3COMLOGO1ds.jpg (2172 bytes)
3C015

Installation and Configuration Instructions for 3Com DynamicAccess® Software, Version 1.5

12/16/98

   Click any of
    the topics
Product Overview

  System Requirements for DynamicAccess Software
  Special Considerations for Installing DynamicAccess Software Version 1.5
  What Is Included in the DynamicAccess Software Version 1.5  

Installation Overview

  Choosing an Installation Method 
  Setting a dRMON Password 
  Upgrading to Version 1.5.4a

Installing DynamicAccess Software

Configuring DynamicAccess Software

  Using the 3Com DynamicAccess Control Panel Utility
  Enabling Fast IP
  Setting Up Traffic Prioritization and IP Precedence (ToS)
  Using Scheduling Options 
  Setting Administration Options 

Distributing DynamicAccess Software Throughout Your Network

Using Login Scripts to Install from a Central Server
Waking Up the Tivoli Management Agent

Removing DynamicAccess Software

  From Computers Running Windows NT
  From Computers Running Windows 95  

Tech Tips

Technical Support

info1.gif (941 bytes)
These instructions are intended for network administrators who have experience installing software and using management tools for an Ethernet network.
This software release is version 1.5.4a and the following changes were made:
  • The installation process checks for the presence of Microsoft TCP/IP hotfix on multiprocessor PCs NT 4 Service Pack 4.  This hotfix is required if you want to install DynamicAccess software on a multiprocessor PC.  Click here for details.
  • The instructions on waking up the Tivoli Management Agent (TMA) have been updated.   If you want to use the TMA at your site, obtain the latest files at the following 3Com web site:
    www.3com.com/dynamicaccess/hotfixes

In the software release 1.5.2, the following changes were made:

  • DynamicAccess software now works on Windows 98.
  • The installation process now runs more smoothly.

In the software release 1.5.1, the following changes were made:

  • By default, GMRP and GVRP are now OFF.
  • If you use login scripts to distribute DynamicAccess software, run KEYSET.EXE after you run DA15CFG.EXE.
  • In Windows NT 4.0, DynamicAccess software and the 3Com DMI agent can coexist.
  • The list of applications in the Traffic Prioritization tab have been alphabetized.
  • Some of the Traffic Prioritization values have been updated to reflect the current IETF RFC.
  • Fixed potential reporting inaccuracies in the dRMON software.
  • A password must be used if you plan to use the dRMON software.
  • The folder to which DynamicAccess software expands is now 3COMDA15.

 


yellowalert.gif (1026 bytes) 
To avoid multiprocessor system failure with Windows NT 4.0 Service Pack 4: You must install a Microsoft TCP/IP hotfix patch and reboot the PC before installing DynamicAccess software version 1.5 on the multiprocessor PC.  If this hotfix is not present when start the installation of DynamicAccess software version 1.5, the setup program aborts.

If you install DynamicAccess software version 1.5 and then upgrade to Service Pack 4, you must install the patch before you reboot the system.

A link to the Microsoft TCP/IP hotfix patch is available at the following 3Com web site:

www.3com.com/dynamicaccesss/hotfixes

The following procedures describe extracting the 3Com® DynamicAccess® software release 1.5 on a PC running Windows 95 or Windows NT.  To extract the DynamicAccess software files:

  1. Copy the DA15SW4.EXE file to a subdirectory on your hard drive from the 3Com Web site or the floppy disk.
  2. Double-click the DA15SW4.EXE file.  The unzipped files expand into the following directory and subdirectories:

    3COMDA15, with the subdirectories:

Follow these instructions to install your DynamicAccess software.

System Requirements for DynamicAccess Software

These client requirements are the minimum suggested for running DynamicAccess software version 1.5. 

Additional requirements for your network or end nodes according to the DynamicAccess software features you want to implement are outlined in this table.

DynamicAccess Focus Feature Standards Network Requirements NIC Requirements Protocol
Requirements
Client dRMON RMON For the Edge Monitor: Windows NT Workstation or Server, version 3.51 or 4.0 with proper Service Packs 3Com Ethernet/Fast Ethernet NICs None
General network



Fast IP NHRP, 802.1p/Q Layer 2 switched path between end nodes on separate subnets, with central router between IP subnets At least NDIS 3-compliant Ethernet/Fast Ethernet NICs TCP/IP
Traffic Prioritization 802.1p,
PACE RFC,
IP ToS
IEEE 802.1p or switches enabled with PACEtechnology
3Com Ethernet/Fast Ethernet NICs IP or IPX
Efficient Multicast Control 802.1p,
GMRP
IEEE 802.1p GMRP switches
At least NDIS 3-compliant Ethernet/Fast Ethernet NICs None


For maximum performance and reliability when you run DynamicAccess software, 3Com strongly recommends that the latest Microsoft Service Pack for that operating system be installed on any computer on which you plan to install DynamicAccess software.  The Service Pack levels that were current at the time of product release are as follows:

3Com recommends that as a minimum, you have installed the Service Pack levels listed above on your computers.

