|
|
This chapter provides information you need to unpack, install, and set up your Micro Hubs.
![]() | TimeSaver You can also use the Cisco 1538 Series Micro Hub 10/100 Cabling and Start Up guide that came with your hub for quick instructions on how to install and configure your Micro Hub. |
To ensure personal safety and protect the equipment, follow these guidelines:
![]() | Warning Unplug the power cord before you work on a system that does not have an on/off switch. |
![]() | Warning Do not work on the system or connect or disconnect cables during periods of lightning activity. |
![]() | Warning Read the installation instructions before you connect the system to its power source. |
![]() | Warning
The power supply is designed to work with TN power systems. |
![]() | Warning This equipment is intended to be grounded. Ensure that the host is connected to earth ground during normal use. |
![]() | Warning When installing the unit, the ground connection must always be made first and disconnected last. |
![]() | Warning Ultimate disposal of this product should be handled according to all national laws and regulations. |
Responsible party:
Manager, Corporate compliance
Cisco Systems Inc.
170 West Tasman Drive
San Jose, CA 95134
USA
(408) 526-4000
The following products:
Cisco 1538M and Cisco 1538 Micro Hub 10/100 has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules.
The FCC B warning statement for this product is in the front matter of this manual.

Make sure that you receive all the items shown in Figure 2-1. If any items are missing or damaged, contact your Cisco reseller.
Before you begin installing the hub:
These are the major steps for installing your Micro Hub:
1. Verify that the hub is operational by running the power-on self-test (POST).
![]() | TimeSaver If you are installing more than one Micro Hub, complete the next two steps. If you are installing only one hub, skip these steps. |
2. Install the hubs in a stack.
3. Connect the stacking cables to the hubs.
4. Connect power to the hub.
5. Connect other network devices to the hub.
![]() | TimeSaver If you have at least one Cisco 1538M managed hub and plan to use the management features, complete the next two steps. If you do not plan to manage your Micro Hubs, skip these steps. |
6. Connect the console port of a managed Micro Hub to a terminal or PC to monitor and configure the stack.
7. Access the Micro Hub management interface.
Before installing and cabling the hub, you might want power up the hub and verify that it is operational.
To power up the hub, connect one end of the AC power cord to the AC power connector on the hub and the other end of the cord to a power outlet (see Figure 2-6).
The hub begins the power-on self-test (POST) after power up. POST consists of the nine individual tests listed in Table 4-1. The port LEDs show which test the hub is executing. As each test executes, a port LED turns green. For example, if the LED for port 4 is green, the boot code test (test 1) is being executed. On the hub, the port LED for port 4 turns green first, followed by ports 3, 2, 1, 8, 7, and so on. The LED turns off after the test completes. The POWER LED is solid amber until POST completes.
When POST completes, the following conditions can exist (if other devices are not connected to the hub):
You should inform your system administrator if one or more nonfatal failures are detected. Contact your Cisco representative or reseller for support if any fatal failures are detected.
The "Understanding POST Results" section provides additional information, including the possible causes of nonfatal and fatal failures.
Up to four Micro Hubs can be stacked and connected through the rear panel UP and DOWN ports. Each hub comes with a stacking clip and a screw. Before using the clip, you must assemble the clip and the screw, as shown in Figure 2-2.
![]() | TimeSaver If you are using only one hub, go directly to "Connecting the Power Cord" section. |
After pushing the screw into the stacking clip, use the clip as shown in Figure 2-3.
Figure 2-3 shows how to stack Micro Hubs, and Figure 2-4 shows how to remove them from a stack.
To unstack hubs that are connected with the stacking clip, follow the instructions in Figure 2-4.
![]() | Caution If the unit you are removing is a managed hub and there is no secondary managed hub in the stack, you lose manageability for the entire hub stack. If the removed managed hub is mounted between two operating units, the Ethernet segment is split into two separate segments when the stacking cables are disconnected. |
For additional information about repeater types and collision domains, see "Repeater Types". "Ethernet Cable Specifications" provides additional information about Ethernet network guidelines.
You can interconnect hubs via the stacking connectors on the rear panel of the hubs. These interconnected hubs then appear to the rest of the network and to the management interface as a single logical repeater.
Interconnecting hubs differs from cascaded hubs that are connected via the standard 10/100 ports on the rear of the hub. The connected hubs then appear to the rest of the network and to the management interface as two logical repeaters.
Figure 2-5 shows how to attach the stacking cables to a stack of Micro Hubs.
Use the following guidelines when connecting the stacking cables:
![]() | Caution Be sure that the cable connector is properly aligned with the stacking connector. Inserting the connector at an angle damages the pins, making the cable unusable. |
You need at least one Micro Hub per three interconnected hubs (one hub stack) if you want to manage the stack. A second Micro Hub in the stack can act as a redundant stack manager in case the primary manager fails.
If a hub stack has more than one management hub, the upper management hub in the stack is the primary management hub. The lower management hub is the secondary management hub.
