow light.  
For more information on the LEDs, refer to Chapter 1.  
LOGGING IN FOR THE FIRST TIME  
After the Summit has completed the POST, it is operational. Once operational, you can  
log in to the switch and configure an IP address for the default VLAN (named default).  
To manually configure the IP settings, perform the following steps:  
1
Connect a terminal or workstation running terminal-emulation software to the  
console port.  
2
3
At your terminal, press [Return] one or more times until you see the login prompt.  
At the login prompt, enter the default user name admin to log on with administrator  
privileges. For example:  
login: admin  
Administrator capabilities allow you to access all switch functions.  
For more information on switch security, refer to Chapter 3.  
2-6  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LOGGING IN FOR THE FIRST TIME  
4
At the password prompt, press [Return].  
The default name, admin, has no password assigned. When you have successfully  
logged on to the switch, the command-line prompt displays the name of the switch  
(for example, Summit1) in its prompt.  
5
6
Assign an IP address and subnetwork mask for VLAN default by typing  
config vlan default ipaddress 123.45.67.8 255.255.255.0  
Your changes take effect immediately.  
Save your configuration changes so that they will be in effect after the next switch  
reboot, by typing  
save  
For more information on saving configuration changes, refer to Chapter 14.  
7
When you are finished using the facility, logout of the switch by typing  
logout  
After two incorrect login attempts, the Summit locks you out of the login facility.  
You must wait a few minutes before attempting to log in again.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
2-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
INSTALLATION AND SETUP  
2-8  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Accessing The Switch  
3
This chapter provides the following required information to begin managing the  
Summit:  
Understanding the command syntax  
Line-editing commands  
Command history substitution  
Configuring the switch for management  
Switch management methods  
Configuring SNMP  
Checking basic connectivity  
In order for configuration changes to be retained through a switch power cycle or  
reboot, you must issue a SAVE command after you have made the change. For  
more information on the SAVE command, refer to Chapter 14.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
3-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ACCESSING THE SWITCH  
UNDERSTANDING THE COMMAND SYNTAX  
This section describes the steps to take when entering a command. Refer to the sections  
that follow for detailed information on using the command-line interface.  
To use the command-line interface, follow these steps:  
1
When entering a command at the prompt, ensure that you have the appropriate  
privilege level.  
Most configuration commands require you to have the administrator privilege level.  
Enter the command name.  
2
If the command does not include a parameter or values, skip to Step 3. If the  
command requires more information, or if you want to include optional arguments,  
continue to Step 2a.  
a
If the command has additional options, include them after the command name.  
If the command includes a parameter, enter the parameter name and values.  
b
The value part of the command specifies how you want the parameter to be set.  
Values include numerics, strings, or addresses, depending on the parameter.  
3
After entering the complete command, press [Return].  
If an asterisk (*) appears in front of the command-line prompt, it indicates that  
you have outstanding configuration changes that have not been saved. For more  
information on saving configuration changes, refer to Chapter 14.  
SYNTAX HELPER  
The command-line interface has a built-in syntax helper. If you are unsure of the  
complete syntax for a particular command, enter as much of the command as possible.  
The syntax helper provides a list of options for the remainder of the command.  
The syntax helper also provides assistance if you have entered an incorrect command.  
COMMAND COMPLETION WITH SYNTAX HELPER  
The Summit provides command completion by way of the [Tab] key. If you enter a  
partial command, pressing the [Tab] key posts a list of available options, and places the  
cursor at the end of the command.  
3-2  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
UNDERSTANDING THE COMMAND SYNTAX  
ABBREVIATED SYNTAX  
Abbreviated syntax is the shortest, most unambiguous, allowable abbreviation of a  
command, parameter, or value. Typically, this is the first three letters of the command.  
COMMAND SHORTCUTS  
All named components of the switch configuration must have a unique name.  
Components are named using the createcommand. When you enter a command to  
configure a named component, you do not need to use the keyword of the component.  
For example, to create a VLAN, you must enter a unique VLAN name:  
create vlan engineering  
Once you have created the VLAN with a unique name, you can then eliminate the  
keyword vlanfrom all other commands that require the name to be entered. For  
example, instead of entering the command  
config vlan engineering delete port 1-3,6  
you could enter the following shortcut:  
config engineering delete port 1-3, 6  
NUMERICAL RANGES  
Commands that require you to enter one or more port numbers use the parameter  
<portlist>in the syntax. A portlist can be a range of numbers, for example:  
port 1-3  
You can add additional port numbers to the list, separated by a comma:  
port 1-3,6,8  
NAMES  
All named components of the switch configuration must have a unique name. Names  
must begin with an alphabetical character delimited by whitespace, unless enclosed in  
quotation marks.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
3-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ACCESSING THE SWITCH  
SYMBOLS  
You may see a variety of symbols shown as part of the command syntax. These symbols  
explain how to enter the command, and you do not type them as part of the command  
itself. Table 3-1 summarizes command syntax symbols.  
Table 3-1: Command Syntax Symbols  
Symbol  
Description  
angle brackets < >  
Enclose a variable or value. You must specify the variable or value. For  
example, in the syntax  
config vlan <name> ipaddress <ip_address>  
you must supply a VLAN name for <name>and an address for  
<ip_address>when entering the command. Do not type the angle  
brackets.  
square brackets [ ]  
vertical bar |  
braces { }  
Enclose a required value or list of required arguments. One or more  
values or arguments can be specified. For example, in the syntax  
disable vlan [<name> | all]  
you must specify either the VLAN name for <name>, or the keyword all  
when entering the command. Do not type the square brackets.  
Separates mutually exclusive items in a list, one of which must be  
entered. For example, in the syntax  
config snmp community [read | write] <string>  
you must specify either the read or write community string in the  
command. Do not type the vertical bar.  
Enclose an optional value or a list of optional arguments. One or more  
values or arguments can be specified. For example, in the syntax  
show vlan {<name> | all}  
you can specify either a particular VLAN or the keyword all. If you do  
not specify an argument, the command will show all VLANs. Do not type  
the braces.  
3-4  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
LINE-EDITING KEYS  
LINE-EDITING KEYS  
Table 3-2 describes the line-editing keys available using the command-line interface.  
Table 3-2: Line-Editing Keys  
Key(s)  
Description  
Backspace  
Deletes character to the left of cursor and shifts remainder of line to left.  
Delete or [Ctrl] + D Deletes character under cursor and shifts remainder of line to left.  
[Ctrl] + K  
Insert  
Deletes characters from under cursor to the end of the line.  
Toggles on and off. When toggled on, inserts text and pushes previous  
text to right.  
Left Arrow  
Moves cursor to left.  
Right Arrow  
Home or [Ctrl] + A  
End or [Ctrl] + E  
[Ctrl] + L  
Moves cursor to right.  
Moves cursor to first character in line.  
Moves cursor to last character in line.  
Clears the screen and movers the cursor to the beginning of the line.  
Clears all characters typed from the cursor to the beginning of the line.  
Deletes the previous word.  
[Ctrl] + U  
[Ctrl] + W  
Up Arrow  
Displays the previous command in the command history buffer, and  
places cursor at end of command.  
Down Arrow  
Displays the next command in the command history buffer, and places  
cursor at end of command.  
COMMAND HISTORY  
The Summit “remembers” the last 49 commands you enter. You can display a list of  
these commands by using the following command:  
history  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
3-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
ACCESSING THE SWITCH  
COMMON COMMANDS  
Table 3-3 describes common commands used to manage the switch. Commands specific  
to a particular feature are described in the other chapters of this guide.  
Table 3-3: Common Commands  
Command  
Description  
create account [admin | user] <username>  
{<password>}  
Creates a user account.  
create vlan <name>  
Creates a VLAN.  
config account <username> {<password>}  
config banner  
Configures a user account password.  
Configures the banner string. You can  
enter up to 24 rows of 80-column text that  
is displayed before the login prompt of  
each session. Press [Return] at the  
beginning of a line to terminate the  
command and apply the banner. To clear  
the banner, press [Return] at the beginning  
of the first line.  
config devicemode [bridging | iprouting | ipmc |  
ipqos]  
Configures the operating mode of the  
switch. Specify the following:  
bridging— Layer 2 bridging  
functions only  
iprouting— Bridging and IP unicast  
routing functions  
ipmc— Bridging, IP unicast routing,  
and IP multicast routing functions  
ipqos— IP flow-based QoS functions  
If this command is used to change the  
operating mode of the Summit once it is  
up and running, it causes the switch to  
save the configuration and reboot. The  
default operating mode is ipmc.  
config port <portlist> auto off {speed [10 | 100]}  
duplex [half | full]  
Manually configures the port speed and  
duplex setting of one or more ports.  
3-6  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
COMMON COMMANDS  
Table 3-3: Common Commands (continued)  
Command  
Description  
config time <date> <time>  
Configures the system date and time. The  
format is as follows:  
mm/dd/yyyy hh:mm:ss  
The time uses a 24-hour clock format. You  
cannot set the year past 2023.  
config vlan <name> ipaddress <ip_address>  
{<mask>}  
Configures an IP address and subnet  
mask for a VLAN.  
enable bootp vlan [<name> | all]  
enable idletimeout  
Enables BOOTP for one or more VLANs.  
Enables a fixed value timer that  
disconnects all sessions (both Telnet and  
console) after 20 minutes of inactivity.  
The default setting is disabled.  
clear session <number>  
Terminates a Telnet session from the  
switch.  
disable bootp vlan [<name> | all]  
disable idletimeout  
Disables BOOTP for one or more VLANs.  
Disables the fixed value timer that  
disconnects all sessions. Once disabled,  
console sessions remain open until the  
switch is rebooted. Telnet session remain  
open until you close the Telnet client.  
disable port <portlist>  
disable telnet  
Disables a port.  
Disables Telnet access to the switch.  
Disables Web access to the switch.  
Deletes a user account.  
Deletes a VLAN.  
disable web  
delete account <username>  
delete vlan <name>  
unconfig switch {all}  
Resets all switch parameters (with the  
exception of defined user accounts) to the  
factory defaults. If you specify the  
keyword all, the user account information  
is reset as well.  
show banner  
Displays the user-configured banner.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
3-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ACCESSING THE SWITCH  
CONFIGURING MANAGEMENT ACCESS  
The Summit supports the following two level levels of management:  
User  
Administrator  
A user-level account has viewing access to all manageable parameters, with the  
exception of the following:  
User account database  
SNMP community strings  
A user-level account can use the pingcommand to test device reachability, and change  
the password assigned to the account name. If you have logged on with user  
capabilities, the command-line prompt will end with a (>) sign. For example:  
Summit1:2>  
An administrator-level account can view and change all switch parameters. It can also  
add and delete users, and change the password associated with any account name. The  
administrator can disconnect a management session that has been established by way of  
a Telnet connection. If this happens, the user logged on by way of the Telnet connection  
is notified that the session has been terminated.  
If you have logged on with administrator capabilities, the command-line prompt will  
end with a (#) sign. For example:  
Summit1:18#  
The prompt text is taken from the SNMP sysnamesetting. The number that follows the  
colon indicates the sequential line/ command number.  
If an asterisk (*) appears in front of the command-line prompt, it indicates that you  
have outstanding configuration changes that have not been saved. For example:  
*Summit1:19#  
For more information on saving configuration changes, refer to Chapter 14.  
3-8  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CONFIGURING MANAGEMENT ACCESS  
DEFAULT ACCOUNTS  
By default, the switch is configured with two accounts, as shown in Table 3-4.  
Table 3-4: Default Accounts  
Account Name  
Access Level  
admin  
This user can access and change all manageable  
parameters. The admin account cannot be deleted.  
user  
This user can view (but not change) all manageable  
parameters, with the following exceptions:  
This user cannot view the user account database.  
This user cannot view the SNMP community strings.  
This user has access to the pingcommand.  
CHANGING THE DEFAULT PASSWORD  
Default accounts do not have passwords assigned to them. Passwords must have a  
minimum of 4 characters and can have a maximum of 12 characters.  
User names and passwords are case-sensitive.  
To add a password to the default admin account, follow these steps:  
1
2
3
Log in to the switch using the name admin.  
At the password prompt, press [Return].  
Add a default admin password by typing the following:  
config account admin  
4
5
Enter the new password at the prompt.  
Re-enter the new password at the prompt.  
To add a password to the default user account, follow these steps:  
1
2
3
Log in to the switch using the name admin.  
At the password prompt, press [Return].  
Add a default user password by typing the following:  
config account user  
4
Enter the new password at the prompt.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
3-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
ACCESSING THE SWITCH  
5
Re-enter the new password at the prompt.  
If you forget your password while logged out of the command-line interface,  
contact your local technical support representative, who will advise on your next  
course of action.  
CREATING A MANAGEMENT ACCOUNT  
The switch can have a total of sixteen management accounts. You can use the default  
names (admin and user), or you can create new names and passwords for the accounts.  
Passwords must have a minimum of 4 characters and can have a maximum of 12  
characters.  
The account name “admin” cannot be deleted.  
To create a new account, follow these steps:  
1
2
3
Log in to the switch as admin.  
At the password prompt, press [Return].  
Add a new user by using the following command:  
create account [admin | user] <username>  
Enter the password at the prompt.  
4
5
Re-enter the password at the prompt.  
VIEWING SWITCH ACCOUNTS  
To view the accounts that have been created, you must have administrator privileges.  
Enter the following to see the accounts:  
show account  
Output from the show accounts command is as follows:  
#show account  
User Name  
Access LoginOK Failed Session  
------------- ------ ------- ------ --------  
admin  
user  
R/W  
RO  
0
0
0
0
3-10  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
METHODS OF MANAGING THE SUMMIT  
DELETING A SWITCH ACCOUNT  
To delete a switch account, you must have administrator privileges. Use the following  
command to delete an account:  
delete account <username>  
METHODS OF MANAGING THE SUMMIT  
You can manage the Summit using the following methods:  
Access the command-line interface by connecting a terminal (or workstation with  
terminal-emulation software) to the Summit console port.  
Access the command-line interface over a TCP/ IP network using a Telnet  
connection.  
Access the Web interface over a TCP/ IP network, using a standard Web browser  
(such as Netscape Navigator™ 3.0 or greater, or Microsoft Internet Explorer™ 3.0 or  
greater).  
Use an SNMP Network Manager over a network running the IP protocol.  
The switch can support up to seven user sessions concurrently (for example, one  
console port, one Web session, and five Telnet connections).  
USING THE CONSOLE INTERFACE  
The command-line interface built into the switch is accessible by way of the 9-pin,  
RS-232 console port located on the rear of the unit.  
For more information on the console port pin-outs, refer to Chapter 2.  
Once the connection is established, you will see the system prompt and you may log in.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
3-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ACCESSING THE SWITCH  
USING TELNET  
Any workstation with a Telnet facility should be able to communicate with the switch  
over a TCP/ IP network.  
Up to eight active Telnet sessions can access the switch concurrently. The Telnet  
connection will time out after twenty minutes of inactivity. If a connection to a Telnet  
session is lost inadvertently, the switch terminates the session within two hours.  
Before you can start a Telnet session, you must set up the IP parameters described in  
the section “Configuring Switch IP Parameters,” later in this chapter. Telnet is enabled  
by default.  
To open the Telnet session, you must specify the IP address of the device that you want  
to manage. Check the user manual supplied with the Telnet facility if you are unsure of  
how to do this.  
Once the connection is established, you will see the system prompt and you may log in.  
CONNECTING TO ANOTHER HOST USING TELNET  
You can Telnet from the current command-line interface session to another host using  
the following command:  
telnet <ipaddress> {<port_number>}  
If the TCP port number is not specified, the Telnet session defaults to port 23. Only  
VT100 emulation is supported.  
CONFIGURING SWITCH IP PARAMETERS  
In order to manage the switch by way of a Telnet connection or by using an SNMP  
Network Manager, you must first configure the switch IP parameters.  
USING A BOOTP SERVER  
If you are using IP and you have a BOOTP server set up correctly on your network, you  
must add the following information to the BOOTP server:  
Switch Media Access Control (MAC) address  
IP address  
Subnet address mask (optional)  
3-12  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
USING TELNET  
The switch MAC address is found on the rear label of the switch.  
Once this is done, the IP address and subnetwork mask for the switch will be  
downloaded automatically. You can then start managing the switch without further  
configuration.  
You can enable BOOTP on a per-VLAN basis by using the following command:  
enable bootp vlan [<name> | all]  
By default, BOOTP is enabled on the default VLAN.  
If you configure the switch to use BOOTP, the switch IP address is not retained through  
a power cycle, even if the configuration has been saved. To retain the IP address  
through a power cycle, you must configure the IP address of the VLAN using the  
command-line interface (CLI), Telnet, or Web interface.  
All VLANs within a switch that are configured to use BOOTP to get their IP address  
use the same MAC address. Therefore, if you are using BOOTP relay through a router,  
the BOOTP server must be capable of differentiating its replay based on the gateway  
portion of the BOOTP packet.  
For more information on DHCP/BOOTP relay, refer to Chapter 9.  
MANUALLY CONFIGURING THE IP SETTINGS  
If you are using IP without a BOOTP server, you must enter the IP parameters for the  
switch in order for the SNMP Network Manager or Telnet software to communicate  
with the device. To assign IP parameters to the switch, you must do the following:  
Log in to the switch with administrator privileges.  
Assign an IP address and subnetwork mask to a VLAN.  
The switch comes configured with a default VLAN named default. To use Telnet or  
an SNMP Network Manager, you must have at least one VLAN on the switch, and it  
must be assigned an IP address and subnetwork mask. IP addresses are always  
assigned to a VLAN. The Summit can be assigned multiple IP addresses.  
For information on creating and configuring VLANs, refer to Chapter 5.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
3-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ACCESSING THE SWITCH  
To manually configure the IP settings, perform the following steps:  
1
Connect a terminal or workstation running terminal emulation software to the  
console port.  
2
3
At your terminal, press [Return] one or more times until you see the login prompt.  
At the login prompt, enter your user name and password. Note that they are both  
case-sensitive. Ensure that you have entered a user name and password with  
administrator privileges.  
If you are logging in for the first time, use the default user name admin to log in  
with administrator privileges. For example:  
login: admin  
Administrator capabilities enable you to access all switch functions. The default  
user names have no passwords assigned.  
If you have been assigned a user name and password with administrator  
privileges, enter them at the login prompt.  
4
5
At the password prompt, enter the password and press [Return].  
When you have successfully logged in to the switch, the command-line prompt  
displays the name of the switch in its prompt.  
Assign an IP address and subnetwork mask for the default VLAN by using the  
following command:  
config vlan <name> ipaddress <ipaddress> {<subnet_mask>}  
For example:  
config vlan default ipaddress 123.45.67.8 255.255.255.0  
Your changes take effect immediately.  
6
7
Configure the default route for the switch using the following command:  
config iproute add default <ipaddress> {<metric>}  
For example:  
config iproute add default 123.45.67.1  
Save your configuration changes so that they will be in effect after the next switch  
reboot, by typing  
save  
For more information on saving configuration changes, refer to Chapter 14.  
3-14  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
USING TELNET  
8
When you are finished using the facility, log out of the switch by typing  
logout  
DISCONNECTING A TELNET SESSION  
The administrator-level account can disconnect a management session that has been  
established by way of a Telnet connection. If this happens, the user logged in by way of  
the Telnet connection is notified that the session has been terminated.  
To terminate a Telnet session, follow these steps:  
1
2
Log in to the switch with administrator privileges.  
Determine the session number of the session you want to terminate by typing  
show session  
Sample output from the show sessioncommand is as follows:  
show session:  
0 Wed Sep 17 20:48:38 1997 admin console serial  
4 Wed Sep 17 21:52:16 1997 admin telnet 192.208.37.26  
3
Terminate the session by using the following command:  
clear session <session_number>  
DISABLING TELNET ACCESS  
By default, Telnet services are enabled on the switch. You can choose to disable Telnet  
by entering  
disable telnet  
To re-enable Telnet on the switch, at the console port enter  
enable telnet  
You must be logged in as an administrator to enable or disable Telnet.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
3-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ACCESSING THE SWITCH  
IP HOST CONFIGURATION COMMANDS  
Table 3-5 describes the commands that are used to configure IP settings on the switch.  
Table 3-5: IP Host Configuration Commands  
Command  
Description  
config iparp add <ipaddress> <mac_address>  
Adds a permanent entry to the ARP table.  
Specify the IP address and MAC address  
of the entry.  
config iparp delete <ipaddress>  
Deletes an entry from the ARP table.  
Specify the IP address of the entry.  
clear iparp [<ipaddress> | vlan <name> | all]  
Removes dynamic entries in the IP ARP  
table. Permanent IP ARP entries are not  
affected.  
config iproute add <ipaddress> <mask> <gateway> Adds a static address to the routing table.  
{<metric>}  
Use a value of 255.255.255.255 for mask  
to indicate a host entry  
config iproute delete <ipaddress> <mask>  
<gateway>  
Deletes a static address from the routing  
table.  
config iproute add default <gateway> {<metric>}  
Adds a default gateway to the routing  
table. A default gateway must be located  
on a configured IP interface. If no metric is  
specified, the default metric of 1 is used.  
config iproute delete default <gateway>  
show ipconfig {vlan <name> | all}  
show ipstats {vlan [<name> | all]}  
Deletes a default gateway from the  
routing table.  
Displays configuration information for one  
or more VLANs.  
Displays IP statistics for the CPU of the  
switch.  
show iparp {<ipaddress | vlan <name> | all |  
permanent}  
Displays the IP ARP table. You can filter  
the display by IP address, VLAN, or  
permanent entries.  
3-16  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
USING EXTREMEWARE VISTA  
USING EXTREMEWARE VISTA  
ExtremeWareVistais device-management software running in the Summit that  
enables you to access the switch over a TCP/ IP network, using a standard Web browser.  
Any properly configured standard Web browser that supports frames (such as Netscape  
Navigator 3.0 or Microsoft Internet Explorer 3.0) can manage the switch over a TCP/ IP  
network.  
For more information on assigning an IP address, refer to “Configuring Switch IP  
Parameters,” on page 3-12.  
The default home page of the switch can be accessed using the following command:  
http://<ipaddress>  
When you access the home page of the switch, you are presented with the Logon  
screen.  
For more information on using ExtremeWare Vista, refer to Chapter 13.  
DISABLING WEB ACCESS  
By default, Web access is enabled on the Summit. To disable it, enter the following  
command:  
disable web  
To re-enable Web access, enter the following command:  
enable web  
Reboot the switch in order for these changes to take effect.  
For more information on rebooting the switch, refer to Chapter 14.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
3-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ACCESSING THE SWITCH  
USING SNMP  
Any Network Manager running the Simple Network Management Protocol (SNMP) can  
manage the switch, provided the Management Information Base (MIB) is installed  
correctly on the management station. Each Network Manager provides its own user  
interface to the management facilities.  
The following sections describe how to get started if you want to use an SNMP  
manager. It assumes you are already familiar with SNMP management. If not, refer to  
the following publication:  
“The Simple Book”  
by Marshall T. Rose  
ISBN 0-13-8121611-9  
Published by Prentice Hall  
ACCESSING SWITCH AGENTS  
In order to have access to the SNMP agent residing in the switch, at least one VLAN  
must have an IP address assigned to it.  
For more information on assigning IP addresses, refer to Table 3-3.  
SUPPORTED MIBS  
Any Network Manager running SNMP can manage the Summit, provided the MIB is  
installed correctly on the management station. In addition to private MIBs, the Summit  
supports the standard MIBs listed in Table 3-6.  
Table 3-6: Supported MIBs  
Description  
RFC Number  
1213  
MIB II  
IP Forwarding Table MIB  
Bridge MIB  
1354  
1493  
Evolution of Interfaces  
RIP2 MIB  
1573  
1724  
RMON (Etherstats, History,  
Alarms, and Events)  
1757  
3-18  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
USING SNMP  
Table 3-6: Supported MIBs (continued)  
Description  
RFC Number  
OSPF2 MIB  
1850  
2021  
2239  
RMON II Probe Configuration  
802.3 MAU MIB  
The IEEE Bridge MIB dot1dTpPortEntry PortInDiscards and dot1dBasePortEntry  
counters are not incremented.  
CONFIGURING SNMP SETTINGS  
The following SNMP parameters can be configured on the switch:  
Authorized trap receivers — An authorized trap receiver can be one or more  
network management stations on your network. The switch sends SNMP traps to all  
trap receivers. You can have a maximum of six trap receivers configured for each  
Summit. Entries in this list can be created, modified, and deleted using the RMON2  
trapDestTable MIB variable, as described in RFC 2021.  
Authorized managers — An authorized manager can be either a single network  
management station, or a range of addresses (for example, a complete subnet)  
specified by a prefix and a mask. The Summit can have a maximum of thirty-two  
authorized managers.  
Community strings — The community strings allow a simple method of  
authentication between the switch and the remote Network Manager. There are two  
types of community strings on the Summit. Read community strings provide  
read-only access to the switch. The default read community string is public.  
Read-write community strings provide read and write access to the switch. The  
default read-write community string is private. A total of eight community strings  
can be configured on the switch. The community string for all authorized trap  
receivers must be configured on the switch for the trap receiver to receive  
switch-generated traps.  
System contact (optional) — The system contact is a text field that enables you to  
enter the name of the person(s) responsible for managing the switch.  
System name — The system name is the name that you have assigned to this switch.  
The default name is the model name of the Summit (for example, Summit1).  
System location (optional) — Using the system location field, you can enter an  
optional location for this switch.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
3-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ACCESSING THE SWITCH  
Table 3-7 describes SNMP configuration commands.  
Table 3-7: SNMP Configuration Commands  
Command  
Description  
enable snmp access  
enable snmp trap  
Turns on SNMP support for the switch.  
Turns on SNMP trap support.  
config snmp add <ipaddress> {<mask>}  
Adds the IP address of an SNMP  
management station to the access list. Up  
to 32 addresses can be specified.  
config snmp add trapreceiver <ipaddress>  
community <string>  
Adds the IP address of a specified trap  
receiver. The IP address can be a  
unicast, multicast, or broadcast. A  
maximum of 6 trap receivers is allowed.  
config snmp add community [read | readwrite]  
<string>  
Adds an SNMP read and write community  
string. Each community string can have a  
maximum of 127 characters.  
config snmp delete [<ipaddress> {<mask>} | all]  
Deletes the IP address of a specified  
SNMP management station or all SNMP  
management stations. If you delete all  
addresses, any machine can have SNMP  
management access to the switch.  
config snmp delete trapreceiver [<ip_address>  
community <string> | all]  
Deletes the IP address of a specified trap  
receiver or all authorized trap receivers.  
config snmp delete community [read | readwrite]  
<string>  
Deletes an SNMP community string.  
config snmp syscontact <string>  
Configures the name of the system  
contact. A maximum of 255 characters is  
allowed.  
config snmp sysname <string>  
Configures the name of the switch. A  
maximum of 255 characters is allowed.  
The default sysname is the model name of  
the Summit, such as Summit1, Summit2,  
Summit3, and so on. The sysname  
appears in the Summit prompt.  
config snmp syslocation <string>  
Configures the location of the switch. A  
maximum of 255 characters is allowed.  
3-20  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
USING SNMP  
DISPLAYING SNMP SETTINGS  
To display the SNMP settings configured on the Summit, enter the following command:  
show management  
This command displays the following information:  
Enable/ disable state for telnet, SNMP, and Web access  
SNMP community strings  
Authorized SNMP station list  
SNMP trap receiver list  
Login statistics  
RESETTING AND DISABLING SNMP  
To reset and disable SNMP settings, use the commands in Table 3-8.  
Table 3-8: SNMP Reset and Disable Commands  
Command  
Description  
disable snmp access  
disable snmp trap  
Disables SNMP on the switch.  
Prevents SNMP traps from being sent from the switch.  
Does not clear the SNMP trap receivers that have been  
configured.  
unconfig management  
Restores default values to all SNMP-related entries.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
3-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
ACCESSING THE SWITCH  
CHECKING BASIC CONNECTIVITY  
The Summit offers the following two commands for checking basic connectivity:  
ping  
traceroute  
mtrace  
PING  
The pingcommand enables you to send Internet Control Message Protocol (ICMP) echo  
messages to a remote IP device. The pingcommand is available for both the user and  
administrator privilege level.  
The pingcommand syntax is  
ping {continuous} {size <n>} <ip_address>  
Options for the ping command are described in Table 3-9.  
Table 3-9: Ping Command Parameters  
Parameter  
Description  
continuous  
Specifies ICMP echo messages to be sent continuously.  
This option can be interrupted by pressing any key.  
size <n>  
Specifies the size of the packet.  
If a pingrequest fails, the switch continues to send pingmessages until interrupted.  