To determine whether you have Windows 95 OSR2 or Windows 95 with Service Pack 1, right-click the My Computer icon and select Properties.  In the General tab, the notation 4.00.950 B indicates that the OSR2 release of Windows 95 is installed.  The notation 4.00.950a indicates that Service Pack 1 for Windows 95 is installed.

To determine the Service Pack level for Windows NT, check the displayed Service Pack level on the boot screen. Or, open the Control Panel and select About Windows NT from the Help menu.

Check Microsoft’s World Wide Web page for the most current Service Pack at http://www.microsoft.com.

Special Considerations for Installing DynamicAccess Software Version 1.5 

ATM Environments

DynamicAccess software version 1.5 does not bind to ATM NICs even though they emulate Ethernet.  If you have a PC with an ATM NIC and an Ethernet NIC, DynamicAccess software binds only to the Ethernet NIC.

Intermediate Drivers

If a PC already has an intermediate driver installed, the DynamicAccess installation software detects its presence and aborts the installation process.  The following message is displayed:

Intermediate.gif (3346 bytes)

Dial-Up Adapter

DynamicAccess software version 1.5 does not bind to the Microsoft Dial-up Adapter, if present in the Network Control Panel icon.  Only physical adapters can have the DynamicAccess software bindings.

Windows 98

When upgrading a PC to Windows 98 from OSR2 or Windows 95 and DynamicAccess software has already been installed, 3Com recommends that you first remove the DynamicAccess software, complete the upgrade, and then reinstall the DynamicAccess software.

Using DMI agents on Windows NT 3.51

DynamicAccess software installs properly on a PC with Windows NT 3.51 that already has a DMI agent installed.  However, when activated, the DMI agent posts a Dr. Watson error that sites the LAN_AC32.EXE file and previously seen NIC attributes are no longer visible in the management console.  Be sure to go to 3Com's Web site to find DMI agent updates if you use or plan to use DMI agents at http://www.3com.com/managedPC


What Is Included in DynamicAccess Software 1.5

DynamicAccess software adds intelligence to 3Com and some non-3Com NICs for improved performance, management, and control of your network.  DynamicAccess software 1.5 is a single piece of software, or an "advanced network driver,"  that integrates dRMON, Fast IP, Traffic Prioritization, and Efficient Multicast Control support.  The DynamicAccess software release 1.5 components are:

Feature Benefit
Distributed RMON (dRMON) Enables full RMON reporting on all network segments, even in switched networks, without sacrificing performance and without needing to place dedicated RMON probes throughout the network. 
Traffic Prioritization
(using IEEE 802.1p Class of Service [CoS],  IP Type of Service [ToS] and PACE technology)
Provides a standards-based solution, preventing delays in transmissions of mission-critical or real-time traffic.  Also extends this capability to the WAN.
Fast IP
(NHRP-based shortcut routing) 
Alleviates router bottlenecks in today's any-to-any networks and intranets, where a growing percentage of traffic travels between rather than within subnets.
Efficient Multicast Control
(using IEEE 802.1p GMRP)
Prevents flooding of switched networks by multicast applications such as video training, stock quotes, or online news.

Tivoli Management Agent Provides central update and control capabilities transparent to the user, significantly reducing administration costs.  3Com has partnered with Tivoli Systems Inc. to deliver a simple, low-cost DynamicAccess software distribution application [summer 1998].

For non-technical questions or comments about the DynamicAccess software version 1.5 product, please send e-mail to: 
DA_Feedback@3com.com.

Installation Overview

The installation for DynamicAccess software checks for the presence of other DynamicAccess software that you may have previously installed on the end node.  If you have installed DynamicAccess software version 1.2 (Fast IP) or the dRMON SmartAgent® software, the installation procedure updates those modules and installs new features.  

info1.gif (941 bytes) DynamicAccess software version 1.5 does not bind to the Microsoft Dial-up Adapter, if present in the Network Control Panel icon.  Only physical adapters can have the DynamicAccess software bindings.

The basic tasks required to install the software are:

Choosing an Installation Method

The DynamicAccess software installation process can be done at each end node or it can be done from a central location, eliminating the need to touch end node PCs.  The DynamicAccess software must first be installed, and if you want to use settings other than the defaults, the software must also be configured.  

The installation methods are:

Regardless of the method you choose to deploy DynamicAccess software, you need to expand the software file, run the installation software on an initial PC (for example, one of your administrative PCs), set the configuration options that you want for your network, and prepare the files for distribution.  This initial installation and configuration process is the same one you would use for a local node installation. 