To manage the hub stack, you can use the system information (such as the IP, CDP, and SNMP information) assigned to the primary management hub. The primary management hub also stores the port settings of each hub in the stack. If the primary management hub becomes inactive or is disconnected from the stack, the secondary management hub becomes the primary management hub and uses the same stack information.
![]() | Caution If you are removing a management hub and there is no secondary management hub in the stack, you lose manageability for the entire hub stack. In addition, if the removed management hub is mounted between two operating hubs, you split the Ethernet segment into two separate segments when the stacking cables are disconnected. |
For information on managing the hub stack through the hub manager, see the "Managing the Hub Segments" section.
The physical position of the hubs in the hub stack and the stacking cable connections between hubs determine how they appear to the management interface. The FastHub management interface uses a hub-numbering convention, assigning numbers from top to bottom---the hub at the top of the stack is Group 1, the hub below Group 1 is Group 2, and so on. If you have four hubs in a stack and you remove Group 3 and connect the stacking cable from Group 2 to Group 4, Group 4 is renumbered as Group 3.
Micro Hubs can be added to or removed from the hub stack without powering down any hub in the stack. This function is referred to as hot swapping. The stack reconfigures itself in approximately 30 seconds. During this period, all packets received by the hub stack are dropped. However, the end-station protocols retransmit the lost packets; no connections are lost, and there is no degradation in network performance. If a management hub is present, all configured system parameters are retained; however, all network-related statistics are cleared.
![]() | Caution If you are removing a management hub and there is no secondary management hub in the stack, you lose manageability for the entire hub stack. In addition, if the removed management hub is mounted between two operating hubs, you split the Ethernet segment into two separate segments when the stacking cables are disconnected. |
Connect power and turn the hub on as shown in Figure 2-6 for each hub in the stack.
![]() | Warning A voltage mismatch can cause equipment damage and may pose a fire hazard. If the voltage indicated on the label is different from the power outlet voltage, do not connect the hub to that receptacle. |
After turning the hub on, check the hub front panel to make sure that certain LEDs are on as shown in Figure 2-7.

![]() | Warning This product relies on the building's installation for short-circuit (overcurrent) protection. Ensure that a fuse or circuit breaker no larger than 120 VAC, 15A U.S. (240 VAC, 10A international) is used on the phase conductors (all current-carrying conductors). |
You can connect the following types of devices to the hub workstation ports labeled 1 through 8:
This section describes how to connect these devices to the hub.
Connect network devices such as PCs, workstations, routers, or servers to the hub ports labeled 1 through 8, as shown in Figure 2-8. The network device must have a 10BaseT or 100BaseTX network interface card (NIC) to connect to the Micro Hub.
For more information about what kind of Ethernet cable to use, see the "Ethernet Cable Specifications".
After connecting a network device to the hub, check the corresponding port LED (labeled 1 through 8) on the front panel. The color and blinking pattern of the LED (shown in Figure 2-9) indicates the activity for the corresponding hub port.
Connect compatible 10/100-Mbps hubs or switches to the hub through port 5, as shown in Figure 2-10.
For more information about what kind of Ethernet cable to use, see the "Ethernet Cable Specifications".
After connecting a hub or switch to port 5, check the LED labeled 5 on the front panel (see Figure 2-11). The color and blinking pattern of the LED indicate activity for port 5.
![]() | TimeSaver This section applies only to the Cisco 1538M managed hub; the Cisco 1538 manageable hub does not have a console port. |
To connect the RJ-45 console port of a managed hub to a management station or modem, you must use the supplied RJ-45-to-RJ-45 rollover console cable and the appropriate adapter and follow these steps.
Step 1 Configure the hub console port settings to match the management station or modem. These are the default settings of the console port:
You can change the console port characteristics of the hub from the web-based System Configuration Page (see the "Changing the System Configuration" section) or by using the terminal command from the CLI.
Step 2 Connect one end of the supplied rollover console cable to the console port, as shown in Figure 2-12.
![]() | Caution Do not connect an actual telephone line, an ISDN line, or an Ethernet cable to this console port. Damage to the hub can result. Make sure you use the supplied RJ-45-to-RJ-45 rollover cable and adapters to connect the console port to the management station or modem. |
Step 3 Attach the appropriate adapter, such as the supplied RJ-45-to-DB-9 female DTE adapter (labeled Terminal), to a management station or modem.
Step 4 Connect the other end of the supplied rollover cable to the adapter.
Connector and cabling specifications for the console port are in the "Specifications and Cables."
Now that the hub is connected to a management station, you can assign IP information to the hub (see the "Assigning IP Information to a Cisco 1538M Hub" section).
After you install the hub and connect it to a management station, you can assign IP information to the hub. IP information identifies the hub to the network and is required to manage and monitor the hub through the Cisco 1538 Hub Manager, the CLI, or SNMP.
You can assign IP information to the hub by either:
or
You should contact your system administrator for the following information:
To assign IP information to the hub, follow these steps:
Step 1 From your management station, start the terminal emulation program.
After POST completes, the Continue with configuration dialog? prompt appears on the management station, and you can then follow the prompts to assign IP information to the hub. If the Continue with configuration dialog? prompt does not appear, see the "Troubleshooting" chapter.