Press any key to interrupt a pingrequest.  
TRACEROUTE  
The traceroutecommand enables you to trace the routed path between the switch and  
a destination endstation. The traceroutecommand syntax is  
traceroute <ip_address>  
where ip_addressis the IP address of the destination endstation.  
3-22  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
CHECKING BASIC CONNECTIVITY  
MTRACE  
The mtracecommands displays the multicast path from a source to a receiver. The  
mtrace command syntax is  
mtrace <group> <source> {<ttl>}  
where the following is true:  
group— Is the IP multicast group address.  
source—Is the IP source address.  
ttl— Is the time to live attribute.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
3-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ACCESSING THE SWITCH  
3-24  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Configuring Ports  
4
Ports on the Summit switch can be configured in the following ways:  
Enabling and disabling individual ports  
Configuring the port speed (Fast Ethernet ports only)  
Configuring half- or full-duplex mode  
Creating load-sharing groups on multiple ports  
Configuring a port to connect to the Summit Virtual Chassis  
Changing the Quality or Service (QoS) setting for individual ports  
For more information on QoS, refer to Chapter 8.  
ENABLING AND DISABLING PORTS  
By default, all ports are enabled. To enable or disable one or more ports, use the  
following command:  
[enable | disable] port <portlist>  
For example, to disable ports 3, 5, and 12 through 15 on the Summit2, enter the  
following:  
disable port 3,5,12-15  
Even though a port is disabled, the link remains enabled for diagnostic purposes.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
4-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CONFIGURING PORTS  
CONFIGURING PORT SPEED AND DUPLEX SETTING  
By default, the Summit is configured to use autonegotiation to determine the port speed  
and duplex setting for each port. You can select to manually configure the duplex  
setting and the speed of 10/ 100 Mbps ports, and you can manually configure the  
duplex setting on Gigabit Ethernet ports.  
Fast Ethernet ports can connect to either 10Base-T or 100Base-T networks. By default,  
the ports autonegotiate port speed. You can also configure each port for a particular  
speed (either 10 Mbps or 100 Mbps).  
Gigabit Ethernet ports are statically set to 1 Gbps, and their speed cannot be modified.  
All ports on the Summit can be configured for half-duplex or full-duplex operation. By  
default, the ports autonegotiate the duplex setting.  
To configure port speed and duplex setting, use the following command:  
config port <portlist> auto off {speed [10 | 100]} duplex [half | full]  
To configure the switch to autonegotiate, use the following command:  
config port <portlist> auto on  
TURNING OFF AUTONEGOTIATION FOR A GIGABIT ETHERNET PORT  
In certain interoperability situations, it is necessary to turn autonegotiation off on a  
Gigabit Ethernet port. Even though a Gigabit Ethernet port runs only at full duplex and  
gigabit speeds, the command that turns off autonegotiation must still include the  
duplex setting.  
The following example turns autonegotiation off for port 49 (a Gigabit Ethernet port);  
config port 49 auto off duplex full  
4-2  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
PORT COMMANDS  
PORT COMMANDS  
Table 4-1 describes the port commands.  
Table 4-1: Port Commands  
Command  
Description  
enable learning port <portlist>  
Enables MAC address learning on one or more  
ports. The default setting is enabled.  
enable port <portlist>  
Enables a port.  
enable sharing <master_port> grouping  
<portlist>  
Defines a load-sharing group of ports. The ports  
specified in <portlist> are grouped to the  
master port.  
enable smartredundancy <portlist>  
config port <portlist> auto on  
Enables the smart redundancy feature on the  
redundant Gigabit Ethernet port. When the smart  
redundancy feature is enabled, the switch  
always uses the primary link when the primary  
link is available. The default setting is enabled.  
Enables autonegotiation for the particular port  
type; 802.3u for 10/100 Mbps ports or 802.3z for  
Gigabit Ethernet ports.  
config port <portlist> auto off {speed [10 |  
100]} duplex [half | full]  
Changes the configuration of a group of ports.  
Specify the following:  
auto off— the port will not autonegotiate  
the settings  
speed— the speed of the port (for 10/100  
Mbps ports only)  
duplex— the duplex setting (half- or  
full-duplex)  
config port <portlist> qosprofile <qosname>  
disable learning port <portlist>  
Configures one or more ports to use a particular  
QoS profile.  
Disables MAC address learning on one or more  
ports for security purposes. If MAC address  
learning is disabled, only broadcast traffic and  
packets destined to a permanent MAC address  
matching that port number, are forwarded. The  
default setting is enabled.  
disable port <portlist>  
Disables a port. Even when disabled, the link is  
available for diagnostic purposes.  
disable sharing <master_port>  
Disables a load-sharing group of ports.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
4-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
CONFIGURING PORTS  
Table 4-1: Port Commands (continued)  
Command  
Description  
disable smartredundancy <portlist>  
Disables the smart redundancy feature. If the  
feature is disabled, the switch changes the  
active link only when the current active link  
becomes inoperable.  
show port {<portlist>} collisions  
show port {<portlist>} config  
Displays real-time collision statistics.  
Displays the port configuration, including the  
following:  
Port state  
Link state  
Link speed  
Duplex mode  
Flow control  
Load sharing information  
Link media information  
show port {<portlist>} information  
Displays detailed system-related information,  
including the following:  
Port state  
Link state  
Autonegotiation state  
Link speed  
Duplex mode  
Load sharing information  
EDP status  
SummitLink mode status  
VLAN information  
QoS information  
show port {<portlist>} packet  
Displays a histogram of packet statistics.  
show port {<portlist>} qosmonitor  
Displays real-time QoS statistics. For more  
information on QoS, refer to Chapter 8.  
show port {<portlist>} rxerrors  
show port {<portlist>} stats  
Displays real-time receive error statistics. For  
more information on error statistics, refer to  
Chapter 12.  
Displays real-time port statistics. For more  
information on port statistics, refer to Chapter 12.  
4-4  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
LOAD SHARING  
Table 4-1: Port Commands (continued)  
Command  
Description  
show port {<portlist>} txerrors  
Displays real-time transmit error statistics. For  
more information on error statistics, refer to  
Chapter 12.  
show port {<portlist>} utilization  
Displays real-time port utilization information. Use  
the [Spacebar] to toggle between packet, byte,  
and bandwidth utilization information.  
LOAD SHARING  
Load sharing with Summit switches allows you to increase bandwidth and resilience  
between switches by using a group of ports to carry traffic in parallel between switches.  
The sharing algorithm allows the switch to use multiple ports as a single logical port.  
For example, VLANs see the load-sharing group as a single logical port. The algorithm  
also guarantees packet sequencing between clients.  
If a port in a load-sharing group fails, traffic is redistributed to the remaining ports in  
the load-sharing group. If the failed port becomes active again, traffic is redistributed to  
include that port.  
Load sharing is most useful in cases where the traffic transmitted from the switch to the  
load-sharing group is sourced from an equal or greater number of ports on the switch.  
For example, traffic transmitted to a 2-port load-sharing group should originate from a  
minimum of two other ports on the same switch.  
This feature is supported between Summit switches only, but may be compatible with  
third-party “trunking” or sharing algorithms. Check with an Extreme Networks  
technical representative for more information.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
4-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CONFIGURING PORTS  
CONFIGURING LOAD SHARING  
To set up the Summit to load share among ports, you must create a load-sharing group  
of ports. Load-sharing groups are defined according to the following rules:  
Ports on the switch are divided into groups of two or four.  
Ports in a load-sharing group must be contiguous.  
Follow the outlined boxes in Table 4-2 through Table 4-6 to determine the valid port  
combinations.  
The first port in the load-sharing group is configured to be the “master” logical port.  
This is the reference port used in configuration commands. It can be thought of as  
the logical port representing the entire port group.  
Table 4-2, Table 4-3, Table 4-4, Table 4-5, and Table 4-6 show the possible load-sharing  
port group combinations for the Summit1, Summit2, Summit3, Summit4 and  
Summit4/ FX, and Summit48, respectively.  
Table 4-2: Port Combinations for the Summit1  
Load-Sharing  
Group  
1
2
3
4
x
x
5
x
x
6
x
x
7
x
x
8
4-port groups  
2-port groups  
x
x
Table 4-3: Port Combinations for the Summit2  
Load-Sharing  
Group  
1
x
x
2
x
x
3
x
x
4
x
x
5
x
x
6
x
x
7
x
x
8
x
x
9
x
x
10 11 12 13 14 15 16 17 18  
4-port groups  
2-port groups  
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
Table 4-4: Port Combinations for the Summit3  
Load-Sharing  
Group  
1
0
1
1
1
1
3
1
1
5
1
6
1
7
1
1
2
0
2
1
2
2
2
3
2
4
2
5
1
x
x
2
x
x
3
x
x
4
x
x
5
x
x
6
x
x
7
x
x
8
x
x
9
x
x
2
x
x
4
x
x
8
x
x
9
x
x
4-port groups  
2-port groups  
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
4-6  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
     
LOAD SHARING  
Table 4-5: Port Combinations for the Summit4 and Summit4/FX  
Load-Sharing  
Group  
1
0
1
1
1
2
1
3
1
4
1
5
1
6
1
7
1
8
1
9
2
0
2
1
2
2
1
x
x
2
x
x
3
x
x
4
x
x
5
x
x
6
x
x
7
x
x
8
x
x
9
x
x
4-port groups  
2-port groups  
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
Table 4-6: Port Combinations for the Summit48  
Load-Sharing  
Group  
1
0
1
1
1
2
1
3
1
1
1
1
7
1
8
1
9
2
0
2
2
2
2
4
1
x
x
2
x
x
3
x
x
4
x
x
5
x
x
6
x
x
7
x
x
8
x
x
9
x
x
4
x
x
5
x
x
6
x
x
1
x
x
2
x
x
3
x
x
4-port groups  
2-port groups  
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
Load-Sharing  
Group  
2
5
2
6
2
7
2
8
2
9
3
0
3
1
3
2
3
3
3
4
3
5
3
6
3
7
3
8
3
9
4
0
4
1
4
2
4
3
4
4
4
5
4
6
4
7
4
8
4-port groups  
2-port groups  
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
x
Load-Sharing  
Group  
4
9
5
0
4-port groups  
2-port groups  
x
x
To define a load-sharing group, you assign a group of ports to a single, logical port  
number. To enable or disable a load-sharing group, use the following commands:  
enable sharing <master_port> grouping <portlist>  
disable sharing <master_port>  
The following example defines a load-sharing group that contains ports 9 through 12,  
and uses the first port in the group as the master logical port 9:  
enable sharing 9 grouping 9-12  
In this example, logical port 9 represents physical ports 9 through 12.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
4-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
CONFIGURING PORTS  
When using load sharing, you should always reference the master logical port of  
the load-sharing group (port 9 in the previous example) when configuring or  
viewing VLANs. VLANs configured to use other ports in the load-sharing group  
will have those ports deleted from the VLAN when load sharing becomes enabled.  
VERIFYING THE LOAD SHARING CONFIGURATION  
The screen output resulting from the show port configcommand indicates the ports  
are involved in load sharing and the master logical port identity.  
PORT-MIRRORING  
Port-mirroring configures the switch to copy all traffic associated with one or more  
ports to a monitor port on the switch. The monitor port can be connected to a network  
analyzer or RMON probe for packet analysis. The switch uses a traffic filter that copies  
a group of traffic to the monitor port. The traffic filter can be defined based on one of  
the following criteria:  
MAC source address/ destination address — All data sent to or received from a  
particular source or destination MAC address is copied to the monitor port.  
Physical port — All data that traverses the port, regardless of VLAN configuration,  
is copied to the monitor port.  
VLAN — All data to and from a particular VLAN, regardless of the physical port  
configuration, is copied to the monitor port.  
Virtual port — All data specific to a VLAN on a specific port is copied to the  
monitor port.  
Up to 8 mirroring filters and one monitor port can be configured on the switch. Once a  
port is specified as a monitor port, it cannot be used for any other function.  
Frames that contain errors are not mirrored.  
4-8  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
PORT-MIRRORING  
PORT-MIRRORING COMMANDS  
Port-mirroring commands are described in Table 4-7.  
Table 4-7: Port-Mirroring Configuration Commands  
Command  
Description  
Dedicates a port on the switch to be the mirror port.  
enable mirroring port <port>  
config mirroring add [mac <mac_address> Adds a single mirroring filter definition. Up to eight  
| vlan <name> | port <port> | vlan  
<name> port <port>]  
mirroring definitions can be added. You can mirror  
traffic from a MAC address, a VLAN, a physical  
port, or a specific VLAN/port combination.  
config mirroring delete [mac  
<mac_address> | vlan <name> | port  
<port> | vlan <name> port <port> | all}  
Deletes a particular mirroring filter definition, or all  
mirroring filter definitions.  
disable mirroring  
show mirroring  
Disables port-mirroring.  
Displays the port-mirroring configuration.  
PORT-MIRRORING EXAMPLE  
The following example selects port 3 as the mirror port, and sends all traffic coming  
into or out of the switch on port 1 to the mirror port:  
enable mirroring port 3  
config mirroring add port 1  
The following example sends all traffic coming into or out of the switch on port 1 and  
the VLAN default to the mirror port:  
config mirroring add port 1 vlan default  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
4-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
CONFIGURING PORTS  
SUMMIT VIRTUAL CHASSIS  
The Summit Virtual Chassis is an ultra-high performance, low-cost external backplane  
that connects up to eight stacked or distributed Summit switches into one cohesive  
system.  
Features of the Summit Virtual Chassis include the following:  
Increased port density  
Policy-based Quality of Service (QoS)  
Load-sharing links  
Extensive fault-tolerant capabilities  
Redundant power supplies  
Hot-swappable switches  
How-swappable virtual chassis  
Environmental sensors  
The Summit Virtual Chassis has eight SummitLink ports. A SummitLink port is a  
proprietary backplane channel used to connect Summit switches to the Summit Virtual  
Chassis.  
For detailed information about the Summit Virtual Chassis, refer to the Summit  
Virtual Chassis Design and Installation Guide.  
SUMMIT SWITCH PORT CONNECTIONS  
Table 4-8 describes the Summit switch ports that can be used to connect to one, two, or  
four Summit Virtual Chassis units.  
Table 4-8: Summit Ports to Use to Connect to the Summit Virtual Chassis  
One Virtual Chassis Two Virtual Chassis Four Virtual Chassis  
Summit1  
Any of ports 1 - 8  
Ports 2 and 3, or  
Ports 4 and 5, or  
Ports 6 and 7  
Ports 4, 5, 6, and 7  
Summit2  
Summit3  
Port 17 or Port 18  
Port 25  
Ports 17 and 18  
4-10  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
SUMMIT VIRTUAL CHASSIS  
Table 4-8: Summit Ports to Use to Connect to the Summit Virtual Chassis (continued)  
One Virtual Chassis Two Virtual Chassis Four Virtual Chassis  
Summit4  
Any of ports 17 - 22  
Ports 17 and 18, or  
Ports 19 and 20, or  
Ports 21 and 22  
Ports 19, 20, 21, and 22  
Ports 19, 20, 21, and 22  
Summit4/FX Any of ports 17 - 22  
Ports 17 and 18, or  
Ports 19 and 20, or  
Ports 21 and 22  
Summit48  
Port 49 or Port 50  
Ports 49 and 50  
EXTREME DISCOVERY PROTOCOL  
The Extreme Discovery Protocol (EDP) is used to locate neighbor Extreme Networks  
switches connected to the Summit Virtual Chassis. When running on a normal switch  
port, EDP is used to by the Summit switches to exchange topology information with  
each other. Information communicated using EDP includes the following:  
Switch MAC address (switch ID)  
Switch software version information  
Switch IP address  
Switch VLAN-IP information  
Switch port number  
Summit Virtual Chassis identifier and port number  
Listing of all virtual chassis identifiers  
EDP cannot be disabled on ports that are connected to a Summit Virtual  
Chassis.  
When a Gigabit Ethernet port is configured to be connected to a SummitLink port on a  
Summit Virtual Chassis, the Activity LED on the Summit flashes once per second, even  
when no traffic is present on the network. The flashing Activity LED indicates that EDP  
is running successfully between all of the Summit switches connected to the Summit  
Virtual Chassis.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
4-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CONFIGURING PORTS  
SUMMIT VIRTUAL CHASSIS COMMANDS  
Table 4-9 lists commands that are used on the Summit switch to connect it to a Summit  
Virtual Chassis.  
Table 4-9: Summit Virtual Chassis Commands  
Command  
Description  
show edp  
Displays connectivity information for neighboring  
Summit switches.  
enable summitlink port <portlist>  
Enables the port to connect to a SummitLink port  
on the Summit Virtual Chassis. SummitLink cannot  
be enabled if multiple STPDs are configured on  
the port. The default setting is disabled.  
disable summitlink port <portlist>  
enable edp port <portlist>  
Disables the connection to the SummitLink port on  
the Summit Virtual Chassis.  
Enables the generation and processing of Extreme  
Discovery Protocol message on one or more ports.  
The default setting is enabled.  
disable edp port <portlist>  
Disables the Extreme Discovery Protocol on one or  
more ports. EDP cannot be disabled on a port that  
has SummitLInk enabled.  
CONFIGURING THE SUMMIT FOR USER WITH THE SUMMIT VIRTUAL  
CHASSIS  
You must configure the Summit switch port(s) prior to connecting the switch to the  
Summit Virtual Chassis. Each connected port must be configured as a SummitLink port,  
using the following command:  
enable summitlink port <portlist>  
If you are using a parallel Virtual Chassis stack, you must configure load-sharing on the  
Summit after the ports are designated as SummitLink ports. This is done using the  
following command:  
enable sharing <master port> grouping <portlist>  
4-12  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
SUMMIT VIRTUAL CHASSIS  
VLANS AND SUMMIT SWITCHES USING THE VIRTUAL CHASSIS  
Summit switches exchange information using EDP across Virtual Chassis links. The  
information exchanged allows the switches to automatically join VLANs. A VLAN is  
automatically joined between Summit switches that are members of the same Virtual  
Chassis stack if the VLAN name and configured 802.1Q tag values are identical.  
The VLAN default is joined by all Summit switches that are connected to a  
Summit Virtual Chassis stack. This is because the VLAN name default exists on  
all Summits, and the explicit 802.1Q tag value is 1 on each switch.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
4-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CONFIGURING PORTS  
4-14  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Virtual LANs (VLANs)  
5
Setting up Virtual Local Area Networks (VLANs) on the Summit eases many  
time-consuming tasks of network administration while increasing efficiency in network  
operations.  
This chapter describes the concept of VLANs and explains how to implement VLANs  
on the Summit.  
OVERVIEW OF VIRTUAL LANS  
The term VLAN is used to refer to a collection of devices that communicate as if they  
were on the same physical LAN. Any set of ports (including all ports on the switch) is  
considered a VLAN. LAN segments are not restricted by the hardware that physically  
connects them. The segments are defined by flexible user groups you create with the  
command-line interface.  
BENEFITS  
Implementing VLANs on your networks has the following advantages:  
VLANs help to control traffic.  
With traditional networks, congestion can be caused by broadcast traffic that is  
directed to all network devices, regardless of whether they require it. VLANs  
increase the efficiency of your network because each VLAN can be set up to contain  
only those devices that must communicate with each other.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
5-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
VIRTUAL LANS (VLANS)  
VLANs provide extra security.  
Devices within each VLAN can only communicate with member devices in the same  
VLAN. If a device in VLAN Marketing must communicate with devices in VLAN  
Sales, the traffic must cross a routing device.  
VLANs ease the change and movement of devices.  
With traditional networks, network administrators spend much of their time dealing  
with moves and changes. If users move to a different subnetwork, the addresses of  
each endstation must be updated manually.  
For example, with a VLAN, if an endstation in VLAN Marketing is moved to a port  
in another part of the network, and retains its original subnet membership; you must  
only specify that the new port is in VLAN Marketing.  
TYPES OF VLANS  
The Summit supports a maximum of 256 VLANs. Summit VLANs can be created  
according to the following criteria:  
Physical port  
802.1Q tag  
Ethernet, LLC SAP, or LLC/ SNAP Ethernet protocol type  
A combination of these criteria  
PORT-BASED VLANS  
In a port-based VLAN, a VLAN name is given to a group of one or more ports on the  
switch. A switch port can be a member of only one port-based VLAN.  
5-2  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TYPES OF VLANS  
For example, in Figure 5-1, ports 1, 2, and 5 are part of VLAN Marketing; ports 3, 4, and  
6 are part of VLAN Sales; and ports 7 and 8 are in VLAN Finance.  
Marketing  
Finance  
1
8
2
3
4
5
6
7
Sales  
Figure 5-1: Example of a port-based VLAN  
Even though they are physically connected to the same switch, for the members of the  
different VLANs to communicate, the traffic must go through the IP routing  
functionality provided in the Summit. This means that each VLAN must be configured  
as a router interface with a unique IP address.  
SPANNING SWITCHES WITH PORT-BASED VLANS  
To create a port-based VLAN that spans two switches, you must do two things:  
Assign the port on each switch to the VLAN.  
Cable the two switches together using one port on each switch per VLAN.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
5-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
VIRTUAL LANS (VLANS)  
Figure 5-2 illustrates a single VLAN that spans two switches. All ports on both switches  
belong to VLAN Sales. The two switches are connected using port 2 on Switch 1, and  
port 6 on Switch 2.  
Sales  
1
8
2
3
4
5
6
7
Switch 1  
1
8
2
3
4
5
6
7
Switch 2  
Figure 5-2: Single port-based VLAN spanning two switches  
In a port-based VLAN, to create multiple VLANs that span two switches, a port on  
Switch 1 must be cabled to a port on Switch 2 for each VLAN you want to have span  
across the switches. At least one port on each switch must be a member of the  
corresponding VLANs, as well.  
5-4  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
TYPES OF VLANS  
Figure 5-3 illustrates two VLANs spanning two switches. On Switch 1, ports 1-4 are part  
of VLAN Accounting; ports 5 - 8 are part of VLAN Engineering. On Switch 2, ports 1-4  
are part of VLAN Accounting; ports 5 - 8 are part of VLAN Engineering. VLAN  
Accounting spans Switch 1 and Switch 2 by way of a connection between Switch 1 port 2  
and Switch 2 port 4. VLAN Engineering spans Switch 1 and Switch 2 by way of a  
connection between Switch 1 port 5 and Switch 2 port 8.  
Accounting  
Engineering  
1
8
2
3
4
5
6
7
Switch 1  
1
8
2
3
4
5
6
7
Switch 2  
Figure 5-3: Two port-based VLANs spanning two Switches  
Using these steps, you can create multiple VLANs that span multiple switch es, in a  
daisy-chained fashion. Each switch must have a dedicated port for each VLAN. Each  
dedicated port must be connected to a port that is a member its VLAN on the next  
switch.  
TAGGED VLANS  
Tagging is a process that inserts a marker (called a tag) into the Ethernet frame. The tag  
contains the identification number of a specific VLAN, called the VLANid.  
The use of 802.1Q tagged packets may lead to the appearance of packets  
slightly bigger than the current IEEE 802.3/Ethernet maximum of 1518 bytes.  
This may affect packet error counters in other devices, and may also lead to  
connectivity problems if non-802.1Q bridges or routers are placed in the path.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
5-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
VIRTUAL LANS (VLANS)  
USES OF TAGGED VLANS  
Tagging is most commonly used to create VLANs that span switches. The  
switch-to-switch connections are typically called trunks. Using tags, multiple VLANs  
can span multiple switches using one or more trunks. In a port-based VLAN, each  
VLAN requires its own pair of trunk ports, as shown in Figure 5-3. Using tags, multiple  
VLANs can span two switches with a single trunk.  
Another benefit of tagged VLANs is the ability to have a port be a member of multiple  
VLANs. This is particularly useful if you have a device (such as a server) that must  
belong to multiple VLANs. The device must have a NIC that supports 802.1Q tagging.  
A single port can be a member of only one port-based VLAN. All additional VLAN  
membership for the port must be accompanied by tags. In addition to configuring the  
VLAN tag for the port, the server must have a Network Interface Card (NIC) that  
supports 802.1Q tagging.  
ASSIGNING A VLAN TAG  
Each VLAN may be assigned an 802.1Q VLAN tag. As ports are added to a VLAN with  
an 802.1Q tag defined, you decide whether each port will use tagging for that VLAN.  
The default mode of the switch is to have all ports assigned to the VLAN named  
“default,” with an 802.1Q VLAN tag (VLANid) of 1 assigned.  
Not all ports in the VLAN must be tagged. As traffic from a port is forwarded out of  
the switch, the switch determines (in real time) if each destination port should use  
tagged or untagged packet formats for that VLAN. The switch adds and strips tags, as  
required, by the port configuration for that VLAN.  
Packets arriving tagged with a VLANid that is not configured in the switch will be  
discarded.  
5-6  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TYPES OF VLANS  
Figure 5-4 illustrates the physical view of a network that uses tagged and untagged  
traffic.  
M S  
M
S
M S  
M
Switch 1  
M
S
= Marketing  
= Sales  
802.1Q  
Tagged server  
= Tagged port  
M
M
S
S
Switch 2  
Figure 5-4: Physical diagram of tagged and untagged traffic  
Figure 5-5 shows a logical diagram of the same network.  
Switch 1  
Sales  
Marketing  
Port 1 *  
Port 7 *  
Switch 1  
Switch 2  
Switch 1  
Switch 2  
Port 2  
Port 4  
Port 1  
Port 4  
Port 1  
Port 6  
Port 7  
Port 8  
Switch 2  
Port 2 *  
*Tagged Ports  
Figure 5-5: Logical diagram of tagged and untagged traffic  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
5-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
VIRTUAL LANS (VLANS)  
In Figure 5-4 and Figure 5-5:  
The trunk port on each switch carries traffic for both VLAN Marketing and VLAN  
Sales.  
The trunk port on each switch is tagged.  
The server connected to port 1 on Switch 1 has a NIC that supports 802.1Q tagging.  
The server connected to port 1 on Switch 1 is a member of both VLAN Marketing  
and VLAN Sales.  
All other stations use untagged traffic.  
As data passes out of the switch, the switch determines if the destination port requires  
the frames to be tagged or untagged. All traffic coming from and going to the server is  
tagged. Traffic coming from and going to the trunk ports is tagged. The traffic that  
comes from and goes to the other stations on this network is not tagged.  
MIXING PORT-BASED AND TAGGED VLANS  
You can configure the Summit using a combination of port-based and tagged VLANs. A  
given port can be a member of multiple VLANs, with the stipulation that only one of its  
VLANs uses untagged traffic. In other words, a port can simultaneously be a member of  
one port-based VLAN and multiple tag-based VLANs.  
For the purposes of VLAN classification, packets arriving on a port with an  
802.1Q tag containing a VLANid of zero are treated as untagged.  
GENERIC VLAN REGISTRATION PROTOCOL  
The Generic VLAN Registration Protocol (GVRP) allows a LAN device to signal other  
neighboring devices that it wishes to receive packets for one or more VLANs. The  
GVRP protocol is defined as part of the IEEE 802.1Q Virtual LANs draft standard. The  
main purpose of the protocol is to allow switches to automatically discover some of the  
VLAN information that would otherwise have to be manually configured in each  
switch. GVRP can also be run by network servers. These servers are usually configured  
to join several VLANs, and then signal the network switches of the VLANs of which  
they want to be part.  
5-8  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TYPES OF VLANS  
Figure 5-6 illustrates a network using GVRP.  
Switch A VLAN Red, Tag 10  
GVRP: "Send  
me traffic for  
VLAN tag 10."  
GVRP: "Send  
me traffic for  
VLAN tag 10."  
Switch B  
GVRP: "Send  
me traffic for  
VLAN tag 10."  
Figure 5-6: Network example using GVRP  
In Figure 5-6, Switch A is a member of VLAN Red. VLAN Red has the VLANid 10. Port  
1 and port 2 on Switch A are added to the VLAN as untagged.  
The configuration for Switch A is as follows:  
create vlan red  
config vlan red tag 10  
config vlan red add port 1-2 untagged  
enable gvrp  
Switch B does not need to be configured with VLAN or tagging information. Instead,  
using GVRP, the server connected to Switch B, and the remainder of the network  
connected to Switch B provide Switch B with the information it needs to forward traffic.  
Switch A automatically adds port 3 to VLAN Red because Switch A now knows that  
there are other devices on port 3 that need access to VLAN Red.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
5-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
VIRTUAL LANS (VLANS)  
VLANs that are automatically created using GVRP with the VLANid 10 are given  
names in the following format:  
gvrp vlan xxxx  
where xxxx is the VLANid (in decimal) that is discovered by GVRP. These VLANs are  
not permanently stored in NVRAM, and you cannot add or remove ports from these  
VLANs.  