Setting a dRMON Password

To promote secure monitoring with dRMON, you must set a password for the dRMON DynamicAccess software.  If you plan to implement the dRMON Edge Monitor System or have already done so at your site, you should have your password for the dRMON SmartAgent software recorded in a safe place.  If you do not choose to set a password, the end node PCs will not communicate with the Edge Monitor.


yellowalert.gif (1026 bytes) 
Do not install the DynamicAccess software version 1.5 on the PC where you installed or plan to install the Edge Monitor.  The data reported by the Edge Monitor will be inaccurate because it will track its own traffic statistics twice. 

To set the password for secure monitoring with the dRMON Edge Monitor System using the DynamicAccess software:

  1. Expand the files you downloaded from 3Com.
  2. Run the KEYGEN.EXE file to set a dRMON password, if you already have implemented or plan to implement this feature.
    The KEYGEN.EXE file encodes the password into the KEYSET.EXE file.

    Setk.bmp (53334 bytes)

  3. Enter your password in the dialog box.
    Record your dRMON Edge Monitor System password in a safe place.
  4. Click OK.
  5. Be sure to insert the KEYSET.EXE file in the login script and run it before you run the DA15CFG.EXE file.

    Upon completion, the KEYSET.EXE file asks you to reboot. 

If you mistype the password, you can correct it and run the KEYSET.EXE file again from the login script if the end nodes have not been discovered by an Edge Monitor.  If the end nodes have been adopted by an Edge Monitor, you can pause the Edge Monitor while you run the KEYSET.EXE file again from a login script to set the correct password.

info1.gif (941 bytes)  If you install DynamicAccess software on a PC running Windows NT Server, the dRMON software that collects statistics is in a paused state.  To activate the dRMON collection, change the value of the following registry REG_DWORD from 0 to 1 with Regedit:

HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\DAPassThru<n>\Parameters\
      dRMONEnabled

where <n> is the instance of the virtual NIC.

KEYSET.EXE only works with the DynamicAccess software, not with the dRMON SmartAgent software that you find on the Edge Monitor System product CD.

Upgrading to Version 1.5.4a

If you have previously distributed and configured a prior version of DynamicAccess software throughout your network, and you want to upgrade to version 1.5.4a, please observe the two tasks below. Although you are already familiar with the basic installation process:


Installing DynamicAccess Software

To begin the installation of the DynamicAccess software, double-click the DA15INST.EXE file.  You will see the following screens.  During the distribution and installation process on each PC, the user also sees the same process.

1dainst.jpg (34334 bytes)

Because the DynamicAccess software installation causes the network protocol bindings to be reprocessed, the Bindings Status dialog box flashes until the process is complete.

If the PC is running Windows NT and neither you nor the user is logged on as a local administrator, the following message appears.

Notice.gif (4378 bytes)

Log out and log on with local administrator rights to complete the installation.

When the installation is complete, you are asked to reboot.

reboot.gif (3212 bytes)

Click OK.

You may be prompted to reboot more than once for the networking settings to apply properly.  Follow the prompts to reboot.

After the DynamicAccess software is installed, the following changes are visible in the Network dialog box. 


Configuring DynamicAccess Software with the 3Com DynamicAccess Control Panel Utility

When you run the DA15INST.EXE file, the 3Com DynamicAccess Control Panel utility is installed as an icon in the Windows Control Panel.

controlpanel1.gif (5424 bytes)

Use this utility to set the DynamicAccess software options for the end nodes.  You can configure DynamicAccess software settings two ways:

The 3Com DynamicAccess software Control Panel utility can be run locally unless you, the network administrator, disallow this capability.  Local use of the utility can be prevented through a login script by changing the default Read/Write access setting to Read Only, using the .INI file you create and save with the DynamicAccess software utility. 

If you have already set access to the DynamicAccess Control Panel utility to Read Only on a PC and you need to temporarily enable READ WRITE access to this utility, you can use the DA15CFG.EXE file found in the <WINDOWS>\SYSTEM directory.  In a DOS window, enter:

DA15CFG.EXE -READWRITE

The 3Com DynamicAccess Control Panel utility can then be used to alter any setting.

To change access back to Read Only after you have modified some of the settings, in a DOS window, enter:

DA15CFG.EXE -READONLY

Using the 3Com DynamicAccess Control Panel Utility

Double-click the 3Com DynamicAccess Software icon to open the utility.

3Com_DAicon.gif (1872 bytes)

If you have more than one 3Com or non-3Com NIC in the PC, the DynamicAccess Control Panel utility configures NIC-specific parameters for the selected NIC only.  All DynamicAccess software parameters can be set or modified remotely by running DA15CFG.EXE with an .INI file in a login script.  Any settings specified through login scripts apply to all NICs in the PC, depending on the feature's requirements.

If there are multiple NICs in the end node PC when you open the 3Com DynamicAccess Control Panel utility, you can select which NIC to configure for the DynamicAccess software settings from the list in the Select Adapter dialog box.

selectNIC.gif (7932 bytes)

DynamicAccess software parameters are described in the next sections.

