Enterasys Networks 2000 manual Add, Delete, Refresh

Page 173

 

ATM Configuration

VPI

Displays the Virtual Path Identifier assigned to the

 

connection. Virtual Path Identifiers are used to group

 

virtual connections, allowing for channel trunking

 

between ATM switches. Each VPI can be configured to

 

carry many different channels (designated by VCIs)

 

between two points.

VCI

Displays the Virtual Channel Identifier assigned to the

 

connection; allowable values are 0 - 1023 for each VPI.

 

Each assigned VCI must be unique within its defined

 

VPI: for example, you can assign a VCI of 14 as many as

 

four times: once with a VPI of 0, once with a VPI of 1, and

 

so on. Remember, it is the combined VPI and VCI

 

designations assigned to a channel that creates the

 

grouping of virtual connections.

Encapsulation Type

Displays the method used to encapsulate LAN packets

 

on the selected circuit. Current versions of HSIM-A6DP

 

firmware use 802.3 VC-based multiplexing for bridging

 

protocols (designated VC MUX 802.3 Bridged); future

 

versions will add support for ATM Forum LAN

 

Emulation and SecureFast Switching. You may also see

 

some connections assigned a type of “other”; these are

 

default connections that cannot be modified or deleted.

Status

Displays the current administrative status of the

 

connection: enabled or disabled. In current versions of

 

firmware, all connections are enabled by default, and

 

cannot be disabled.

UpTime

The length of time the selected connection has been

 

enabled.

Add

Selecting the Add button either adds a new connection or modifies an existing one, using the parameters entered in the fields below the list box. A confirmation window opens for both additions and modifications.

Delete

Selecting the Delete button deletes the selected connection; a confirmation window requires that you confirm the deletion.

Refresh

Selecting Refresh refreshes the connection information displayed in the window.