GVRP assumes that the VLANs for which it carries information operate using VLAN  
tags, unless explicitly configured otherwise. Typically, you must configure any untagged  
VLANs on the switches at the edges of the network, and the GVRP protocol is used  
across the core of the network to automatically configure other switches using tagged  
VLANs.  
GVRP COMMANDS  
Table 5-1 describes GVRP commands.  
Table 5-1: GVRP Commands  
Command  
Description  
enable gvrp  
Enables the Generic VLAN Registration  
Protocol (GVRP). The default setting is  
disabled.  
config gvrp {listen | send | both | none} {port  
<portlist> | all}  
Configures the sending and receiving GVRP  
information on one or more ports. Options  
include the following:  
listen— Receive GVRP packets.  
send— Send GVRP packets.  
both— Send and receive GVRP packets.  
none— Disable the port from participating  
in GVRP operation.  
The default setting is both.  
disable gvrp  
show gvrp  
Disables the GARP VLAN Registration  
Protocol.  
Displays the current configuration and status  
of GVRP.  
5-10  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
TYPES OF VLANS  
PROTOCOL-BASED VLANS  
Protocol-based VLANs enable you to define a packet filter that the Summit uses as the  
matching criteria to determine if a particular packet belongs to a particular VLAN.  
Protocol-based VLANs are most often used in situations where network segments  
contain hosts running multiple protocols. For example, in Figure 5-7, the hosts are  
running both the IP and NetBIOS protocols.  
The IP traffic has been divided into two IP subnets, 192.207.35.0 and 192.207.36.0. The  
subnets are internally routed by the Summit. The subnets are assigned different VLAN  
names, Finance and Personnel, respectively. The remainder of the traffic belongs to the  
VLAN named MyCompany. All ports are members of the VLAN MyCompany.  
192.207.35.1  
192.207.36.1  
My Company  
192.207.35.0  
Finance  
192.207.36.0  
Personnel  
1
2
3
4
= IP traffic  
= All other traffic  
Figure 5-7: Protocol-based VLANs  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
5-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
VIRTUAL LANS (VLANS)  
PREDEFINED PROTOCOL FILTERS  
The following protocol filters are predefined on the Summit:  
IP  
IPX  
NetBIOS  
DECNet  
IPX_8022  
IPX_SNAP  
AppleTalk  
DEFINING PROTOCOL FILTERS  
If necessary, you can define a customized protocol filter based on EtherType, LLC,  
and/ or SNAP. Up to six protocols may be part of a protocol filter. To define a protocol  
filter, do the following:  
Create a protocol using the following command:  
create protocol <protocol_name>  
For example:  
create protocol fred  
The protocol name can have a maximum of 31 characters.  
Configure the protocol using the following command:  
config protocol <protocol_name> add <protocol_type> <hex_value>  
Supported protocol types include:  
etype— EtherType  
The values for etypeare four-digit hexadecimal numbers taken from a list  
maintained by the IEEE. This list can be found at the following URL:  
http://standards.ieee.org/regauth/ethertype/index.html  
llc— LLC SAP  
The values for llcare four-digit hexadecimal numbers that are created by  
concatenating a two-digit LLC Destination SAP (DSAP) and a two-digit LLC  
Source SAP (SSAP). The list of LLC SAPs can be found at the following URL:  
http://stdsbbs.ieee.org/pub/general/LLC_list.txt  
5-12  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
VLAN NAMES  
snap— Ethertype inside an IEEE SNAP packet encapsulation.  
The values for snapare the same as the values for etype, described previously.  
config protocol fred add llc feff  
config protocol fred add snap 9999  
A maximum of seven protocol filters, each containing a maximum of six protocols, can  
be defined, however no more than seven protocol should be active and configured for  
use.  
For more information on SNAP protocol for Ethernet protocol types, see TR  
11802-5:1997 (ISO/IEC) [ANSI/IEEE std. 802.1H, 1997 Edition].  
DELETING A PROTOCOL FILTER  
If a protocol filter is deleted from a VLAN, the VLAN is assigned a protocol filter of  
none. You can continue to configure the VLAN, however no traffic is forwarded to the  
VLAN until a protocol is assigned to it.  
PRECEDENCE OF TAGGED PACKETS OVER PROTOCOL FILTERS  
If a VLAN is configured to accept tagged packets on a particular port, incoming packets  
that match the tag configuration take precedence over any protocol filters that are  
associated with the VLAN.  
VLAN NAMES  
The Summit supports up to 256 different VLANs. Each VLAN is given a name that can  
be up to 32 characters. VLAN names can use standard alphanumeric characters. The  
following characters are not permitted in a VLAN name:  
Space  
Comma  
Quotation mark  
VLAN names must begin with an alphabetical letter. Quotation marks can be used to  
enclose a VLAN name that does not begin with an alphabetical character, or that  
contains a space, comma, or other special character.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
5-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
VIRTUAL LANS (VLANS)  
VLAN names are locally significant. That is, VLAN names used on one switch are only  
meaningful to that switch. If another switch is connected to it, the VLAN names have  
no significance to the other switch. The exception to this is when a switch is connected  
to a Summit Virtual Chassis. In this case, the VLAN name is used as part of the  
connectivity negotiation process. You should use VLAN names consistently across your  
entire network.  
DEFAULT VLAN  
The Summit ships with one default VLAN that has the following properties:  
The VLAN name is default.  
It contains all the ports on a new or initialized switch.  
The default VLAN is untagged on all ports. It has an internal VLANid of 1.  
CONFIGURING VLANS ON THE SUMMIT  
This section describes the commands associated with setting up VLANs on the Summit.  
Configuring a VLAN involves the following steps:  
1
2
Create and name the VLAN.  
Assign an IP address and mask (if applicable) to the VLAN, if needed.  
Each IP address and mask assigned to a VLAN must represent a unique IP  
subnet. You cannot configure the same IP subnet on different VLANs.  
3
4
Assign a VLANid, if any ports in this VLAN will use a tag.  
Assign one or more ports to the VLAN.  
As you add each port to the VLAN, decide if the port will use an 802.1Q tag.  
Table 5-2 describes the commands used to configure a VLAN.  
Table 5-2: VLAN Configuration Commands  
Command  
Description  
create vlan <name>  
create protocol <protocol_name>  
Creates a named VLAN.  
Creates a user-defined protocol.  
5-14  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
CONFIGURING VLANS ON THE SUMMIT  
Table 5-2: VLAN Configuration Commands (continued)  
Command  
Description  
enable ignore-stp vlan <name>  
Enables a VLAN from using STP port  
information. When enabled, all virtual ports  
associated with the VLAN are in STP  
forwarding mode. The default setting is  
disabled.  
config dot1p ethertype <ethertype>  
Configures an IEEE 802.1Q Ethertype. Use  
this command only if you have another switch  
that supports 802.1Q, but uses a different  
Ethertype value than 8100.  
config protocol <protocol_name> [add | delete] Configures a protocol filter. Supported  
<protocol_type> <hex_value>  
<protocol_type> values include:  
{<protocol_type> <hex_value>} ...  
etype  
llc  
snap  
The variable <hex_value> is a hexadecimal  
number between 0 and FFFF that represents  
either the Ethernet protocol type (for  
EtherType), the DSAP/SSAP combination (for  
LLC), or the SNAP-encoded Ethernet protocol  
type (for SNAP).  
config vlan <name> ipaddress <ipaddress>  
{<mask>}  
Assigns an IP address and an optional mask to  
the VLAN.  
config vlan <name> [add | delete] port  
<portlist> {tagged | untagged}  
Adds one or more ports to a VLAN. You can  
specify tagged port(s), untagged port(s). By  
default, ports are untagged.  
config vlan <name> delete port <portlist>  
{tagged | untagged}  
Deletes one or more ports from a VLAN.  
config vlan <name> protocol  
[<protocol_name> | any]  
Configures a protocol-based VLAN. If the  
keyword anyis specified, then it becomes the  
default VLAN. All packets that cannot be  
classified into other protocol-based VLANs are  
assigned to the default VLAN of that port.  
config vlan <name> qosprofile <qosname>  
config vlan <name> tag <vlanid>  
Configures a VLAN to use a particular QoS  
profile. Dynamic FDB entries associated with  
the VLAN are flushed once the change is  
committed.  
Assigns a numerical VLANid. The valid range  
is from 1 to 4095.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
5-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
VIRTUAL LANS (VLANS)  
VLAN CONFIGURATION EXAMPLES  
The following example creates a port-based VLAN named accounting, assigns the IP  
address 132.15.121.1, and assigns ports 1, 2, 3, and 6 to it:  
create vlan accounting  
config accounting ipaddress 132.15.121.1  
config default delete port 1-3, 6  
config accounting add port 1-3,6  
Because VLAN names are unique, you do not need to enter the keyword vlan  
after you have created the unique VLAN name. You can use the VLAN name  
alone.  
The following example creates a tag-based VLAN named video. It assigns the VLANid  
1000. Ports 4 through 8 are added as tagged ports to the VLAN.  
create vlan video  
config video tag 1000  
config video add port 4-8 tagged  
The following example creates a VLAN named Sales, with the VLANid 120. The VLAN  
uses both tagged and untagged ports. Ports 1 through 3 are tagged, and ports 4 and 7  
are untagged. Note that when not explicitly specified, ports are added as untagged.  
create vlan sales  
config sales tag 120  
config sales add port 1-3 tagged  
config sales add port 4,7  
The following example creates a protocol-based VLAN named IPSales. Ports 6 through 8  
are assigned to the VLAN.  
create vlan ipsales  
config ipsales protocol ip  
config ipsales add port 6-8  
The following example defines a protocol filter, myprotocol and applies it to the VLAN  
named myvlan. This is an example only, and has no real-world application.  
create protocol myprotocol  
config protocol myprotocol add etype 0xf0f0  
config protocol myprotocol add etype 0xffff  
create vlan myvlan  
config myvlan protocol myprotocol  
5-16  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
DISPLAYING VLAN SETTINGS  
DISPLAYING VLAN SETTINGS  
To display VLAN settings, use the following command:  
show vlan {<name> | all}  
Sample output from this command is as follows:  
show vlan all  
VLAN Interface [1-fde] with name “net142” created by user  
Tagging:  
IP:  
Untagged (Internal tag 4095)  
Not configured  
STPD:  
Domain “s0” is running spanning tree protocol.  
AppleTalk = SNAP:809b SNAP:80f3  
QP1  
Protocol  
QoS Profile:  
Ports:  
4.  
(Number of active port=4)  
1 2 3 10  
Untag:  
LAN Interface [2-fdd] with name “net123” created by user  
Tagging:  
IP:  
802.1Q Tag 1054  
123.45.67.1/255.0.0.0  
STPD:  
Domain “s0” is running spanning tree protocol.  
Match all unfiltered protocols.  
QP1  
Protocol  
QoS Profile:  
Ports:  
18.  
Untag:  
Tagged:  
(Number of active port=6)  
1 2 3 4 5 8 9 10  
6 7 11 12 13 14 15 16 17 18  
The showcommand displays summary information about each VLAN, and includes  
the following:  
Name  
VLANid  
How the VLAN was created (manually or by GVRP)  
IP address  
STPD information  
Protocol information  
QOS profile information  
Ports assigned  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
5-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
VIRTUAL LANS (VLANS)  
Tagged/ untagged status for each port  
How the ports were added to the VLAN (manually or by GVRP)  
To display protocol information, use the following command:  
show protocol {<protocol> | all}  
This showcommand displays protocol information, including the following:  
Protocol name  
List of protocol fields  
VLANs that use the protocol  
DELETING VLANS  
To delete a VLAN, or to return VLAN settings to their defaults, use the commands  
listed in Table 5-3.  
Table 5-3: VLAN Delete and Reset Commands  
Command  
Description  
disable ignore-stp vlan <name>  
unconfig vlan <name> ipaddress  
delete vlan <name>  
Allows a VLAN to use STP port information.  
Resets the IP address of the VLAN.  
Removes a VLAN.  
delete protocol <protocol>  
Removes a protocol.  
5-18  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Switch Forwarding Database  
(FDB)  
6
This chapter describes the contents of the switch forwarding database (FDB), how the  
FDB works, and how to configure the FDB.  
OVERVIEW OF THE FDB  
The Summit maintains a database of all media access control (MAC) addresses received  
on all of its ports. It uses the information in this database to decide whether a frame  
should be forwarded or filtered.  
FDB CONTENTS  
The database holds up to a maximum of 128K entries. Each entry consists of the MAC  
address of the device, an identifier for the port on which it was received, and an  
identifier for the VLAN to which the device belongs. Frames destined for devices that  
are not in the FDB are flooded to all members of the VLAN.  
FDB ENTRY TYPES  
The following are three types of entries in the FDB:  
Dynamic entries — Initially, all entries in the database are dynamic. Entries in the  
database are removed (aged-out) if, after a period of time (aging time), the device  
has not transmitted. This prevents the database from becoming full with obsolete  
entries by ensuring that when a device is removed from the network, its entry is  
deleted from the database. Dynamic entries are deleted from the database if the  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
6-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SWITCH FORWARDING DATABASE (FDB)  
switch is reset or a power off/ on cycle occurs. For more information about setting  
the aging time, refer to the section “Configuring FDB Entries,” later in this chapter.  
Non-aging entries — If the aging time is set to zero, all aging entries in the database  
are defined as static, non-aging entries. This means that they do not age, but they are  
still deleted if the switch is reset.  
Permanent entries — Permanent entries are retained in the database if the switch is  
reset or a power off/ on cycle occurs. The system administrator must make entries  
permanent. A permanent entry can either be a unicast or multicast MAC address.  
All entries entered by way of the command-line interface are stored as permanent.  
The switch can support a maximum of 64 permanent entries.  
Once created, permanent entries stay the same as when they were created. For  
example. the permanent entry store is not updated when any of the following take  
place:  
A VLAN is deleted  
A VLANid is changed  
A port mode is changed (tagged/ untagged)  
A port is deleted from a VLAN  
A port is disabled  
A port enters blocking state  
A port QoS setting is changed  
A port goes down (link down)  
Blackhole entries — A blackhole entry configures packets with a specified MAC  
destination address to be discarded. Blackhole entries are useful as a security  
measure or in special circumstances where a specific destination address must be  
discarded. Blackhole entries are treated like permanent entries in the event of a  
switch reset or power off/ on cycle. Blackhole entries are never aged out of the  
database.  
HOW FDB ENTRIES GET ADDED  
Entries are added into the FDB in the following two ways:  
The switch can learn entries. The switch updates its FDB with the source MAC  
address from a packet, the VLAN, and the port identifier on which the source packet  
is received.  
You can enter and update entries using a MIB browser, an SNMP Network Manager,  
or the command-line interface, as described in the next section.  
6-2  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CONFIGURING FDB ENTRIES  
ASSOCIATING A QOS PROFILE WITH AN FDB ENTRY  
You can associate a QoS profile with a MAC address (and VLAN) of a device that will  
be dynamically learned. The FDB treats the entry like a dynamic entry (it is learned, it  
can be aged out of the database, and so on). The switch applies the QoS profile as soon  
as the FDB entry is learned.  
CONFIGURING FDB ENTRIES  
To configure entries in the FDB, use the commands listed in Table 6-1.  
Table 6-1: FDB Configuration Commands  
Command  
Description  
create fdbentry <mac_address> vlan  
<name> [blackhole | <portlist> | dynamic]  
{qosprofile <qosname>}  
Creates an FDB entry. Specify the following:  
mac_address— Device MAC address, using  
colon separated bytes.  
name— VLAN associated with MAC address.  
blackhole — Configures the MAC address as  
a blackhole entry.  
portlist— Port numbers associated with  
MAC address.  
dynamic— Specifies that the entry will be  
learned dynamically. Used to associated a QoS  
profile with a dynamically learned entry.  
qosname— QoS profile associated with MAC  
address.  
If more than one port number is associated with a  
permanent MAC entry, packets are multicast to the  
multiple destinations.  
config fdb agingtime <number>  
enable learning port <portlist>  
Configures the FDB aging time. The range is 15  
through 1,000,000 seconds. The default value is  
300 seconds. A value of 0 indicates that the entry  
should never be aged out.  
Enables MAC address learning on one or more  
ports.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
6-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
SWITCH FORWARDING DATABASE (FDB)  
Table 6-1: FDB Configuration Commands (continued)  
Command  
Description  
disable learning port <portlist>  
Disables MAC address learning on one or more  
ports for security purposes. If MAC address  
learning is disabled, only broadcast traffic and  
packets destined to a permanent MAC address  
matching that port number, are forwarded. The  
default setting is enabled.  
FDB CONFIGURATION EXAMPLES  
This example adds a permanent entry to the FDB:  
create fdbentry 00:E0:2B:12:34:56 vlan marketing port 4  
The permanent entry has the following characteristics:  
MAC address is 00E02B123456.  
VLAN name is marketing.  
Port number for this device is 4.  
This example associates the QoS profile qp2 with a dynamic entry that will be learned  
by the FDB:  
create fdbentry 00:A0:23:12:34:56 vlan net34 dynamic qosprofile qp2  
This entry has the following characteristics:  
MAC address is 00A023123456.  
VLAN name is net34.  
The entry will be learned dynamically.  
QoS profile qp2 will be applied when the entry is learned.  
6-4  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
DISPLAYING FDB ENTRIES  
DISPLAYING FDB ENTRIES  
To display FDB entries, use the command  
show fdb {all | <mac_address> | vlan <name> | <portlist> | permanent |  
qos}  
where the following is true:  
all— Displays all FDB entries.  
mac_address— Displays the entry for a particular MAC address.  
vlan <name>— Displays the entries for a VLAN.  
portlist— Displays the entries for a port.  
permanent— Displays all permanent entries.  
qos— Displays all entries that are associated with a QoS profile.  
The following sample output shows the information displayed when you request  
output for all FDB entries:  
show fdb  
Hash Num Mac  
Vlan  
Flags Ptag PortList  
--------------------------------------------------------------- -  
0ff0: 0 ff:ff:ff:ff:ff:ff Default(0001) sm  
1823: 0 08:00:4e:2b:f3:00 Default(0001) sm  
2bfb: 0 00:80:c7:01:cb:bd Default(0001) dm  
3289: 0 00:e0:2b:00:00:00 Default(0001) sm  
0fdf CPU,1,19  
0ff1 CPU  
0000 1  
0ffb CPU  
0ffb CPU  
373d: 0 01:80:c2:00:00:00  
(0000)  
sm  
Total: 5 Static: 4 Perm: 0 Dyn: 1 Dropped: 0  
FDB Aging time: 300 seconds  
The showcommand displays summary information, including  
MAC address  
VLAN name and VLANID  
The VLANID 0000indicates that the entry is a special entry that is not associated  
with any one VLAN.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
6-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SWITCH FORWARDING DATABASE (FDB)  
Entry method (shown in the field labeled Flags):  
s— Static entry configured by the user  
d— Dynamic entry learned by the switch  
m— MAC address entry  
i— MAC address entry that is used for IP routing  
Port  
Hash and PTAG entries (used by Extreme Networks technical support only)  
REMOVING FDB ENTRIES  
You can remove one or more specific entries from the FDB, or you can clear the entire  
FDB of all entries by using the commands listed in Table 6-2.  
Table 6-2: Removing FDB Entry Commands  
Command  
Description  
delete fdbentry <mac_address> vlan <name>  
Deletes a permanent FDB entry.  
clear fdb [all | <mac_address> | vlan <name> |  
<portlist>]  
Clears dynamic FDB entries that match  
the filter. Use the keyword allto clear all  
dynamic entries.  
6-6  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Spanning Tree Protocol (STP)  
7
Using the Spanning Tree Protocol (STP) functionality of the Summit makes your  
network more fault tolerant.  
The following sections explain more about STP and the STP features supported by the  
switch.  
STP is a part of the 802.1D bridge specification defined by the IEEE Computer  
Society. To explain STP in terms used by the 802.1D specification, the Summit  
will be referred to as a bridge.  
OVERVIEW OF THE SPANNING TREE PROTOCOL  
STP is a bridge-based mechanism for providing fault tolerance on networks. STP allows  
you to implement parallel paths for network traffic, and ensure that  
Redundant paths are disabled when the main paths are operational.  
Redundant paths are enabled if the main path fails.  
SPANNING TREE DOMAINS  
The Summit can be partitioned into multiple virtual bridges. Each virtual bridge can  
run an independent Spanning Tree instance. Each Spanning Tree instance is called a  
Spanning Tree Domain (STPD). Each STPD has its own Root Bridge and active path. Once  
the STPD is created, one or more VLANs can be assigned to it.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
7-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SPANNING TREE PROTOCOL (STP)  
A port can belong to only one STPD. If a port is a member of multiple VLANs, then all  
those VLANs must belong to the same STPD.  
The key points to remember when configuring VLANs and STP are the following:  
Each VLAN forms an independent broadcast domain.  
STP blocks paths to create a loop-free environment.  
When STP blocks a path, no data can be transmitted or received on the blocked port.  
Within any given STPD, all VLANs belonging to it use the same spanning tree.  
Care must be taken to ensure that STPD instances within a single Summit  
switch do not see each other in the same broadcast domain. This could happen  
if, for example, another external bridge is used to connect VLANs belonging to  
separate STPDs.  
If you delete a STPD, the VLANs that were members of that STPD are also deleted. You  
must remove all VLANs associated with the STP before deleting the STPD.  
DEFAULTS  
The default device configuration contains a single STPD called s0. The default VLAN is  
a member of STPD s0.  
All STP parameters default to the IEEE 802.1D values, as appropriate.  
STP CONFIGURATIONS  
When you assign VLANs to an STPD, pay careful attention to the STP configuration  
and its effect on the forwarding of VLAN traffic.  
Figure 7-1 illustrates a network that uses VLAN tagging for trunk connections. The  
following four VLANs have been defined:  
Sales is defined on Switch A, Switch B, and Switch M.  
Personnel is defined on Switch A, Switch B, and Switch M.  
Manufacturing is defined on Switch Y, Switch Z, and Switch M.  
Engineering is defined on Switch Y, Switch Z, and Switch M.  
Marketing is defined on all switches (Switch A, Switch B, Switch Y, Switch Z, and  
Switch M).  
7-2  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
STP CONFIGURATIONS  
Two STPDs are defined:  
STPD1 contains VLANs Sales and Personnel.  
STPD2 contains VLANs Manufacturing and Engineering.  
The VLAN Marketing is a member of the default STPD, but not assigned to either  
STPD1 or STPD2.  
Sales, Personnel, Marketing  
Switch A  
Manufacturing, Engineering, Marketing  
Switch Y  
Switch B  
Switch Z  
STPD 1  
STPD 2  
Switch M  
Sales, Personnel, Manufacturing, Engineering, Marketing  
Figure 7-1: Multiple Spanning Tree Domains  
When the switches in this configuration start up, STP configures each STP domain such  
that there are no active loops in the topology. STP could configure the topology in a  
number of ways to make it loop-free.  
In Figure 7-1, the connection between Switch A and Switch B is put into blocking state,  
and the connection between Switch Y and Switch Z is put into blocking state. After STP  
converges, all the VLANs can communicate, and all bridging loops are prevented.  
The VLAN Marketing, which has not been assigned to either STPD1 or STPD2,  
communicates using all five switches. The topology has no loops, because STP has  
already blocked the port connection between Switch A and Switch B, and between  
Switch Y and Switch Z.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
7-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
SPANNING TREE PROTOCOL (STP)  
Within a single STPD, you must be extra careful when configuring your VLANs.  
Figure 7-2 illustrates a network that has been incorrectly set up using a single STPD so  
that the STP configuration disables the ability of the switches to forward VLAN traffic.  
Marketing & Sales  
Marketing, Sales & Engineering  
Switch 1  
Switch 3  
Switch 2  
Sales & Engineering  
Figure 7-2: Tag-based STP configuration  
The tag-based network in Figure 7-2 has the following configuration:  
Switch 1 contains VLAN Marketing and VLAN Sales.  
Switch 2 contains VLAN Engineering and VLAN Sales.  
Switch 3 contains VLAN Marketing, VLAN Engineering, and VLAN Sales.  
The tagged trunk connections for three switches form a triangular loop that is not  
permitted in an STP topology.  
All VLANs in each switch are members of the same STPD.  
STP may block traffic between Switch 1 and Switch 3 by disabling the trunk ports for  
that connection on each switch.  
Switch 2 has no ports assigned to VLAN marketing. Therefore, if the trunk for VLAN  
marketing on Switches 1 and 3 is blocked, the traffic for VLAN marketing will not be  
able to traverse the switches.  
7-4  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
CONFIGURING STP ON THE SUMMIT  
CONFIGURING STP ON THE SUMMIT  
STP configuration involves the following actions:  
Create one or more STP domains using the following command:  
create stpd <stpd_name>  
STPD, VLAN, and QoS profile names must all be unique. For example, a name  
used to identify a VLAN cannot be used when you create an STPD or a QoS  
profile.  
Add one or more VLANs to the STPD using the following command:  
config stpd <stpd_name> add vlan <name>  
Enable STP for one or more STP domains using the following command:  
enable stpd [<stpd_name> | all]  
All VLANs belong to a STPD. If you do not want to run STP on a VLAN, you  
must ad the VLAN to a STPD that is disabled.  
Once you have created the STPD, you can optionally configure STP parameters for the  
STPD.  
You should not configure any STP parameters unless you have considerable  
knowledge and experience with STP. The default STP parameters are adequate  
for most networks.  
The following parameters can be configured on each STPD:  
Hello time  
Forward delay  
Max age  
Bridge priority  
The following parameters can be configured on each port:  
Path cost  
Port priority  
The device supports the RFC 1493 Bridge MIB. Parameters of only the s0 default  
STPD are accessible through this MIB.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
7-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SPANNING TREE PROTOCOL (STP)  
Table 7-1 shows the commands used to configure STP.  
Table 7-1: STP Configuration Commands  
Command  
Description  
create stpd <stpd_name>  
Creates an STPD. When created, an STPD has  
the following default parameters:  
Bridge priority — 32,768  
Hello time — 2 seconds  
Forward delay — 15 seconds  
enable stpd [<stpd_name> | all]  
enable stpd port <portlist>  
Enables the STP protocol for one or all STPDs.  
The default setting is disabled.  
Enables the STP protocol on one or more ports.  
If STPD is enabled for a port, BPDUs will be  
generated on that port if STP is enabled for the  
associated STPD. The default setting is enabled.  
config stpd <stpd_name> add vlan <name>  
config stpd <stpd_name> hellotime <value>  
Adds a VLAN to the STPD.  
Specifies the time delay (in seconds) between  
the transmission of BPDUs from this STPD when  
it is the Root Bridge.  
The range is 1 through 10. The default setting is  
2 seconds.  
config stpd <stpd_name> forwarddelay  
<value>  
Specifies the time (in seconds) that the ports in  
this STPD spend in the listening and learning  
states when the switch is the Root Bridge.  
The range is 4 through 30. The default setting is  
15 seconds.  
config stpd <stpd_name> maxage <value>  
Specifies the maximum age of a BPDU in this  
STPD.  
The range is 6 through 40. The default setting is  
20 seconds.  
Note that the time must be greater than, or equal  
to 2 X (Hello Time + 1) and less than, or equal to  
2 X (Forward Delay –1).  
config stpd <stpd_name> priority <value>  
Specifies the priority of the STPD. By changing  
the priority of the STPD, you can make it more or  
less likely to become the Root Bridge.  
The range is 0 through 65,535. The default  
setting is 32,768. A setting of 0 indicates the  
highest priority.  
7-6  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
CONFIGURING STP ON THE SUMMIT  
Table 7-1: STP Configuration Commands (continued)  
Command  
Description  
config stpd <stpd_name> port cost <value>  
<portlist>  
Specifies the path cost of the port in this STPD.  
The range is 1 through 65,535. The switch  
automatically assigns a default path cost based  
on the speed of the port, as follows:  
For a 10Mbps port, the default cost is 100.  
For a 100Mbps port, the default cost is 19.  
For a 1000Mbps port, the default cost is 4.  
config stpd <stpd_name> port priority  
<value> <portlist>  
Specifies the priority of the port in this STPD. By  
changing the priority of the port, you can make it  
more or less likely to become the Root Port.  
The range is 0 through 255. The default setting  
is 128. A setting of 0 indicates the lowest priority.  
