RuggedSwitch™ RS8000 / RS1600 / RS900 Product Family User Guide RS1600 RS1600 RS1600T RS1600T RS8000 RS8000 RS8000T RS8000T RuggedCom Inc. 64 Jardin Dr. (Unit 3G) Concord, Ontario Canada L4K 3P3 Web: www.ruggedcom.
RuggedSwitch™ User Guide RUGGEDSWITCH™ USER GUIDE FOR USE WITH RS8000, RS1600, AND RS900 PRODUCTS RUGGEDSWITCH™ OPERATING SYSTEM V1.5 Version 1.5.1 – Aug. 3, 2004 RuggedCom Disclaimer RuggedCom Inc. makes no warranty of any kind with regard to this 64 Jardin Drive, Unit 3G material. Concord, Ontario RuggedCom shall not be liable for errors contained herein or for Canada L4K 3P3 use of this material.
About this User Guide ABOUT THIS USER GUIDE This guide is concerned with aiding the user in the configuration and operation of the RuggedSwitch™ using the RuggedCom User Interface.
RuggedSwitch™ User Guide Rugged MediaConverter™ Installation Guide RuggedCom Fiber Guide White paper: Rapid Spanning Tree in Industrial Networks Document Conventions This publication uses the following conventions: Note: Means reader take note. Notes contain helpful suggestions or references to materials not contained in this guide.
About this User Guide 7. At this point the switch will raise links, learn addresses and forward traffic. By default link alarms and SNMP linkUp/linkDown traps (See Chapter 1) are raised for all ports. The Port Configuration and Status, View Port Status command will indicate the current state of the ports in real time. The Ethernet Statistics, View Ethernet Statistics command will provide a useful indication of traffic on the switch.
RuggedSwitch™ User Guide Table Of Contents About this User Guide............................................................................................................................ i Applicable Firmware Revision .............................................................................................................. i Who Should Use This User Guide......................................................................................................... i How To Use This User Guide..............
Table Of Contents MAC Address Management Parameter Ranges & Default Settings....................................................13 MAC Address Tables Management Menu...........................................................................................13 Viewing MAC Addresses ....................................................................................................................14 Purge MAC Address Table ........................................................................................
RuggedSwitch™ User Guide Chapter 5 – Configuring Class of Service ...........................................................................................44 Introduction to CoS..............................................................................................................................44 CoS Features ........................................................................................................................................44 CoS Concepts And Issues ............................
Table Of Contents Clearing Alarms ...................................................................................................................................92 Viewing CPU Diagnostics ...................................................................................................................93 Viewing and Clearing the System Log ................................................................................................95 Viewing Product Identification.....................................
RuggedSwitch™ User Guide Finding The Correct Table.................................................................................................................128 Retrieving Information.......................................................................................................................128 Changing Values In A Table..............................................................................................................129 Defaulting A Table..........................................
Table Of Figures TABLE OF FIGURES Figure 1: Main Menu With Screen Elements Identified ........................................................................3 Figure 2: Administration Menu .............................................................................................................5 Figure 3: IP Services Configuration Menu ............................................................................................5 Figure 4: Time and Date Menu ..............................................
RuggedSwitch™ User Guide Figure 27: Global CoS Parameters Menu ............................................................................................47 Figure 28: Port CoS Parameters Menu ................................................................................................47 Figure 29: Priority to CoS Mapping Menu ..........................................................................................48 Figure 30: TOS DSCP to CoS Mapping ...................................................
Table Of Figures Figure 54: The History Process..........................................................................................................101 Figure 55: History Control Table.......................................................................................................102 Figure 56: RMON History Samples Table ........................................................................................103 Figure 57: The Alarm Process .........................................................
Chapter 1– Setting Up And Administering The Switch Chapter 1– Setting Up And Administering The Switch Introduction This chapter familiarizes the user with the RuggedCom user interface as well as describes the following procedures: • Configuring the IP Address and Subnet Mask • Configuring the Gateway Address • Configuring for DHCP Operation • Configuring the Management Connection Inactivity Timeout • Configuring the number of Telnet Sessions • Configuring TFTP Server Permissions • Configuring
RuggedSwitch™ User Guide The Structure of the User Interface The user interface is organized as a series of menus with an escape to a command line interface (CLI) shell. Each menu screen presents the switch name (as proved by the System Identification parameter), Menu Title, Access Level, Alarms indicator, Sub-Menus and Command Bar. Sub-menus are entered by selecting the desired menu with the arrow keys and pressing the enter key. Pressing the escape key ascends to the parent menu.
Table Of Contents Making Configuration Changes When changing a data item the user selects the data item by the cursor keys and then pressing the enter key. The cursor will change position to allow editing of the data item. Typing a new value after pressing enter always erases the old parameter value. The left and right cursor keys may be used to position the edit point without erasing the old parameter value.
RuggedSwitch™ User Guide Administration Menu The Administration command provides the menu shown in the following Figure.
Table Of Contents Note: Changes to the IP Address take effect immediately upon being saved. Telnet connections in place at the time of an address change will be lost. Subnet This parameter specifies the subnet mask of the switch. Gateway This parameter specifies the gateway IP address. This is the address to use when forwarding packets to a network other than the one the switch belongs to.
RuggedSwitch™ User Guide Configuring System Identification The system identification is displayed in the sign-on screen and in the upper left hand corner of all RuggedSwitch™ menu screens. Setting the system identification can make it easier to identify the switches within your network. Setting the location and contact fields can provide information about where the switch is located and who to contact in order to resolve problems.
Table Of Contents Time Zone The time zone setting allows for the conversion of UTC (Universal Coordinated Time) to local time. NTP Server Address This parameter specifies the IP address of the NTP (Network Time Protocol) server used to set the on-board real time clock. Programming an address of “0.0.0.0” disables the use of NTP. The current time setting will be overwritten at every NTP sync time interval, as specified by the NTP update period parameter.
