Enterasys Networks 2000 manual Configuring Fddi Frame Translation Settings, Util

Page 165

FDDI Applications

%Util

The percentage of utilization of available bandwidth by the indicated SMT over the current poll interval; the percentage is calculated by dividing the actual number of transmitted bytes/sec into the maximum number of bytes/sec that could be transmitted (125,000,000 bytes/sec potential on a 100 Megabit/second ring).

Setting the FDDI Statistics Poll Rate

1.Click on the clock symbol () next to the Poll Rate (sec) text box. The New Timer Interval text box, Figure 6-7, will appear.

Figure 6-7. New Timer Interval Text Box

2.Highlight the hour field in the New Timer Interval text box and enter a new hour value or use the arrow keys to scroll to change the hour, as desired. The time is given in a 24-hour hh:mm:ss format.

3.Repeat step 2 to change the minutes and seconds fields, as desired.

4.Click OK when you are finished entering new information. The new Poll Rate you have set is now entered.

The FDDI Statistics window will refresh, and the new time interval will take effect immediately.

Configuring FDDI Frame Translation Settings

The HSIM-F6 interface must be configured to translate packets from an FDDI frame format to an Ethernet frame format (and vice versa) when bridging packets between FDDI and Ethernet networks. The Frame Translation window lets you set the parameters for frame translation.

To access the FDDI Translation window (Figure 6-8):

1.In the Chassis View window, click on FDDI to display the FDDI menu.

2.Click on Frame Translation.