CONFIGURATION EXAMPLE  
The following example creates and enables an STPD named Backbone_st. It assigns the  
Manufacturing VLAN to the STPD. It disables STP on ports 1 through 7, and port 12.  
create stpd backbone_st  
config stpd backbone_st add vlan manufacturing  
enable stpd backbone_st  
disable stpd backbone_st port 1-7,12  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
7-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SPANNING TREE PROTOCOL (STP)  
DISPLAYING STP SETTINGS  
To display STP settings for all ports, use the following command:  
show stpd {<stpd_name> | all}  
This command displays the following information:  
STPD name  
Bridge ID  
STPD configuration information  
Sample output from the command is as follows:  
show stpd  
Stpd:s0  
Stp:DISABLED  
Number of Ports:8  
Ports: 1,2,3,4,5,6,7,8  
Vlans: Default accounting video sales  
BridgeID 80:00:00:e0:2b:00:a4:00  
Designated root: 00:00:00:00:00:00:00:00  
RootPathCost: 0  
MaxAge: 0s  
HelloTime: 0s  
ForwardDelay: 0s  
CfgBrMaxAge: 20s CfgBrHelloTime: 2s CfgBrForwardDelay:15s  
Topology Change Time: 35s  
Hold time: 1s  
Topology Change Detected: FALSE  
Number of Topology Changes: 0  
Time Since Last Topology Change: 0s  
Topology Change:FALSE  
To display the STP state of a port, use the following command:  
show stpd <stpd_name> port <portlist>  
This command displays the following:  
STPD port configuration  
STPD state (root bridge, and so on)  
STPD port state (forwarding, blocking, and so on)  
7-8  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
DISABLING AND RESETTING STP  
DISABLING AND RESETTING STP  
To disable STP or return STP settings to their defaults, use the commands listed in  
Table 7-2.  
Table 7-2: STP Disable and Reset Commands  
Command  
Description  
delete stpd <stpd_name>  
Removes an STPD. An STPD can only be removed if  
all VLANs have been deleted from it.  
disable stpd [<stpd_name> | all]  
disable stpd port <portlist>  
Disables the STP mechanism on a particular STPD,  
or for all STPDs.  
Disables STP on one or more ports. Disabling STP  
on one or more ports puts those ports in  
FORWARDING state; all BPDUs received on those  
ports will be disregarded.  
unconfig stpd {<stpd_name> | all}  
Restores default STP values to a particular STPD or  
to all STPDs.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
7-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
SPANNING TREE PROTOCOL (STP)  
7-10  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Quality of Service (QoS)  
8
This chapter describes the concept of Quality of Service (QoS) and explains how to  
implement QoS on the Summit.  
OVERVIEW OF QUALITY OF SERVICE  
QoS is a feature of the Summit that allows you to specify different service levels for  
outbound traffic. QoS is an effective control mechanism for networks that have  
heterogeneous traffic patterns. Using QoS, you can specify the service that a traffic type  
receives.  
The main benefit of QoS is that it allows you to have control over the types of traffic  
that receive enhanced service from the switch. For example, if video traffic requires a  
higher priority than data traffic, using QoS you can assign a different QoS profile to  
those VLANs that are transmitting video traffic.  
BUILDING BLOCKS  
Quality of Service is determined by one or more of the following building blocks:  
QoS mode — Indicates whether the switch should use egress or ingress traffic  
classifications. Ingress is the default.  
QoS profile — Includes bandwidth and priority parameters.  
Traffic classification —A method of grouping traffic that has one or more attributes  
in common.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
8-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
QUALITY OF SERVICE (QOS)  
QoS profiles are assigned to traffic classifications, independent of the QoS mode chosen,  
in order to modify switch forwarding behavior.  
QOS MODE  
There are two modes of QoS. Ingress mode, the default, can use a wide variety of traffic  
classifications, but has a limitation of being able to use only the default four QoS  
profiles. You can modify the bandwidth parameters of the default QoS profiles.  
Using egress mode, you can define additional QoS profiles, but you must use a smaller  
selection of traffic classifications. You can modify both the prioritization and bandwidth  
parameters of user-defined QoS profiles.  
DEFAULT QOS PROFILES  
Four default QoS profiles are provided that cannot be deleted. The default QoS profile  
names are as follows:  
qp1  
qp2  
qp3  
qp4  
The default QoS profiles exist in either ingress or egress mode. In ingress mode, only  
the default QoS profiles are observed. In egress mode, up to 28 additional custom  
profiles may be defined, for a total of 32. You cannot create custom profiles in ingress  
mode.  
The parameters that make up a QoS profile include the following:  
Minimum bandwidth — The minimum percentage of bandwidth that the traffic  
requires. The switch is required to provide the minimum amount of bandwidth to  
the traffic. The lowest possible value is 0%.  
Maximum bandwidth — The maximum percentage of bandwidth that the traffic is  
permitted to use.  
Priority — The level of priority in which the traffic will be serviced by the switch.  
Choices include:  
Low  
Normal  
8-2  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
BUILDING BLOCKS  
Medium  
High  
A QoS profile does not alter the behavior of the switch until it is assigned to a  
traffic classification.  
The details of the default profiles are shown in Table 8-1.  
Table 8-1: Default QoS Profiles  
Profile Name  
Priority  
Low  
Minimum Bandwidth Maximum Bandwidth  
qp1  
qp2  
qp3  
qp4  
0%  
0%  
0%  
0%  
100%  
100%  
100%  
100%  
Normal  
Medium  
High  
You can modify the minimum and maximum bandwidth parameters of the default QoS  
profiles in either ingress or egress mode. The priority parameter can not be modified in  
ingress mode.  
TRAFFIC GROUPINGS  
Different traffic groupings are available, depending on the QoS mode configured for the  
switch. In the event that a given packet matches two or more grouping criteria, there is  
a predetermined precedence for which traffic grouping will apply. By default, all traffic  
groupings are placed in the QoS profile named qp1.  
The available traffic groupings are listed in the following sections, in order of highest to  
lowest precedence.  
INGRESS TRAFFIC GROUPINGS  
Ingress traffic groupings include the following:  
IP destination address — A specific QoS profile can be associated with an IP  
destination address, or range of IP destination addresses specified using a subnet  
mask. The QoS parameters are dynamically associated with a route when the route  
table is built. This is controlled by the following command:  
config ipqos [add | delete] <ip_destination_address>/<mask_length>  
qosprofile <qosname>  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
8-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
QUALITY OF SERVICE (QOS)  
Destination MAC address — When making a permanent FDB entry, you can provide  
a QoS profile. You can also provide a QoS profile that will be bound to a dynamic  
FDB entry when the MAC address is learned. This is configured using the following  
command:  
create fdbentry <mac addr> vlan <vlan name> [blackhole | port  
<portlist> | dynamic] qosprofile <qosname>  
For example:  
create fdbentry 00:11:22:33:44:55 vlan default port 1 qosprofile qp1  
IEEE 802.1p — When traffic that contains 802.1p prioritization bits are seen, the  
traffic is mapped to the four default QoS profiles. No user configuration is required  
for this type of traffic grouping. Table 8-2 describes 802.1p values and their  
associated QoS profiles.  
Table 8-2: 802.1p Values and Associated QoS Profiles  
802.1p Value  
QoS Profile  
qp1  
0
1
2
3
4
5
6
7
qp1  
qp2  
qp2  
qp3  
qp3  
qp4  
qp4  
PACE— When 3Com® PACE traffic is seen, it is mapped to the profile named qp3.  
Observance of PACE can be controlled by using the following command:  
{enable | disable} pace  
Source port — You can configure a QoS profile to all the traffic being received from a  
particular port. This is controlled by using the following command:  
config port <portlist> qosprofile <qosname>  
VLAN — This is controlled by using the following command:  
config vlan <name> qosprofile <qosname>  
8-4  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
BUILDING BLOCKS  
EGRESS TRAFFIC GROUPINGS  
Egress traffic groupings include the following:  
IP destination address — A specific QoS profile can be associated with an IP  
destination address, or range of IP destination addresses specified using a subnet  
mask. The QoS parameters are dynamically associated with a route when the route  
table is built. This is controlled by the following command:  
config ipqos [add | delete] <destination_address> qosprofile  
<qosname>  
Destination MAC address — Configuration is as described in the section, “Ingress  
Traffic Groupings,” except that bandwidth parameters of the QoS profile are  
observed.  
VLAN — Configuration is as described in the section, “Ingress Traffic Groupings,”  
except that bandwidth parameters of the QoS profile are observed.  
In order to use ipqos traffic groupings, you must change the devicemode of the  
switch to ipqos, before configuring QoS.  
PRECEDENCE  
If traffic falls into multiple traffic groupings, the following order of precedence applies:  
Ingress Mode  
IP destination address  
Destination MAC address  
802.1p prioritization bits  
PACE  
Source port  
VLAN  
Egress Mode  
IP destination address  
Destination MAC address  
VLAN  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
8-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
QUALITY OF SERVICE (QOS)  
PRIORITIZATION  
Prioritization is used when there is bandwidth contention for transmission on a port.  
The four levels of priority are used as a mechanism for resolving the contention  
between traffic groups. If traffic groups have the same priority, a round-robin”  
algorithm is applied.  
CREATING AND CONFIGURING A QOS PROFILE  
Up to 28 custom QoS profiles can be created on the Summit in egress mode. To create a  
QoS profile, use the following command:  
create qosprofile <name>  
A new QoS profile is created with the following default values:  
Minimum bandwidth — 0%  
Maximum bandwidth — 100%  
Priority — low  
Each of the default values is configurable by using the following command in egress  
mode:  
config qosprofile <qosname> {minbw <percent>} {maxbw <percent>}  
{priority <level>}  
In ingress mode, use the same command syntax to modify the bandwidth parameters of  
the default QoS profiles, however the priority level specified is ignored.  
ASSIGNING A QOS PROFILE  
Once you have established one or more traffic classifications and configured one or  
more QoS profiles, you can match them together using one of the following commands:  
config vlan <name> qosprofile <qosname>  
or  
config port <portlist> qosprofile <qosname>  
You can assign a QoS profile to a MAC entry by using the following command:  
create fdbentry <mac_address> vlan <name> [blackhole | <portlist> |  
dynamic] {qosprofile <qosname>}  
8-6  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
PORT QUEUE MONITOR  
You can assign a QoS profile to an IP address by using the following command:  
config ipqos [add | delete] <ip_destination_address> qosprofile  
<qosname>  
PORT QUEUE MONITOR  
There are four queues per physical port in the Summit. In ingress mode, the four QoS  
profiles align to the four queues (for example, qp1 to the first queue, qp2 to the second  
queue, and so on). In egress mode, the mapping of QoS profiles to queues is a function  
of the particular configuration.  
The Port Queue Monitor (PQM) is a utility that monitors all the queues assigned to a  
port. The PQM monitors the number of frames and the frames per second a specific  
queue is responsible for transmitting on a physical port. The real-time display roves  
through the given portlist to provide these statistics. The particular port being  
monitored at that time is indicated by an asterisk (*) appearing after the port number in  
the display.  
Table 8-3 describes the PQM commands:  
Table 8-3: PQM Commands  
Command  
Description  
show qosmonitor  
Displays the QoS monitor results. An  
asterisk (*) indicates the port currently  
being monitored.  
show port {<portlist>} qosmonitor  
Displays real-time QoS statistics for one or  
more ports.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
8-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
QUALITY OF SERVICE (QOS)  
CONFIGURING QOS  
Table 8-4 describes the commands used to configure QoS.  
Table 8-4: QoS Configuration Commands  
Command  
Description  
enable pace  
Enables recognition of the PACE bit.  
Available in ingress mode, only.  
create qosprofile <qosname>  
Creates a QoS profile. The default values  
assigned to a created QoS profile are:  
Minimum bandwidth — 0%  
Maximum bandwidth — 100%  
Priority — low  
config qosmode [ingress | egress]  
Changes the QoS mode to ingress mode  
or egress mode.  
config qosprofile <qosname> {minbw <percent>}  
{maxbw <percent>} {priority <level>}  
Configures a QoS profile. Specify:  
minbw — The minimum bandwidth  
percentage guaranteed to be available  
to this queue. The default setting is 0.  
maxbw— The maximum bandwidth  
percentage this queue is permitted to  
use. The default setting is 100.  
priority— The service priority for  
this queue. Settings include low,  
medium-low, medium, high. The default  
setting is low. Available in egress mode,  
only.  
config port <portlist> qosprofile <qosname>  
Allows you to configure one or more ports  
to use a particular QoS profile. Available  
in ingress mode, only.  
config vlan <name> qosprofile <qosname>  
disable pace  
Allows you to configure a VLAN to use a  
particular QoS profile.  
Disables recognition of the PACE bit.  
Available in ingress mode, only.  
8-8  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
CONFIGURING QOS  
SAMPLE INGRESS MODE QOS CONFIGURATION  
The following ingress mode example modifies an existing QoS profile and applies it to a  
VLAN traffic grouping. The priority parameter, although required, is ignored when  
configuring a default QoS profile in ingress mode.  
config qosprofile qp4 minbw 15% maxbw 100% priority high  
config vlan sales qosprofile qp4  
SAMPLE EGRESS MODE QOS CONFIGURATION  
This egress mode example does the following:  
Configures the QoS mode and devicemode of the switch.  
Creates a QoS profile mktgqos, with the following characteristics:  
minimum bandwidth = 0%  
maximum bandwidth = 10%  
priority = low  
Applies the QoS profile mktgqos to a range of IP addresses.  
The steps to configure this example are as follows:  
1
Configure the switch for the egress mode, by typing the following:  
config qosmode egress  
2
3
Reboot the switch.  
Configure the switch for the correct devicemode, by typing the following:  
config devicemode ipqos  
4
5
Reboot the switch.  
Create and configure the QoS profile mktgqos,, by typing the following:  
create qosprofile mktgqos  
config qosprofile mktgqos minbw 0% maxbw 10% priority low  
Apply the QoS profile to a range of IP addresses, by typing the following:  
config ipqos add 128.1.0.0/16 qosprofile mktgqos  
6
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
8-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
QUALITY OF SERVICE (QOS)  
DISPLAYING QOS INFORMATION  
To display QoS information on the switch, use the following command:  
show qosprofile {<qosname> | all}  
Information displayed includes:  
QoS profile name  
Minimum bandwidth  
Maximum bandwidth  
Priority  
A list of all traffic groups assigned to the QoS profile  
Additionally, QoS information can be displayed from the traffic group perspective by  
using one of the following commands:  
show fdb permanent  
Shows destination MAC entries and their QoS profiles.  
show switch  
Includes PACE enable/ disable information.  
show vlan  
Shows the QoS profile assignments to the VLAN.  
show ipqos  
Displays the IP QoS table.  
RESETTING QOS  
To delete a QoS profile use the following command:  
delete qosprofile <qosname>  
This command is available only in egress mode.  
8-10  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
IP Unicast Routing  
9
This chapter describes how to configure IP routing on the Summit. It assumes that  
you are already familiar with IP unicast routing. If not, refer to the following  
publications for additional information:  
RFC 1058 — Routing Information Protocol  
RFC 1256 — ICMP Router Discovery Messages  
RFC 1812 — Requirements for IP Version 4 Routers  
For more information on routing protocols, refer to Chapter 10.  
OVERVIEW OF IP UNICAST ROUTING  
The Summit provides full Layer 3, IP unicast routing. It exchanges routing information  
with other routers on the network using either the Routing Information Protocol (RIP)  
or the Open Shortest Path First (OSPF) protocol. The Summit dynamically builds and  
maintains a routing table, and determines the best path for each of its routes.  
Each host using the IP unicast routing functionality of the Summit must have a unique  
IP address assigned. In addition, the default gateway assigned to the host must be the  
IP address of the Summit router interface.  
RIP and OSPF are described in Chapter 10.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
9-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
IP UNICAST ROUTING  
ROUTER INTERFACES  
The routing software and hardware routes IP traffic between router interfaces. A router  
interface is simply a VLAN that has an IP address assigned to it.  
As you create VLANs with IP addresses belonging to different IP subnets, you can also  
choose to route between the VLANs. Both the VLAN switching and IP routing function  
occur within the Summit.  
Each IP address and mask assigned to a VLAN must represent a unique IP  
subnet. You cannot configure the same IP subnet on different VLANs.  
In Figure 9-1, A Summit is depicted with two VLANs defined; Finance and Personnel.  
Ports 1 and 3 are assigned to Finance; ports 2 and 4 are assigned to Personnel. Finance  
belongs to the IP network 192.207.35.0; the router interface for Finance is assigned the IP  
address 192.206.35.1. Personnel belongs to the IP network 192.207.36.0; its router  
interface is assigned IP address 192.207.36.1. Traffic within each VLAN is switched  
using the Ethernet MAC addresses. Traffic between the two VLANs is routed using the  
IP addresses.  
192.207.35.1  
192.207.36.1  
192.207.35.0  
Finance  
192.207.36.0  
Personnel  
1
2
3
4
192.207.35.11  
192.207.36.12  
192.207.35.13  
192.207.36.14  
Figure 9-1: Routing between VLANs  
9-2  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
OVERVIEW OF IP UNICAST ROUTING  
POPULATING THE ROUTING TABLE  
The Summit maintains an IP routing table for both network routes and host routes. The  
table is populated from the following sources:  
Dynamically, by way of routing protocol packets or ICMP redirects exchanged with  
other routers  
Statically, by way of routes entered by the administrator  
Default routes, configured by the administrator  
Locally, by way of interface addresses assigned to the Summit  
By other static routes, as configured by the administrator  
If you define a default route, and subsequently delete the VLAN on the subnet  
associated with the default route, the invalid default route entry remains. You  
must manually delete the configured default route.  
DYNAMIC ROUTES  
Dynamic routes are typically learned by way of RIP or OSPF. Routers that use RIP or  
OSPF exchange information in their routing tables in the form of advertisements. Using  
dynamic routes, the routing table contains only networks that are reachable.  
Dynamic routes are aged out of the table when an update for the network is not  
received for a period of time, as determined by the routing protocol.  
STATIC ROUTES  
Static routes are manually entered into the routing table. Static routes are used to reach  
networks not advertised by routers. You can configure up to 64 static unicast routes on  
the Summit.  
Static routes can also be used for security reasons, to control which routes you want  
advertised by the router. You can decide if you want all static routes to be advertised,  
using one of the following commands:  
[enable | disable] rip exportstatic  
[enable | disable] ospf exportstatic  
The default setting is enabled. Static routes are never aged out of the routing table.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
9-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
IP UNICAST ROUTING  
A static route must be associated with a valid IP subnet. An IP subnet is associated with  
a single VLAN by its IP address and subnet mask. If the VLAN is subsequently deleted,  
the static route entries using that subnet must be deleted manually.  
MULTIPLE ROUTES  
When there are multiple, conflicting choices of a route to a particular destination, the  
router picks the route with the longest matching network mask. If these are still equal,  
the router picks the route using the following criterion (in the order specified):  
Directly attached network interfaces  
ICMP redirects (refer to Table 9-3)  
Static routes  
Directly attached network interfaces that are not active.  
If you define multiple default routes, the route that has the lowest metric is used.  
If there are multiple default routes that have the same lowest metric, the Summit  
picks one of the routes.  
You can also configure blackhole routes—traffic to these destinations is silently dropped.  
PROXY ARP  
Proxy ARP was first invented so that ARP-capable devices could respond to ARP  
Request packets on behalf of ARP-incapable devices. The usage and scope of proxy  
ARP has been expended since its introduction. Currently, proxy ARP can be used to  
achieve router redundancy and simplify IP client configuration. The Summit switch  
supports proxy ARP for this type of network configuration. Up to 64 proxy ARP entries  
can be configured. The section describes some example of how to use proxy ARP with  
the Summit.  
ARP-INCAPABLE DEVICES  
To configure the Summit to respond to ARP Requests on behalf of devices that are  
incapable of doing so, you must configure the IP address and MAC address of the  
ARP-incapable device using the use the following command:  
config iparp add proxy <ipaddress> {<mask>} <mac_address> {always}  
9-4  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
OVERVIEW OF IP UNICAST ROUTING  
Once configured, the Summit responds to ARP Requests on behalf of the device as long  
as the following conditions are satisfied:  
The valid IP ARP Request is received on a Summit router interface.  
The target IP address matches the IP address configured in the proxy ARP table.  
The proxy ARP table entry indicates that the switch should always answer this ARP  
Request (the alwaysparameter must be applied).  
Once all the proxy ARP conditions are met, the Summit formulates an ARP Response  
using the configured MAC address in the packet.  
PROXY ARP BETWEEN SUBNETS  
In some networks, it is desirable to configure the IP host with a wider subnet than the  
actual subnet mask of the segment. Proxy ARP can be used so that the router answers  
ARP Requests for devices outside of the subnet. As a result, the host communicates as if  
all devices are local. In reality, communication with devices outside of the subnet are  
proxied by the router.  
For example, an IP host is configured with a class B address of 100.101.102.103 and a  
mask of 255.255.0.0. The Summit is configured with the IP address 100.101.102.1 and a  
mask of 255.255.255.0. The Summit is also configured with a proxy ARP entry of IP  
address 100.101.0.0 and mask 255.255.0.0, without the alwaysparameter.  
When the IP host tries to communicate with the host at address 100.101.45.67, the IP  
hosts communicates as if the two hosts are on the same subnet, and sends out an IP  
ARP Request. The Summit answers on behalf of the device at address 100.101.45.67,  
using its own MAC address. All subsequent data packets from 100.101.102.103 are sent  
to the switch, and the switch routes the packets to 100.101.45.67.  
IP MULTINETTING  
IP multinetting is used in many legacy IP networks when there is a need to overlap  
multiple subnets into one physical segment. On the Summit, you can only assign a  
single IP address to a router interface (one IP address per VLAN). To support IP  
multinetting, you must assign multiple VLANs to the same physical port. The Summit  
routes IP traffic from one subnet to another, all within the same physical port.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
9-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
IP UNICAST ROUTING  
The following rules apply when you are configuring IP multinetting:  
A maximum of one IP address is associated with a router interface (or VLAN).  
Multiple VLANs must be used to implement IP multinetting.  
A maximum of four subnets are allowed on one multinetted port.  
For multinetted segments that span multiple ports, you must configure all the  
multinetted VLANs with the same port assignment.  
A maximum of one VLAN can run RIP, and this VLAN must be configured to use  
the IP protocol.  
BOOTP works only on the VLAN assigned to the IP protocol.  
IP MULTINETTING OPERATION  
To use IP multinetting, follow these steps:  
1
2
3
4
Select a port on which IP multinetting is to run.  
For example, port 2.  
Remove the default VLAN from the selected port.  
config default delete port 2  
Create a dummy protocol.  
create protocol mnet  
Create the multinetted subnets.  
create vlan net21  
create vlan net22  
5
Assign IP addresses to the net VLANs.  
config net21 ipaddress 123.45.21.1 255.255.255.0  
config net22 ipaddress 192.24.22.1 255.255.255.0  
6
7
Assign one of the subnets to the IP protocol.  
config net21 protocol ip  
Assign the other subnets to the dummy protocol.  
config net22 protocol mnet  
9-6  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
OVERVIEW OF IP UNICAST ROUTING  
8
9
Assign the subnet to a physical port.  
config net21 add port 2  
config net22 add port 2  
Enable IP forwarding on the subnets.  
enable ipforwarding  
10 Enable IP multinetting.  
enable multinetting  
11 If you are using RIP, disable RIP on the dummy VLANs.  
config rip delete net22  
IP MULTINETTING EXAMPLES  
The following example configures the switch to have one multinetted segment (port 5)  
that contains three subnets (192.67.34.0, 192.67.35.0, and 192.67.37.0).  
config default delete port 5  
create protocol mnet  
create vlan net34  
create vlan net35  
create vlan net37  
config net34 ipaddress 192.67.34.1  
config net35 ipaddress 192.67.35.1  
config net37 ipaddress 192.67.37.1  
config net34 protocol ip  
config net35 protocol mnet  
config net37 protocol mnet  
config net34 add port 5  
config net35 add port 5  
config net37 add port 5  
enable ipforwarding  
enable multinetting  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
9-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
IP UNICAST ROUTING  
The following example configures the switch to have one multinetted segment (port 5)  
that contains three subnets (192.67.34.0, 192.67.35.0, and 192.67.37.0). It also configures a  
second multinetted segment consisting of two subnets (192.67.36.0 and 192.99.45.0). The  
second multinetted segment spans three ports (port 8, port 9, and port 10). RIP is  
enabled on both multinetted segments.  
config default delete port 5  
create protocol mnet  
create vlan net34  
create vlan net35  
create vlan net37  
config net34 ipaddress 192.67.34.1  
config net35 ipaddress 192.67.35.1  
config net37 ipaddress 192.67.37.1  
config net34 protocol ip  
config net35 protocol mnet  
config net37 protocol mnet  
config net34 add port 5  
config net35 add port 5  
config net37 add port 5  
config default delete port 8-10  
create vlan net36  
create vlan net45  
config net36 ipaddress 192.67.36.1  
config net45 ipaddress 192.99.45.1  
config net36 protocol ip  
config net45 protocol mnet  
config net36 add port 8-10  
config net45 add port 8-10  
config rip delete vlan all  
config rip add net34  
config rip add net36  
enable rip  
enable ipforwarding  
enable multinetting  
9-8  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CONFIGURING IP UNICAST ROUTING  
CONFIGURING IP UNICAST ROUTING  
This section describes the commands associated with configuring IP unicast routing on  
the Summit. Configuring routing involves the following steps:  
Verify the switch operating mode is set to iproutingby using the following  
command:  
show switch  
If it is not, use the following command:  
config devicemode iprouting  
Create and configure two or more VLANs.  
Although it is possible to enable IP forwarding and an IP routing protocol (such as  
RIP) with only one VLAN defined, the Summit does not create or respond  
appropriately to ICMP messages unless at least two VLANs are created and  
configured.  
For information on creating and configuring VLANs, refer to Chapter 5.  
Assign each VLAN that will be using routing an IP address, using the following  
command:  
config vlan <name> ipaddress <ipaddress> {<mask>}  
Ensure that each VLAN has a unique IP address.  
Configure a default route, using the following command:  
config iproute add default <gateway> {<metric>}  
Default routes are used when the router has no other dynamic or static route to the  
requested destination.  
Turn on IP routing for one or more VLANs, using the following command:  
enable ipforwarding {vlan <name> | all}  
Turn on RIP or OSPF using one of the following commands:  
enable rip  
enable ospf  
Only one routing protocol, either RIP or OSPF, can be enabled on the switch at  
any given time.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
9-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
IP UNICAST ROUTING  
VERIFYING THE IP UNICAST ROUTING CONFIGURATION  
Use the show iproutecommand to display the current configuration of IP unicast  
routing for the switch, and for each VLAN. The show iproutecommand displays the  
currently configured routes, and includes how each route was learned.  
Additional verification commands include the following:  
show iparp  
Displays the IP ARP table of the switch.  
show ipfdb  
Displays the hosts that have been transmitting or receiving packets, and the port and  
VLAN for each host.  
show ipconfig  
Displays configuration information for one or more VLANs.  
CONFIGURING DHCP/BOOTP RELAY  
Once IP unicast routing is configured, you can configure the Summit to forward  
Dynamic Host Configuration Protocol (DHCP) or BOOTP requests coming from clients  
on subnets being service by the Summit and going to hosts on different subnets. This  
feature can be used in various applications, including DHCP services between Windows  
NT servers and clients running Windows 95. To configure the relay function, do the  
following:  
1
2
Configure VLANs and IP unicast routing.  
Enable the DHCP or BOOTP relay function, using the following command:  
enable bootprelay  
3
Configure the addresses to which DHCP or BOOTP requests should be directed,  
using the following command:  
config bootprelay add <ipaddress>  
To delete an entry, use the following command:  
config bootprelay delete {<ipaddress> | all}  
9-10  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CONFIGURING DHCP/BOOTP RELAY  
VERIFYING THE DHCP/BOOTP RELAY CONFIGURATION  
To verify the DHCP/ BOOTP relay configuration, use the following command:  
show ipconfig  
This command displays the configuration of the BOOTP relay service, and the  
addresses that are currently configured.  
Table 9-1 describes the commands used to configure basic IP settings on the switch.  
Table 9-1: Basic IP Commands  
Command  
Description  
enable bootp vlan [<name> | all]  
Enables the generation and processing of  
BOOTP packets on a VLAN to obtain an  
IP address for the VLAN from a BOOTP  
server. The default setting is enabled for  
all VLANs.  
enable bootprelay  
Enables the forwarding of BOOTP and  
Dynamic Host Configuration Protocol  
(DHCP) requests.  
enable ipforwarding {vlan <name> | all}  
Enables IP routing for one or more VLANs.  
