Cabletron Systems manual Using the EMM-E6 User’s Guide

Page 10

Introduction

Stand-alone Launcher or the command line (if you are running in stand-alone mode); in addition, several applications can also be accessed from within the Hub View, a graphical display of the EMM-E6 and the hub it is managing.

The EMM-E6 User’s Guide describes how to use many of the applications included with the module; note that the instructions provided in this guide apply to the EMM-E6 module regardless of the operating system or management platform you are using. Instructions for launching each individual function from the command line (stand-alone mode) are also included in each chapter.

Following is a description of the applications covered in this guide; while we provide as much background information as we can, we do assume that you’re familiar with Ethernet networks and general network management concepts:

Chapter 1, Introduction, provides a list of related documentation, describes certain software conventions, and shows you how to contact the Cabletron Systems Global Call Center.

Chapter 2, Using the EMM-E6 Hub View, describes the visual display of the Hub and explains how to use the mouse within the Hub View; the operation of some basic functions (changing the Hub View display, opening menus and windows, enabling and disabling ports, checking device and module status, and so on) available only from within the Hub View is also described. You can access the Hub View application from the icon menu or the command line.

Chapter 3, Alarm Configuration, describes how to set thresholds and enable or disable alarms at the network (channel), module, and port levels. You can access the Alarm Configuration application from the icon menu, the Hub View, or the command line.

Chapter 4, Link/Seg Traps, describes how to configure link and segmentation traps to suit your management needs. You can access the Link/Seg Traps application from the icon menu, the Hub View, or the command line.

Chapter 5, Redundancy, describes how to configure redundant circuits to keep your network connections up and running in the event of a single port’s failure. You can access the Redundancy application from the icon menu, the Hub View, or the command line.

Chapter 6, Source Addressing, describes how to display the Source Address List, how to set the ageing time, and how to configure source address traps; it also discusses the effects of source address locking. You can access the Source Address application from the icon menu, the Hub View, or the command line.

Chapter 7, Security, describes how to configure intruder protection for all MIMs installed in the EMM-E6-controlled hub, and how to configure eavesdropper protection for any installed LANVIEWSECURE MIMs. You can access the Security application from the icon menu, the Hub View, or the command line.

1-2

Using the EMM-E6 User’s Guide

Image 10
Contents EMM-E6 Page Virus Disclaimer Restricted Rights Notice Contents Chapter Source Addressing Chapter SecurityChapter Front Panel Redundancy Appendix a EMM-E6 MIB StructureContents Using the EMM-E6 User’s Guide IntroductionUsing the EMM-E6 User’s Guide What’s not in the EMM-E6 User’s Guide UPSConventions Screen Displays Window ConventionsUsing the Mouse ButtonGetting Help EMM-E6 Firmware Year 2000 ComplianceUsing the EMM-E6 Hub View Using the Hub ViewNavigating Through the Hub View Hub View Front PanelDevice Name UptimeDate and Time Device LocationUsing the EMM-E6 Hub View EMM-E6 Ports Display Using the Mouse in a Hub View Module Brim PortsHub View Port Color Codes Port Display FormMonitoring Hub Performance Port Display Form Traffic ErrorsLoad CollisionsFrame Sizes ProtocolsPort Type Using the EMM-E6 Hub View Name and Location Checking Device Status and Updating Front Panel InfoContact Checking Network Status Chassis TypeName Active UsersChecking Module Status Module TypeChecking Port Status Link StatusStatus Media TypeViewing the IP Address Table Topology TypeLaunching the Global Find MAC Address Tool Checking StatisticsUsing the EMM-E6 Hub View Avg Packet Size Received BytesTotal Packets Broadcast PacketsCRC Errors Total ErrorsAlignment Errors OOW CollisionsRunt Frames Giant FramesViewing the Port Source Address List Protocols/Frames StatisticsUsing the EMM-E6 Hub View Setting the Polling Intervals Managing the HubContact Status Device General StatusPort Operational State Configuring FNB ConnectionsDevice Configuration StatisticsConfiguring RIC MIM Connections To configure FNB connectivity for an individual port Setting a Port’s Trunk Type 15. Tpxmim Channel Selection WindowTo change a port’s topology status Enabling/Disabling MIM Ports Alarm Configuration From the icon Using Alarm ConfigurationFrom the command line stand-alone mode From the Hub ViewConfiguring Alarms CRCSetting Repeater Alarms BroadcastSetting and Changing Alarms Set Repeater Alarms WindowSetting Module and Port Alarms Setting Module AlarmsSet Module Alarms Window Set the Status to EnabledSetting Port Alarms Set Port Alarms WindowSet the Status to Enabled Alarm Configuration Setting Module and Port Alarms What is a Segmentation Trap? Link/Seg TrapsWhat is a Link Trap? Enabling and Disabling Link/Seg TrapsSpmarun r4hwtr IP address community name Configuring Link/Seg Traps for the Repeater Viewing and Configuring Link/Seg Traps for Hub ModulesModule Traps Window Viewing and Configuring Link/Seg Traps for Ports Port Traps WindowLink/Seg Traps Link/Seg Traps Enabling and Disabling Link/Seg Traps Setting Network Circuit Redundancy Repeater RedundancyConfiguring a Redundant Circuit Spmarun r4red IP address community nameChannel X Redundancy Window Add Circuit Address Window Repeater Redundancy Monitoring Redundancy To set the Poll IntervalSource Addressing Displaying the Source Address ListDisplaying the Source Address List Source Addressing Setting the Hash Type Setting the Aging TimeLocking Source Addresses Source Address Locking on Older Devices Configuring Source Address Traps Repeater-level Traps Module- and Port-level Traps Source Addressing Finding a Source Address Port Source Address Traps WindowClick on to exit the window Security What is LANVIEWSECURE? Spmarun r4sec IP address SU community nameSecure address assignment New definitions for station and trunk portsTrunk port security Configurable violation response Newest Lanviewsecure FeaturesContinuous learning mode Full or partial security against eavesdroppingSecurity on Non-LANVIEWSECUREMIMs Learned addresses resetForced non-secure status Configuring Security Security To assign secure addresses to a port Addresses Window Boards with Multiple Caches Add MAC Address WindowResetting Learned Addresses Tips for Successfully Implementing Eavesdropper ProtectionEnabling Security and Traps Security Repeater-level Security and Traps Channel X Security WindowModule-level Security and Traps Channel X Module Security Window Port-level Security and Traps Channel X Port Security WindowSecurity Setting Front Panel Redundancy Front Panel RedundancySetting Front Panel Redundancy Add Circuit Address Window Front Panel Redundancy Setting Front Panel Redundancy Ietf MIB Support EMM-E6 MIB StructureMIB Components Chassis MGRRepeater One, Repeater Two, and Repeater Three Host ServicesIP Services Ctron Use OnlyMIB Navigator Rmon DefaultDistributed LAN Monitor Rmon HostBrief Word About MIB Components and Community Names EMM-E6 MIB Structure Index Index-2 Index-3 Index Index-4
Related manuals
Manual 64 pages 974 b