Configuring FDDI Frame Translation Settings

6-13

Image 165
Contents SmartSwitch 2000 User’s Guide Page Virus Disclaimer Restricted Rights Notice Contents Alarm Configuration Chapter Statistics Chapter Managing Ethernet MicroLAN SwitchesChapter HSIM-W87 Configuration Chapter Fddi ApplicationsIndex Introduction Introduction Introduction Introduction Using the SmartSwitch 2000 User’s Guide Using the Mouse Related ManualsSoftware Conventions Left Mouse Button Right Mouse Button Device Name Common SmartSwitch 2000 Window FieldsIP Address LocationUsing Window Buttons Using On-line HelpGetting Help Getting Help from the Global Technical Assistance Center Accessing On-line DocumentationLogin Introduction Getting Help SmartSwitch 2000 Chassis View Viewing Chassis Information Front Panel InformationConnection Status Port Status Boot PromFirmware TimeMenu Structure SmartSwitch 2000 Chassis View Menu StructureDevice Menu Port Status Menu Fddi Menu Repeater MenuUtilities Menu Help MenuModule Menu Port Menus Port Status Displays Selecting a Port Status ViewStatus Load Mapping ErrorsSpeed TypeSmartSwitch 2000 Chassis View Port Assignment Errors or Frame SizePort Status Color Codes Chassis Manager WindowDevice Type Viewing Hardware TypesConnection Type Module TypeInterface Description Viewing I/F Summary InformationDescription IndexPhysical Status Logical StatusRaw Counts Viewing Interface Detail RateAddress ErrorUnicast Non-UnicastPackets Received Received only Unknown Protocol Received onlyTransmit Queue Size Transmit only Packets Transmitted Transmit onlyComponent Using Device Find Source AddressPort Instance Component Managing the Hub Configuring Ports12. The Port Configuration Window Configuring Standard Ethernet and Fddi PortsStandard Mode Configuring Fast Ethernet Ports on First Generation DevicesFull Duplex 13. The Fast Ethernet Port Configuration Window Desired Operational Mode Current Operational ModePort Type Link StateRemote Capabilities Advertised AbilitiesFor 100Base-FX ports, options are Setting the Desired Operational ModeConfiguring Ethernet Ports on Second Generation Devices 14. The Ethernet Configuration Window Auto Negotiate Config Remote Auto SignalAuto Negotiate Mode Operational Mode FieldsFlow Control DuplexAuto Negotiation Technologies Configuring the COM Port Setting Advertised Abilities for Auto NegotiationCom Port Function Com Port AdminUsing an Uninterruptable Power Supply UPS Accessing the UPS WindowSpeed Selection UPS ID Setting the UPS ID Redirecting Traffic on the SmartSwitch Using the Test OptionUsing the Disconnect Option To access the Port Redirect window Priority Configuration Configuring Priority Queuing Based on Receive Port 18. The Port Priority Configuration Window 19. The MAC Based Priority Configuration Window Configuring Priority Queuing Based on MAC-layer InformationAddress Type Current Priority EntriesFrame Type PriorityTo assign a transmit priority based on MAC-layer information Configuring Priority Queuing Based on Packet Type System Resources Window Dram Installed Flash Memory InstalledSram Installed Nvram InstalledReserving CPU Bandwidth 802.1Q VLANs What is a VLAN?About 802.1Q Vlan Configuration and Operation What is an 802.1Q Port-Based VLAN?Egress List Operation Ingress List Operation802.1Q Port Types 1Q TrunkConfiguring Your 802.1Q Vlans Setting Vlan Parameters and Operational ModesHybrid Vlan Name Admin StatusDeleting VLANs Creating and Modifying VLANsUpdating Vlan Config Window Information Performing Ingress List ConfigurationEnabling and Disabling VLANs Mode Slot/PortDiscard Port Operational ModePort Discard Assigning Vlan Membership to PortsSetting Port Frame Discard Formats Setting Port Operational ModesUpdating Vlan Port Config Window Information Performing Egress List ConfigurationName Slot NumberEgress Ports Broadcast SuppressionEgress Untagged List Building an Egress ListTotal RX Port #Peak Rate Time Since PeakThreshold 26. The Edit Time Window Setting the Device Date and TimeEnabling and Disabling Ports SmartSwitch 2000 Chassis View Managing the Hub About Rmon Alarms and Events Alarm ConfigurationAlarm Configuration Basic Alarm ConfigurationRmon Basic Alarm Configuration Window Accessing the Basic Alarm Configuration WindowKilobits Total Errors Broadcasts/Multicasts Viewing Alarm StatusIf Number If TypePolling Interval Log/TrapRising Threshold Rising ActionCreating and Editing a Basic Alarm Alarm Configuration Disabling a Basic Alarm Viewing the Basic Alarm Log Accessing the Rmon Advanced Alarm/Event List Advanced Alarm ConfigurationRmon Advanced Alarm/Event List Window Alarm Configuration Creating and Editing an Advanced Alarm Rmon Create/Edit Alarms Window Alarm Configuration Alarm Configuration Alarm Configuration Table index.lengthin bytes.instancein decimal format Alarm Configuration Creating and Editing an Event Rmon Create/Edit Events Window Alarm Configuration Adding Actions to an Event Rmon Create/Edit Actions Window Viewing an Advanced Alarm Event Log Deleting an Alarm, Event, or ActionAlarm Configuration How Rising and Falling Thresholds Work Alarm Configuration How Rising and Falling Thresholds Work Statistics Accessing the Statistics WindowsStatistics Rmon StatisticsBytes ProblemsPackets Drop EventsFrame Size Bytes Packets Viewing Total, Delta, and Accumulated Statistics Printing Statistics If StatisticsIf Statistics Discarded Repeater Statistics Managing Ethernet MicroLAN SwitchesStatistics Windows Accessing the Statistics WindowsTo access the port-level Statistics window Statistics Defined Hard ErrorsActive Users BroadcastsUsing the Total and Delta Option Buttons Soft ErrorsAccessing the Timer Statistics Windows Timer StatisticsTo access the port-level Timer Statistics window Repeater Performance Graphs Setting the Timer Statistics IntervalAccessing the Performance Graph Windows Total Errors Red Percent Load GreenFrames Blue Detail Button Configuring the Performance GraphsFrame Status Breakdown Error BreakdownAccessing the Alarm Limits Windows Alarm LimitsManaging Ethernet MicroLAN Switches Managing Ethernet MicroLAN Switches Collisions Broadcast Packets Errors of TypeConfiguring Alarms Setting the Alarm Limits Time IntervalWithin Trap Selection Setting Alarm LimitsAccessing the Trap Selection Windows Link State Traps Trap DefinitionsSource Address Traps Segmentation TrapsConfiguring Traps Managing Ethernet MicroLAN Switches Fddi Applications Click on Fddi Statistics Concentrator ConfigurationMAC State Concentrator Configuration WindowSMT Version Neg. Negotiated Req. Requested Target Token Rotation TimeConcentrator M Ports Concentrator Non-M PortsConnection Policy Window Ring ConfigurationFddi Applications Number of Nodes Station ListStations Panel Address ModeNode Class Fddi PerformanceTopology Upstream NeighborTransmit Frames Frame ErrorsReceive Frames Lost FramesFrames/sec Fddi StatisticsKBytes/sec Peak KBytes/secSetting the Fddi Statistics Poll Rate Configuring Fddi Frame Translation SettingsUtil Click on Frame TranslationFrame Translation Window Information about Ethernet and Fddi Frame TypesEthernet Ethernet FramesEthernet Snap Ethernet 802.3 Ethernet RawFddi Frames FddiIP Fragmentation Fddi Frame Translation OptionsTranslate all Non-Novell Fddi Snap frames to Translate all Ethernet Raw frames toTranslate all Novell Fddi 802.2 frames to Translate all Novell Fddi Snap frames toTranslate all Novell Fddi MAC frames to Auto Learn Novell Frame TranslationAccessing the ATM Connections Window ATM ConfigurationConnection Data SettingsAdd DeleteRefresh Configuring Connections Adding a New ConnectionDeleting a Connection T3 Configuration Window HSIM-W87 ConfigurationValid Intervals Time ElapsedLine Status T1 Configuration WindowT3 Line Type T3 Loop BackT1 Line Number T1 Frame Type T1 Loop BackT1 Line BuildOut Max Entries Configuring IP PriorityIP Priority Queue Status Number of EntriesHSIM-W87 Configuration Configuring IP Priority Numerics SymbolsIndex-2 Index-3 Index-4 Index-5 Index Index-6
Related manuals
Manual 86 pages 11.98 Kb