If no argument is provided, enables routing  
for all VLANs that have been configured  
with an IP address. The default setting for  
ipforwardingis disabled.  
enable ipforwarding broadcast {vlan <name> | all}  
Enables forwarding IP broadcast traffic for  
one or more VLANs. If no argument is  
provided, enables broadcast forwarding  
for all VLANs. To enable, ipforwarding  
must be enabled on the VLAN. The default  
setting is enabled.  
enable multinetting  
Enables IP multinetting on the switch/  
config bootprelay add <ipaddress>  
Adds the IP destination address to  
forward BOOTP packets.  
config bootprelay delete [<ipaddress> | all]  
config iparp add <ipaddress> <mac_address>  
Removes one or all IP destination  
addresses for forwarding BOOTP packets.  
Adds a permanent entry to the ARP table.  
Specify the IP address and MAC address  
of the entry.  
config iparp delete <ipaddress>  
Deletes an entry from the ARP table.  
Specify the IP address of the entry.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
9-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
IP UNICAST ROUTING  
Table 9-1: Basic IP Commands (continued)  
Command  
Description  
disable bootp vlan [<name> | all]  
Disables the generation and processing of  
BOOTP packets.  
config iparp add proxy <ipaddress> {<mask>}  
{<mac_address>} {always}  
Configures proxy ARP entries. Up to 64  
proxy ARP entries can be configured.  
When <mask> is not specified, a how  
address with the mask 255.255.255.255 is  
assumed. When <mac_address> is not  
specified, the MAC address of the switch  
is used in the ARP Response. When  
alwaysis specified, the switch answers  
ARP Requests without filtering requests  
that belong to the same subnet of the  
receiving router interface.  
config iparp delete proxy [<ipaddress> {<mask>} |  
all]  
Deletes one or all proxy ARP entries.  
disable bootprelay  
Disables the forwarding of BOOTP  
requests.  
disable ipforwarding {vlan <name> | all}  
Disables routing for one or more VLANs.  
disable ipforwarding broadcast {vlan <name> | all}  
Disables routing of broadcasts to other  
networks.  
disable multinetting  
Disables IP multinetting on the switch.  
clear iparp [<ipaddress> <mask> | vlan <name> |  
all]  
Removes dynamic entries in the IP ARP  
table. Permanent IP ARP entries are not  
affected.  
clear ipfdb [<ipaddress> | vlan <name> | all]  
Removes the dynamic entries in the IP  
forwarding database.  
9-12  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CONFIGURING DHCP/BOOTP RELAY  
Table 9-2 describes the commands used to configure the IP route table.  
Table 9-2: Route Table Configuration Commands  
Command  
Description  
enable iproute sharing  
Enables load sharing if multiple routes to the  
same destination are available. Only paths with  
the same lowest cost are shared. The default  
setting is enabled.  
config ipqos add <ip_destination_address>  
<mask> qosprofile <qosname>  
Adds a QoS profile to an IP destination  
address.  
config ipqos delete <ip_destination_address>  
<mask>  
Deletes a QoS profile from an IP destination  
address.  
config iproute add <ipaddress> <mask>  
<gateway> <metric>  
Adds a static address to the routing table. Use  
a value of 255.255.255.255 for maskto  
indicate a host entry  
config iproute delete <ipaddress> <mask>  
<gateway>  
Deletes a static address from the routing table.  
config iproute add blackhole <ipaddress>  
<mask>  
Adds a blackholeaddress to the routing  
table. All traffic destined for the configured IP  
address is dropped, and no Internet Control  
Message Protocol (ICMP) message is  
generated.  
config iproute delete blackhole <ipaddress>  
<mask>  
Deletes a blackholeaddress from the routing  
table.  
config iproute add default <gateway>  
{<metric>}  
Adds a default gateway to the routing table. A  
default gateway must be located on a  
configured IP interface. If no metric is  
specified, the default metric of 1 is used.  
config iproute delete default <gateway>  
disable iproute sharing  
Deletes a default gateway from the routing  
table.  
Disables load sharing for multiple routes.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
9-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
IP UNICAST ROUTING  
Table 9-3 describes the commands used to configure the ICMP protocol.  
Table 9-3: ICMP Configuration Commands  
Command  
Description  
enable icmp redirects {vlan <name> | all}  
Enables generation of ICMP redirect messages  
on one or more VLANs. The default setting is  
enabled.  
enable icmp unreachables {vlan <name> | all} Enables the generation of ICMP unreachable  
messages on one or more VLANs. The default  
setting is enabled.  
enable icmp useredirects  
Enables the modification of route table  
information when an ICMP redirect message  
is received. The default setting is disabled.  
enable irdp {vlan <name> | all}  
config irdp [multicast | broadcast]  
Enables the generation of ICMP router  
advertisement messages on one or more  
VLANs. The default setting is enabled.  
Configures the destination address of the  
router advertisement messages. The default  
setting is multicast.  
config irdp <mininterval> <maxinterval>  
<lifetime> <preference>  
Configures the router advertisement message  
timers, using seconds. Specify:  
mininterval— The minimum amount of  
time between router advertisements. The  
default setting is 450 seconds.  
maxinterval— The maximum time  
between router advertisements. The default  
setting is 600 seconds.  
lifetime— The default setting is 1,800  
seconds.  
preferenceThe preference level of  
the router. An IRDP client always uses the  
router with the highest preference level.  
Change this setting to encourage or  
discourage the use of this router. The  
default setting is 0.  
unconfig icmp  
unconfig irdp  
Resets all ICMP settings to the default values.  
Resets all router advertisement settings to the  
default values.  
disable icmp redirects {vlan <name> | all}  
Disables the generation of ICMP redirects on  
one or more VLANs.  
9-14  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
ROUTING CONFIGURATION EXAMPLE  
Table 9-3: ICMP Configuration Commands (continued)  
Command Description  
disable icmp unreachables {vlan <name> | all} Disables the generation of ICMP unreachable  
messages on one or more VLANs.  
disable icmp useredirects  
Disables the changing of routing table  
information when an ICMP redirect message  
is received.  
disable irdp {vlan <name> | all}  
Disables the generation of router advertisement  
messages on one or more VLANs.  
ROUTING CONFIGURATION EXAMPLE  
Figure 9-2 illustrates a switch that has three VLANs defined as follows:  
Finance  
Protocol-sensitive VLAN using the IP protocol  
Ports 1 and 3 have been assigned  
IP address 192.207.35.1  
Personnel  
Protocol-sensitive VLAN using the IP protocol  
Ports 2 and 4 have been assigned  
IP address 192.207.36.1  
MyCompany  
Port-based VLAN  
All ports have been assigned  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
9-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
IP UNICAST ROUTING  
192.207.35.1  
192.207.36.1  
My Company  
192.207.35.0  
Finance  
192.207.36.0  
Personnel  
1
2
3
4
IP  
IP  
NetBIOS  
IP  
IP  
NetBIOS  
NetBIOS  
NetBIOS  
= IP traffic  
= NetBIOS traffic  
Figure 9-2: Unicast routing configuration example  
The stations connected to ports 1 through 4 generate a combination of IP traffic and  
NetBIOS traffic. The IP traffic is filtered by the protocol-sensitive VLANs. All other  
traffic is directed to the VLAN MyCompany.  
In this configuration, all IP traffic from stations connected to ports 1 and 3 have access  
to the router by way of the VLAN Finance. Ports 2 and 4 reach the router by way of the  
VLAN Personnel. All other traffic (NetBIOS) is part of the VLAN MyCompany.  
The example in Figure 9-2 is configured as follows:  
create vlan Finance  
create vlan Personnel  
create vlan MyCompany  
config Finance protocol ip  
config Personnel protocol ip  
config Finance add port 1,3  
config Personnel add port 2,4  
config MyCompany add port all  
9-16  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
DISPLAYING ROUTER SETTINGS  
config Finance ipaddress 192.207.35.1  
config Personnel ipaddress 192.207.36.1  
enable ipforwarding  
DISPLAYING ROUTER SETTINGS  
To display settings for various IP routing components, use the commands listed in  
Table 9-4.  
Table 9-4: Router Show Commands  
Command  
Description  
show iparp proxy {<ipaddress> {<mask>} | all}  
show ipconfig {vlan <name> | all}  
Displays the proxy ARP table.  
Displays configuration information for one or  
more VLANs, including the following:  
IP address, subnet mask  
IP forwarding information  
BOOTP configuration  
VLAN name, VLANid  
Global ICMP configuration  
Global IGMP configuration  
Global router advertisement configuration  
show ipqos {<ip_destination_address> <mask> | Displays the IP QoS table.  
all}  
show ipstats {vlan [<name> | all]}  
Displays IP statistics for the CPU of the  
switch.  
show iparp {<ipaddress | vlan <name> | all |  
permanent}  
Displays the IP Address Resolution Protocol  
(ARP) table. You can filter the display by IP  
address, VLAN, or permanent entries. Each  
entry displayed includes the following:  
IP address  
MAC address  
Aging timer value  
VLAN name, VLANid, and port number  
Flags  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
9-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
IP UNICAST ROUTING  
Table 9-4: Router Show Commands (continued)  
Command  
Description  
show ipfdb {<ipaddress> <netmask> | vlan  
<name> | all}  
Displays the contents of the IP forwarding  
database table. Used for technical support  
purposes.  
show iproute vlan {<name> | all | permanent |  
<ipaddress> <mask>}  
Displays the contents of the IP routing table.  
RESETTING AND DISABLING ROUTER SETTINGS  
To return router settings to their defaults and disable routing functions, use the  
commands listed in Table 9-5.  
Table 9-5: Router Reset and Disable Commands  
Command  
Description  
clear iparp [<ipaddress> | vlan <name> | all] Removes dynamic entries in the IP ARP table.  
Permanent IP ARP entries are not affected.  
clear ipfdb [<ipaddress> <netmask> | vlan  
<name> | all]  
Removes the dynamic entries in the IP  
forwarding database.  
disable bootp vlan [<name> | all]  
Disables the generation and processing of  
BOOTP packets.  
disable bootprelay  
Disables the forwarding of BOOTP requests.  
disable icmp redirects {vlan <name> | all}  
Disables the generation of ICMP redirects on one  
or more VLANs.  
disable icmp unreachables  
Disables the generation of ICMP unreachable  
messages on one or more VLANs.  
disable icmp useredirects  
Disables the changing of routing table information  
when an ICMP redirect message is received.  
disable ipforwarding {vlan <name> | all}  
Disables routing for one or more VLANs.  
disable ipforwarding broadcast {vlan  
<name> | all}  
Disables routing of broadcasts to other networks.  
disable irdp {vlan <name> | all}  
Disables the generation of router advertisement  
messages on one or more VLANs.  
unconfig icmp  
unconfig irdp  
Resets all ICMP settings to the default values.  
Resets all router advertisement settings to the  
default values.  
9-18  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Routing Protocols  
10  
This chapter describes the IP unicast routing protocols available on the Summit. It  
assumes that you are already familiar with IP unicast routing. If not, refer to the  
following publications for additional information:  
RFC 1058 — Routing Information Protocol (RIP)  
RFC 1256 — ICMP Router Discovery Messages  
RFC 1723 — RIP Version 2  
RFC 2178 — OSPF Version 2  
“Interconnections: Bridges and Routers”  
by Radia Perlman  
ISBN 0-201-56332-0  
Published by Addison-Wesley Publishing Company  
OVERVIEW  
The Summit switch supports the use of either the Routing Information Protocol (RIP) or  
the Open Shortest Path First (OSPF) protocol for IP unicast routing.  
RIP is a distance vector protocol, based on the Bellman-Ford (or distance vector)  
algorithm. The distance vector algorithm has been in use for many years, and is widely  
deployed and understood.  
OSPF is a link state protocol, based on the Dijkstra link state algorithm. OSPF is a newer  
Interior Gateway Protocol (IGP), and solved a number of problems associated with  
using RIP on todays complex networks.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
10-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ROUTING PROTOCOLS  
RIP VERSUS OSPF  
The distinction between RIP and OSPF lies in the fundamental differences between  
distance vector protocols and link state protocols. Using a distance vector protocol, each  
router creates a unique routing table from summarized information obtained from  
neighboring routers. Using a link state protocol, every router maintains an identical  
routing table created from information obtained from all routers in the autonomous  
system. Each router builds a shortest path tree, using itself as the root. The link state  
protocol ensures that updates sent to neighboring routers are acknowledged by the  
neighbors, verifying that all routers have a consistent network map.  
The biggest advantage of using RIP is that it is relatively simple to understand and  
implement, and it has been the de facto routing standard for many years.  
RIP has a number of limitations that can cause problems in large networks, including  
the following:  
A limit of 15 hops between the source and destination networks  
A large amount of bandwidth taken up by periodic broadcasts of the entire routing  
table  
Slow convergence  
Routing decisions based on hop count; no concept of link costs or delay  
Flat networks; no concept of areas or boundaries  
OSPF offers many advantages over RIP, including the following:  
No limitation on hop count  
Route updates multicast only when changes occur  
Faster convergence  
Support for load balancing to multiple routers based on the actual cost of the link  
Support for hierarchical topologies where the network is divided into areas  
The details of RIP and OSPF are explained later in this chapter.  
10-2  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
OVERVIEW OF RIP  
OVERVIEW OF RIP  
RIP is an Interior Gateway Protocol (IGP) first used in computer routing in the  
ARPAnet as early as 1969. It is primarily intended for use in homogeneous networks of  
moderate size.  
To determine the best path to a distant network, a router using RIP always selects the  
path that has the least number of hops. Each router that data must traverse is  
considered to be one hop.  
ROUTING TABLE  
The routing table in a router using RIP contains an entry for every known destination  
network. Each routing table entry contains the following information:  
IP address of the destination network  
Metric (hop count) to the destination network  
IP address of the next router  
Timer that tracks the amount of time since the entry was last updated  
The router exchanges an update message with each neighbor every 30 seconds (default  
value), or if there is a change to the overall routed topology (also called triggered  
updates). If a router does not receive an update message from its neighbor within the  
route timeout period (180 seconds by default), the router assumes the connection  
between it and its neighbor is no longer available.  
SPLIT HORIZON  
Split horizon is a scheme for avoiding problems caused by including routes in updates  
sent to the router from which the route was learned. Split horizon omits routes learned  
from a neighbor in updates sent to that neighbor.  
POISON REVERSE  
Like split horizon, poison reverse is a scheme for eliminating the possibility of loops in  
the routed topology. In this case, a router advertises a route over the same port that  
supplied the route, but the route uses a hop count of 16, defining it as unreachable.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
10-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ROUTING PROTOCOLS  
TRIGGERED UPDATES  
Triggered updates occur whenever a router changes the metric for a route, and it is  
required to send an update message immediately, even if it is not yet time for a regular  
update message to be sent. This will generally result in faster convergence, but may also  
result in more RIP-related traffic.  
ROUTE ADVERTISEMENT OF VLANS  
VLANs that are configured with an IP address, but are configured to not route IP, have  
their subnets advertised by RIP with a metric of 16 (unreachable). To disable the  
advertising of a subnet completely, you must unconfigure the IP address for the VLAN  
using the following command:  
unconfig vlan <name> ipaddress  
RIP VERSION 1 VERSUS RIP VERSION 2  
A new version of RIP, called RIP version 2, expands the functionality of RIP version 1 to  
include the following:  
Variable-Length Subnet Masks (VLSMs)  
Next-hop addresses  
Support for next-hop addresses allows for optimization of routes in certain  
environments.  
Multicasting  
RIP version 2 packets can be multicast instead of being broadcast, reducing the  
load on hosts that do not support routing protocols.  
10-4  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
OVERVIEW OF OSPF  
OVERVIEW OF OSPF  
OSPF is a link state protocol that distributes routing information between routers  
belonging to a single IP domain, also known as an autonomous system. In a link state  
routing protocol, each router maintains a database describing the topology of the  
autonomous system. Each participating router has an identical database maintained  
from the perspective of that router.  
From the link state database (LSDB), each router constructions a tree of shortest paths,  
using itself as the root. The shortest path tree provides the route to each destination in  
the Autonomous System. When several equal-cost routes to a destination exist, traffic  
can distributed among them. The cost of a route is described by a single metric.  
LINK STATE DATABASE  
Upon initialization, each router transmits a link state advertisement (LSA) on each of its  
interfaces. The LSA contains the following information for each link:  
IP network number of the link  
Subnet mask of the link  
Metric for the link  
Operation status (up or down) of the link  
LSAs are collected by each router and entered into the LSDB of each router. OSPF uses  
flooding to distribute LSAs between routers. Any change in routing information is sent  
to all of the routers in the network. All routers within an area have the exact same  
LSDB.  
AREAS  
OSPF allows parts of a networks to be grouped together into areas. The topology within  
an area is hidden from the rest of the autonomous system. Hiding this information  
enables a significant reduction in LSA traffic, and reduces the computations needed to  
maintain the LSDB. Routing within the area is determined only by the topology of the  
area.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
10-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ROUTING PROTOCOLS  
The three types of routers defined by OSPF are as follows:  
Internal Router (IR)  
An internal router has all of its interfaces within the same area.  
Area Border Router (ABR)  
An ABR has interfaces in multiple areas. It is responsible for exchanging Summary  
Advertisements with other ABRs.  
Autonomous System Border Router (ASBR)  
An ASBR acts as a gateway between OSPF and other routing protocols, or other  
autonomous systems.  
The Summit can be configured as an internal router or an area border router.  
AREA 0  
Any OSPF network that contains more than one area is required to have an area  
configured as area 0, also called the backbone. All areas in an autonomous system must  
be connected to the backbone. When designing networks, you should start with area 0,  
and then expand into other areas.  
The backbone allows summary information to be exchanged between ABRs. Every ABR  
hears the area summaries from all other ABRs. The ABR then forms a picture of the  
distance to all network outside of its area by examining the collected advertisements,  
and adding in the backbone distance to each advertising router.  
STUB AREAS  
OSPF allows certain areas to be configured as stub areas. A stub area is connected to  
only one other area and contains a single exit point. The area that connects to a stub  
area can be the backbone area. All routing out of a stub area is based on default routes.  
Stub areas are used to reduce memory and computation requirements on OSPF routers.  
Figure 10-1 shows a stub area.  
ABR  
Area 0  
Stub Area  
Figure 10-1: Stub area  
10-6  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
OVERVIEW OF OSPF  
VIRTUAL LINKS  
In the situation when a new area is introduced that does have a direct physical  
attachment to the backbone, a virtual link is used. A virtual link provides a logical path  
between the ABR of the disconnected area and the ABR of the backbone. A virtual link  
must be established between two ABRs that have a common area, with one ABR  
connected to the backbone. Figure 10-2 illustrates a virtual link.  
Area 2  
ABR  
ABR  
Area 1  
Area 0  
Virtual link  
Figure 10-2: Virtual link for stub area  
Virtual links are also used to repair a discontiguous backbone area. For example, in  
Figure 10-3, if the connection between ABR1 and the backbone fails, the connection  
using ABR2 provides redundancy so that the discontiguous area can continue to  
communicate with the backbone using the virtual link.  
Area 0  
ABR 1  
ABR 2  
Area 1  
Area 2  
Area 3  
Virtual link  
Figure 10-3: Virtual link providing redundancy  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
10-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
ROUTING PROTOCOLS  
CONFIGURING RIP  
Table 10-1 describes the commands used to configure RIP.  
Table 10-1: RIP Configuration Commands  
Command  
Description  
enable rip  
Enables RIP. The default setting is disabled.  
enable rip aggregation  
Enables RIP aggregation of subnet information  
an interface configured to sent RIP v2 or RIP  
v2-compatible traffic. The switch summarizes  
subnet routes to the nearest class network  
route. The following rules apply when using  
RIP aggregation:  
Subnet routes are aggregated to the  
nearest class network route when crossing  
a class boundary.  
Within a class boundary, no routes are  
aggregated.  
If aggregation is enabled, the behavior is  
the same as in RIP v1.  
If aggregation is disabled, subnet routes  
are never aggregated, even when crossing  
a class boundary.  
The default setting is enabled.  
enable rip exportstatic  
Enables the advertisement of static routes  
using RIP. The default setting is enabled.  
enable rip poisonreverse  
Enables the split horizon with poison-reverse  
algorithm for RIP. The default setting is  
enabled. If you enable poison reverse and  
split horizon, poison reverse takes precedence.  
enable rip splithorizon  
enable rip triggerupdate  
Enables the split horizon algorithm for RIP.  
Default setting is enabled.  
Enables triggered updates. Triggered updates  
are a mechanism for immediately notifying a  
router’s neighbors when the router adds or  
deletes routes, or changes the metric of a  
route. The default setting is enabled.  
10-8  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
CONFIGURING RIP  
Table 10-1: RIP Configuration Commands (continued)  
Command  
Description  
config rip add {vlan <name> | all}  
Configures RIP on an IP interface. If no VLAN  
is specified, then allis assumed. When an  
IP interface is created, per interface RIP  
configuration is disabled by default.  
config rip delete [vlan <name> | all]  
config rip garbagetime {<delay>}  
config rip routetimeout {<delay>}  
Disables RIP on an IP interface. When RIP is  
disabled on the interface, the parameters are  
not reset to their defaults.  
Configures the RIP garbage time. The timer  
granularity is 10 seconds. The default setting is  
120 seconds.  
Configures the route timeout. The timer  
granularity is 10 seconds. The default setting is  
180 seconds.  
config rip rxmode [none | v1only | v2only |  
any] {vlan <name> | all}  
Changes the RIP receive mode for one or  
more VLANs. Specify:  
none— Drop all received RIP packets.  
v1only— Accept only RIP version 1  
format packets.  
v2only— Accept only RIP version 2  
format packets.  
any— Accept both version 1 and version  
2 packets.  
If no VLAN is specified, the setting is applied to  
all VLANs. The default setting is any.  
config rip txmode [none | v1only | v1comp |  
v2only] {vlan <name> | all}  
Changes the RIP transmission mode for one or  
more VLANs. Specify:  
none— Do not transmit any packets on  
this interface.  
v1only— Transmit RIP version 1 format  
packets to the broadcast address.  
v1comp— Transmit version 2 format  
packets to the broadcast address.  
v2only— Transmit version 2 format  
packets to the RIP multicast address  
If no VLAN is specified, the setting is applied to  
all VLANs. The default setting is v2only.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
10-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ROUTING PROTOCOLS  
Table 10-1: RIP Configuration Commands (continued)  
Command  
Description  
config rip updatetime {<delay>}  
Changes the periodic RIP update timer. The  
timer granularity is 10 seconds. The default  
setting is 30 seconds.  
RIP CONFIGURATION EXAMPLE  
Figure 10-4 illustrates a switch that has three VLANs defined as follows:  
Finance  
Protocol-sensitive VLAN using the IP protocol  
Ports 1 and 3 have been assigned  
IP address 192.207.35.1  
Personnel  
Protocol-sensitive VLAN using the IP protocol  
Ports 2 and 4 have been assigned  
IP address 192.207.36.1  
MyCompany  
Port-based VLAN  
All ports have been assigned  
10-10  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
RIP CONFIGURATION EXAMPLE  
192.207.35.1  
192.207.36.1  
My Company  
192.207.35.0  
Finance  
192.207.36.0  
Personnel  
1
2
3
4
IP  
IP  
NetBIOS  
IP  
IP  
NetBIOS  
NetBIOS  
NetBIOS  
= IP traffic  
= NetBIOS traffic  
Figure 10-4: RIP configuration example  
The stations connected to ports 1 through 4 generate a combination of IP traffic and  
NetBIOS traffic. The IP traffic is filtered by the protocol-sensitive VLANs. All other  
traffic is directed to the VLAN MyCompany.  
In this configuration, all IP traffic from stations connected to ports 1 and 3 have access  
to the router by way of the VLAN Finance. Ports 2 and 4 reach the router by way of the  
VLAN Personnel. All other traffic (NetBIOS) is part of the VLAN MyCompany.  
The example in Figure 10-4 is configured as follows:  
create vlan Finance  
create vlan Personnel  
create vlan MyCompany  
config Finance protocol ip  
config Personnel protocol ip  
config Finance add port 1,3  
config Personnel add port 2,4  
config MyCompany add port all  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
10-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
ROUTING PROTOCOLS  
config Finance ipaddress 192.207.35.1  
config Personnel ipaddress 192.207.36.1  
enable ipforwarding  
config rip add vlan all  
enable rip  
DISPLAYING RIP SETTINGS  
To display settings for RIP, use the commands listed in Table 10-2.  
Table 10-2: RIP Show Commands  
Command  
Description  
show rip {vlan <name> | all}  
Displays RIP configuration and statistics for  
one or more VLANs.  
show rip stat {vlan <name> | all}  
Displays RIP-specific statistics. Statistics  
include the following per interface:  
Packets transmitted  
Packets received  
Bad packets received  
Bad routes received  
Number of RIP peers  
Peer information  
10-12  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
RESETTING AND DISABLING RIP  
RESETTING AND DISABLING RIP  
To return RIP settings to their defaults, or to disable RIP, use the commands listed in  
Table 10-3.  
Table 10-3: RIP Reset and Disable Commands  
Command  
Description  
config rip delete [vlan <name> | all]  
Disables RIP on an IP interface. When RIP is  
disabled on the interface, the parameters are not  
reset to their defaults.  
disable rip  
Disables RIP.  
disable rip aggregation  
Disables the RIP aggregation of subnet  
information on a RIP version 2 interface.  
disable rip splithorizon  
Disables split horizon.  
disable rip poisonreverse  
disable rip triggerupdate  
disable rip exportstatic  
Disables poison reverse.  
Disables triggered updates.  
Disables the filtering of static routes.  
unconfig rip {vlan <name> | all}  
Resets all RIP parameters to the default VLAN.  
Does not change the enable/disable state of the  
RIP settings.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
10-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
ROUTING PROTOCOLS  
CONFIGURING OSPF  
Table 10-4 describes the commands used to configure OSPF.  
Table 10-4: OSPF Configuration Commands  
Command  
Description  
create ospf area <areaid>  
Creates an OSPF area. By default, the OSPF  
area 0.0.0.0 is created.  
enable ospf  
Enables OSPF process for the router.  
enable ospf exportstatic type [1 | 2]  
Exports statically configured routes to other  
OSPF routers. The default setting is disabled.  
config ospf [vlan <name> | area <areaid> |  
Specifies the authentication password (up to 8  
virtual-link <routerid> <areaid>] authentication characters) or MD5 key for one or all interfaces  
[simple-password <password> | md5  
<md5_key_id> <md5_key>| none]  
in an area. The <md5_key>is a numeric value  
with the range 0 - 65536. When the OSPF  
area is specified, authentication information is  
applied to all OSPF interfaces within the area.  
config ospf vlan <name> area <areaid>  
Associates a VLAN (router interface) with an  
OSPF area. All router interfaces must have an  
associated OSPF area. The default <areaid>  
is 0 (backbone area).  
config ospf [vlan <name> | area <areaid> | all] Configures the cost metric of one or all  
cost <number> interface(s). The default cost is 1.  
config ospf [vlan <name> | area <areaid> | all] Configures the priority used in the designated  
priority <number>  
router election algorithm for one or all IP  
interface(s) of for all the interfaces within the  
area. The range is 0 through 255, and the  
default setting is 1.  
config ospf add [vlan <name> | all]  
config ospf delete [vlan <name> | all]  
Enables OSPF on one or all VLANs (router  
interfaces). The default setting is disabled.  
Disables OSPF on one or all VLANs (router  
interfaces).  
config ospf add virtual-link <routerid> <areaid> Adds a virtual link connected to another ABR.  
Specify the following:  
routerid— Far end router interface  
number.  
areaid— Transit area used for connecting  
the two end-points. The transit area cannot  
have the IP address 0.0.0.0.  
10-14  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
CONFIGURING OSPF  
Table 10-4: OSPF Configuration Commands (continued)  
Command  
Description  
config ospf delete virtual-link <routerid>  
<areaid>  
Removes a virtual link.  
config ospf area <areaid> normal  
Configures an OSFP area as a normal area.  
The default setting is normal.  
config ospf area <areaid> stub [summary |  
nosummary] stub-default-cost <cost>  
Configures an OSPF area as a stub area. The  
default setting is normal.  
config ospf area add range <ipaddress>  
<mask> [advertise | noadvertise]  
Configures a range of IP addresses in an  
OSPF area. If advertised, the range is exported  
as a single summary link state advertisement  
by the ABR.  
config ospf area delete range <ipaddress>  
<mask>  
Deletes a range of IP addresses in an OSPF  
area.  
config ospf routerid [automatic | <routerid>]  
Configures the OSPF router ID. If automatic is  
specified, the switch uses the largest IP  
interface address as the OSPF router ID. The  
default setting is automatic.  
config ospf [vlan <name> | area <areaid> |  
virtual-link <routerid>] timer  
<retransmission_interval>  
<transmission_delay> <hello_interval>  
<dead_interval>  
Configures the timers for one interface or all  
interfaces in the same OSPF area. The  
following default, minimum, and maximum  
values (in seconds) are used:  
Retransmission interval  
Default: 5  
Minimum: 0  
Maximum: 3600  
Transmissiondelay  
Default: 1  
Minimum: 0  
Maximum: 3600  
Hellointerval  
Default: 10  
Minimum: 1  
Maximum: 65535  
Deadinterval  
Default: 40  
Minimum: 1  
Maximum: 2147483647  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
10-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ROUTING PROTOCOLS  
OSPF CONFIGURATION EXAMPLE  
Figure 10-5 shows an example of an autonomous system using OSPF routers. The  
details of this network follow.  