RuggedSwitch™ User Guide Configure SNMP Management Stations This command identifies management stations that may configure the switch through SNMP and receive Traps from the switch. At shipping time and after factory reloads the switch is configured not to allow remote management or raise Traps. Identify a management station to the switch by executing the Configure SNMP Management Stations command and pressing CTRL-I to create a management record, as shown below.
Table Of Contents Troubleshooting Problem One • I have configured the IP address and a gateway. I am pinging the switch but it is not responding. I am sure the switch is receiving the ping because it’s port LEDs are flashing and the statistics menu shows the pings. What is going on? Is the switch being pinged through a router? If so, the switch gateway address must be configured. The following figure illustrates the problem. 192.168.0.1 Router 10.0.0.1 10.0.0.2 RuggedSwitchTM Workstation 192.168.0.
RuggedSwitch™ User Guide Chapter 2 - Configuring MAC Address Management Introduction This chapter familiarizes the user with: • Viewing learned MAC addresses • Purging MAC Address Entries • Configuring the switch MAC Address Aging time • Configuring static MAC addresses MAC Address Management Features MAC Address management provides you with the following features: • The ability to configure static MAC addresses.
Chapter 2 - Configuring MAC Management Viewing MAC Addresses The View MAC Addresses command presents a real time display of learned and static MAC addresses.
RuggedSwitch™ User Guide Purge MAC Address Table This command removes all dynamic entries from the MAC address table. The only negative impact of this operation is that it causes flooding while addresses are relearned. Configure MAC Address Learning Options This menu allows you to configure MAC management related parameters.
Chapter 2 - Configuring MAC Management that LAN segment. Prioritized addresses function much as regular dynamic addresses, appearing in the MAC Addresses display only while they are learned. MAC Address This parameter specifies the unicast address that is to be statically configured or prioritized. VID This parameter configures the VLAN upon which the MAC address operates. Port If a static MAC address is being constructed, enter the port number upon which the device with this address is located.
RuggedSwitch™ User Guide Chapter 3 – Configuring the Ports Introduction This chapter familiarizes the user with: • Configuring port physical parameters • Configuring link alarms/traps for the port • Configuring rate limiting • Configuring port security • Using Port Mirroring • Viewing the status of ports • Resetting all or one port • Using the Loss-of-Link Management feature Port Features 10BaseT/100Base Interfaces • Uses RJ45 Connector 10BaseFL Interfaces • Multi-mode fiber (820nm) opti
Chapter 3 – Configuring the Ports • Port Latency: 10 Mbps - 16µs + frame time, 100 Mbps - 5µs + frame time Port Applications Port Security Port Security provides the ability to filter or accept traffic from specific MAC addresses. Port Security works by inspecting the source MAC addresses of received frames and validating them against the contents in the Static MAC Address Table (See Chapter 2 - Configuring MAC Address Management).
RuggedSwitch™ User Guide Controller Protection Through Loss-of-Link Management Modern industrial controllers often feature backup Ethernet ports used in the event of a link failure. When these interfaces are supported by media (such as fiber) that employ separate transmit and receive paths, the interface can be vulnerable to failures that occur in only one of the two paths. Refer to the following figure.
Chapter 3 – Configuring the Ports Using Port Mirroring Introduction Port mirroring is a management tool in which all traffic on a designated port is copied (or mirrored) to a target port. If a protocol analyzer is attached to the target port, the traffic stream of valid frames on any source port is made available for analysis. Note: Invalid frames received on the source port will not be mirrored.
RuggedSwitch™ User Guide The main menu Port Configuration and Status command presents this menu. Commands are provided to reset, configure and obtain the status of ports.
Chapter 3 – Configuring the Ports Port Configuration Menu The Configure Port Parameters Command will provide a summary of the settings of all ports. Selecting a particular port and pressing enter will allow you to configure that port.
RuggedSwitch™ User Guide Flow Control Flow Control is useful for preventing frame loss during times of severe network traffic. Examples of this include multiple source ports concentrating to a single destination port or a higher speed port bursting to a lower speed port. When the port is half-duplex it is accomplished using “backpressure” where the switch simulates collisions causing the sending device to retry transmissions according to the Ethernet backoff algorithm.
Chapter 3 – Configuring the Ports The Configure Port Security Command configures the ability to filter or accept traffic from specific MAC addresses.
RuggedSwitch™ User Guide Shutdown Time This is the length of time to shut the port down when an unauthorized frame is received in port security mode. If this option is set to “Don’t Shutdown”, the frame will simply be filtered. If this option is set to “Until Reset”, the port will be shutdown until a port reset command is issued or the switch is reset. This option can also take the number of seconds (1 to 86384) to hold the port down.
Chapter 3 – Configuring the Ports Viewing Port Status The View Port Status command shows the port status. My Switch Port Status Port 1 2 3 4 5 6 7 8 Name Maint. RTU IED Bay 6 IED Bay 8 IED Bay 9 IED Bay 12 Local Access U/L to Subs 22 U/L to Subs 24 Admin Access Link Up Up Up Up Up Down Up Up Speed 10 100 100 100 100 10 100 100 Duplex Half Full Full Full Full Half Full Full Z-Help S-Shell Figure 17: Port Status Menu Resetting Ports Performs a reset of one or all Ethernet ports.
RuggedSwitch™ User Guide Troubleshooting Problem One • One of my links seems to be fine at low traffic levels, but starts to fail as traffic rates increase. • One of my links pings OK but has problems with FTP/SQL/HTTP/… A possible cause of intermittent operation is that of an autonegotiation mismatch. If one end of the link is fixed to full duplex and the peer autonegotiates, the autonegotiating end falls back to half-duplex operation. At lower traffic volumes the link may display few if any errors.
Chapter 4 – Configuring VLANs Chapter 4 – Configuring VLANs Introduction This chapter familiarizes the user with: • VLAN Terminology and Issues • VLANs and their relationship to protocols such as IGMP • Planning VLAN networks • Configuring VLANs • Viewing VLAN status and statistics • Troubleshooting VLANs VLAN Features RuggedCom VLANs provide you with the following features: • Per Port : • • • • • Per VLAN : • • • • VLAN Name, IGMP Ability to exclude ports from the VLAN.