Setting Up Traffic Prioritization and IP Precedence (ToS)

DynamicAccess software supports the emerging IEEE 802.1p/Q standard to provide Traffic Prioritization over Ethernet networks.  The 802.1p standard allows up to eight levels of priority to be defined according to business needs.  This is accomplished by looking in the packet at the specific IP port number of the application to be prioritized and applying the proper classification tag.

yellowalert.gif (1026 bytes) 



yellowalert.gif (1026 bytes)

When implementing 802.1p-based features (i.e., 802.1p Traffic Prioritization, 802.1p GMRP for Multicast Control, 802.1Q for VLAN ID and/or GVRP VLAN registration), 3Com strongly recommends that you ensure that switches in the network are also properly configured to support these features.  Failure to do so may result in a loss of connectivity between end systems.  When using multicast-based applications, check the Prioritize Multicast Traffic option.

If you have end nodes without DynamicAccess software installed that communicate with other DynamicAccess software end nodes which use Traffic Prioritization and IPX, you need to place an 802.1Q-aware switch which is configured to remove 802.1Q tags in front of the non-DynamicAccess software nodes.  Otherwise, you will lose connectivity between the two groups.

The DynamicAccess Control Panel utility has an editable table that defines how applications are prioritized.  Prioritization can ease bottlenecks in your network and allow critical applications to have network precedence.  The Traffic Prioritization tab of the DynamicAccess Control Panel utility appears when you double-click the 3Com DynamicAccess Software icon.

trafficprior.gif (9361 bytes)

Some common applications and their priority assignments in terms of protocol (IPX, TCP, UDP), port/socket range, and suggested priority are already set for you in the Control Panel utility.  The On/Off button enables or disables the prioritization of the selected application for your network.  The enabled applications are denoted by the X in the On column.  You can enable up to 32 applications per protocol for a total of 96 applications.  To add any application that you use at your site, click the Add button. 

When you click the Add button, the following dialog box appears for you to create a definition for the application you want to add.  Insert the name of your application, specify the protocol it uses, enter the port or socket range in decimal format, and assign it a class of service priority.  If you need to change any information about an application you have already added, select the application and click Edit to open this dialog box.

Appadd.gif (4611 bytes)

Some applications support multiple protocols and use different port or socket ranges for each protocol.  If the application in question uses multiple protocols, you must create a definition for each protocol.  The range and protocol must match those on your network.  For example, if TCP/IP is installed on your network, do not enter the socket range for the IPX protocol.  Use the range for TCP/IP.  If you inadvertently enter the wrong port values or protocol, whatever application is operating at that port range will be prioritized, not the application you intended. 

Note:  Be sure that you enter the port range that corresponds to the specified protocol.

Traffic prioritization operates by watching the packets that are sent through a specified port range. If you add multiple applications that are on the same protocol and port range, you must specify the same priority for that group of applications. If you try to specify a different priority for one of those applications, only the priority specified first is used. For example, if you define the following:

Application Protocol Port/Socket Range Class of Service
Application 1

TCP

80

Network Critical

Application 2

TCP

80

Standard

Application 2 will not be prioritized as defined, but is prioritized according to the definition for Application 1.

For additional information about port ranges, click any of the links below.

http://www.isi.edu/in-notes/iana/assignments/port-numbers  

http://www.con.wesleyan.edu/~triemer/network/regports.html

http://www.chebucto.ns.ca/~rakerman/port-table.html

http://developer.novell.com/engsup/sample/tids/dsoc1a/dsoc1a.htm

http://developer.novell.com/engsup/sample/tids/dsoc1b/dsoc1b.htm

When you click the Advanced button, the Advanced dialog box of the Traffic Prioritization tab appears.  In the Advanced panel, you can set options globally and define your own classes for Class of Service support.  The Priority Support check box allows you to enable or disable global support for the service specified by the additional check boxes.  If the Priority Support check box is not selected, none of the classes associated with PACE, the IEEE 802.1p/Q standard for switches, nor the IP Type of Service is enabled.  If any of the boxes are checked, then that service is enabled.

trafadvanced.gif (12421 bytes)

In the Predefined Class of Service list, the highest priority is Network Critical which has a value of 7. 

The following classes are the default Class of Service options available to use for classifying applications from the DynamicAccess Control Panel utility:


Class of Service
IP Precedence IP Type of Service 802.1p/Q Priority

PACE Enabled?

Value

Default

Value

Default

Value Default
Network Critical 7 Enabled 14 Enabled 7 Enabled Yes
Interactive Voice 6 Enabled 10 Enabled 6 Enabled Yes
Interactive Multimedia 5 Enabled 14 Enabled 5 Enabled Yes
Streaming Multimedia 4 Enabled 4 Enabled 4 Enabled Yes
Business Critical 3 Enabled 6 Enabled 3 Enabled No
Background 2 Enabled 1 Enabled 2 Enabled No
Best Effort 1 Enabled 1 Enabled 1 Enabled No
Standard 0 Disabled 1* Enabled 0 Disabled No
OFF No Disabled No Disabled No Disabled No

For ToS, the value of 1 means that packets are sent with minimum monetary costs.