Area 0  
IR 2  
IR 1  
10.0.1.1  
10.0.1.2  
10.0.3.2  
10.0.2.2  
Headquarters  
ABR 2  
10.0.3.1  
10.0.2.1  
ABR 1  
161.48.2.2  
160.26.25.1  
160.26.26.1  
Los Angeles  
Virtual link  
161.48.2.1  
160.26.26.2  
Chicago  
160.26.25.2  
Area 5  
Area 6 (stub)  
Figure 10-5: OSPF configuration example  
Area 0 is the backbone area. It is located at the headquarters and has the following  
characteristics:  
2 internal routers (IR1 and IR2)  
2 area border routers (ABR1 and ABR2)  
Network number 10.0.x.x  
2 identified VLANs (HQ_10_0_2 and HQ_10_0_3)  
10-16  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
OSPF CONFIGURATION EXAMPLE  
Area 5 is connected to the backbone area by way of ABR1 and ABR2. It is located in  
Chicago and has the following characteristics:  
Network number 160.26.x.x  
1 identified VLAN (Chi_160_26_26)  
2 internal routers  
A virtual link from ABR1 to ABR2 that traverses both internal routers.  
In the event that the link between either ABR and the backbone fails, the virtual link  
provides a connection for all routers that become discontiguous from the backbone.  
Area 6 is a stub area connected to the backbone by way of ABR1. It is located in Los  
Angeles and has the following characteristics:  
Network number 161.48.x.x  
1 identified VLAN (LA_161_48_2)  
3 internal routers  
Uses default routes for inter-area routing  
Two router configurations for the example in Figure 10-5 are provided in the following  
section.  
CONFIGURATION FOR ABR1  
The following is the configuration for the router labeled ABR1:  
create vlan HQ_10_0_2  
create vlan HQ_10_0_3  
create vlan LA_161_48_2  
create vlan Chi_160_26_2  
config vlan HQ_10_0_2 ipaddress 10.0.2.1 255.255.255.0  
config vlan HQ_10_0_3 ipaddress 10.0.3.1 255.255.255.0  
config vlan LA_161_48_2 ipaddress 161.48.2.2 255.255.255.0  
config vlan Chi_160_26_2 ipaddress 160.26.2.1 255.255.255.0  
create ospf area 0.0.0.5  
create ospf area 0.0.0.6  
enable ipforwarding  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
10-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ROUTING PROTOCOLS  
config ospf area 0.0.0.6 stub nosummary stub-default-cost 10  
config ospf vlan LA_161_48_2 area 0.0.0.6  
config ospf vlan Chi_160_26_2 area 0.0.0.5  
config ospf add virtual-link 160.26.25.1 0.0.0.5  
config ospf add vlan all  
enable ospf  
CONFIGURATION FOR IR1  
The following is the configuration for the router labeled IR1:  
config vlan HQ_10_0_1 ipaddress 10.0.1.2 255.255.255.0  
config vlan HQ_10_0_2 ipaddress 10.0.2.2 255.255.255.0  
config ospf add vlan all  
enable ipforwarding  
enable ospf  
DISPLAYING OSPF SETTINGS  
To display settings for OSPF, use the commands listed in Table 10-5.  
Table 10-5: OSPF Show Commands  
Command  
Description  
show ospf  
Displays global OSPF information.  
show ospf area {<areaid> | all}  
Displays information about a particular OSPF  
area, or all ospf areas.  
show ospf interfaces {vlan <name> | area  
<areaid> | all}  
Displays information about one or all OSPF  
interfaces. If no argument is specific, all  
OSPF interfaces are displayed.  
show ospf lsdb {detail} {area <areaid> | all}  
Displays a table of the current link state  
{router | network | summary_net | summary_asb database. You can filter the display using  
| as_external | all}  
either the area ID or the remote router’s  
router ID, or the link state ID. The default is  
allwith no detail. If detail is specified,  
each entry includes complete LSA  
information.  
show ospf virtual-link {<areaid> <routerid> | all}  
Displays virtual link information about a  
particular router or all routers.  
10-18  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
RESETTING AND DISABLING OSPF SETTINGS  
RESETTING AND DISABLING OSPF SETTINGS  
To return OSPF settings to their defaults, use the commands listed in Table 10-6.  
Table 10-6: OSPF Reset and Disable Commands  
Command  
Description  
config ospf delete [vlan <name> | all]  
Disables OSPF on one or all VLANs (router  
interfaces).  
delete ospf area [<areaid> | all]  
Deletes and OSPF area. Once an OSPF area is  
removed, the associated OSPF area and OSPF  
interface information is removed.  
disable ospf  
Disables OSPF.  
disable ospf exportstatic  
Disables exporting of statically configured routes.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
10-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
ROUTING PROTOCOLS  
10-20  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
IP Multicast Routing  
11  
This chapter describes the components of IP multicast routing, and how to configure IP  
multicast routing on the Summit.  
For more information on IP multicasting, refer to RFC 1112, RFC 1075,  
RFC 2236, and other more recent Internet draft documents.  
OVERVIEW  
IP multicast routing is a function that allows a single IP host to send a packet to a group  
of IP hosts. This group of hosts can include devices that reside on the local network,  
within a private network, or outside of the local network.  
IP multicast routing consists of the following functions:  
A router that can forward IP multicast packets.  
A router-to-router multicast protocol (for example, Distance Vector Multicast Routing  
Protocol or DVMRP).  
A method for the IP host to communication its multicast group membership to a  
router (for example, Internet Group Management Protocol or IGMP).  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
11-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
IP MULTICAST ROUTING  
DVMRP OVERVIEW  
DVMRP is a distance vector protocol that is used to exchange routing and multicast  
information between routers. Like RIP, DVMRP periodically sends the entire routing  
table to its neighbors.  
DVMRP has a mechanism that allows it to prune and graft multicast trees in order to  
reduce the bandwidth that is consumed by IP multicast traffic.  
IGMP OVERVIEW  
IGMP is a protocol used by an IP host to register its IP multicast group membership  
with the router. Periodically, the router queries the multicast group to see if the group is  
still in use. If the group is still active, a single IP host responds to the query, and group  
registration is maintained.  
IGMP SNOOPING  
IGMP snooping adds intelligence to a layer 2 device (such as a switch), to reduce the  
flooding of IP multicast traffic. The goal of IGMP snooping is to optimize the usage of  
network bandwidth and prevent multicast traffic from being flooded to parts of the  
network that do not need to see it.  
CONFIGURING IP MULTICASTING ROUTING  
To configure IP multicast routing, you must do the following:  
Set the devicemode to IP multicasting, using the following command:  
config devicemode ipmc  
Save and reboot the switch so that the new devicemode configuration occurs.  
Configure the switch for IP unicast routing.  
For more information on configuring IP unicast routing, refer to Chapter 9 and  
Chapter 10.  
Enable multicast routing on the interface, using the following command:  
enable ipmcforwarding {vlan <name> | all}  
Enable DVMRP on all IP multicast routing interfaces, using the following command:  
config dvmrp add [vlan <name> | all]  
11-2  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
CONFIGURING IP MULTICASTING ROUTING  
Enable DVMRP on the router, using the following command:  
enable dvmrp  
Table 11-1 describes the commands used to configure IP multicast routing.  
Table 11-1: IP Multicast Routing Configuration Commands  
Command  
Description  
enable dvmrp  
Enables DVMRP on the switch. The default  
setting is disabled.  
enable ipmcforwarding {<vlan <name> | all>} Enables IP multicast forwarding on an IP  
interface. If allis specified, all configured IP  
interfaces are affected. When new IP interfaces  
are added, ipforwarding is disabled by default.  
config dvmrp add {vlan <name> | all}  
Enables DVMRP on an IP interface. When an IP  
interface is created, DVMRP is enabled by  
default.  
config dvmrp delete {vlan <name> | all}  
Disables DVMRP on an IP interface.  
config dvmrp vlan <name> timer  
<probe_interval>  
Configures DVMRP interface timers. Specify the  
following:  
<neighbor_timeout_interval>  
probe_interval— The amount of time that  
the switch waits between transmitting  
DVMRP probe messages. The range is 1 to  
4294967296 seconds (136 years). The  
default setting is 10 seconds.  
neighbor_timeout_interval— The  
amount of time before a DVMRP neighbor  
route is declared to be down. The range is 1  
to 4294967296 seconds (136 years). The  
default setting is 35 seconds.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
11-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
IP MULTICAST ROUTING  
Table 11-1: IP Multicast Routing Configuration Commands (continued)  
Command  
Description  
config dvmrp timer <route_report_interval>  
<route_replacement_time>  
Configures the global DVMRP timers. Specify  
the following:  
route_report_interval— The amount  
of time the switch waits between transmitting  
periodic route report packets. The range is 1  
to 4294967296 seconds (136 years). The  
default setting is 60 seconds.  
route_replacement_time— The  
hold-down time before a new route is  
learned, once the previous route has been  
deleted. The range is 1 to 4294967296  
seconds (136 years). The default setting is  
140 seconds.  
config ipmc cache timeout <seconds>  
Configures the aging time for IP multicast cache  
entries. The default setting is 300 seconds.  
Table 11-2 describes the command used to configure the Internet Gateway Message  
Protocol (IGMP).  
Table 11-2: IGMP Configuration Commands  
Command  
Description  
enable igmp {vlan <name> | all}  
Enables IGMP on a router interface. The default  
setting is enabled.  
enable igmp snooping {vlan <name> | all}  
Enables IGMP snooping. The default setting is  
disabled.  
11-4  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
CONFIGURING IP MULTICASTING ROUTING  
Table 11-2: IGMP Configuration Commands (continued)  
Command  
Description  
config igmp <query_interval>  
<query_response_interval>  
<last_member_query_interval>  
Configures the IGMP timers. Timers are based  
on RFC2236. Specify the following:  
query_interval— The amount of time, in  
seconds, the switch waits between sending  
out General Queries. The range is 1 to  
4294967296 seconds (136 years). The  
default setting is 125 seconds.  
query_response_interval— The  
maximum response time inserted into the  
periodic General Queries. The range is 1 to  
25 seconds. The default setting is 10 seconds.  
last_member_query_interval— The  
maximum response time inserted into a  
Group-Specific Query sent in response to a  
Leave group message. The range is 1 to 25  
seconds. The default setting is 1 second.  
config igmp snooping <router_timeout>  
<host_timeout>  
Configures the IGMP snooping timers. Timers  
should be set to approximately 2.5 times the  
router query interval in use on the network.  
Specify the following:  
router_timeout— The interval, in  
seconds, between the last time the router  
was discovered and the current time. The  
range is 10 to 4294967296 seconds (136  
years). The default setting is 260 seconds.  
host_timeout— The interval, in seconds,  
between the last IGMP group report message  
from the host and the current time. The range  
is 10 to 4294967296 seconds (136 years).  
The default setting is 260 seconds.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
11-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
IP MULTICAST ROUTING  
CONFIGURATION EXAMPLE  
Figure 11-1 is used in Chapter 10 to describe the OSPF configuration on a Summit. Refer  
to Chapter 10 for more information about configuring OSPF. In this example, the switch  
labeled IR1 is configured for IP multicast routing.  
Area 0  
IR 2  
IR 1  
10.0.1.1  
10.0.1.2  
10.0.3.2  
10.0.2.2  
Headquarters  
ABR 2  
10.0.3.1  
10.0.2.1  
ABR 1  
161.48.2.2  
160.26.25.1  
160.26.26.1  
Los Angeles  
Virtual link  
161.48.2.1  
160.26.26.2  
Chicago  
160.26.25.2  
Area 5  
Area 6 (stub)  
Figure 11-1: IP multicast routing configuration example  
11-6  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
DISPLAYING IP MULTICAST ROUTING SETTINGS  
CONFIGURATION FOR IR1  
The following is the configuration for the router labeled IR1:  
config vlan HQ_10_0_1 ipaddress 10.0.1.2 255.255.255.0  
config vlan HQ_10_0_2 ipaddress 10.0.2.2 255.255.255.0  
config ospf add vlan all  
enable ipforwarding  
enable ospf  
enable ipmcforwarding  
config dvmrp add vlan all  
DISPLAYING IP MULTICAST ROUTING SETTINGS  
To display settings for IP multicast routing components, use the commands listed in  
Table 11-3.  
Table 11-3: IP Multicast Routing Show Commands  
Command  
Description  
show dvmrp {vlan <name> | route | all}  
Displays the DVMRP configuration and  
statistics, or the unicast route table. The  
default setting is all.  
show igmp snooping {<vlan <name> | all}  
Displays IGMP snooping registration  
information, and a summary of all IGMP  
timers and states.  
show ipmc cache {<group> {<src_ipaddress>  
<mask>}} | all}  
Displays the IP multicast forwarding cache.  
Information displayed includes the following:  
IP group address  
IP source address and mask  
Upstream neighbor  
Interface to upstream neighbor  
Route expiration timer  
Routing protocol  
List of next hop interfaces and protocols  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
11-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
IP MULTICAST ROUTING  
DELETING AND RESETTING IP MULTICAST SETTINGS  
To return IP multicast routing settings to their defaults and disable IP multicast routing  
functions, use the commands listed in Table 11-4.  
Table 11-4: IP Multicast Routing Reset and Disable Commands  
Command  
Description  
disable dvmrp  
Disables DVMRP on the switch.  
Disables IP multicast forwarding.  
Disables IGMP on a router interface.  
Disables IGMP snooping.  
disable ipmcforwarding {vlan <name> | all}  
disable igmp {vlan <name> | all}  
disable igmp snooping {vlan <name> | all}  
unconfig dvmrp [vlan <name> | all]  
Resets the DVMRP timers to their default  
settings.  
unconfig igmp  
Resets all IGMP settings to their default values  
and clears the IGMP group table.  
clear igmp snooping [vlan <name> | all]  
Removes one or more IGMP snooping entries.  
clear ipmc cache {<group>  
{<src_ipaddress> <mask>}} | all]  
Resets the IP multicast cache table. If no option  
is specified, all IP multicast cache entries are  
flushed.  
11-8  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Status Monitoring and Statistics  
12  
This chapter describes how to view the current operating status of the switch, how to  
display information in the switch log, and how to take advantage of the RMON  
capabilities available in the switch.  
Viewing statistics on a regular basis allows you to see how well your network is  
performing. If you keep simple daily records, you will see trends emerging and notice  
problems arising before they cause major network faults. This way, statistics can help  
you get the best out of your network.  
STATUS MONITORING  
The status monitoring facility provides information about the switch. This information  
may be useful for your technical support representative if you have a problem.  
Table 12-1 describes the showcommands available on the switch.  
Table 12-1: Switch Monitoring Commands  
Command  
Description  
show account  
Displays the account names, access level, number of  
successful and failed login attempts, and the number  
of active sessions in the user database. This  
command is available only to admin level users.  
show banner  
Displays the user-configured banner.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
12-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
STATUS MONITORING AND STATISTICS  
Table 12-1: Switch Monitoring Commands (continued)  
Command  
Description  
show config  
Displays the current switch configuration to the  
terminal. You can then capture the output and store  
it as a file.  
show diag  
Displays switch software diagnostics.  
show dvmrp {vlan <name> | route | all}  
Displays the DVMRP configuration and statistics, or  
the unicast route table. The default setting is all.  
show edp  
Displays connectivity information for neighboring  
Summit switches.  
show fdb {all | <macaddress> | vlan  
<name> | <portlist> | permanent | qos}  
Displays the forwarding database contents including  
MAC address, associated VLAN, port, age-of-entry  
configuration method, and status. Providing one of the  
options acts as a filter on the display. Providing a  
VLAN name displays all entries for the VLAN. Use the  
MAC address to locate a specific entry in the FDB.  
show gvrp  
Displays the current configuration and status of  
GVRP.  
show igmp snooping {<vlan <name> |  
all}  
Displays IGMP snooping registration information, and  
a summary of all IGMP timers and states.  
show iparp {<ip_address> | vlan  
<name> | all | permanent}  
Displays the IP Address Resolution Protocol (ARP)  
table. You can filter the display by IP address, VLAN,  
or permanent entries.  
show iparp proxy {<ipaddress> {<mask} Displays the proxy ARP table.  
| all}  
show ipconfig {vlan <name> | all}  
Displays configuration information for one or more  
VLANs, including the following:  
IP address, subnet mask  
IP forwarding information  
BOOTP configuration  
VLAN name, VLANid  
Global ICMP configuration  
Global IGMP configuration  
Global IRDP configuration  
show ipfdb {<ipaddress> | vlan <name> Displays the contents of the IP forwarding database  
| all}  
table.  
12-2  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
STATUS MONITORING  
Table 12-1: Switch Monitoring Commands (continued)  
Command  
Description  
show ipmc cache {<group>  
{<src_ipaddress> <mask>}} | all}  
Displays the IP multicast route table. Information  
displayed includes the following:  
IP group address  
IP source address and mask  
Upstream neighbor  
Interface to upstream neighbor  
Route expiration timer  
Routing protocol  
List of next hop interfaces and protocols  
show ipqos {<ip_destination_address>  
<mask> | all}  
Displays the IP QoS table.  
show iproute vlan {<name> | all |  
permanent | <ipaddress> <mask>}  
Displays the contents of the IP routing table.  
show ipstats {vlan [<name> | all]}  
Displays statistics of packets handled by the CPU,  
including the following:  
inpackets, outpackets  
ICMP/IGMP statistics  
IRDP statistics  
show log {<priority>} {<subsystem>}  
Displays the current snapshot of the log. Options  
include:  
priority— Filters the log to display message  
with the selected priority or higher (more critical).  
Priorities include critical, warning, and  
informational. If not specified, informational priority  
messages and higher are displayed.  
subsystem— Filters the log to display  
messages associated with the selected switch  
subsystem. Subsystems include Syst, STP Brdg,  
SNMP, Telnet, VLAN, and Port. If not specified,  
all subsystems are displayed.  
show log config  
Displays the log configuration, including the syslog  
host IP address, the priority level of messages being  
logged locally, and the priority level of messages  
being sent to the syslog host.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
12-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
STATUS MONITORING AND STATISTICS  
Table 12-1: Switch Monitoring Commands (continued)  
Command  
Description  
show management  
Displays network management configuration and  
statistics including enable/disable states for Telnet  
and SNMP, SNMP community strings, authorized  
SNMP station list, SNMP trap receiver list, and login  
statistics.  
show memory  
Displays the current system memory information.  
Displays the port-mirroring configuration.  
Displays global OSPF information.  
show mirroring  
show ospf  
show ospf area {<areaid> | all}  
Displays information about a particular OSPF area,  
or all ospf areas.  
show ospf interfaces {vlan <name> |  
area <areaid> | all}  
Displays information about one or all OSPF  
interfaces. If no argument is specific, all OSPF  
interfaces are displayed.  
show ospf lsdb {detail} {area <areaid> | Displays a table of the current link state database.  
all} {router | network | summary_net |  
summary_asb | as_external | all}  
You can filter the display using either the area ID or  
the remote router’s router ID, or the link state ID. The  
default is allwith no detail. If detail is specified,  
each entry includes complete LSA information.  
show ospf virtual-link {<areaid>  
<routerid> | all}  
Displays virtual link information about a particular  
router or all routers.  
show port {<portlist>} collisions  
show port {<portlist>} config  
Displays real-time collision statistics.  
Displays the port configuration, including the  
following:  
Port state  
Link state  
Link speed  
Duplex mode  
Flow control  
Load sharing information  
Link media information  
QoS information  
12-4  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
STATUS MONITORING  
Table 12-1: Switch Monitoring Commands (continued)  
Command  
Description  
show port {<portlist>} information  
Displays detailed system-related information, including  
the following:  
Port state  
Link state  
Autonegotiation state  
Link speed  
Duplex mode  
Load sharing information  
EDP status  
SummitLink mode  
VLAN information  
QoS information  
show port {<portlist>} packet  
show port {<portlist>} qosmonitor  
show port {<portlist>} rxerrors  
show port {<portlist>} stats  
Displays a histogram of packet statistics.  
Displays real-time QoS statistics.  
Displays real-time receive error statistics.  
Displays real-time port statistics.  
show port {<portlist>} txerrors  
show port {<portlist>} utilization  
Displays real-time transmit error statistics.  
Displays real-time port utilization information. Use the  
[Spacebar] to toggle between packet, byte, and  
bandwidth utilization information.  
show protocol {<protocol> | all}  
Displays protocol information including protocol name,  
protocol fields, and the list of VLANs that use this  
protocol.  
show qosmonitor  
Displays the QoS monitor configuration and results.  
show qosprofile {<qosname> | all}  
Displays QoS profile information including the QoS  
profile name, minimum bandwidth, maximum  
bandwidth, and priority levels. Also displays the  
groupings to which this QoS profile is applied.  
show rip {vlan <name> | all}  
Displays RIP configuration and statistics for one or  
more VLANs.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
12-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
STATUS MONITORING AND STATISTICS  
Table 12-1: Switch Monitoring Commands (continued)  
Command  
Description  
show rip stat {vlan <name> | all}  
Displays RIP-specific statistics. Statistics include the  
following per interface:  
Packets transmitted  
Packets received  
Bad packets received  
Bad routes received  
Number of RIP peers  
Peer information  
show session  
Displays the currently active Telnet and console  
sessions communicating with the switch. Provides  
the user name, IP address of the incoming Telnet  
session, whether a console session is currently  
active, and login time. Sessions are numbered.  
show stpd {<stpd_name> | all}  
Displays STP information for the one or all STP  
domains.  
show stpd <stpd_name> port <portlist> Displays port-specific STP information including STP  
port configuration and state.  
show switch  
Displays the current switch information, including:  
sysName, sysLocation, sysContact  
MAC address  
Current time and time, and system uptime  
Operating environment (temperature, fans, and  
power supply status)  
NVRAM image information (primary/secondary  
image, date, time, size, version)  
NVRAM configuration information  
(primary/secondary configuration, date, time, size,  
version)  
Scheduled reboot information  
802.1p information  
System serial number and reworks indicator  
Software platform  
System ID  
Power supply and fan status  
12-6  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
PORT STATISTICS  
Table 12-1: Switch Monitoring Commands (continued)  
Command  
Description  
show version  
Displays the hardware and software versions currently  
running on the switch. Also displays the switch serial  
number.  
show vlan {<name> | all}  
When used with the keyword all, or with no named  
VLANs, displays a summary list of VLAN names with  
a portlist and associated status of each. When used  
with a named identifier, displays port information  
including membership list, IP address, tag information.  
PORT STATISTICS  
The Summit provides a facility for viewing port statistic information. The summary  
information lists values for the current counter against every port on the switch, and it  
is refreshed approximately every two seconds. Values are displayed to nine digits of  
accuracy.  
To view port statistics, use the following command:  
show port <portlist> stats  
The following port statistic information is collected by the switch:  
Link Status — The current status of the link. Options are  
Ready — The port is ready to accept a link.  
Active — The link is present at this port.  
Chassis — The link is connected to a Summit Virtual Chassis.  
Transmit Packet Count (Tx Pkt Count) — The number of packets that have been  
successfully transmitted by the port.  
Transmit Byte Count (Tx Byte Count) — The total number of data bytes successfully  
transmitted by the port.  
Total Collisions — The total number of collisions seen by the port, regardless of  
whether a device connected to the port participated in any of the collisions.  
Received Packet Count (Rx Pkt Count) — The total number of good packets that  
have been received by the port.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
12-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
STATUS MONITORING AND STATISTICS  
Received Byte Count (RX Byte Count) — The total number of bytes that were  
received by the port, including bad or lost frames. This number includes bytes  
contained in the Frame Check Sequence (FCS), but excludes bytes in the preamble.  
Receive Broadcast (RX Bcast) — The total number of frames received by the port  
that are addressed to a broadcast address.  
Receive Multicast (RX Mcast) — The total number of frames received by the port  
that are addressed to a multicast address.  
PORT ERRORS  
The Summit keeps track of errors for each port.  
To view port transmit errors, use the following command:  
show port <portlist> txerrors  
The following port transmit error information is collected by the switch:  
Link Status — The current status of the link. Options are  
Ready — The port is ready to accept a link.  
Active — The link is present at this port.  
Transmit Collisions (TX Coll) — The total number of collisions seen by the port,  
regardless of whether a device connected to the port participated in any of the  
collisions.  
Transmit Late Collisions (TX Late) — The total number of collisions that have  
occurred after the ports transmit window has expired.  
Transmit Deferred Frames (TX Def) — The total number of frames that were  
transmitted by the port after the first transmission attempt was deferred by other  
network traffic.  
Transmit Errored Frames (TX Err) — The total number of frames that were not  
completely transmitted by the port because of network errors (such as late collisions  
or excessive collisions).  
To view port receive errors, use the following command:  
show port <portlist> rxerrors  
12-8  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
PORT MONITORING DISPLAY KEYS  
The following port receive error information is collected by the switch:  
Receive Bad CRC Frames (RX CRC) — The total number of frames received by the  
port that were of the correct length, but contained a bad FCS value.  
Receive Oversize Frames (RX Over) — The total number of good frames received  
by the port that were of greater than the supported maximum length of 1,522 bytes.  
Receive Undersize Frames (RX Under) — The total number of frames received by  
the port that were less than 64 bytes long.  
Receive Jabber Frames (RX Jab) — The total number of frames received by the port  
that was of greater than the support maximum length and had a Cyclic Redundancy  
Check (CRC) error.  
Receive Alignment Errors (RX Align) — The total number of frames received by the  
port that occurs if a frame has a CRC error and does not contain an integral number  
of octets.  
Receive Frames Lost (RX Lost) — The total number of frames received by the port  
that were lost because of buffer overflow in the switch.  
PORT MONITORING DISPLAY KEYS  
Table 12-2 describes the keys used to control the displays that appear when you issue  
any of the show portcommands.  
Table 12-2: Port Monitoring Display Keys  
Key(s)  
Description  
U
Displays the previous page of ports.  
Displays the next page of ports.  
Exits from the screen.  
D
[Esc] or [Return]  
0
Clears all counters.  
[Space]  
Cycles through the following screens:  
Packets per second  
Bytes per second  
Percentage of bandwidth  
Available using the show port  
utilizationcommand only.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
12-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
STATUS MONITORING AND STATISTICS  
SWITCH LOGGING  
The Summit log tracks all configuration and fault information pertaining to the device.  
Each entry in the log contains the following information:  
Timestamp — The timestamp records the month and day of the event, along with  
the time (hours, minutes, and seconds) in the form HH:MM:SS. If the event was  
caused by a user, the user name is also provided.  
Fault level Table 12-3 describes the three levels of importance that the switch can  
assign to a fault.  
Table 12-3: Fault Levels Assigned by the Switch  
Level  
Description  
Critical  
A desired switch function is inoperable. The switch may need to  
be reset.  
Warning  
A noncritical error that may lead to a function failure.  
Informational  
Actions and events that are consistent with expected behavior.  
Subsystem — The facility refers to the specific functional area of the switch to which  
the error refers. Table 12-4 describes the subsystems.  
Table 12-4: Fault Log Subsystems  
Subsystem  
Description  
Syst  
General system-related information. Examples include memory,  
power supply, security violations, fan failure, overheat  
condition, and configuration mode.  
STP  
Brdg  
STP information. Examples include an STP state change.  
Bridge-related functionality. Examples include low table space  
and queue overflow.  
SNMP  
Telnet  
SNMP information. Examples include community string  
violations.  
Information related to Telnet login and configuration performed  
by way of a Telnet session.  
VLAN  
Port  
VLAN-related configuration information.  
Port management-related configuration. Examples include port  
statistics and errors.  
Message — The message contains the log information with text that is specific to the  
problem.  
12-10  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
   
SWITCH LOGGING  
LOCAL LOGGING  
The switch maintains 1,000 messages in its internal log. You can display a snapshot of  
the log at any time by using the command  
show log {<priority>} {<subsystem>}  
where the following is true:  
priority— Filters the log to display message with the selected priority or higher  
(more critical). Priorities include critical, warning, and informational. If not specified,  
informational priority messages and higher are displayed.  
subsystem— Filters the log to display messages associated with the selected switch  
subsystem. Subsystems include Syst, STP Brdg, SNMP, Telnet, VLAN, and Port. If  
not specified, all subsystems are displayed.  
