Manuale d’uso / di manutenzione del prodotto 11.3 del fabbricante 3Com
Vai alla pagina of 50
® http://www.3com.com/ New Installation for Enterprise OS Softwar e Version 11.3 Part No. 09-1550-001 Published May 1999.
ii 3Com Corporation 5400 Bayfront Plaza Santa Clara, California 95052-8145 Copyright © 1999, 3Com Corporation. All rights reserved. No part of this documentation may be r epr oduced in any form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without written permission from 3Com Corporation.
iii C ONTENTS A BOUT T HIS G UIDE Introduction 5 How to Use This Guide 5 Conventions 6 Y ear 2000 Compliance 6 1 O VERVIEW NETBuilder II Systems 7 EZBuilt Preassembled NETBuilder II System 7 Component.
iv Full-Form Syntax 22 Abbreviated Syntax 22 Symbols 23 Full and Abbr eviated Syntax Examples 24 V ariations in Command Syntax 25 Entering Service Names in Command Lines 25 Determining the Display of .
A BOUT T HIS G UIDE Introduction This guide describes how to get started with your new NETBuilder II ® bridge/router . It describes how to install Enterprise OS software and perform the initial system boot. It also explains how to access and use the command-line interface to establish basic settings.
6 A BOUT T HIS G UIDE Conventions T able 1 and T able 2 list conventions that are used thr oughout this guide. Y ear 2000 Compliance For information on Y ear 2000 compliance and 3Com products, visit the 3Com Y ear 2000 Web page: http://www.3com.com/products/yr2000.
1 O VERVIEW This chapter is an overview of how to get started with your new NETBuilder II ® system. This chapter provides you with an installation checklist that describes the basic steps for starting a NETBuilder II system with a Dual Processor Engine (DPE) module.
8 C HAPTER 1: O VERVIEW Installation Checklist This section contains a checklist for installing software and booting a NETBuilder II system with a DPE module. Install System Software and Boot — See Chapter 2. Change the Primary Boot Source — See Chapter 3.
2 I NSTALLING S OFTWARE AND B OOTING A NETB UILDER II S YSTEM This chapter contains the following procedur es: ■ Installing and booting Enterprise OS software ■ Making a backup copy of the softwar.
10 C HAPTER 2: I NSTALLING S OFTWARE AND B OOTING A NETB UILDER II S YSTEM Booting a Component NETBuilder II System T o boot a component NETBuilder II system, follow these steps: 1 Insert a flash memory card with pr einstalled software in drive A on the DPE module.
Using the Backup Flash Card 11 2 Format the blank flash memory card in drive B by entering: FORMAT b: T ype Y for yes when the formatting confirmation message is displayed.
12 C HAPTER 2: I NSTALLING S OFTWARE AND B OOTING A NETB UILDER II S YSTEM 3 Reboot the NETBuilder II bridge/router by pr essing the two outer buttons on the LCD control panel. The system boots from the Enterprise OS softwar e flash memory card in drive A.
3 C HANGING THE B OOT S OURCE This chapter describes how to change the primary boot source on a bridge/r outer or tunnel switch. The Enterprise OS software boot files for the main pr ocessor module are factory shipped with a:/primary/boot.29k as the default primary boot source for NETBuilder bridge/routers.
14 C HAPTER 3: C HANGING THE B OOT S OURCE For more information about the Boot Monitor utility , see the Firmware appendix in Reference for Enterprise OS Software . 2 T o enter the Boot Monitor utility , enter r: 3 Enter a boot path using: BT <drive>:/<path>/<filename> If you do not enter the <drive> value, drive A is used.
Configuring the Primary Boot Source 15 4 At the Enterprise OS prompt, enter: SysconF 2 The Primary Boot Source menu is displayed: 5 Enter 1 to select a boot filename. Information similar to the following is displayed: Current Boot Filename: a:/primary/boot.
16 C HAPTER 3: C HANGING THE B OOT S OURCE.
4 C ONFIGURING B ASIC S ETTINGS This chapter describes preliminary tasks for configuring basic bridge/r outer settings. Before you begin configuring ports and paths (described in Chapter 1 of Using Enterprise OS Software ), complete the following tasks: ■ Log on to the system.
18 C HAPTER 4: C ONFIGURING B ASIC S ETTINGS 3 Log on as root: root 4 Press the Return key . Pressing the Return key when prompted for the password enters a null string, which is the default local password. Later in this chapter , you will be instructed on how to change the password.
Learning About the User Interfaces 19 Accessing the User Interface T o access the user interface or to modify the configuration of the bridge/router or tunnel switch, use one of the following methods: ■ Access the bridge/router commands locally thr ough the console port.