The Default value of Enabled or Disabled for 802.1p means "tagged" or "not tagged."  The Default value of Enabled for IP ToS means the priority in the IP header is changed.  If the Type of Service is disabled, no changes are made to the IP header.  These predefined classes cannot be edited. 

You can add a new class, or edit or delete any selected item in the user-defined list of classes.  Click the Add button, or double-click the item to open the User-Defined Class of Service (Add/Edit) dialog box.

Classadd.gif (6899 bytes)

This dialog box allows you to define a class specific to your needs for your network.  The Internet Engineering Task Force (IETF) is still considering the practical interpretation of the IP Type of Service (ToS) values.  (For details, refer to IETF RFC 791 "Internet Protocol, DARPA Internet Program Protocol Specification," Sept. 1981, and RFC 1349 "Type of Service in the Internet Protocol Suite," P. Almqist, July 1992.)  Therefore, if the values you specify here need changing, you can always edit them.  The Traffic Prioritization, or 802.1p/Q, support and priority are also assigned when you define new classes. 

You can specify the settings for various scheduling options and Fast IP independently using the two associated dialog boxes. 

Using Scheduling Options

To open the Scheduling Options dialog box, click the Scheduling Options button in the Traffic Prioritization (Advanced) dialog box.

schedopt.gif (3129 bytes)

The following advanced values can be modified to regulate traffic on the network.

Option Range Default Function
FIFO Packet Threshold
1-255 5 Controls the number of low-priority packets that the network driver allows in the FIFO ahead of PACE packets.  A smaller number decreases the time between PACE packets, thus improving high-priority traffic performance and simultaneously decreasing low-priority traffic performance.  The recommended setting is 5.
Concurrent UDP Streams 64 16 Controls the number of simultaneous multimedia UDP packet streams that the network driver can handle at any given time. For many applications, the number of UDP streams is the same as the number of connections.

For example, a videoconference with three people at three different sites uses three concurrent UDP streams for the video data.  The concurrent UDP streams setting must be a power of 2 (2, 4, 8, 16, and so forth), but the optimal value varies depending on your PC and the application that you are running.

Although a video server can support up to 32 connections, a client may only want to conference with four other people at a time.

Any changes to this setting take effect after rebooting.  The recommended setting is 16.

Low-Priority Ratio 1-255 25 When traffic prioritization support is enabled, high-priority packets are always transmitted before low-priority packets.  If a high-priority application sends out a sufficiently high number of high-priority packets, low-priority packets may not be sent.

To prevent this problem, the driver uses a ratio setting to periodically send out a low-priority packet (if one is waiting to be sent).  For example, if a value of 20 is entered, one low-priority packet would be sent for every 20 high-priority packets.  The recommended setting is 25.
PACE Natural Packet Interval 30-300 180 To communicate packet priority to interconnect devices (repeaters, switches, and the like), the PACE driver slightly modifies the Ethernet packet.  Because of this, connection problems may result when these modified packets are sent out for long periods during which no low-priority packets are sent.  To get around this problem, the driver can be configured to send out an unaltered, natural packet periodically.  The recommended setting is 180 seconds.

 

Enabling Fast IP

The default setting for Fast IP is Off.  Fast IP settings are installed with default values.  When Fast IP is turned on, the defaults apply.  You enable Fast IP using the 3Com DynamicAccess Control Panel utility.  Other advanced parameters, such as the number of packets before initiating a Fast IP cut-through request and aging time for the cache table, are also set using this Fast IP tab.

Fast IP technology relies upon the concept of "open" VLANs. Open VLANs allow communication between VLANs.  If the switches in the network have been configured to implement "closed" VLANs where communication between VLANs is not allowed, Fast IP will not function and the normal routed path will be used.  A network that has both open and closed VLANs can experience problems, such as a loss of connectivity. To avoid this problem, refer to the switch product documentation or consult your switch vendor(s) to ensure the switch supports open VLANs. If you must have a mixed switch environment, Fast IP should be disabled.



Enter the values in decimal format.

Fast IP Settings Default Range Function
Enabled Off N/A Turns Fast IP on or off.
Lease Time 300 0 -  4294967294
or 0xFFFFFFFE
Sets the period in seconds that a Fast IP cut-through remains functioning once established, specified in decimal format. 
Cut-through Threshold 5 0 -  4294967294
or 0xFFFFFFFE
Sets the number of packets allowed to travel before a Fast IP cut-through is created, specified in decimal format.

Setting Administration Options

The settings available in the Administration tab are unlikely to change frequently once you have established using DynamicAccess software on your network.  The additional networking settings are VLAN Tagging and Efficient Multicast enablement.