RuggedSwitch™ User Guide VLAN Concepts And Issues VLANs and Tags A virtual LAN or VLAN is a group of devices on one or more LAN segments that communicate as if they were attached to the same physical LAN segment. VLANs are extremely flexible because they are based on logical instead of physical connections. When VLANs are introduced, all traffic in the network must belong to one or another VLAN. Traffic on one VLAN cannot pass to another, except through an intranetwork router or layer 3 switch.
Chapter 4 – Configuring VLANs Edge And Trunk Port Types Each port can be configured to take on a type of Edge or Trunk. An Edge port attaches to a single end device (such as a PC or IED) and carries traffic on a single pre-configured VLAN. Trunk ports are part of the network and carry traffic for all VLANs between switches. Trunk ports must be manually programmed with the VLANs to be supported. Forbidden Port Lists Each VLAN can be configured to exclude ports from membership in the VLAN.
RuggedSwitch™ User Guide Switch 1 VLAN 2 VLAN 3 Switch 3 Switch 2 VLAN 5 VLAN 4 Figure 18: Multiple and Overlapping VLANs Administrative Convenience VLANs enable equipment moves to be handled by software reconfiguration instead the alternative, cable management. When a host’s physical location is changed, its connection point is often changed as well. With VLANs, the host’s VLAN membership and priority are simply copied to the new port.
Chapter 4 – Configuring VLANs VLAN 2 IP Addresses: VLAN 2 – 199.85.245.0 - 199.85.245.127 VLAN 3 – 199.85.245.128 - 199.85.245.191 VLAN 4 – 199.85.245.192 - 199.85.245.255 199.85.245.1/25 VLAN 3 199.85.245.128/26 Server, Router or Layer 3 Switch VLAN 4 Switch 199.85.245.192/26 Figure 19: Inter-VLAN Communications Service Differentiation Programming of priority field in the VLAN tag can be used to provide classes of service in the network. See Chapter 5 for information on configuring CoS.
RuggedSwitch™ User Guide Virtual LANs Menu The Virtual LANs menu is accessible from the main menu Virtual LANs command. The VLAN menu will lead you to all the other available menus for configuring and obtaining the status of VLANs. My Switch Virtual LANs Admin Access Configure Static VLANs Configure Port VLAN Parameters View VLAN Summary Z-Help S-Shell Figure 20: Virtual LANs Menu Static VLANs Menu The Static VLANs menu is accessible from the Virtual LANs menu Configure Static VLANs command.
Chapter 4 – Configuring VLANs IGMP This parameter enables or disables IGMP Snooping on the VLAN in question. Note: If IGMP Snooping is not enabled for the VLAN, both IGMP messages and multicast streams from routers will be forwarded directly to all members of the VLAN. If any one member of the VLAN joins a multicast group then all members of the VLAN will receive the multicast traffic. For more information on IGMP see Chapter 7 – Configuring Multicast Filtering.
RuggedSwitch™ User Guide Edge Type An edge port is always a member of only one VLAN, the native VLAN (often called the port VLAN or PVID). Use an edge port with PVID Format set to “tagged” when you need to service VLAN aware equipments and with PVID Format set to “untagged” when you need to service non-VLAN aware equipments. Untagged frames received on edge ports will be forwarded to the network using the port's configured native VLAN.
Chapter 4 – Configuring VLANs PVID (Native VLAN) The Port VLAN Identifier (PVID) or native VLAN specifies the VLAN id associated with untagged (and 802.1p priority tagged) frames received on this port. Note: If the VLAN configured as the PVID does not exist in the “Configure VLANs” menu, the switch will automatically create and use it. IGMP will automatically be disabled for that VLAN. If it is desirable for IGMP to be used on that VLAN, it can be created in the “Configure VLANs” menu and IGMP enabled.
RuggedSwitch™ User Guide Troubleshooting Problem One • I don’t need VLANs at all. How do I turn them off? Simply leave all ports set to type “Edge” and leave the native VLAN set to 1. This is the default configuration for the switch. Problem Two • I have added two VLANs 2 and 3. I made a number of ports members of these VLANS. Now I need some of the devices in one VLAN send messages to some devices in the other VLAN.
Chapter 5 – Configuring Class of Service Chapter 5 – Configuring Class of Service Introduction to CoS This chapter familiarizes the user with using the Class of Service feature. CoS Features RuggedSwitch™ CoS provide you with the following features: • Ability to prioritize traffic statically by port. • Ability to prioritize traffic by the priority field in 802.1p and 802.1q tags. • Ability to prioritize traffic based on its source or destination MAC address.
RuggedSwitch™ User Guide Note that a frame’s CoS will be high if any of the above factors set it high. The frame’s CoS will be low only if all of the above factors set it low. Received frames are first examined to determine if they are IP frames. If the frame is IP and the TOS DSCP to CoS feature is selected, the CoS is determined from the DSCP field itself. The frame is then examined for 802.1P and 802.1Q tags and the priority field is mapped to a CoS.
Chapter 5 – Configuring Class of Service CoS Configuration CoS Parameter Ranges & Default Settings The following set of tables lists default CoS configuration parameters for the unit.
RuggedSwitch™ User Guide 6:1 - 6 high priority frames are transmitted for every normal priority frame 1:0 - transmit normal priority frames only after all high priority frames are sent Port CoS Parameters Menu The Port CoS Parameters menu is accessible from the Classes Of Service menu.
Chapter 5 – Configuring Class of Service DSCP to CoS Mapping Menu The DSCP to CoS Mapping menu is accessible from the Classes Of Service menu. My Switch DSCP to CoS Mapping Admin Access DSCP CoS 0 Normal 1 Normal 2 Normal 3 Normal 4 Normal 5 Normal 6 Normal 7 Normal 8 Normal 9 Normal More below ... Figure 30: TOS DSCP to CoS Mapping CoS This menu maps the TOS DSCP from a IP frame to a CoS. CoS Access Priorities Menu The CoS Access Priorities menu is accessible from the Classes Of Service menu.