20 C HAPTER 4: C ONFIGURING B ASIC S ETTINGS 5 Log in as root. T ype: root or admin 6 Click the OK button to enter a null string as the password, which is the default local password. The default Web Link page opens in the br owser window . Web Link Interface Description The Web Link application window has thr ee frames.
Learning About the User Interfaces 21 The Main menu (Level 1) is displayed. Depending on your software package, the number of services in your Main menu may vary . 2 Select the service you want to use. For example, selecting 1 from the Main menu (Level 1) display generates a menu for the SYS Service.
22 C HAPTER 4: C ONFIGURING B ASIC S ETTINGS The value part of the command specifies how you want the parameter to be set. V alues include numerics, strings, or addr esses, depending on the parameter . For additional information, see “Syntax for Assigning V alues” on page 28 .
Learning About the User Interfaces 23 Figure 2 Abbr eviated Syntax Additional syntax examples are pr ovided in “Full and Abbreviated Syntax Examples” on page 24 .
24 C HAPTER 4: C ONFIGURING B ASIC S ETTINGS Full and Abbreviated Syntax Examples The following examples show the full form first, followed by the abbreviated command syntax. The full-form command syntax: ADD !<port> -NRIP AdvToNeighbor <network>%<mac address> [.
Learning About the User Interfaces 25 V ariations in Command Syntax Each command has its own syntax. When a command is used for configuring parameters, its syntax or values may change according to the parameter and service.
26 C HAPTER 4: C ONFIGURING B ASIC S ETTINGS Software . For more information about the Curr entPorts parameter , see Reference for Enterprise OS Software . The syntax convention for ports, virtual ports, and group ports is: !<port> For a port, <port> is a variable ID number , for example, !1.
Learning About the User Interfaces 27 Privilege Level The privilege level determines which commands and parameters a user can access. The network manager must set the Network Manager password and the User password to be the same in or der to provide equal levels of security .
28 C HAPTER 4: C ONFIGURING B ASIC S ETTINGS Syntax for Assigning V alues Most parameters must be assigned a value of a particular type. T able 4 shows the possible types. The SET , SETDefault, and SYSgen commands requir e both parameter names and parameter values.
Learning About the User Interfaces 29 example, to include an apostrophe in string text, enter a backslash followed by an apostrophe ('). T o include a backslash () in string text, enter two backslashes (). The first backslash prevents the bridge/r outer from tr eating the second as a special character .
30 C HAPTER 4: C ONFIGURING B ASIC S ETTINGS The syntax variation for non-ISDN interfaces applies to local area network (LAN) and data terminal equipment (DTE) interfaces. Enterprise OS software menus and help strings do not display the syntax variation for ISDN interfaces.
Learning About the User Interfaces 31 Frame Relay Requires an addr ess called a Data Link Connection Identifier (DLCI). DLCIs are assigned by the appr opriate authority at subscription time. A DLCI follows an at sign (@) and can range from 1 thr ough 1022 decimal.
32 C HAPTER 4: C ONFIGURING B ASIC S ETTINGS Network Layer Addresses ISDN An ISDN address is a phone number provided by your telecommunications carrier . It can include a dial prefix, country code, area code, and phone number . It can consist of a maximum of 30 characters.
Learning About the User Interfaces 33 T able 6 Internet Address Format Class Range of First Address Field Address Format A 0–127 nnn.hhh.hhh.hhh * * n represents a digit of the network number; h represents a digit of the host number. B 128–191 nnn.
34 C HAPTER 4: C ONFIGURING B ASIC S ETTINGS Getting Help The user interface provides help menus as memory aids. T o display the help menu, enter a question mark (?).
Obtaining Network Manager Privilege Level 35 modifying it and see the new value, the new value has taken effect immediately . If a command changes only the default value, the new value takes effect only after reboot.
36 C HAPTER 4: C ONFIGURING B ASIC S ETTINGS T o change the password, follow these steps: 1 At the Enterprise OS prompt (Enterprise OS #), enter: SysPassWord When a menu is displayed, Select 1, Set Network Manager Privilege Password. 2 Enter the new Network Manager password.
Assigning Internet Addresses 37 The system location can contain no more than 255 characters. The default value is “ “ (null string). 3 Specify a string that identifies the contact person managing.
38 C HAPTER 4: C ONFIGURING B ASIC S ETTINGS The following example illustrates how to assign an Internet address to a bridge. Example Figure 3 shows a configuration in which you need to assign an Internet address to a bridge. Hosts A and B are two hosts belonging to the same IP network, network 10.