Efficient Multicast

Efficient Multicast is used to relieve network congestion that arises when large amounts of multicast traffic exist.  Many distance learning, collaborative computing, and desktop video-conferencing applications use multicasts to convey data.

Efficient Multicast allows NICs to work with switches that comply with the IEEE 802.1p Group Multicast Registration Protocol (GMRP) specification, so that the NICs can register for multicast group membership.  This membership means that multicast traffic can be filtered to only those segments that need to be part of the multicast group.  In order for Efficient Multicast to operate correctly, your network must incorporate switches that comply with the IEEE 802.1p (GMRP) standard.  If a particular switch does not understand GMRP, it simply treats the packet like any other and no side effects occur.

GMRP is disabled by default. 3Com recommends you verify your switches' capabilities and that their configuration is set up for GMRP.

adminops.gif (8837 bytes)

VLAN Registration (Group VLAN Registration Protocol [GVRP])

VLAN (Virtual LAN) Registration is very similar to Efficient Multicast.  Instead of registering for multicast traffic, VLAN registration enables the end node to tell the 802.1Q-aware switch which VLAN traffic to send to the end node.

For VLAN Registration to operate correctly, your network must incorporate 802.1Q-compliant switches.  GVRP is disabled be default.  3Com recommends you verify your switches' capabilities and that their configuration is set up for GVRP.

Default VLAN Tag

If your network has VLANs enabled and requires that a particular end node should have a VLAN tag in its network traffic, select the Enabled check box to enable the tag.  Specify the tag in the Default Tag field in decimal format within the range of 0 - 4095.  If VLAN tagging is enabled, all traffic from this end node has an 802.1Q tag. The default tag value is 1.

Prioritize Multicast Traffic

Select this box if you want to assign priority to all your multicast traffic.  If you experience any connectivity problems after selecting this feature, one or more of your 802.1p/Q switches may be misconfigured. 

Setting Control Panel Access

The 3Com DynamicAccess software Control Panel utility can be run locally if the Local Read/Write Access button is selected.  If the Local Read Only button is selected, none of the settings in the utility can be changed.  As network administrator you can disallow any changes by setting access setting to Read Only when you save .INI file you create and save with the DynamicAccess software utility. 

Saving Settings to a .INI File

After you have established the Traffic Prioritization and other settings, you can save those settings, and any additional ones you set in the Administration tab, to a file that you specify by selecting the Create DynamicAccess Software .INI file check box in the Apply Changes To area.  This file, which has an .INI file format, is used with DA15CFG.EXE to pass those site-specific settings to the end node PCs in your network through a login script or if DA15CFG.EXE is run locally. 

yellowalert.gif (1026 bytes)  Do not edit the .INI file directly to avoid inserting syntax errors that may prevent the file from being used properly. 

If you want to apply your changes to your local PC, select the Local System (write to registry) check box.  You can have either or both check boxes selected.

info1.gif (941 bytes)  Be sure to leave the Local System (write to registry) check box CLEAR if you just want to create the .INI file and not change the local settings.  You may inadvertently lock yourself out of the Control Panel utility if you have applied Local Read Only Access.  If you need to enable the 3Com Control Panel utility again, click here for instructions.

If you have established the DynamicAccess software settings for Traffic Prioritization and Fast IP and now, from your network administrative PC, you want to finalize the settings that will be distributed across your network, 3Com recommends you restrict access to the 3Com DynamicAccess Control Panel utility on the local end nodes by clicking the Local Read Only Access button before you export your settings to YOURFILE.INI.

Apply Changes Locally

To apply the new configuration settings to the local PC you are working on, select the Local System check box. 


Distributing DynamicAccess Software Throughout Your Network

The DynamicAccess software installation program detects whether you have previously installed any DynamicAccess software or the dRMON SmartAgent software on a PC.  If previous software versions are detected, the installation program removes them and then installs version 1.5.  Because the installation program checks for the presence of the current DynamicAccess software, any subsequent time end users log on to the network, the installation program does not reinstall DynamicAccess software.

Any configuration settings that you distribute through the login script by running DA15CFG.EXE take precedence over any settings that may be specified locally at the end node.  Therefore, you should not leave the installation and configuration files in your login script files any longer than you need to be satisfied that each end node has completed the installation. 

info1.gif (941 bytes)  When you run the DynamicAccess installation files from a login script on end node PCs running Windows NT 3.51, 3Com suggests you ensure that the login script is run synchronously. 

NTlogsync.gif (7362 bytes)

Using Login Scripts to Install from a Central Server

For NetWare, use the NetAdmin tool to modify a login script to include the DynamicAccess files.