RuggedSwitch™ User Guide Chapter 6 – Configuring Rapid Spanning Tree Introduction This chapter familiarizes the user with: • RSTP Issues • Planning RSTP networks • Configuring RSTP • Viewing the status and statistics of RSTP • Troubleshooting RSTP RSTP Features RuggedSwitch™ RSTP provides you with the following features: • Industry standard support of Rapid Spanning Tree (802.1w), which features a compatibility mode with legacy STP (802.1d). • Superior performance.
Chapter 6 – Configuring Rapid Spanning Tree RSTP Concepts And Issues The 802.1d Spanning Tree Protocol was developed to allow the construction of robust networks that incorporate redundancy while pruning the active topology of the network to prevent loops. While STP is effective, it requires that frame transfer must halt after a link outage until all bridges in the network are sure to be aware of the new topology. Using the 802.1d recommended values, this period lasts 30 seconds.
RuggedSwitch™ User Guide There are three RSTP states: Discarding, Learning and Forwarding. The discarding state is entered when the port is first taken into service. The port does not learn addresses in this state and does not participate in frame transfer. The port looks for STP traffic in order to determine its role in the network. When it is determined that the port will play an active part in the network, the state will change to Learning.
Chapter 6 – Configuring Rapid Spanning Tree Role There are four RSTP port roles: Root, Designated, Alternate and Backup. If the bridge is designated (i.e. it is not the root bridge) it must have a single root port. The root port is the “best” (i.e. quickest) way to send traffic to the root bridge. A port is designated if it is the best port to service the LAN segment it is connected to. All bridges on the same LAN segment listen to each others messages and agree on who is the designated bridge.
RuggedSwitch™ User Guide Because an edge port services only end stations, topology change messages are not generated when its link toggles. Point To Point and Multipoint Links RSTP uses a peer-peer protocol called Proposing-Agreeing to ensure transitioning in the event of a link failure. This protocol is point to point and breaks down in multipoint situations, i.e. when more than two bridges operate on a shared media link.
Chapter 6 – Configuring Rapid Spanning Tree IEEE 802.1d vs. IEEE 802.1w Costs The IEEE 802.1d specification limits port costs to values of 1 to 65536. It recommends that a path cost corresponding to the 1x109 / link speed be used. Designed at a time when 9600 bps links were state of the art, this method breaks down in modern use, as the method cannot represent a link speed higher than a gigabit per second. In order to remedy this problem in future applications the IEEE 802.
RuggedSwitch™ User Guide RSTP Applications RSTP in Structured Wiring Configurations RSTP allows you to construct structured wiring systems in which connectivity is maintained in the event of link failures. For example a single link failure of any of links A through Z would leave all ports of bridges 555 through 888 connected to the network. Figure 34: Example Of A Structured Wiring Configuration Design Considerations for RSTP in Structured Wiring Configurations 1.
Chapter 6 – Configuring Rapid Spanning Tree 4. Choose the root bridge and backup root bridge carefully. The root bridge should be selected to be at the concentration point of network traffic. Locate the backup root bridge adjacent to the root bridge. One strategy that may be used is to tune the bridge priority to establish the root bridge and then tune each bridge’s priority to correspond to its distance from the root bridge. 5. Identify desired steady state topology.
RuggedSwitch™ User Guide 2. Identify required legacy support and ports with half duplex/shared media restrictions. These bridges should not be used if network failover/recovery times are to be minimized. 3. Identify edge ports Ports that connect to host computers, IEDs and controllers may be set to edge ports in order to guarantee rapid transitioning to forwarding as well as reduce the number of topology change notifications in the network. 4. Choose the root bridge.
Chapter 6 – Configuring Rapid Spanning Tree RSTP Configuration Bridge and Port Parameter Ranges & Default Settings The following set of tables lists default STP configuration parameters for the unit. For each parameter the parameter name, recommended setting and possible range are included.
RuggedSwitch™ User Guide Spanning Tree Menu The Spanning Tree menu is accessible from the main menu Spanning Tree command. The Spanning Tree menu will lead you to all the other available menus for configuring and obtaining the status of RSTP ports.
Chapter 6 – Configuring Rapid Spanning Tree Hello Time This is the time between configuration messages issued by the root bridge. Shorter hello times may result in faster detection of topology changes at the expense of moderate increases in STP traffic. Max Age Time The time a configuration message remains valid after being issued by the root bridge.
RuggedSwitch™ User Guide Port RSTP Parameters Menu The Port RSTP Parameters menu configures parameters that apply to individual ports.
Chapter 6 – Configuring Rapid Spanning Tree without any listening and learning delays. The MAC tables of Edge ports do not need to be flushed when topology changes occur in the STP network. Unlike an STP disabled port, accidentally connecting an edge port to another port in the spanning tree will result in a detectable loop. The "edgeness" of the port will be switched off and the standard RSTP rules will apply (until the next link outage).
RuggedSwitch™ User Guide RSTP Statistics Bridge RSTP Statistics Menu The Bridge RSTP Statistics menu is accessible from the Spanning Tree menu.
Chapter 6 – Configuring Rapid Spanning Tree Learned Hello Time The actual Hello time provided by the root bridge as learned in configuration messages. This time is used in designated bridges. Configured Forward Delay The configured Forward Delay time from the Bridge RSTP Parameters menu. Learned Forward Delay The actual Forward Delay time provided by the root bridge as learned in configuration messages. This time is used in designated bridges.
RuggedSwitch™ User Guide Port RSTP Statistics Menu The Bridge RSTP Statistics menu is accessible from the Spanning Tree menu. My Switch Port 1 2 3 4 5 6 7 8 Port RSTP Statistics Status Role Disabled Disabled Disabled Disabled Link Down Link Down Link Down Forwarding Root Cost 0 0 0 0 0 0 0 19 RX RSTs 0 0 0 0 0 0 0 0 Admin Access TX RSTs 0 0 0 0 0 0 0 0 RX Configs 0 0 0 0 0 0 0 37 Z-Help S-Shell> Figure 41: Port RSTP Parameters Menu Status The status of the port.
