Foundry Switch and Router Installation and Configuration Guide
iv December 2000
DETERMINING POWER SUPPLY STATUS ................................................................................................2-6
I
NSTALLING POWER SUPPLIES ..............................................................................................................2-6
R
EMOVING POWER SUPPLIES ...............................................................................................................2-7
R
EPLACING FANS (4-SLOT AND 8-SLOT CHASSIS DEVICES ONLY) ..............................................................2-10
R
EQUIRED TOOLS ..............................................................................................................................2-10
DETERMINING WHICH FAN HAS FAILED ...............................................................................................2-10
F
OUR-SLOT CHASSIS .........................................................................................................................2-11
E
IGHT-SLOT CHASSIS ........................................................................................................................2-12
REPLACING A FAN TRAY (15-SLOT CHASSIS DEVICES ONLY) .....................................................................2-13
V
ERIFYING PROPER OPERATION ...............................................................................................................2-13
A
TTACHING A PC OR TERMINAL ................................................................................................................2-14
ASSIGNING PERMANENT PASSWORDS .......................................................................................................2-16
C
ONFIGURING IP ADDRESSES ...................................................................................................................2-17
L
AYER 3 SWITCHES ............................................................................................................................2-17
LAYER 2 SWITCHES ............................................................................................................................2-18
M
OUNTING THE CHASSIS OR STACKABLE DEVICE ......................................................................................2-19
D
ESKTOP INSTALLATION .....................................................................................................................2-19
R
ACK MOUNT INSTALLATION – CHASSIS DEVICES ...............................................................................2-19
R
ACK MOUNT INSTALLATION – STACKABLE DEVICES ...........................................................................2-20
P
OWERING ON A SYSTEM .........................................................................................................................2-21
C
ONNECTING NETWORK DEVICES .............................................................................................................2-22
C
ONNECTORS ....................................................................................................................................2-22
C
ABLE LENGTH ..................................................................................................................................2-22
C
ONNECTING TO ETHERNET OR FAST ETHERNET HUBS .......................................................................2-24
C
ONNECTING TO WORKSTATIONS, SERVERS, OR ROUTERS .................................................................2-24
I
NSTALLING OR REMOVING A GBIC .....................................................................................................2-25
T
ROUBLESHOOTING NETWORK CONNECTIONS .....................................................................................2-26
T
ESTING CONNECTIVITY ............................................................................................................................2-26
P
INGING AN IP ADDRESS ....................................................................................................................2-26
T
RACING A ROUTE .............................................................................................................................2-26
M
ANAGING THE DEVICE ............................................................................................................................2-27
L
OGGING ON THROUGH THE CLI .........................................................................................................2-27
L
OGGING ON THROUGH THE WEB MANAGEMENT INTERFACE ...............................................................2-29
L
OGGING ON THROUGH IRONVIEW ......................................................................................................2-31
S
WAPPING MODULES (CHASSIS DEVICES ONLY) .........................................................................................2-31
CHAPTER 3
S
ECURING ACCESS TO MANAGEMENT FUNCTIONS ....................................... 3-1
SECURING ACCESS METHODS .....................................................................................................................3-1
R
ESTRICTING REMOTE ACCESS TO MANAGEMENT FUNCTIONS .....................................................................3-3
U
SING ACLS TO RESTRICT REMOTE ACCESS .......................................................................................3-4
R
ESTRICTING REMOTE ACCESS TO THE DEVICE TO SPECIFIC IP ADDRESSES .........................................3-5
R
ESTRICTING REMOTE ACCESS TO THE DEVICE TO SPECIFIC VLAN IDS ...............................................3-6
D
ISABLING SPECIFIC ACCESS METHODS ...............................................................................................3-7
S
ETTING PASSWORDS ................................................................................................................................3-9