Cisco Systems PA-T3 Network Card User Manual


 
CHAPTER
Configuring the PA-T3 Interfaces 8-1
8
Configuring the PA-T3 Interfaces
To continue your PA-T3 port adapter installation, you must configure the PA-T3 interfaces. The
instructions that follow apply to all supported platforms. Minor differences between the platforms
are noted. This chapter contains the following sections:
Using the EXEC Command Interpreter, page 8-2
Identifying Port Adapter Slot and T3 Interface Port Numbers, page 8-2
Shutting Down an Interface, page 8-7
Performing a Basic Configuration, page 8-10
Configuration Example, page 8-11
Customizing the PA-T3 Serial Port Adapter, page 8-12
Configuring Cyclic Redundancy Checks, page 8-13
Checking the Configuration, page 8-14
If you installed a new PA-T3 port adapter or if you want to change the configuration of an existing
interface, youmust enter configuration modeusing the configure command. Ifyou replaced a PA-T3
port adapter that was previously configured, the system recognizes the new PA-T3 port adapter
interfaces and brings each of them up in their existing configuration.
After you verify that the new PA-T3 port adapter is installed correctly (the enabled LED goes on),
use the privileged-level configure command to configure the new interfaces. Be prepared with the
information you need, such as the following:
Protocols you plan to route on each new interface
IP addresses if you will configure the interfaces for IP routing
Use of bridging on the new interfaces
Timing source for each new interface and clock speeds for external timing
For a summary of the configuration options available and instructions for configuring interfaces on
the PA-T3 port adapter, refer to the appropriate configuration publications listed in the “Related
Documentation” section on page vi.
Configuration commands are executed from the privileged level of the EXEC command interpreter,
which usually requires password access. Contact your system administrator, if necessary, to obtain
access. (See the “Using the EXEC Command Interpreter” section on page 8-2 for an explanation of
the privileged level of the EXEC.)