Chapter 6 – Configuring Rapid Spanning Tree Backup The port is attached to a LAN that is serviced by another port on the bridge. It is not used but is standing by. If a failure of the port that is currently designated for the LAN occurs the backup port will become designated for the LAN. Alternate The port is attached to a bridge that provides connectivity to the root bridge. It is not used but is standing by. If a failure of the current root port occurs this port will become the new root.
RuggedSwitch™ User Guide Troubleshooting Problem One • When I connect up a new port the network locks up solid. The port status LEDs are flashing madly. • Occasionally, the network seems to experience a lot of flooding. All the ports seem to experience significant traffic. The problem lasts a few seconds and then goes away. • One of my switches displays a strange behaviour where the root port hops back and forth between two switch ports and never settles down.
Chapter 6 – Configuring Rapid Spanning Tree Another possible explanation is that some links in the network run half duplex. RSTP uses a peer-peer protocol called Proposing-Agreeing to ensure transitioning in the event of a link failure. This protocol requires full duplex operation. When RSTP detects a non-half duplex port it cannot use the Proposing-Agreeing protocol and must make the port transition the slow (i.e. STP) way.
RuggedSwitch™ User Guide flows burst continuously to 100% of the line bandwidth, STP can be disrupted. Restrict the traffic flows to below 100%. Problem Six • After I bring up a new port the root moves on to that port, and I don’t want it to. • The port that I want to become root won’t do so. Is it possible that the port cost is incorrectly programmed or that autonegotiation derives an undesired value? Inspect the port and path costs with each port active as root.
Chapter 7 – Configuring Multicast Filtering Chapter 7 – Configuring MULTICAST FILTERING Introduction to Multicast Filtering RuggedSwitch™ accomplishes multicast Filtering through the use of the Internet Group Management Protocol (IGMP) snooping. IGMP is used by IP hosts to report their host group memberships to multicast routers. As hosts join and leave specific multicast groups, streams of traffic are directed to or withheld from that host.
RuggedSwitch™ User Guide IGMP Concepts And Issues Router IGMP Operation The following figure provides a simple example of IGMP use. One “producer” IP host (P1) is generating two IP multicast streams, M1 and M2. There are four potential “consumers” of these streams, C1 through C4. The multicast router discovers which host wishes to subscribe to which stream by sending general membership queries to each of the segments.
Chapter 7 – Configuring Multicast Filtering Switch IGMP Active and Passive Operation The IGMP Snooping protocol provides a means for switches to snoop (i.e. watch) the operation of routers, respond with joins/leaves on the behalf of consumer ports and to prune multicast streams accordingly. There are two modes of IGMP the switch can be configured to assume, active and passive. Active Mode When such a switch is used without a multicast router, it is able to function as if it is a multicast router.
RuggedSwitch™ User Guide Combined Router And Switch IGMP Operation This section describes the additional challenges of multiple routers, VLAN support and switching. Producer P1 resides upon VLAN 2 while P2 resides upon VLAN 3. Consumer C1 resides upon both VLANs whereas C2 and C3 reside upon VLANs 3 and 2, respectively. Router 2 resides upon VLAN 2, presumably to forward multicast traffic to a remote network or act as a source of multicast traffic itself.
Chapter 7 – Configuring Multicast Filtering Note that VLAN 3 does not have an external multicast router. The switch will operating in its “routerless” mode and issue general membership queries as if it is the router. Processing Joins If host C1 desires to subscribe to the multicast streams for both P1 and P2, it will generate two joins. The join from C1 on VLAN 2 will cause the switch to immediately initiate its own join to multicast router 1 (and to issue its own join as a response to queries).
RuggedSwitch™ User Guide Multicast Filtering Configuration Multicast Filtering Parameter Ranges & Default Settings The following set of tables lists default IGMP configuration parameters for the switch.
Chapter 7 – Configuring Multicast Filtering Note: Active mode IGMP is much to be preferred to passive mode, resulting in rapid pruning of traffic. Use passive mode only with routers that have problems identifying IGMP enabled switches. A switch running in passive mode requires the presence of a multicast router or it will not be able to forward multicast streams at all! Query Interval In active mode, this is the time interval between IGMP queries sent by the switch.
RuggedSwitch™ User Guide Source Port This is the port receiving the multicast stream as described by this entry. Source port information will be aged out after about two query intervals. Note: The switch can detect only one multicast traffic source at any one time. The switch will display information about the first source it detects.
Chapter 7 – Configuring Multicast Filtering Troubleshooting Problem One • When I start a multicast traffic feed it is always distributed to all members of the VLAN. Is IGMP enabled for the VLAN? Multicasts will be distributed to all members of the VLAN unless IGMP is enabled. Problem Two • Computers on my switch receive the multicast traffic just fine, but I can’t get the stream through a connected router.
RuggedSwitch™ User Guide Problem Four • Multicast streams of some groups are not forwarded properly. Some segments without subscribers receive the traffic while some segments with subscribers don’t. Ensure there are you do have a situation where differing multicast groups have multicast IP addresses that map to the same multicast MAC Address. The switch forwarding operation is MAC Address based and will not work properly for several groups mapping to the same MAC Address.
Chapter 8 – Diagnostics Chapter 8 – Diagnostics Introduction This chapter familiarizes the user with: • Using The Alarm System to view and clear Alarms • Viewing and clearing the System Log • Viewing CPU Diagnostics • Loading the Factory Default Configuration • Viewing the Product Identification • Resetting the switch Using The Alarm System Alarm Concepts And Issues Alarms are the occurrence of events of interest that are logged by the switch.
RuggedSwitch™ User Guide Active alarms are removed (cleared) either by solving the original cause of the alarm or by disabling the alarm itself. Passive Alarms Passive alarms are historic in nature. They signify events that represented abnormal conditions in the past, and do not affect the current operational status. Examples of passive alarms include authentication failures or error rates that temporarily exceeded a certain threshold.