2000 specifications

Enterasys Networks, a key player in the networking space in 2000, was renowned for its innovative solutions that combined high-performance networking with robust security features. Founded with the vision of providing enterprise-level networking infrastructure, Enterasys positioned itself to cater to the growing demands of business networks during the dot-com boom.

One of the main features of Enterasys Networks was its focus on delivering secure, scalable networking solutions that could seamlessly integrate with existing enterprise systems. The company developed a range of products including switches, routers, and wireless solutions that were designed to optimize performance while ensuring security at every layer. Their core offerings provided businesses with the reliability required to handle increasing volumes of data traffic.

A standout technology of Enterasys was its identity and access management solutions. These technologies allowed organizations to control who could access network resources and under what conditions. This was particularly crucial in a time when cyber threats were on the rise, and businesses were becoming more aware of the need for strict network security protocols. The features included role-based access control and authentication measures, which were fundamental in safeguarding sensitive information.

Enterasys also introduced intelligent networking features, which enabled dynamic traffic management and prioritization. This technology helped organizations optimize their network performance by automatically adjusting to changing workload demands. Such capabilities were essential for businesses relying on bandwidth-intensive applications and services.

The company also embraced the rising trend of wireless networking, providing solutions that combined wired and wireless technologies for a unified experience. Enterasys Wireless LAN solutions were groundbreaking at the time, offering seamless connectivity and security to mobile devices, thereby enhancing productivity and flexibility within enterprise environments.

In addition to hardware, Enterasys developed network management software that simplified the administration of complex networks. This software enabled IT professionals to monitor performance, troubleshoot issues, and implement security policies efficiently.

Overall, Enterasys Networks in 2000 was characterized by its commitment to delivering secure, intelligent networking solutions that catered to the needs of modern enterprises. With its innovative technologies and features, Enterasys played a significant role in shaping the networking landscape, laying the groundwork for future advancements in network security and management.