  1. Copy the DA15INST.EXE file from the directory where you expanded the download file from 3Com on your initial PC to the root level of the volume SYS in the NetWare server.  This root level will be mapped to a drive X.
  2. Copy the DA15CFG.EXE file from the <Windows>/system directory of your initial PC to the same location on the NetWare server.
  3. Start NetAdmin.
  4. From the NetAdmin options, select Manage objects.
  5. Select the NetWare server that contains the login scripts you want to modify.
  6. From Actions, select View of edit properties....
  7. Modify the login script by adding:

    ;MAP a drive letter to the path where you have placed the executable

    MAP DRIVE:=SERVER/Volume:Path

    IF OS="Win95" or OS="WINNT" THEN
       #DRIVE:DA15INST.EXE
       #DRIVE:DA15CFG.EXE -F <full path>YOURFILE.INI
      #DRIVE:KEYSET.EXE

    ENDIF

    where the explicit path to YOURFILE.INI file is stated.  The DA15INST.EXE file is required for installation and DA15CFG.EXE with the .INI file is required for configuration.  Use KEYSET.EXE if you want to set a dRMON password.  The user is prompted to reboot after KEYSET.EXE has finished running.
  8. Inform your user community about the changes you are making that they will see when they log in to your network.  You could use the suggested Administrative Bulletin included with these instructions.

For Windows NT networks, add a batch file that contains the following lines, with the .INI file you created with the DynamicAccess software Control Panel utility.   Use the "User Manager for Domain" to add this batch file to the login script.

PATH=%windir%\system;%windir%\system32
da15cfg.exe -F
<full path> YOURFILE.INI

Using a Self-extracting Executable from Your Intranet

You can have your users copy and run the DA15INST.EXE file themselves on their PCs.  In this case, the basic installation instructions you can give to your users are as follows:

  1. Copy the DA15INST.EXE and the YOURFILE.INI files to your hard drive from <your preferred server>.
  2. If you are running Windows NT on your PC, you must be logged in to your PC as a local administrator.
  3. Double-click the DA15INST.EXE file to install the DynamicAccess software. 
  4. Follow the prompts and reboot your PC.
  5. Run the DA15CFG.EXE file with the YOURFILE.INI file to obtain the settings preferred for our network by entering, in a DOS window:

    PATH:DA15CFG.EXE -F YOURFILE.INI
  6. If you use the dRMON Edge Monitor System, run the KEYSET.EXE file in a DOS window.  
  7. Follow the prompts and reboot your PC. 

Be sure to inform your users about the benefits of the upgraded networking software.  You could use the suggested Administrative Bulletin included with these instructions.

Waking Up the Tivoli LCF Agent

When you install the DynamicAccess software, an endpoint agent, called the LCF endpoint, from Tivoli, Inc. is copied to the end node PC in the directory: c:\tivoli\lcf.   These files include the actual code (lcfd, the daemon code), and the libraries needed for the LCF endpoint.  Click here for instructions.


Removing DynamicAccess Software

If you need to remove the DynamicAccess software from a PC, the process that you use depends on the operating system.  If you have more than one NIC in the PC, additional considerations apply.  The PC must be restarted for the changes to take effect. 

From Computers Running Windows NT

For Windows NT, you:

  1. Open the Network icon in the Control Panel.
  2. Click the Protocol tab.
  3. Select the DAPassThru Driver Transport and click Remove.

From Computers Running Windows 95

For Windows 95, you have two methods.  The first method uses the Start button.

  1. From the Start button menu, click Run.
  2. Enter the filename DAW95RMV.EXE and click OK.
  3. Reboot the PC when prompted .

The file named DAW95RMV.EXE is in the <Windows>\System directory.

The second method uses the Add/Remove Programs icon in the Control Panel.

  1. Open the Add/Remove Programs icon in the Control Panel.

    removeDA95.gif (13801 bytes)

  2. Select the DynamicAccess Software entry and click Remove.
  3. Reboot the PC when prompted .

yellowalert.gif (1026 bytes) 
In Windows 95, if the 3Com DynamicAccess Control Panel utility is set to Read Only, you cannot remove the DynamicAccess software.  You must change the access to Read Write and then remove DynamicAccess software. 

When you have DynamicAccess software installed on more than one NIC in a PC, use either of the above methods for removing DynamicAccess software.

If you attempt an improper removal and network connections appear to be broken, you must run DAW95RMV.EXE to complete the clean up.  After you run DAW95RMV.EXE, you can reinstall DynamicAccess software.

yellowalert.gif (1026 bytes)
 
Your network connections will break if you select the DA Transport protocols from either the Virtual NIC or the real NIC and click Remove.

You must run DAW95RMV.EXE to complete the clean up.

Tech Tips

At the time of product release, 3Com compiled the following recommendations for specific circumstances when you use DynamicAccess software. 

crosstipsm.jpg (936 bytes)  If you need to update your NIC driver any time after you have DynamicAccess software installed, be sure to restart the PC, even if you do not see a prompt to reboot.  The DynamicAccess software will restore your DynamicAccess software settings to the new driver upon rebooting.
crosstipsm.jpg (936 bytes)  If you have installed DynamicAccess software on a PC running Windows NT and you add the TCP/IP protocol, you need to configure the real NIC with the IP address and other settings, not the DynamicAccess software virtual NIC.