Chapter 8 – Diagnostics Each alarm has an associated description string. The string will include a port number if it is relevant. The description may also provide an indication of the recent rate at which this alarm is occurring (if the alarm has occurred previously). Alarms And The Critical Failure Relay All active alarms will immediately de-energize the critical fail relay (thus signifying a problem). The relay will be re-energized when the last outstanding active alarm is cleared.
RuggedSwitch™ User Guide Viewing CPU Diagnostics The CPU Diagnostics Menu is available from the Diagnostics menu View CPU Diagnostics command. The parameters presented in this menu are read-only. My Switch CPU Diagnostics Running Time Total Powered Time CPU Usage RAM Total RAM Available Temperature Admin Access 265 days, 22:38:05 488 days, 12:15:07 0.
Chapter 8 – Diagnostics Viewing and Clearing the System Log The View System Log command displays entries made in the system log. The system log records various events including reboots, user sign-ons, alarms and configuration saves. My Switch syslog.txt Admin Access Nov 11 14:25:40.363 INFO System log cleared Nov 12 16:50:53.058 INFO Guest logged in Nov 12 21:52:11.406 INFO Flashing config.csv started Nov 12 21:52:11.968 INFO Flashing config.csv done Nov 12 21:52:12.051 INFO Flashing config.
RuggedSwitch™ User Guide Load Factory Default Configuration The Load Factory Default Configuration command will re-load all configuration parameters to factory default values. Configuration parameters that affect the connection to the switch (as provided by the Configure IP Services menu) will not be modified. A prompt will be displayed requesting confirmation of this action. Resetting The Unit The Reset Device command will close all open Telnet connections and warm start the unit.
Chapter 9 - Using Ethernet And RMON Statistics Chapter 9 – Using Ethernet And RMON Statistics Introduction This chapter familiarizes the user with: • Viewing Ethernet Statistics • Viewing and Clearing Ethernet Port Statistics • Configuring RMON History Control • Viewing RMON History Samples • Configuring RMON Alarms • Configuring RMON Events • Viewing RMON Event Logs The Ethernet Statistics menu is accessible from the main menu Ethernet Statistics command.
RuggedSwitch™ User Guide View Ethernet Statistics Ethernet statistics provides a continuously updated (once per second) view of the traffic on all ports.
Chapter 9 - Using Ethernet And RMON Statistics InPkts This counter is incremented once for every good packet (Unicast + Multicast + Broadcast) received. This counter is incremented once for every transmitted good packet. This counter is incremented once for every data octet of all received packets, including packets that (for whatever reason) will be dropped. This counter should reflect all the data octets received on the line. This counter is incremented once for every received packet.
RuggedSwitch™ User Guide • The ability to collect historical statistics in order to review performance and operation of Ethernet ports. • The ability to record a log entry and/or generate an SNMP trap when the rate of occurrence of a specified event is exceeded. These capabilities are provided through the following menus: • RMON History Control Table – This menu controls the periodic statistical sampling of data and corresponds to the RFC 2819 (RMON-MIB) History Group.
Chapter 9 - Using Ethernet And RMON Statistics RMON Historical Statistics Concepts And Issues Historical statistics allow users to program the switch to take “snapshots” of the RMON-MIB history statistics of a port at regular intervals. Each user creates a record that describes: • The port to capture the statistics for • The interval between each sample taken • The total number of samples (called RMON buckets) to keep • Information about the user that created the record, i.e.
RuggedSwitch™ User Guide Configure RMON History Control Table Menu The History Control Table stores configuration records that define a users sample collection. Collected samples can be viewed by using the arrow keys to select a particular record and pressing V.
Chapter 9 - Using Ethernet And RMON Statistics RMON History Samples Table Menu History samples for a particular record in the RMON History Control Table are displayed by selecting a particular record there and pressing V. The index of the record will be included in the resulting menu title of the sample screen. The table will present a series of samples. The Sample number starts with one and increases by one with each new log entry.
RuggedSwitch™ User Guide RMON Alarms And Events Concepts And Issues The Alarm Process The RMON Alarms Table allows the user to create records that configure the switch to examine the state of a specific statistic variable. The record contains an upper and a lower threshold for legal values of the statistic in a given interval. This provides the ability to detect events occurring more quickly than a specified maximum rate or less quickly than a specified minimum rate.
Chapter 9 - Using Ethernet And RMON Statistics Alarm Generation And Hysteresis The ability to configure upper and lower thresholds on the value of a measured statistic provide for the ability to add hysteresis to the alarm generation process. If the value of the measured statistic over time is compared to a single threshold, alarms will be generated each time the statistic crosses the threshold. If the statistic’s value fluctuates around the threshold, an alarm can generated every measurement period.
RuggedSwitch™ User Guide Configure RMON Alarms The Alarms Table stores configuration records that define statistics, their polling periods and threshold parameters. My Switch RMON Alarms Index Variable 1 ifInOctets.5 2 ifOutOctets.5 More right ... Admin Access Rising Thr 10000 10000 Falling Thr 100000 100000 Z-Help S-Shell I-Insert L-Delete Figure 59: RMON Alarm Configuration Table screens Index The index of the RMON Alarms entry.
Chapter 9 - Using Ethernet And RMON Statistics Startup Alarm The alarm that may be sent after the first measurement period. If the first sample is greater than or equal to the rising threshold and Startup Alarm is equal to “rising” or “risingOrFalling”, then a rising alarm will be generated. If the first is less than or equal to the falling threshold and Startup Alarm is equal to “falling” or “risingOrFalling”, then a falling alarm will be generated.
RuggedSwitch™ User Guide Configure RMON Events The RMON Events Table stores profiles of behaviour used in event logging. These profiles are used by RMON Alarm records to send traps and log events. Collected logs can be viewed by using the arrow keys to select a particular profile’s record and pressing V. Each record may specify that an alarms log entry be created on its behalf whenever the event occurs. Each entry may also specify that a notification should occur by way of SNMP trap messages.