Step 2 From the terminal or PC, enter Y:
Continue with configuration dialog? [yes/no]: Y
Step 3 Enter the IP address (for example: 10.1.105.20):
Enter IP address: 10.1.105.20
Step 4 Enter the subnet mask (IP netmask) (for example: 255.255.255.0):
Enter IP netmask: 255.255.255.0
Step 5 Enter the IP address of the default gateway (for example: 10.1.105.254):
Enter IP default gateway: 10.1.105.254
The following information is displayed:
The following configuration command script was created: ip address 10.1.105.20 255.255.255.0 ip default-gateway 10.1.105.254 ! end
Step 6 Enter Y:
Use this configuration? [yes/no]: Y
The following information is displayed:
Building configuration... Use the enabled mode `configuration' command to modify this configuration. Press RETURN to get started.
Pressing Return opens a CLI session.
Step 7 Exit from the terminal session.
You can now use the hub with its default values or configure and monitor it by using the Cisco 1538 Hub Manager, the CLI, or SNMP and the MIB files.
After you assign IP information to the hub, you can access the hub management interfaces. This section provides information for accessing the Cisco 1538 Hub Manager, the CLI, and SNMP and MIB files.
To access the hub manager, all you need is the IP information of the hub (and the password if one has been assigned). IP information for the hub is usually assigned when the hub is first started up after installation. (See the "Assigning IP Information to a Cisco 1538M Hub" section.)
To access the hub manager, follow these steps:
Step 1 Start Netscape Communicator (4.03 or higher) or Microsoft Internet Explorer (4.01 or higher).
Step 2 Ensure that the following browser features are enabled:
Step 3 Enter the IP address of the hub in the Location field if you are using Communicator (the Address field if you are using Internet Explorer) to display the hub manager Home Page (Figure 2-13).
You can access the CLI
When you access the CLI and a password has been defined, the following prompt is displayed:
Cisco Systems Console Enter Password:
Enter the password. The hostname> prompt is displayed after you enter the correct password.
For complete information about the CLI, refer to the Cisco 1538 Series Micro Hub 10/100 Command Reference.
You can access the hub MIB files through SNMP. The following MIB files contain variables that can be set or read to provide information about the hub and the traps generated by the hub.
If you are going to manage the hub by using SNMP and the MIB files, the Read and Write community strings need to be set. To do this, you can either
You can obtain a copy of the MIB files in the following ways:
To obtain a MIB file, follow these steps:
Step 1 Use FTP to access the server ftp.cisco.com.
Step 2 Log in with the username anonymous.
Step 3 Enter your e-mail name when prompted for the password.
Step 4 At the ftp> prompt, change directories to /pub/MIBs.
Step 5 Use the get README command to display the readme file listing available files.
Step 6 Use the get MIB_filename command to get a copy of the MIB file.
To access the MIB files from CCO, click Software & Support to display the Software Center site.
CCO serves a wide variety of users through two interfaces that are updated and enhanced simultaneously: a character-based version and a multimedia version that resides on the World Wide Web (WWW). The character-based CCO supports Zmodem, Kermit, Xmodem, FTP, and Internet e-mail, and it is excellent for quick access to information over lower bandwidths. The WWW version of CCO provides richly formatted documents with photographs, figures, graphics, and video, as well as hyperlinks to related information.
You can access CCO in the following ways:
For a copy of CCO's Frequently Asked Questions (FAQ), contact cco-help@cisco.com. For additional information, contact cco-team@cisco.com.
The Remote Monitoring (RMON) MIB is used by network managers to monitor remote devices. An RMON implementation consists of a software probe that continually collects statistics about a LAN and a management station that communicates with the probe. The probe transfers information to the management station on request or when a predefined threshold is crossed.
The hub supports four RMON groups (Table 2-1) as defined in RFC 1757. Default statistic rows are created for each port when you start the hub. You can obtain information about the four supported groups by using any SNMP management application.
| Group Name | Description |
|---|---|
This group collects traffic and error statistics for a specific interface. For example, you could use this group to determine how many error packets have been seen on a given port. Statistics from this group can be used by the history group to record historical views of network performance. A statistics row is established by default for each hub port. | |
This group periodically samples the counters generated by the statistics group. This information can be used to establish baseline information regarding network activity. You can define the intervals you want to record information for, and you can define how many of the samples are to be stored. Note RMON statistics gathering has a maximum limit of 50 history buckets per historyControlTable entry. | |
This group generates alarms according to user-defined thresholds. You could, for example, configure RMON to generate an alarm when alignment errors on a port exceeded a predefined limit. Rising and falling thresholds can be defined, and the events group can generate traps and automated responses based on the alarms. | |
This group sends traps to the management station based on information (alarms) received from the alarm group. |
Now that you have installed the hub and, if you have a managed hub, assigned IP information to the hub, continue to "Configuring and Monitoring from the Hub Manager," for configuration and monitoring information.
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Tue Jul 18 10:58:47 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.