REAL-TIME DISPLAY  
In addition to viewing a snapshot of the switch log, you can configure the switch to  
maintain a running real-time display of log messages on the console. To turn on the log  
display, enter the following command:  
enable log display  
To configure the log display, use the following command:  
config log display {<priority>} {<subsystem>}  
If priorityis not specified, only messages of critical priority are displayed. If the  
subsystemis not specified, all subsystems are displayed.  
If you enable the log display on a terminal connected to the console port, your settings  
will remain in effect even after your console session is ended (unless you explicitly  
disable the log display).  
When using a Telnet connection, if your Telnet session is disconnected (because of the  
inactivity timer, or for other reasons), the log display is automatically halted. You must  
restart the log display by using the enable log displaycommand.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
12-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
STATUS MONITORING AND STATISTICS  
REMOTE LOGGING  
In addition to maintaining an internal log, the Summit supports remote logging by way  
of the UNIX Syslog host facility. To enable remote logging, do the following:  
Configure the Syslog host to accept and log messages.  
Enable remote logging by using the following command:  
enable syslog  
Configure remote logging by using the following command:  
config syslog <ipaddress> <facility> {<priority>} {<subsystem>}  
Specify:  
ipaddress— The IP address of the syslog host.  
facility— The syslog facility level for local use. Options include local0through  
local7.  
priority— Filters the log to display message with the selected priority or higher  
(more critical). Priorities include critical, warning, and informational. If not specified,  
only critical priority messages are sent to the syslog host.  
subsystem— Filters the log to display messages associated with the selected switch  
subsystem. Subsystems include Syst, STP Brdg, SNMP, Telnet, VLAN, and Port. If  
not specified, all subsystems are sent to the syslog host.  
Refer to your UNIX documentation for more information about the Syslog host  
facility.  
LOGGING COMMANDS  
The commands described in Table 12-5 allow you to configure logging options, reset  
logging options, display the log, and clear the log.  
12-12  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SWITCH LOGGING  
Table 12-5: Logging Commands  
Command  
Description  
config log display {<priority>} {<subsystem>}  
Configures the real-time log display. Options  
include:  
priority— Filters the log to display  
messages with the selected priority or  
higher (more critical). Priorities include  
critical, warning, and informational. If not  
specified, informational priority messages  
and higher are displayed.  
subsystem— Filters the log to display  
messages associated with the selected  
switch subsystem. Subsystems include  
Syst, STP Brdg, SNMP, Telnet, VLAN, and  
Port. If not specified, all subsystems are  
displayed.  
config syslog <ip_address> <facility>  
{<priority>} {<subsystem>}  
Configures the syslog host address and filter  
messages sent to the syslog host. Options  
include:  
ipaddress— The IP address of the  
syslog host.  
facility— The syslog facility level for  
local use.  
priority— Filters the log to display  
messages with the selected priority or  
higher (more critical). Priorities include  
critical, warning, and informational. If not  
specified, only critical priority messages  
and are sent to the syslog host.  
subsystem— Filters the log to display  
messages associated with the selected  
switch subsystem. Subsystems include  
Syst, STP Brdg, SNMP, Telnet, VLAN, and  
Port. If not specified, all subsystems are  
sent to the syslog host.  
enable log display  
enable syslog  
Enables the log display.  
Enables logging to a remote syslog host.  
Disables the log display.  
disable log display  
disable syslog  
Disables logging to a remote syslog host.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
12-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
STATUS MONITORING AND STATISTICS  
Table 12-5: Logging Commands (continued)  
Command  
Description  
show log {<priority>} {<subsystem>}  
Displays the current snapshot of the log.  
Options include:  
priority— Filters the log to display  
message with the selected priority or higher  
(more critical). Priorities include critical,  
warning, and informational. If not specified,  
informational priority messages and higher  
are displayed.  
subsystem— Filters the log to display  
messages associated with the selected  
switch subsystem. Subsystems include  
Syst, STP Brdg, SNMP, Telnet, VLAN, and  
Port. If not specified, all subsystems are  
displayed.  
show log config  
Displays the log configuration, including the  
syslog host IP address, the priority level of  
messages being logged locally, and the  
priority level of messages being sent to the  
syslog host.  
clear counters  
Clears all switch statistics and port counters.  
clear log {static}  
Clears the log. If staticis specified, the  
critical log messages are also cleared.  
RMON  
Using the Remote Monitoring (RMON) capabilities of the switch allows network  
administrators to improve switch efficiency and reduce the load on the network.  
The following sections explain more about the RMON concept and the RMON features  
supported by the Summit.  
You can only use the RMON features of the switch if you have an RMON  
management application.  
ABOUT RMON  
RMON is the common abbreviation for the Remote Monitoring Management  
Information Base (MIB) system defined by the Internet Engineering Task Force (IETF)  
documents RFC 1271 and RFC 1757, which allows you to monitor LANs remotely.  
12-14  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
RMON  
A typical RMON setup consists of the following two components:  
RMON probe — An intelligent, remotely controlled device or software agent that  
continually collects statistics about a LAN segment or VLAN. The probe transfers  
the information to a management workstation on request, or when a predefined  
threshold is crossed.  
Management workstation — Communicates with the RMON probe and collects the  
statistics from it. The workstation does not have to be on the same network as the  
probe, and can manage the probe by in-band or out-of-band connections.  
RMON FEATURES OF THE SWITCH  
The IETF defines nine groups of Ethernet RMON statistics. The Summit supports the  
following four of these groups:  
Statistics  
History  
Alarms  
Events  
This section describes these groups, and discusses how they can be used.  
STATISTICS  
The RMON Ethernet Statistics group provides traffic and error statistics showing  
packets, bytes, broadcasts, multicasts, and errors on a LAN segment or VLAN.  
Information from the Statistics group is used to detect changes in traffic and error  
patterns in critical areas of the network.  
HISTORY  
The History group provides historical views of network performance by taking periodic  
samples of the counters supplied by the Statistics group. The group features  
user-defined sample intervals and bucket counters for complete customization of trend  
analysis.  
The group is useful for analysis of traffic patterns and trends on a LAN segment or  
VLAN, and to establish baseline information indicating normal operating parameters.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
12-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
STATUS MONITORING AND STATISTICS  
ALARMS  
The Alarms group provides a versatile, general mechanism for setting threshold and  
sampling intervals to generate events on any RMON variable. Both rising and falling  
thresholds are supported, and thresholds can be on the absolute value of a variable or  
its delta value. In addition, alarm thresholds may be autocalibrated or set manually.  
Alarms inform you of a network performance problem and can trigger automated  
action responses through the Events group.  
EVENTS  
The Events group creates entries in an event log and/ or sends SNMP traps to the  
management workstation. An event is triggered by an RMON alarm. The action taken  
can be configured to ignore it, to log the event, to send an SNMP trap to the receivers  
listed in the trap receiver table, or to both log and send a trap. The RMON traps are  
defined in RFC 1757 for rising and falling thresholds.  
Effective use of the Events group saves you time. Rather than having to watch real-time  
graphs for important occurrences, you can depend on the Event group for notification.  
Through the SNMP traps, events can trigger other actions, providing a mechanism for  
an automated response to certain occurrences.  
RMON AND THE SWITCH  
RMON requires one probe per LAN segment, and standalone RMON probes have  
traditionally been expensive. Therefore, Extremes approach has been to build an  
inexpensive RMON probe into the agent of each switch. This allows RMON to be  
widely deployed around the network without costing more than traditional network  
management. The Summit accurately maintains RMON statistics at the maximum line  
rate of all of its ports.  
For example, statistics can be related to individual ports. Also, because a probe must be  
able to see all traffic, a stand-alone probe must be attached to a nonsecure port.  
Implementing RMON in the switch means that all ports can have security features  
enabled.  
12-16  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
RMON  
EVENT ACTIONS  
The actions that you can define for each alarm are shown in Table 12-6.  
Table 12-6: Event Actions  
Action  
High Threshold  
No action  
Notify only  
Notify and log  
Send trap to all trap receivers.  
Send trap; place entry in RMON log  
To be notified of events using SNMP traps, you must configure one or more trap  
receivers, as described in Chapter 3.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
12-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
STATUS MONITORING AND STATISTICS  
12-18  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Using ExtremeWare Vista  
13  
ExtremeWare Vista is device-management software running in the Summit that allows  
you to access the switch over a TCP/ IP network, using a standard Web browser. Any  
properly configured standard Web browser that supports frames (such as Netscape  
Navigator 3.0 or higher, or Microsoft Internet Explorer 3.0 or higher) can be used to  
manage the switch.  
ExtremeWare Vista provides a subset of the command-line interface (CLI) commands  
available for configuring and monitoring the Summit. If a particular command is not  
available using ExtremeWare Vista, you must use the command-line interface to access  
the desired functionality.  
ENABLING AND DISABLING WEB ACCESS  
By default, Web access is enabled on the Summit. To disable it, use the following  
command:  
disable web  
To re-enable Web access, use the following command:  
enable web  
You will need to reboot the switch in order for these changes to take effect.  
For more information on rebooting the switch, refer to Chapter 14.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
13-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
USING EXTREMEWARE VISTA  
To use ExtremeWare Vista, at least one VLAN on the switch must be assigned an IP  
address.  
For more information on assigning an IP address, refer to Chapter 3.  
SETTING UP YOUR BROWSER  
In general, the default settings that come configured on your browser work well with  
ExtremeWare Vista. The following are recommended settings that you can use to  
improve the display features and functionality of ExtremeWare Vista:  
After downloading a newer version of the Summit image, clear the browser disk and  
memory cache to see the updated menu screens. You must clear the cache while at  
the main ExtremeWare Vista Logon screen, so that all underlying .GIF files are  
updated.  
Check for newer versions of stored pages. Every visit to the page should be selected  
as a cache setting.  
If you are using Netscape Navigator, configure the cache option to check for changes  
“Every Time” you request a page.  
If you are using Microsoft Internet Explorer, configure the Temporary Internet Files  
setting to check for newer versions of stored pages by selecting “Every visit to the  
page.”  
Images must be auto-loaded.  
Use a high-resolution monitor to maximize the amount of information displayed in  
the content frame. The recommended resolution is 1024 x 768 pixels. You can also  
use 800 x 600 pixels.  
Turn off one or more of the browser toolbars to maximize the viewing space of the  
ExtremeWare Vista content screen.  
If you will be using ExtremeWare Vista to send an e-mail to the Extreme Networks  
Technical Support department, configure the e-mail settings in your browser.  
Configure the browser to use the following recommended fonts:  
Proportional font—Times New Roman  
Fixed-width font—Courier New  
13-2  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
ACCESSING EXTREMEWARE VISTA  
ACCESSING EXTREMEWARE VISTA  
To access the default home page of the switch, enter the following URL in your  
browser:  
http://<ip_address>  
When you access the home page of the switch, you are presented with the Login screen.  
Enter your user name and password in the appropriate fields, and click OK.  
If you have entered the name and password of an administrator-level account, you have  
access to all ExtremeWare Vista pages. If you have used a user-level account name and  
password, you only have access to the Statistics and Support information.  
For more information on assigning user names, levels, and passwords, refer to  
Chapter 3.  
If multiple people access the same switch using ExtremeWare Vista, you might see the  
following error message:  
Web:server busy  
To correct this situation, log out of the switch and log in again.  
NAVIGATING EXTREMEWARE VISTA  
After logging in to the switch, the ExtremeWare Vista home page is displayed.  
ExtremeWare Vista divides the browser screen into the following sections:  
Task frame  
Content frame  
Standalone buttons  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
13-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
USING EXTREMEWARE VISTA  
TASK FRAME  
The task frame has two sections. At the top of the task frame are the task tabs. There are  
four task tabs, as follows:  
Configuration  
Statistics  
Support  
Logout  
Below the task tabs are options. Options are specific to the task tab that you select.  
When you select an option, the information displayed in the content frame changes.  
However, when you select a new task tab, the content frame does not change until you  
select a new option.  
CONTENT FRAME  
The content frame contains the main body of information in ExtremeWare Vista. For  
example, if you select an option from the Configuration task tab, enter configuration  
parameters in the content frame. If you select the Statistics task tab, statistics are  
displayed in the content frame.  
BROWSER CONTROLS  
Browser controls include drop-down list boxes, check boxes, and multi-select list boxes.  
A multi-select list box has a scrollbar on the right side of the box. Using a multi-select  
list box, you can select a single item, all items, a set of contiguous items, or multiple  
non-contiguous items. Table 13-1 describes how to make selections from a multi-select  
list box.  
Table 13-1: Multi-Select List Box Key Definitions  
Selection Type  
Single item  
All items  
Key Sequence  
Click the item using the mouse.  
Click the first item, and drag to the  
last item.  
Contiguous items  
Click the first desired item, and  
drag to the last desired item.  
13-4  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
SAVING CHANGES  
Table 13-1: Multi-Select List Box Key Definitions (continued)  
Selection Type  
Key Sequence  
Selected non-contiguous items  
Hold down [Control], click the first  
desired item, click the next desired  
item, and so on.  
STATUS MESSAGES  
Status messages are displayed at the top of the content frame. There are four types of  
status messages, as follows:  
Information—Displays information that is useful to know prior to, or as a result of,  
changing configuration options.  
Warning—Displays warnings about the switch configuration  
Error—Displays errors caused by incorrectly configured settings  
Success—Displays informational messages after you click Submit. The message  
displayed reads, “Request was submitted successfully.”  
STANDALONE BUTTONS  
At the bottom of some of the content frames is a section that contains standalone  
buttons. Standalone buttons are used to perform tasks that are not associated with a  
particular configuration option. An example of this is the Reboot Switch button.  
SAVING CHANGES  
There are two ways to save your changes to non-volatile RAM storage using  
ExtremeWare Vista:  
Select Save Configuration from the Configuration task tab, Switch option.  
This field contains a drop-down list box that allows you to select either the primary  
or secondary configuration area. After you select the configuration area, click Submit  
to save the changes.  
For more information on the primary and secondary configuration areas, refer to  
Chapter 14.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
13-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
USING EXTREMEWARE VISTA  
Click the Logout tab.  
If you attempt to log out without saving your changes, ExtremeWare Vista prompts  
you to save your changes.  
If you select Yes, the changes are saved to the selected configuration area. To change  
the selected configuration area, you must go to the Configuration task tab, Switch  
option.  
DO A GETWHEN CONFIGURING A VLAN  
When configuring a VLAN using ExtremeWare Vista, prior to editing the VLAN  
configuration you must first click on the get button to ensure that subsequent edits are  
applied to the correct VLAN. If you do not click on the getbutton and you submit the  
changes, the changes will be made to the VLAN that was previously displayed.  
If you configure a VLAN and then delete it, the Default VLAN is shown in the VLAN  
name window, but the VLAN information contained in the lower portion of the page is  
not updated. Click on the getbutton to update the display.  
SENDING SCREEN OUTPUT TO EXTREME NETWORKS  
If Extreme Networks requests that you e-mail the output of a particular ExtremeWare  
Vista screen, do the following:  
1
2
Click on the content frame of the screen that you must send.  
From Netscape Navigator, select Save Frame As from the File menu, and enter a  
name for the file.  
3
4
From Microsoft Internet Explorer, select Save As File from the File menu, and enter a  
name for the file.  
Attach the file to the e-mail message that you are sending to Extreme Networks.  
13-6  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Software Upgrade and Boot  
Options  
14  
This chapter describes the procedure for upgrading the switch software image. This  
chapter also discusses how to save and load a primary and secondary image and  
configuration file on the switch.  
DOWNLOADING A NEW IMAGE  
The image file contains the executable code that runs on the Summit. It comes  
preinstalled on the switch from the factory. As new versions of the image are released,  
you should upgrade the software running on your switch.  
The image is upgraded by using a download procedure from either a TFTP server on  
the network or from a PC connected to the serial port using the XMODEM protocol.  
Downloading a new image involves the following steps:  
Load the new image onto a TFTP server on your network, if you will be using TFTP.  
Load the new image onto a PC, if you will be using XMODEM.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
14-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SOFTWARE UPGRADE AND BOOT OPTIONS  
Download the new image to the Summit using the command  
download image [xmodem | <ipaddress> <filename>] {primary |  
secondary}  
where the following is true:  
xmodem— Indicates that you will be using XMODEM over the serial port.  
ipaddress— Is the IP address of the TFTP server.  
filename— Is the filename of the new image.  
primary— Indicates the primary image.  
secondary— Indicates the secondary image.  
The Summit can store up to two images: a primary and a secondary. When you  
download a new image, you must select into which image space (primary or secondary)  
you want the new image to be placed.  
You can select which image the switch will load on the next reboot by using the  
following command:  
use image {primary | secondary}  
If you do not specify which image to use, the switch automatically loads the primary  
image.  
REBOOTING THE SWITCH  
To reboot the switch, use the following command:  
reboot {<date> <time> | cancel}  
where date is the date and timeis the time (using a 24-hour clock format) when the  
switch will be rebooted. The values use the following format:  
mm/dd/yyyy hh:mm:ss  
If you do not specify a reboot time, the reboot happens immediately following the  
command, and any previously scheduled reboots are cancelled. To cancel a previously  
scheduled reboot, use the canceloption.  
14-2  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SAVING CONFIGURATION CHANGES  
SAVING CONFIGURATION CHANGES  
The configuration is the customized set of parameters that you have selected to run on  
the switch. As you make configuration changes, the new settings are stored in run-time  
memory. Settings that are stored in run-time memory are not retained by the switch  
when the switch is rebooted. To retain the settings, and have them be loaded when you  
reboot the switch, you must save the configuration to nonvolatile RAM (NVRAM).  
The Summit can store two different configurations: a primary and a secondary. When  
you save configuration changes, you can select to which configuration you want the  
changes saved. If you do not specify, the changes are saved to the configuration area  
currently in use.  
If you have made a mistake, or you must revert to the configuration as it was before  
you started making changes, you can tell the switch to use the secondary configuration  
on the next reboot.  
To save the configuration, use the following command:  
save {config} {primary | secondary}  
To use the configuration, use the following command:  
use config {primary | secondary | imported}  
The configuration takes effect on the next reboot.  
If the switch is rebooted while in the middle of a configuration save, the switch  
boots to factory default settings. The configuration that is not in the process of  
being saved is unaffected.  
RETURNING TO FACTORY DEFAULTS  
To return the switch configuration to factory defaults, use the following command:  
unconfig switch  
This command resets the entire configuration, with the exception of user accounts and  
passwords that have been configured.  
To reset all parameters, use the following command:  
unconfig switch all  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
14-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SOFTWARE UPGRADE AND BOOT OPTIONS  
USING TFTP TO UPLOAD THE CONFIGURATION  
You can upload the current configuration to a TFTP server on your network. The  
uploaded ASCII file retains the command-line interface format. This allows you to do  
the following:  
Modify the configuration using a text editor, and later download a copy of the file to  
the same switch, or to one or more different switches.  
Send a copy of the configuration file to Extreme Networks Technical Support for  
problem-solving purposes.  
Automatically upload the configuration file every day, so that the TFTP server can  
archive the configuration on a daily basis. Because the filename is not changed, the  
configured file stored in the TFTP server is overwritten every day.  
To upload the configuration, use the command  
upload config <ipaddress> <filename> {every <time> | cancel}  
where the following is true:  
ipaddress— Is the ipaddress of the TFTP server.  
filename— Is the name of the ASCII file.  
every <time>— Specifies the time of day you want the configuration automatically  
uploaded on a daily basis.  
cancel— Cancels automatic upload, if it has been previously configured.  
USING TFTP TO DOWNLOAD THE CONFIGURATION  
You can download a previously saved configuration from a TFTP server. To download a  
configuration, use the following command:  
download config <ipaddress> <filename>  
After the ASCII configuration file is downloaded by way of TFTP, you are prompted to  
reboot the switch. The downloaded configuration file is stored in an area of switch  
memory, and is not retained if the switch has a power failure. When the switch is  
rebooted, it treats the downloaded configuration file as a scrip of CLI commands. After  
the script is executed, you are prompted to save the configuration.  
14-4  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
BOOT OPTION COMMANDS  
BOOT OPTION COMMANDS  
Table 14-1 lists the commands associated with Summit boot options.  
Table 14-1: Boot Option Commands  
Command  
Description  
show config  
Displays the current switch configuration to the  
terminal. You can then capture the output and  
store it as a file.  
download config <ipaddress> <filename>  
Downloads a previously saved ASCII  
configuration file from a specific IP host.  
download image [xmodem | <ipaddress>  
<filename>] {primary | secondary}  
Downloads a new image by way of XMODEM  
using the serial port, or from a TFTP server  
over then network. If no parameters are  
specified, the image is saved to the current  
image.  
reboot {<date> <time> | cancel}  
Reboots the switch at the date and time  
specified. If you do not specify a reboot time,  
the reboot happens immediately following the  
command, and any previously scheduled  
reboots are cancelled. To cancel a previously  
scheduled reboot, use the canceloption.  
save {config} {primary | secondary}  
Saves the current configuration of the switch to  
NVRAM. You can specify the primary or  
secondary configuration area. If not specified,  
the configuration is saved to the configuration  
area currently in use.  
upload config <ipaddress> <filename> {every  
<time> | cancel}  
Uploads the current runtime configuration to  
the specified TFTP server. If every <time>  
is specified, the switch automatically saves the  
configuration to the server once per day, at  
the specified time. To cancel automatic  
upload, use the canceloption. If no options  
are specified, the current configuration is  
uploaded immediately.  
use config {primary | secondary}  
use image [primary | secondary]  
Configures the switch to use a particular  
configuration on the next reboot. Options  
include the primary configuration area, or the  
secondary configuration area. If not specified,  
the switch uses the primary configuration area.  
Configures the switch to use a particular image  
on the next reboot.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
14-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
SOFTWARE UPGRADE AND BOOT OPTIONS  
14-6  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Safety Information  
A
IMPORTANT SAFETY INFORMATION  
Please read the following safety information thoroughly before installing the  
Summit switch.  
Installation and removal of the unit must be carried out by qualified personnel only.  
To reduce the risk of fire or electrical shock, install the unit in a temperature- and  
humidity-controlled indoor area free of conductive contaminants.  
POWER  
Disconnect power from the unit before removing the cover of the unit.  
To ensure compliance with international safety standards, only use the power  
adapter that is supplied with the unit.  
Disconnect the power adapter before removing the unit.  
The unit must be grounded.  
The unit must be connected to a grounded outlet to comply with European safety  
standards.  
Do not connect the unit to an A C outlet (power supply) without a ground  
connection.  
The socket outlet must be near to the unit and easily accessible. You can only remove  
power from the unit by disconnecting the power cord from the outlet.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
A-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SAFETY INFORMATION  
This unit operates under Safety Extra Low Voltage (SELV) conditions according to  
IEC 950. The conditions are only maintained if the equipment to which it is  
connected also operates under SELV conditions.  
The appliance coupler (the connector to the unit and not the wall plug) must have a  
configuration for mating with an EN60320/ IEC320 appliance inlet.  
France and Peru only  
This unit cannot be powered from IT† supplies. If your supplies are of IT type, this  
unit must be powered by 230V (2P+T) via an isolation transformer ratio 1:1, with the  
secondary connection point labeled Neutral, connected directly to ground.  
POWER CORD  
This must be approved for the country where it is used:  
USA and  
Canada  
The cord set must be UL-approved and CSA-  
certified.  
The minimum specification for the flexible cord is  
No. 18 AWG, Type SV or SJ, 3-conductor.  
The cord set must have a rated current capacity of  
at least 10A.  
The attachment plug must be an earth-grounding  
type with a NEMA 5-15P (15A, 125V) or NEMA  
6-15P (15A, 250V) configuration.  
Denmark  
The supply plug must comply with section  
107-2-D1, standard DK2-1a or DK2-5a.  
Switzerland  
The supply plug must comply with SEV/ ASE 1011.  
If the power cord plug is unsuitable and must be replaced, you may find other  
codings for the respective connections. Connect the power supply wires for the unit  
according to the following scheme:  
Brown wire to the Live (Line) plug terminal, which may be marked with the  
letter “L” or colored red.  
Blue wire to the Neutral plug terminal, which may be marked with the letter “N”  
or colored black.  
Yellow/ Green wire to the Ground plug terminal, which may be marked with the  
letter “E” or the Earth symbol  
or colored yellow/ green.  
A-2  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
IMPORTANT SAFETY INFORMATION  
FUSE  
Disconnect power from the unit before opening the fuse holder cover. The unit  
automatically adjusts to the supply voltage. The fuse is suitable for both 110V A.C.  
and 220-240V A.C. operation.  
To change the fuse, release the fuse holder by gently levering a small screwdriver  
under the fuse holder catch. Only fuses of the same manufacturer, rating, and type  
as the original must be used with the unit. Close the fuse holder.  
Fuse  
To comply with European safety standards, a spare fuse must not be fitted to the  
appliance inlet. Only fuses of the same manufacturer, make, and type must be used  
with the unit.  
CONNECTIONS  
Fiber Optic ports - Optical Safety. Never look at the transmit LED/ laser through a  
magnifying device while it is powered on. Never look directly at the fiber TX port  
and fiber cable ends when they are powered on.  
CLASS 1 LASER DEVICE  
Use of controls or adjustments of performance or procedures other than those  
specified herein may result in hazardous laser emissions.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
A-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
SAFETY INFORMATION  
LITHIUM BATTERY  
Replace the lithium battery with the same or equivalent type, as recommended by  
the manufacturer.  
There is a danger of explosion if the battery is incorrectly replaced.  
Dispose of used batteries according to the manufacturer s instructions.  
Do not dispose of the batteries in water, or by fire.  
Disposal requirements vary by country and by state.  
Lithium batteries are not listed by the Environmental Protection Agency (EPA) as  
a hazardous waste. Therefore, they can typically be disposed of as normal waste.  
If you are disposing of large quantities, contact a local waste-management  
service.  
No hazardous compounds are used within the battery module.  
The weight of the lithium contained in each coin cell is approximately 0.035 grams.  
Two types of batteries are used interchangeably:  
CR chemistry uses manganese dioxide as the cathode material.  
BR chemistry uses poly-carbonmonofluoride as the cathode material.  
The battery in the bq4830 device is encapsulated and not user-replaceable.  
A-4  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Technical Specifications  
B
Physical Dimensions  
Height: 3.5 inches x Width: 17.32 inches x Depth: 17.32  
inches  
Weight: 10 kg  
Environmental Requirements  
Operating Temperature  
Storage Temperature  
Operating Humidity  
Standards  
0 to 40° C  
-10 to 70° C  
10% to 95% relative humidity, noncondensing  
EN60068 (IEC68)  
Safety  
Agency Certifications  
UL 1950 3rd Edition, listed  
cUL listed to CSA 22.2#950  
TUV GS mark & GOST safety approval to the following  
EN standards:  
EN60960:1992/A3:1995 plus ZB/ZC Deviations  
EN60825-1  
Electromagnetic Compatibility  
FCC part 15 Class A  
CSA C108.8-M11983 (A)  
VCCI Class 2  
EN55022 Class B  
EN50082 -1 (1997)  
C-Tick mark to AS/NZS 3548:1995  
Summit products that have RJ-45 ports comply with EN55022 Class B when  
used with shielded UTP cable.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
B-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TECHNICAL SPECIFICATIONS  
Heat Dissipation  
Power Supply  
118W maximum (341.2 BTU/hr maximum)  
AC Line Frequency  
Input Voltage Options  
Current Rating  
47Hz to 63Hz  
90VAC to 264VAC, auto-ranging  
100-120/200-240 VAC 3.0/1.5 A  
Standards Supported  
SNMP  
Terminal Emulation  
SNMP protocol (RFC 1157)  
MIB-II (RFC 1213)  
Telnet (RFC 854)  
HTTP 1.0  
Bridge MIB (RFC 1493)  
Interfaces MIB (RFC 1573)  
RMON MIB (RFC 1757)  
802.3 MAU MIB (RFC 2239)  
IP Forwarding MIB (RFC 1354)  
OSPF2 MIB (RFC 1850)  
RIP2 MIB (RFC 1724)  
Protocols Used for  
Administration  
UDP (RFC 768)  
IP (RFC 791)  
ICMP (RFC 792)  
TCP (RFC 793)  
ARP (RFC 826)  
TFTP (RFC 783)  
BOOTP (RFC 1271)  
B-2  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Troubleshooting  
C
If you encounter problems when using the switch, this appendix may be helpful. If you  
have a problem not listed here or in the release notes, contact your local technical  
support representative.  
LEDS  
Power LED does not light:  
Check that the power cable is firmly connected to the device and to the supply outlet.  