Chapter 9 - Using Ethernet And RMON Statistics RMON Event Logs Event logs for a particular record in the RMON Events Table are displayed by selecting a particular record there and pressing V. The index of the record will be included in the resulting menu title of the logs screen. The table will present a series of logs. The log number starts with one and increases by one with each new log entry. The oldest log is deleted in favour of a new log when the number of logs reaches fifty.
RuggedSwitch™ User Guide Troubleshooting Problem One • What do I need to do in order get a trap when the frame rate on port 1 exceeds 1000 fps? We will start by assuming that the frames are unicasts, the rate is to be measured in both directions and that the measurement period is 1 second. 1) Verify that an SNMP management station is configured and traps are enabled.
Chapter 10 - Using The CLI Shell Chapter 10 - Using The CLI Shell Introduction This chapter familiarizes the user with: • Entering and leaving the CLI shell • Viewing files contained in the RuggedSwitch™ File System • Viewing and clearing log files • Running a Loopback test • Pinging remote devices • Tracing the operation of certain protocols • Viewing DHCP Learned Information Using Ipconfig • Executing Commands Remotely Through RSH • Resetting the switch Note: The operations described in
RuggedSwitch™ User Guide Summary Of Commands The shell makes available the following commands.
Chapter 10 - Using The CLI Shell Viewing Files The RuggedSwitch™ maintains a number of volatile and nonvolatile files. These files can aid in the resolution of problems and serve as a useful gauge of the switch’s health. Dir command Enter “dir” to obtain a complete list of files and a description of each. Note: Each file has associated attributes, as described under the Attr column. Files marked “R” are readable, i.e. may be uploaded by the user. Files marked “W” are writable, i.e.
RuggedSwitch™ User Guide Running Loopback Tests The CLI loop command provides a means to validate the operation of the physical port hardware of the switch by running a loopback test. The test works by taking the port offline and transmitting a number of “loopback” frames out the port. If the hardware is functioning correctly the frames will be looped back to receiver to be validated and counted. The test is successful when all transmitted frames are received correctly and in the same order as transmitted.
Chapter 10 - Using The CLI Shell Pinging A Remote Device The ping command sends an ICMP echo request to a remotely connected device. For each reply received the round trip time is displayed. The ping command can be used to ensure connectivity to the next connected device. The command “ping 192.168.0.1” will send a small number of pings to this device and display the results. The ping command is a useful tool for testing commissioned links.
RuggedSwitch™ User Guide Tracing Events The CLI trace command provides a means to trace the operation of various protocols. The trace provides detailed information including RSTP packet decodes, IGMP activity and MAC address displays. Notes: Tracing has been designed to provide detailed information to expert users. Note that all tracing is disabled upon switch startup. In order to display the current trace settings and discover the systems that be traced, enter the CLI command “trace ?”.
Chapter 10 - Using The CLI Shell Starting The Trace The trace is be started by entering “trace”. All historical trace messages will be displayed. Since this may include many messages it may be more desirable to use the “trace clear” command instead. This command will automatically clear the trace buffer as it starts the trace. Note: It is very useful to enable link changes when testing some protocols such as STP. The trace package automatically resets the “seconds” timestamp when a link rises.
RuggedSwitch™ User Guide Executing Commands Remotely Through RSH The Unix/Dos Remote Shell Facility can be used at the workstation to cause the product to act upon commands as if they were entered at the CLI prompt.
Chapter 11 – Upgrading Firmware And Managing Configurations Chapter 11 – Upgrading Firmware And Managing Configurations Introduction This chapter familiarizes the user with: • Upgrading firmware using the XModem protocol and Trivial File Transfer Protocol (TFTP) • Capturing and restoring the switch configuration using XModem and TFTP • Using SQL commands to view/change configuration.
RuggedSwitch™ User Guide Upgrading Firmware With Xmodem Connect to the switch, either through the RS232 port or through a Telnet connection. Press to enter the shell. Enter the command “xmodem receive main.bin”. Open the XModem utility in your terminal package. If possible select the XModem1K protocol, otherwise select the Xmodem protocol. >xmodem receive main.bin Press Ctrl-X to cancel Receiving data now ... Received 751298 bytes. Closing file ... Flash programming results for main.
Chapter 11 – Upgrading Firmware And Managing Configurations Checking The Status OF The Download. The utility will provide an indication that the file was transferred properly, but you must also query the switch in order to determine if it was correctly programmed. Use the command “rsh hostname –l password version” to obtain the revision levels of the software. If the download was successful the version will be indicated as the “next” firmware (i.e. the firmware that will run after the next reboot).
RuggedSwitch™ User Guide Capturing Configurations The RuggedSwitch™ provides a means to capture the configuration of the switch in an ASCII formatted text file. The same file can be downloaded to the switch at a later date in order to restore the switch to its previous configuration. Different versions of configuration file can be compared using an ASCII text difference tool, in order to pinpoint configuration changes.
Chapter 11 – Upgrading Firmware And Managing Configurations Using SQL Commands The RuggedSwitch™ provides an “SQL like” command facility that allows expert users to perform several operations not possible under the user interface, namely: • Restoring the contents of a specific table, but not the whole configuration, to their factory defaults, • Search tables in the database for specific configurations, • Make changes to tables predicated upon existing configurations.
RuggedSwitch™ User Guide Finding The Correct Table Many sql commands operate upon specific tables in the database, and require the table name to be specified. The name can easily be determined by navigating the menu system to the desired menu and pressing . The menu name and the corresponding database table name will be cited. Another way to find a table name is to run the “sql info tables” command. This command also displays menu names and their corresponding database table names.
Chapter 11 – Upgrading Firmware And Managing Configurations Retrieving A Table With The Where Clause It is useful to be able to display specific rows of a table predicated upon the row having parameters of a specific value. The addition of a “where” clause to the select will limit the returned results. As an example, suppose that it desirable to identify all ports on the switch operating in Auto Select mode.