Because Windows NT requires IP settings for each NIC before closing the Network dialog box, enter "dummy" values for the DynamicAccess software virtual NIC.  Upon closing the Network dialog box, the DynamicAccess software will restore all bindings and use the IP settings you specified for the real NIC.

crosstipsm.jpg (936 bytes)  If you use the dRMON Edge Monitor System with DynamicAccess software version 1.5, remember that the dRMON client software only collects data from the first 3Com NIC in the PC.

If you want to have the dRMON client software collect data from a different NIC in that PC, you need to move that NIC to be the first 3Com NIC visible in the Network dialog box.  

crosstipsm.jpg (936 bytes)  Click here for a detailed description about understanding IP port ranges.
crosstipsm.jpg (936 bytes)  If you use a 3C509 EtherLink III NIC in a 233-MHz Pentium ALR® Optima 2 system running Windows NT, 3Com recommends that you disable Plug-and-Play (PnP) mode on the NIC if you see a message that the adapter did not start after you install DynamicAccess software.

Use the DOS window and the EtherDisk to disable PnP.   Insert the EtherDisk into the floppy drive (for example, drive A:).

At the DOS prompt, enter

PNPDSABLE.BAT

When the batch file is finished, restart your PC and verify your network connections.

crosstipsm.jpg (936 bytes)  If you plan to use a 3C589A EtherLink III LAN PC Card NIC with the dRMON software module, please contact 3Com Technical Support for details.
crosstipsm.jpg (936 bytes)  If you add an additional NIC to a PC running Windows NT and Internet Information Server (IIS) version 3.0 and DynamicAccess software is installed, the operating system prompts you to reboot.  If you click Yes, and the PC reboots, IIS may not start automatically.  You need to reboot one more time to restart IIS.  

Technical Support

3Com offers technical support for DynamicAccess software version 1.5 by telephone or online on the 3Com Web site.

Support for 3Com NICs

Technical support is available to customers using DynamicAccess software version 1.5 on 3Com NICs by calling 1-800-NET-3COM (800-876-3266) option 3, option 2.

Support for non-3Com NICs

DynamicAccess software version 1.5 has been tested on the following non-3Com NICs: Intel, Adaptec, and SMC.  DynamicAccess software version 1.5 can be used on non-3Com NICs according to the list of available features. 

In the United States, technical support is available to customers using DynamicAccess software version 1.5 on non-3Com NICs by calling 1-800-NET-3COM (800-876-3266) option 2, option 7.  Enter access number 205930 for time and materials.  Hours are from 6:00 a.m. to 5:00 p.m. PST.  Charges are $150.00 per hour with a 30-minute minimum.  Payable by MasterCard or Visa.

Support is available in APR and Europe via e-mail and is on a best-effort basis.

For support in APR (except Japan), send e-mail to: APR_Technical_Support@3Com.com.

For support in Japan, send e-mail to: APR_Technical_Support@JP.3Com.com.

For support in Europe, send e-mail to: European_Technical_Support@3com.com.

Online Support

3Com also recommends that you check the corporate Web site periodically for FAQ's and updates for your software at:

http://support.3com.com/index.htm

For non-technical questions or comments about the DynamicAccess software version 1.5 product, please send e-mail to: 
DA_Feedback@3com.com .


Copyright ©1998, 3Com Corporation.
Unless otherwise indicated, 3Com registered trademarks are registered in the United States and may or may not be registered in other countries. 3Com, DynamicAccess, EtherDisk, EtherLink, LinkBuilder, OnCore, SmartAgent, and SuperStack are registered trademarks of 3Com Corporation. CoreBuilder and PACE are trademarks of 3Com Corporation.

ALR is a registered trademark of Advanced Logic Research, Inc.   Vines is a registered trademark of Banyan Systems, Inc.  ClearQuality and ClearSupport are registered trademarks of Clarify, Inc. Intel, LANDesk, and Pentium are registered trademarks of Intel Corporation.  LinkLogic is a trademark of MedicaLogic, Inc.  PowerTrak is a trademark of Medicode, Inc.  Windows and Windows NT are registered trademarks of Microsoft Corporation.  3M is a registered trademark of Minnesota Mining and Manufacturing Company.  NetWare is a registered trademark of Novell, Inc.   SQL*Net is a registered trademark of Oracle Corporation.  PeopleSoft is a registered trademark of PeopleSoft, Inc.  Action Request System is a registered trademark of Remedy Corporation.  SupportTEAM is a registered trademark of Scopus Technology, Inc.  SQLServer is a trademark of Sybase, Inc. Tivoli is a registered trademark of Tivoli Systems Inc.  Other brand and product names may be registered trademarks or trademarks of their respective holders.