Check the unit fuse. For information on changing the fuse, see Appendix A.  
On powering-up, the MGMT LED lights yellow:  
The device has failed its Power On Self Test (POST) and you should contact your  
supplier for advice.  
A link is connected, but the Status LED does not light:  
Check that:  
All connections are secure.  
Cables are free from damage.  
The devices at both ends of the link are powered-up.  
Both ends of the gigabit link are set to the same autonegotiation state.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
C-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TROUBLESHOOTING  
Both sides if the gigabit link must be enabled or disabled. It the two are different,  
typically the side with autonegotiation disabled will have the link LED list, and the  
side with autonegotiation enabled will not list. The default configuration for a  
gigabit port is autonegotiation enabled. This can be verified by entering the  
following command:  
show port config  
USING THE COMMAND-LINE INTERFACE  
The initial welcome prompt does not display:  
Check that your terminal or terminal emulator is correctly configured.  
For console port access, you may need to press [Return] several times before the  
welcome prompt appears.  
Check the settings on your terminal or terminal emulator. The settings are 9600 baud, 8  
data bits, 1 stop bit, no parity, XON/ OFF flow control enabled.  
The SNMP Network Manager cannot access the device:  
Check that the device's IP address, subnet mask, and default router are correctly  
configured, and that the device has been reset.  
Check that the device's IP address is correctly recorded by the SNMP Network Manager  
(refer to the user documentation for the Network Manager).  
Check that the community strings configured for the switch and Network Manager are  
the same.  
Check that SNMP access was not disabled for the switch.  
The Telnet workstation cannot access the device:  
Check that the device's IP address, subnet mask and default router are correctly  
configured, and that the device has been reset. Ensure that you enter the IP address of  
the switch correctly when invoking the Telnet facility. Check that Telnet access was not  
disabled for the switch. If you attempt to log in and the maximum number of Telnet  
sessions are being used, you should receive an error message indicating so.  
C-2  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
USING THE COMMAND-LINE INTERFACE  
Traps are not received by the SNMP Network Manager:  
Check that the SNMP Network Manager's IP address and community string are  
correctly configured, and that the IP address of the Trap Receiver is configured properly  
on the switch.  
The SNMP Network Manager or Telnet workstation can no longer access the device:  
Check that Telnet access or SNMP access is enabled.  
Check that the port through which you are trying to access the device has not been  
disabled. If it is enabled, check the connections and network cabling at the port.  
Check that the port through which you are trying to access the device is in a correctly  
configured VLAN.  
Try accessing the device through a different port. If you can now access the device, a  
problem with the original port is indicated. Re-examine the connections and cabling.  
A network problem may be preventing you accessing the device over the network. Try  
accessing the device through the console port.  
Check that the community strings configured for the switch and the Network Manager  
are the same.  
Check that SNMP access was not disabled for the switch.  
Permanent entries remain in the FDB  
If you have made a permanent entry in the FDB (which requires you to specify the  
VLAN to which it belongs and then delete the VLAN) the FDB entry will remain.  
Though causing no harm, you must manually delete the entry from the FDB if you  
want to remove it.  
Default and Static Routes  
If you have defined static or default routes, those routes will remain in the  
configuration independent of whether the VLAN and VLAN IP address that used them  
remains. You should manually delete the routes if no VLAN IP address is capable of  
using them.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
C-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TROUBLESHOOTING  
You forget your password and cannot log in:  
If you are not an administrator, another user having administrator access level can log  
in, delete your user name, and create a new user name for you, with a new password.  
Alternatively, another user having administrator access level can log in and initialize the  
device. This will return all configuration information (including passwords) to the  
initial values.  
In the case where no one knows a password for an administrator level user, contact  
your supplier.  
VLANS  
You cannot add a port to a VLAN:  
If you attempt to add a port to a VLAN and get an error message similar to  
localhost:7 # config vlan marketing add port 1,2  
ERROR: Protocol conflict on port 5  
you already have a VLAN using untagged traffic on a port. Only one VLAN using  
untagged traffic can be configured on a single physical port. VLAN configuration can  
be verified by using the command  
show vlan <name>  
The solution for this error is to remove ports 1 and 2 from the VLAN currently using  
untagged traffic on those ports. If this were the “default” VLAN, the command would  
be  
localhost:23 # config vlan default del port 1,2  
which should now allow you to re-enter the previous command without error as  
follows:  
localhost:26 # config vlan red add port 1,2  
C-4  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
USING THE COMMAND-LINE INTERFACE  
VLAN names:  
There are restrictions on VLAN names. They cannot contain white spaces and cannot  
start with a numeric value unless you use quotation marks around the name. If a name  
contains white spaces, starts with a numeric, or contains non-alphabetical characters,  
you must use quotation marks whenever referring to the VLAN name.  
802.1Q links do not work correctly:  
Remember that VLAN names are only locally significant through the command-line  
interface. For two switches to communicate across a 802.1Q link, the VLAN ID for the  
VLAN on one switch should have a corresponding VLAN ID for the VLAN on the  
other switch.  
If you are connecting to a third-party device and have checked that the VLAN IDs are  
the same, the Ethertype field used to identify packets as 802.1Q packets may differ  
between the devices. The default value used by the switch is 8100. If the third-party  
device differs from this and cannot be changed, you may change the 802.1Q Ethertype  
used by the switch with the following command:  
config dot1p ethertype <ethertype>  
Changing this parameter changes how the switch recognizes all tagged frames received,  
as well as the value it inserts in all tagged frames it transmits.  
VLANs, IP Addresses and default routes:  
Recall that the switch can have an IP address for each configured VLAN. It is only  
necessary to have an IP address associated with a VLAN if you intend to manage  
(telnet, SNMP, ping) through that VLAN. You can also configure multiple default routes  
for the switch. The switch first tries the default route with the lowest cost metric.  
STP  
You have connected an endstation directly to the switch and the endstation fails to  
boot correctly:  
The switch has STP enabled, and the endstation is booting before the STP initialization  
process is complete. Specify that STP has been disabled for that VLAN, or turn off STP  
for the switch ports of the endstation and devices it is attempting to connect to, and  
then reboot the endstation.  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
C-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
TROUBLESHOOTING  
The switch keeps aging out endstation entries in the switch Forwarding Database  
(FDB):  
Reduce the number of topology changes by disabling STP on those switches that do not  
use redundant paths.  
Specify that the endstation entries are static or permanent.  
C-6  
SUMMIT SWITCH INSTALLATION AND USER GUIDE  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index  
configuration  
primary and secondary 14-3  
saving changes 14-3  
uploading to file 14-4  
console port 1-17  
connecting equipment to 2-4  
conventions  
notice icons, About This Guide xviii  
text, About This Guide xviii  
creating a QoS profile 8-6  
A
access levels 3-8  
accounts, creating 3-10  
admin account 3-9  
aging entries 6-1  
alarm actions 12-17  
Alarms, RMON 12-16  
area 0, OSPF 10-6  
areas, OSPF 10-5  
autonegotiation 4-2  
D
default  
B
passwords 3-9  
settings 1-18  
users 3-9  
backbone area, OSPF 10-6  
blackhole entries 6-2  
boot option commands (table) 14-5  
BOOTP relay, configuring 9-10  
BOOTP, using 3-12  
bridge priority 7-5  
browser  
default STP domain 7-2  
Default VLAN 5-14  
deleting a session 3-15  
device mode, configuring 9-9  
DHCP relay, configuring 9-10  
disabling a port 4-1  
controls 13-4  
fonts 13-2  
disabling route advertising (RIP) 10-4  
disabling Telnet 3-15  
disconnecting a Telnet session 3-15  
Distance Vector Multicast Routing Protocol. See  
DVMRP  
distance vector protocol, description 10-2  
domains, Spanning Tree Protocol 7-1  
duplex setting 4-2  
setting up 13-2  
C
cable types and distances 1-4, 2-2  
command  
history 3-5  
shortcuts 3-3  
syntax, understanding 3-2  
common commands (table) 3-6  
community strings 3-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
DVMRP  
configuring 11-3  
description 11-2  
dynamic entries 6-1  
dynamic routes 9-3  
G
GARP VLAN Registration Protocol. See GVRP  
GVRP  
commands (table) 5-10  
description 5-8  
example 5-9  
E
EDP  
commands 4-12  
H
connected to SummitLink port 4-11  
hardware address 1-18  
hello time 7-5  
history command 3-5  
History, RMON 12-15  
home page 3-17, 13-3  
host configuration commands (table) 3-16  
description 4-11  
enabling a port 4-1  
errors, port 12-8  
Events, RMON 12-16  
Extreme Discovery Protocol See EDP  
ExtremeWare Vista  
accessing 13-3  
browser controls 13-4  
browser setup 13-2  
capturing screen output 13-6  
description 13-1  
disabling 3-17, 13-1  
enabling 13-1  
fonts 13-2  
home page 3-17, 13-3  
navigating 13-3  
saving changes 13-5  
screen layout 13-3  
screen resolution 13-2  
status messages 13-5  
VLAN configuration 13-2  
I
ICMP configuration commands (table) 9-14  
IEEE 802.1Q 5-5  
IGMP  
configuration commands (table) 11-4  
description 11-2  
snooping 11-2  
image  
downloading 14-1  
primary and secondary 14-2  
upgrading 14-1  
installing the switch 2-3  
interfaces, router 9-2  
Internet Group Management Protocol. See IGMP  
IP address, entering 3-13  
IP multicast routing  
configuration commands (table) 11-3  
configuring 11-2  
F
FDB  
adding an entry 6-2  
agingin entries 6-1  
blackhole entries 6-2  
clear and delete commands (table) 6-6  
configuration commands (table) 6-3  
configuring 6-3  
contents 6-1  
creating a permanent entry example 6-4  
displaying 6-5  
description 1-7, 11-1  
disabling 11-8  
DVMRP  
configuring 11-3  
description 11-2  
example 11-6  
IGMP  
configuration commands (table) 11-4  
description 11-2  
snooping 11-2  
dynamic entries 6-1  
entries 6-1  
reset and disable commands (table) 11-8  
non-aging entries 6-2  
permanent entries 6-2  
QoS profile association 6-3  
removing entries 6-6  
fonts, browser 13-2  
forward delay 7-5  
resetting 11-8  
settings, displaying 11-7  
show commands (table) 11-7  
IP multinetting  
description 9-5  
example 9-7  
Forwarding Database. See FDB  
free-standing installation 2-4  
full-duplex 1-5  
ii - Index  
Download from Www.Somanuals.com. All Manuals Search And Download.  
IP unicast routing  
logging  
and Telnet 12-11  
BOOTP relay 9-10  
configuration examples 9-15  
configuring 9-9  
default gateway 9-1  
description 1-7  
commands (table) 12-12  
description 12-10  
fault level 12-10  
local 12-11  
DHCP relay 9-10  
message 12-10  
disabling 9-18  
enabling 9-9  
real-time display 12-11  
remote 12-12  
multinetting, description 9-5  
multinetting, example 9-7  
proxy ARP 9-4  
subsystem 12-10  
timestamp 12-10  
logging in 2-6, 3-9  
reset and disable commands (table) 9-18  
resetting 9-18  
router interfaces 9-2  
router show commands (table) 9-17  
routing table  
M
MAC address 1-18  
management access 3-8  
master port, load sharing 4-6  
max age 7-5  
configuration commands (table) 9-13  
dynamic routes 9-3  
multiple routes 9-4  
populating 9-3  
static routes 9-3  
media types and distances 1-4, 2-2  
MIBs 3-18  
mode, QoS 8-2  
monitoring the switch 12-1  
mtrace command 3-23  
multiple routes 9-4  
settings, displaying 9-17  
verifying the configuration 9-10  
K
keys  
N
line-editing 3-5  
names, VLANs 5-13  
non-aging entries 6-2  
port monitoring 12-9  
L
O
LED, description 1-16  
line-editing keys 3-5  
link state database 10-5  
link state protocol, description 10-2  
load sharing  
Open Shortest Path First. See OSPF  
OSPF  
advantages 10-2  
area 0 10-6  
areas 10-5  
backbone area 10-6  
configuration commands (table) 10-14  
configuration example 10-16  
description 10-2, 10-5  
disabling 10-19  
configuring 4-6  
description 4-5  
example 4-7  
group combinations (table) 4-6  
load-sharing group, description 4-5  
master port 4-6  
enabling 9-9  
verifying the configuration 4-8  
local logging 12-11  
location 1-17  
link state database 10-5  
reset and disable commands (table) 10-19  
resetting 10-19  
log display 12-11  
router types 10-6  
settings, displaying 10-18  
show commands (table) 10-18  
stub area 10-6  
virtual link 10-7  
Index - iii  
Download from Www.Somanuals.com. All Manuals Search And Download.  
P
Q
QoS  
PACE 8-4  
passwords  
building blocks 8-1  
default 3-9  
forgetting 3-10  
path cost 7-5  
configuration commands (table) 8-8  
configuration examples 8-9  
configuring 8-8  
permanent entries 6-2  
ping command 3-22  
poison reverse 10-3  
port  
default QoS profiles 8-2  
description 1-6, 8-1  
FDB entry association 6-3  
information, displaying 8-10  
mode 8-1  
PACE recognition 8-4  
Port Queue Monitor (PQM), description 8-7  
precedence 8-5  
autonegotiation 4-2  
commands (table) 4-3  
configuring 4-1  
connections 1-3  
console 1-17  
prioritization 8-6  
duplex 4-2  
profiles  
enabling and disabling 4-1  
errors,viewing 12-8  
load-sharing groups 4-6  
master port 4-6  
configuring 8-8  
creating 8-6  
deleting 8-10  
description 8-2  
monitoring display keys 12-9  
resetting 8-10  
priority, STP 7-5  
traffic classification 8-1  
traffic groupings, description 8-3  
Quality of Service. See QoS  
receive errors 12-8  
redundant power supply 1-17  
speed 4-2  
statistics, viewing 12-7  
STP state, displaying 7-8  
STPD membership 7-2  
SummitLink 4-10  
R
rack mounting the switch 2-3  
rebooting 14-2  
transmit errors 12-8  
Port Queue Monitor. See PQM  
port-based VLANs 5-2  
port-mirroring  
receive errors 12-8  
redundant power supply port 1-17  
remote logging 12-12  
Remote Monitoring. See RMON  
reset button 1-17  
reset to factory defaults 14-3  
RIP  
configuration commands (table) 4-9  
description 4-8  
example 4-9  
virtual port 4-8  
advantages 10-2  
power socket 1-17  
power supply 1-17  
powering on the switch 2-6  
PQM  
commands (table) 8-7  
description 8-7  
primary image 14-2  
profiles, QoS 8-2  
protocol filters 5-12  
protocol-based VLANs 5-11  
proxy ARP, description 9-4  
configuration commands (table) 10-8  
configuration example 10-10  
description 10-2, 10-3  
disabling route advertising 10-4  
enabling 9-9  
limitations 10-2  
poison reverse 10-3  
reset and disable commands (table) 10-13  
routing table entries 10-3  
settings, displaying 10-12  
show commands (table) 10-12  
split horizon 10-3  
triggered updates 10-4  
version 2 10-4  
iv - Index  
Download from Www.Somanuals.com. All Manuals Search And Download.  
RMON  
alarm actions 12-17  
displaying settings 7-8  
domains 7-1  
Alarms group 12-16  
examples 7-2  
Events group 12-16  
overview 7-1  
features supported 12-15  
History group 12-15  
probe 12-15  
port state, displaying 7-8  
stub area, OSPF 10-6  
Summit  
Statistics group 12-15  
router interfaces 9-2  
router types, OSPF 10-6  
Routing Information Protocol. See RIP  
routing table, populating 9-3  
routing. See IP unicast routing  
boot option commands (table) 14-5  
configuration example 1-8  
dimensions B-1  
factory defaults 1-18  
features 1-2  
free-standing installation 2-4  
home page 3-17, 13-3  
image upgrade 14-1  
installing 2-3  
LEDs 1-16  
logging 12-10  
MAC address 1-18  
media distances, supported 1-4  
media types, supported 1-4  
models 1-2  
monitoring 12-1  
port connections 1-3  
S
safety information  
English A-1  
saving changes using ExtremeWare Vista 13-5  
saving configuration changes 14-3  
screen resolution, ExtremeWare Vista 13-2  
secondary image 14-2  
serial number 1-17  
serial port. See console port  
sessions, deleting 3-15  
shortcuts, command 3-3  
show commands 12-1  
Simple Network Management Protocol. See SNMP  
SNAP protocol 5-13  
positioning 2-1  
powering on 2-6  
rack mounting 2-3  
rear view 1-17  
rebooting 14-2  
resetting to factory defaults 14-3  
RMON features 12-15  
routing protocols, supported 10-1  
saving configuration changes 14-3  
size B-1  
stacking with other devices 2-4  
uploading configuration 14-4  
weight B-1  
SNMP  
authorized managers 3-19  
community strings 3-19  
configuration commands (table) 3-20  
configuring 3-19  
reset and disable commands (table) 3-21  
settings, displaying 3-21  
supported MIBs 3-18  
trap receivers 3-19  
Summit Virtual Chassis  
commands (table) 4-12  
description 4-10  
using 3-18  
socket, power 1-17  
Spanning Tree Protocol. See STP  
speed, ports 4-2  
Extreme Discovery Protocol 4-11  
features 4-10  
SummitLink port 4-10  
Summit1, front view 1-10  
Summit2, front view 1-11  
Summit3, front view 1-12  
Summit4, front view 1-13  
Summit4/ FX, front view 1-14  
Summit48, front view 1-15  
SummitLink port 4-10  
switch logging 12-10  
switch monitoring commands (table) 12-1  
syntax, understanding 3-2  
syslog host 12-12  
split horizon 10-3  
standards supported B-2  
static routes 9-3  
statistics, port 12-7  
Statistics, RMON 12-15  
status monitoring 12-1  
STP  
and VLANs 7-2  
configurable parameters 7-5  
configuration commands (table) 7-6  
configuration example 7-7  
configuring 7-5  
default domain 7-2  
description 1-6  
disable and reset commands (table) 7-9  
Index - v  
Download from Www.Somanuals.com. All Manuals Search And Download.  
routing 9-9  
tagged 5-5  
trunks 5-6  
types 5-2  
T
tagging, VLAN 5-5  
Telnet  
disabling 3-15  
disconnecting a session 3-15  
logging 12-11  
W
using 3-12  
Web access  
disabling 3-17, 13-1  
enabling 13-1  
TFTP  
server 14-1  
using 14-4  
traceroute command 3-22  
traffic groupings, QoS 8-3  
transmit errors 12-8  
triggered updates 10-4  
trunks 5-6  
X
xmodem 14-2  
U
upgrading the image 14-1  
uploading the configuration 14-4  
users  
access levels 3-8  
creating 3-10  
default 3-9  
viewing 3-10  
V
verifying the installation 2-6  
viewing accounts 3-10  
Virtual LANs. See VLANs  
virtual link, OSPF 10-7  
VLAN tagging 5-5  
VLANs  
and ExtremeWare Vista 13-2  
and STP 7-2  
assigning a tag 5-6  
benefits 5-1  
configuration commands (table) 5-14  
configuration examples 5-16  
configuring 5-14  
Default 5-14  
delete and reset commands (table) 5-18  
description 1-6  
disabling route advertising 10-4  
displaying settings 5-17  
mixing port-based and tagged 5-8  
names 5-13  
port-based 5-2  
protocol filters 5-12  
protocol-based 5-11  
restoring default values 5-18  
vi - Index  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Index of Commands  
config iproute delete 3-16, 9-13  
config iproute delete blackhole 9-13  
config iproute delete default 3-16, 9-13  
config irdp 9-14  
config log display 12-13  
config mirroring add 4-9  
config mirroring delete 4-9  
config ospf add virtual-link 10-14  
config ospf add vlan 10-14  
config ospf area add range 10-15  
config ospf area delete range 10-15  
config ospf area normal 10-15  
config ospf area stub 10-15  
config ospf authentication 10-14  
config ospf cost 10-14  
config ospf delete virtual-link 10-15  
config ospf delete vlan 10-14, 10-19  
config ospf priority 10-14  
config ospf routerid 10-15  
config ospf timer 10-15  
C
clear counters 12-14  
clear fdb 6-6  
clear igmp snooping 11-8  
clear iparp 3-16, 9-12, 9-18  
clear ipfdb 9-12, 9-18  
clear ipmc cache 11-8  
clear log 12-14  
clear session 3-7, 3-15  
config account 3-6  
config banner 3-6  
config bootprelay add 9-11  
config bootprelay delete 9-11  
config devicemode 3-6  
config dot1q ethertype 5-15  
config dvmrp add 11-3  
config dvmrp delete 11-3  
config dvmrp timer 11-4  
config dvmrp vlan 11-3  
config fdb agingtime 6-3  
config gvrp 5-10  
config ospf vlan 10-14  
config port 3-6  
config port auto off 4-3  
config port auto on 4-3  
config port qosprofile 4-3, 8-8  
config protocol 5-15  
config qosmode 8-8  
config qosprofile 8-8  
config igmp query_interval 11-5  
config igmp snooping 11-5  
config iparp add 3-16, 9-11  
config iparp add proxy 9-12  
config iparp delete 3-16, 9-11  
config iparp delete proxy 9-12  
config ipmc cache timeout 11-4  
config ipqos 8-3  
config ipqos add 9-13  
config ipqos delete 9-13  
config iproute add 3-16, 9-13  
config iproute add blackhole 9-13  
config iproute add default 3-16, 9-13  
config rip add 10-9  
config rip delete 10-9, 10-13  
config rip garbagetime 10-9  
config rip routetimeout 10-9  
config rip rxmode 10-9  
config rip txmode 10-9  
config rip updatetime 10-10  
config snmp add 3-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
config snmp add trapreceiver 3-20  
config snmp community 3-20  
config snmp delete 3-20  
config snmp delete trapreceiver 3-20  
config snmp syscontact 3-20  
config snmp syslocation 3-20  
config snmp sysname 3-20  
config stpd add vlan 7-6  
config stpd forwarddelay 7-6  
config stpd hellotime 7-6  
config stpd maxage 7-6  
config stpd port cost 7-7  
config stpd port priority 7-7  
config stpd priority 7-6  
config syslog 12-13  
disable learning port 4-3, 6-4  
disable log display 12-13  
disable mirroring 4-9  
disable multinetting 9-12  
disable ospf 10-19  
disable ospf exportstatic 10-19  
disable pace 8-4, 8-8  
disable port 3-7, 4-3  
disable rip 10-13  
disable rip aggregation 10-13  
disable rip exportstatic 10-13  
disable rip poisonreverse 10-13  
disable rip splithorizon 10-13  
disable rip triggerupdate 10-13  
disable sharing 4-3  
config time 3-7  
config vlan 3-7  
disable smartredundancy 4-4  
disable snmp access 3-21  
disable snmp trap 3-21  
disable stpd 7-9  
disable stpd port 7-9  
disable summitlink port 4-12  
disable syslog 12-13  
config vlan add port 5-15  
config vlan delete port 5-15  
config vlan ipaddress 5-15  
config vlan protocol 5-15  
config vlan qosprofile 5-15, 8-8  
config vlan tag 5-15  
disable telnet 3-7  
create account 3-6  
disable web 3-7, 13-1  
create fdbentry 6-3  
create ospf area 10-14  
download config 14-5  
download image 14-5  
create protocol 5-14  
create qosprofile 8-8  
create stpd 7-6  
create vlan 3-6, 5-14  
E
enable bootp 3-7, 9-11  
enable bootprelay 9-11  
enable dvmrp 11-3  
enable edp port 4-12  
enable gvrp 5-10  
D
delete account 3-7  
delete fdbentry 6-6  
delete ospf area 10-19  
delete protocol 5-18  
delete qosprofile 8-10  
delete stpd 7-9  
enable icmp redirects 9-14  
enable icmp unreachables 9-14  
enable icmp useredirects 9-14  
enable idletimeout 3-7  
enable igmp 11-4  
delete vlan 3-7, 5-18  
enable igmp snooping 11-4  
enable ignore-stp 5-15  
enable ipforwarding 9-11  
enable ipforwarding broadcast 9-11  
enable ipmcforwarding 11-3  
enable iproute sharing 9-13  
enable irdp 9-14  
enable learning port 4-3, 6-3  
enable log display 12-13  
enable mirroring 4-9  
enable multinetting 9-11  
enable ospf 10-14  
enable ospf exportstatic type 10-14  
enable pace 8-4, 8-8  
disable bootp 3-7, 9-12, 9-18  
disable bootprelay 9-12, 9-18  
disable dvmrp 11-8  
disable edp port 4-12  
disable gvrp 5-10  
disable icmp redirects 9-14, 9-18  
disable icmp unreachables 9-15, 9-18  
disable icmp useredirects 9-15, 9-18  
disable idletimeout 3-7  
disable igmp 11-8  
disable igmp snooping 11-8  
disable ignore-stp 5-18  
disable ipforwarding 9-12, 9-18  
disable ipforwarding broadcast 9-12, 9-18  
disable ipmcforwarding 11-8  
disable iproute sharing 9-13  
disable irdp 9-15, 9-18  
enable port 4-3  
enable rip 10-8  
enable rip aggregation 10-8  
enable rip exportstatic 10-8  
ii-Index of Commands  
Download from Www.Somanuals.com. All Manuals Search And Download.  
enable rip poisonreverse 10-8  
enable rip splithorizon 10-8  
enable rip triggerupdate 10-8  
enable sharing 4-3  
enable smartredundancy 4-3  
enable snmp access 3-20  
enable snmp trap 3-20  
enable stpd 7-6  
show ipqos 9-17, 12-3  
show iproute 9-18, 12-3  
show ipstats 3-16, 9-17, 12-3  
show log 12-3, 12-14  
show log config 12-3, 12-14  
show management 3-21, 12-4  
show memory 12-4  
show mirroring 4-9, 12-4  
show ospf 10-18, 12-4  
enable stpd port 7-6  
enable summitlink port 4-12  
enable syslog 12-13  
enable telnet 3-15  
show ospf area 10-18, 12-4  
show ospf interfaces 10-18, 12-4  
show ospf lsdb 10-18, 12-4  
show ospf virtual-link 10-18, 12-4  
show port collisions 4-4, 12-4  
show port config 4-4, 12-4  
show port packet 4-4, 12-5  
show port qosmonitor 4-4, 8-7, 12-5  
show port rxerrors 4-4, 12-5  
show port stats 4-4, 12-5  
show port txerrors 4-5, 12-5  
show port utilization 4-5, 12-5  
show protocol 5-18, 12-5  
show qosmonitor 8-7, 12-5  
show qosprofile 8-10, 12-5  
show rip 10-12, 12-5  
enable web 3-17, 13-1  
H
history 3-5  
L
logout 3-15  
M
mtrace 3-23  
show rip stat 10-12, 12-6  
show session 3-15, 12-6  
show stpd 7-8, 12-6  
show stpd port 7-8, 12-6  
show switch 12-6  
show version 12-7  
P
ping 3-22  
show vlan 5-17, 12-7  
Q
quit 3-15  
T
telnet 3-12  
traceroute 3-22  
R
reboot 14-2, 14-5  
U
unconfig dvmrp 11-8  
unconfig icmp 9-14, 9-18  
unconfig igmp 11-8  
unconfig irdp 9-14, 9-18  
unconfig management 3-21  
unconfig rip 10-13  
unconfig stpd 7-9  
unconfig switch 3-7  
unconfig vlan ipaddress 5-18  
upload config 14-5  
use config 14-5  
S
save config 14-5  
show account 3-10, 12-1  
show banner 3-7, 12-1  
show config 12-2, 14-5  
show diag 12-2  
show dvmrp 11-7, 12-2  
show edp 4-12, 12-2  
show fdb 6-5, 12-2  
show gvrp 5-10, 12-2  
show igmp snooping 11-7, 12-2  
show iparp 3-16, 9-17, 12-2  
show iparp proxy 9-17, 12-2  
show ipconfig 3-16, 9-11, 9-17, 12-2  
show ipfdb 9-18, 12-2  
show ipmc cache 11-7, 12-3  
use image 14-5  
Index of Commands-iii  
Download from Www.Somanuals.com. All Manuals Search And Download.  

Edelbrock Automobile Parts Victor Series User Manual
EVGA Computer Drive 100 U2 UV19 User Manual
Fender Guitar 0193460 3462 User Manual
Fisher Price Satellite Radio T4840 User Manual
Fujitsu Scanner M3091DC User Manual
Gaggenau Microwave Oven EB 270 271 User Manual
Garland Convection Oven 680 User Manual
Garmin Home Security System FA168CPS User Manual
GE Dishwasher 165D4700P227 User Manual
GE Microwave Oven JEB1860SM User Manual