RuggedSwitch™ User Guide Using RSH And SQL The combination of remote shell scripting and sql commands offer a means to interrogate and maintain large numbers of switches. Consistency of configuration across sites may be verified by this method. The following presents a simple example where the switches to interrogate are drawn from the file “switches”. C:> type switches 10.0.1.1 10.0.1.2 10.0.1.
Appendices Appendix A - Menu Tree Administration Configure IP Services Configure System Identification Configure Passwords Configure Time and Date Configure SNMP Management Stations Port Configuration and Status Configure Ports Parameters Configure Port Rate Limiting Configure Port Security Configure Port Mirroring View Port Status Reset Port(s) Ethernet Statistics View Ethernet Statistics View Ethernet Port Statistics Clear Ethernet Port Statistics Configure RMON History Controls Configure RMON Alar
RuggedSwitch™ User Guide APPENDIX B - SNMP MIB SUPPORT RFC RFC 1907 MIB Name SNMPv2-MIB RFC 2863 IF-MIB RFC 2012 RFC 2013 RFC 2819 TCP-MIB UDP-MIB RMON-MIB Draft-ietf-bridge-bridgemib-smiv2-03 RSTP-MIB Draft-ietf-bridge-rstpmib-03 BRIDGE-MIB Items supported SNMP Group SNMP Community Group SNMP Set Group System Group SNMP Basic Notifications Group General Information Group VHC Packet Group Counter Discontinuity Group Link Up/Down Notification Group TCP Group UDP Group Ethernet Statistics Group His
Appendices GenericTrap (String “MAC address is learned on secure port”) GenericTrap (Intermittent link) APPENDIX D – RMON ACCEPTABLE MIB PARAMETERS The following tables present the MIB parameters that may be used to generate RMON alarms.
RuggedSwitch™ User Guide RMON-MIB (RFC 2819) etherStatsDropEvents etherStatsOctets etherStatsPkts etherStatsBroadcastPkts etherStatsMulticastPkts etherStatsCRCAlignErrors etherStatsUndersizePkts etherStatsOversizePkts etherStatsFragments etherStatsJabbers etherStatsCollisions etherStatsPkts64Octets etherStatsPkts65to127Octets etherStatsPkts128to255Octets etherStatsPkts256to511Octets etherStatsPkts512to1023Octets etherStatsPkts1024to1518Octets The number of received packets that are dropped due to lack
Appendices TCP-MIB (RFC 2012) tcpActiveOpens tcpPassiveOpens tcpAttemptFails tcpEstabResets tcpCurrEstab tcpInSegs tcpOutSegs tcpRetransSegs UDB-MIB (RFC 2013) udpInDatagrams udpNoPorts udpInErrors udpOutDatagrams SNMPv2-MIB snmpInPkts snmpInBadVersions snmpInBadCommunityNames snmpInBadCommunityUses snmpInASNParseErrs RuggedCom The number of times TCP connections have made a direct transition to the SYN-SENT state from the CLOSED state.
RuggedSwitch™ User Guide BRIDGE-MIB (draft-ietf-bridge-bridgemib-smiv2-03) dot1dBasePortDelayExceededDiscards The number of frames discarded by this port due to excessive transit delay through the bridge. dot1dBasePortMtuExceededDiscards The number of frames discarded by this port due to an excessive size. dot1dTpPortInFrames The number of frames that have been received by this port from its segment. dot1dTpPortOutFrames The number of frames that have been transmitted by this port to its segment.
Index INDEX Alarms Indicator 3 Features, Port 18 Features, VLAN 31 Gateway Address, Configuring 6 Loss-of-Link Management 21 MAC Table, Configuring 13 Password, Default 1 RS232 port 1 RSTP Ring Backbone Configurations RSTP Structured Wiring Configurations RSTP, Edge ports 55 VLAN, Management 33 Aging Time, Configuring 15 Alarms, Active 89 Alarms, Clearing 92 Alarms, Critical Failure Relay 91 Alarms, Level 90 Alarms, Passive 90 Alarms, Using 89 Alarms, Viewing 91 Broadcast Rate Limiting 20 Broadcast Rate Li
RuggedSwitch™ User Guide IGMP Configuration 82 IGMP Consumers and Producers 77 IGMP general membership queries 77 IGMP group specific membership queries IGMP leave group message 78 IGMP membership reports 77 IGMP Operation 77 IGMP Query Interval, Configuring 83 IGMP Router Ports, Configuring 83 IGMP Snooping 34 IGMP, Statistics 83 IGMP, Troubleshooting 86 Inactivity Timeout, Configuring 6 IP Address, Configuring 6 Layer 3 switches, Using 32 Link Alarms, Configuring 25 Load Factory Default Configuration 96 M
Index Menu, Time and Date 8 Menu, Virtual LANs 37 Multicast Filtering 75 NTP Server Address, Configuring 9 NTP Update Period, Configuring 9 Password, Configuring 8 Port Mirroring 22 Port Mirroring, Configuring 28 Port Rate Limiting 25 Port Security 19, 26 Port Statistics, Viewing 98 Ports, Configuring 23 Ports, Resetting 29 Ports, Troubleshooting 30 Product Identification 95 Resetting, Device 96 RMON 100 RMON, Alarms And Events 104 RMON, Historical Statistics 101 RMON, Troubleshooting 111 RSH, Using 120 RST
RuggedSwitch™ User Guide SQL, Default Command 130 SQL, Info Command 128 SQL, Select Command 128 SQL, Update Command 129 Statistics 66 Subnet, Configuring 6 System Identification, Configuring 8 System Log, Clearing 95 System Log, Viewing 95 Telnet Sessions, Configuring 6 TFTP Client, Upgrading Firmware With TFTP Server ,Configuring 7 TFTP Server, Upgrading Firmware With Time Zone, Configuring 9 Troubleshooting, Administration Settings VLAN Configuration 36 VLAN Forbidden Ports, Configuring 38 VLAN Ranges & D