Assigning Internet Addresses 39 Figure 4 Assigning an IP Addr ess to a bridge/r outer Port For additional information on Internet addresses and subnet masks, see Using Enterprise OS Software . After assigning an Internet address or addresses to the bridge/router or tunnel switch, go to Chapter 1 in Using Enterprise OS Software.
40 C HAPTER 4: C ONFIGURING B ASIC S ETTINGS If you do not plan to be connected to the Internet, you can assign network addresses on your own. However , if you plan on accessing the Internet in the future, you may want to apply for an Internet network address so you will not have to change network addresses when you make the connection.
NETBuilder Security 41 For example: ADD -SNMP COMmunity “public” TRiv RO AL1 4 Create a new manager with r ead/write access to the bridge/router or tunnel switch. For security reasons, limit the number of network management stations. For example: ADD -SNMP MANager “private” 129.
42 C HAPTER 4: C ONFIGURING B ASIC S ETTINGS.
A T ECHNICAL S UPPORT 3Com provides easy access to technical support information thr ough a variety of services. This appendix describes these services. Information contained in this appendix is correct at time of publication. For the most recent information, 3Com r ecommends that you access the 3Com Corporation World Wide Web site.
44 A PPENDIX A: T ECHNICAL S UPPORT Y ou do not need a user name and password with Web browser software such as Netscape Navigator and Internet Explorer . 3Com Bulletin Board Service The 3Com BBS contains patches, software, and drivers for 3Com pr oducts.
Support from 3Com 45 Support from 3Com If you are unable to obtain assistance fr om the 3Com online technical r esources or from your network supplier , 3Com offers technical telephone support services. T o find out more about your support options, please the 3Com technical telephone support phone number at the location nearest you.
46 A PPENDIX A: T ECHNICAL S UPPORT Retur ning Products for Repair Before you send a pr oduct directly to 3Com for r epair , you must first obtain an authorization number . Products sent to 3Com without authorization numbers will be returned to the sender unopened, at the sender’ s expense.
47 I NDEX Numerics 3Com bulletin board service (3Com BBS) 44 3Com URL 43 3ComFacts 44 A abbreviated command syntax 22 , 24 address formats media AppleT alk 32 Frame Relay 31 ISDN 32 MAC 30 SMDS 31 X.
48 paths naming restrictions 29 using instance identifiers 29 ports naming restrictions 29 syntax conventions 26 using instance identifiers 29 privilege level changing 35 changing SNMP access to fi.
3Com Corporation L IMITED W ARRANTY H ARDWARE 3Com warrants its hardware products to be free from defects in workmanship and materials, under normal use and service, for the following lengths of time .
USE, PERFORMANCE, FAILURE, OR INTERRUPTION OF ITS PRODUCTS, EVEN IF 3COM OR ITS AUTHORIZED RESELLER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, AND LIMITS ITS LIABILITY TO REPAIR, REPLACEMENT, OR REFUND OF THE PURCHASE PRICE PAID, AT 3COM’S OPTION.
Un punto importante, dopo l’acquisto del dispositivo (o anche prima di acquisto) è quello di leggere il manuale. Dobbiamo farlo per diversi motivi semplici:
Se non hai ancora comprato il 3Com 11.3 è un buon momento per familiarizzare con i dati di base del prodotto. Prime consultare le pagine iniziali del manuale d’uso, che si trova al di sopra. Dovresti trovare lì i dati tecnici più importanti del 3Com 11.3 - in questo modo è possibile verificare se l’apparecchio soddisfa le tue esigenze. Esplorando le pagine segenti del manuali d’uso 3Com 11.3 imparerai tutte le caratteristiche del prodotto e le informazioni sul suo funzionamento. Le informazioni sul 3Com 11.3 ti aiuteranno sicuramente a prendere una decisione relativa all’acquisto.
In una situazione in cui hai già il 3Com 11.3, ma non hai ancora letto il manuale d’uso, dovresti farlo per le ragioni sopra descritte. Saprai quindi se hai correttamente usato le funzioni disponibili, e se hai commesso errori che possono ridurre la durata di vita del 3Com 11.3.
Tuttavia, uno dei ruoli più importanti per l’utente svolti dal manuale d’uso è quello di aiutare a risolvere i problemi con il 3Com 11.3. Quasi sempre, ci troverai Troubleshooting, cioè i guasti più frequenti e malfunzionamenti del dispositivo 3Com 11.3 insieme con le istruzioni su come risolverli. Anche se non si riesci a risolvere il problema, il manuale d’uso ti mostrerà il percorso di ulteriori procedimenti – il contatto con il centro servizio clienti o il servizio più vicino.