Accessing the ATM Connections Window

7-3

Image 173
Contents SmartSwitch 2000 User’s Guide Page Virus Disclaimer Restricted Rights Notice Contents Alarm Configuration Chapter Statistics Chapter Managing Ethernet MicroLAN SwitchesIndex Chapter HSIM-W87 ConfigurationChapter Fddi Applications Introduction Introduction Introduction Introduction Using the SmartSwitch 2000 User’s Guide Software Conventions Using the MouseRelated Manuals Left Mouse Button Right Mouse Button Device Name Common SmartSwitch 2000 Window FieldsIP Address LocationGetting Help Using Window ButtonsUsing On-line Help Getting Help from the Global Technical Assistance Center Accessing On-line DocumentationLogin Introduction Getting Help SmartSwitch 2000 Chassis View Connection Status Viewing Chassis InformationFront Panel Information Port Status Boot PromFirmware TimeMenu Structure SmartSwitch 2000 Chassis View Menu StructureDevice Menu Port Status Menu Fddi Menu Repeater MenuModule Menu Utilities MenuHelp Menu Port Menus Status Port Status DisplaysSelecting a Port Status View Load Mapping ErrorsSpeed TypeSmartSwitch 2000 Chassis View Port Assignment Errors or Frame SizePort Status Color Codes Chassis Manager WindowDevice Type Viewing Hardware TypesConnection Type Module TypeInterface Description Viewing I/F Summary InformationDescription IndexPhysical Status Logical StatusRaw Counts Viewing Interface Detail RateAddress ErrorUnicast Non-UnicastPackets Received Received only Unknown Protocol Received onlyTransmit Queue Size Transmit only Packets Transmitted Transmit onlyComponent Using Device Find Source AddressPort Instance Component Managing the Hub Configuring Ports12. The Port Configuration Window Configuring Standard Ethernet and Fddi PortsFull Duplex Standard ModeConfiguring Fast Ethernet Ports on First Generation Devices 13. The Fast Ethernet Port Configuration Window Desired Operational Mode Current Operational ModePort Type Link StateRemote Capabilities Advertised AbilitiesFor 100Base-FX ports, options are Setting the Desired Operational ModeConfiguring Ethernet Ports on Second Generation Devices 14. The Ethernet Configuration Window Auto Negotiate Config Remote Auto SignalAuto Negotiate Mode Operational Mode FieldsFlow Control DuplexAuto Negotiation Technologies Configuring the COM Port Setting Advertised Abilities for Auto NegotiationCom Port Function Com Port AdminSpeed Selection Using an Uninterruptable Power Supply UPSAccessing the UPS Window UPS ID Setting the UPS ID Using the Disconnect Option Redirecting Traffic on the SmartSwitchUsing the Test Option To access the Port Redirect window Priority Configuration Configuring Priority Queuing Based on Receive Port 18. The Port Priority Configuration Window 19. The MAC Based Priority Configuration Window Configuring Priority Queuing Based on MAC-layer InformationAddress Type Current Priority EntriesFrame Type PriorityTo assign a transmit priority based on MAC-layer information Configuring Priority Queuing Based on Packet Type System Resources Window Dram Installed Flash Memory InstalledSram Installed Nvram InstalledReserving CPU Bandwidth 802.1Q VLANs What is a VLAN?About 802.1Q Vlan Configuration and Operation What is an 802.1Q Port-Based VLAN?Egress List Operation Ingress List Operation802.1Q Port Types 1Q TrunkHybrid Configuring Your 802.1Q VlansSetting Vlan Parameters and Operational Modes Vlan Name Admin StatusDeleting VLANs Creating and Modifying VLANsEnabling and Disabling VLANs Updating Vlan Config Window InformationPerforming Ingress List Configuration Mode Slot/PortDiscard Port Operational ModePort Discard Assigning Vlan Membership to PortsSetting Port Frame Discard Formats Setting Port Operational ModesUpdating Vlan Port Config Window Information Performing Egress List ConfigurationName Slot NumberEgress Ports Broadcast SuppressionEgress Untagged List Building an Egress ListTotal RX Port #Peak Rate Time Since PeakThreshold 26. The Edit Time Window Setting the Device Date and TimeEnabling and Disabling Ports SmartSwitch 2000 Chassis View Managing the Hub About Rmon Alarms and Events Alarm ConfigurationAlarm Configuration Basic Alarm ConfigurationRmon Basic Alarm Configuration Window Accessing the Basic Alarm Configuration WindowKilobits Total Errors Broadcasts/Multicasts Viewing Alarm StatusIf Number If TypePolling Interval Log/TrapRising Threshold Rising ActionCreating and Editing a Basic Alarm Alarm Configuration Disabling a Basic Alarm Viewing the Basic Alarm Log Accessing the Rmon Advanced Alarm/Event List Advanced Alarm ConfigurationRmon Advanced Alarm/Event List Window Alarm Configuration Creating and Editing an Advanced Alarm Rmon Create/Edit Alarms Window Alarm Configuration Alarm Configuration Alarm Configuration Table index.lengthin bytes.instancein decimal format Alarm Configuration Creating and Editing an Event Rmon Create/Edit Events Window Alarm Configuration Adding Actions to an Event Rmon Create/Edit Actions Window Viewing an Advanced Alarm Event Log Deleting an Alarm, Event, or ActionAlarm Configuration How Rising and Falling Thresholds Work Alarm Configuration How Rising and Falling Thresholds Work Statistics Accessing the Statistics WindowsStatistics Rmon StatisticsBytes ProblemsPackets Drop EventsFrame Size Bytes Packets Viewing Total, Delta, and Accumulated Statistics Printing Statistics If StatisticsIf Statistics Discarded Repeater Statistics Managing Ethernet MicroLAN SwitchesStatistics Windows Accessing the Statistics WindowsTo access the port-level Statistics window Statistics Defined Hard ErrorsActive Users BroadcastsUsing the Total and Delta Option Buttons Soft ErrorsAccessing the Timer Statistics Windows Timer StatisticsTo access the port-level Timer Statistics window Repeater Performance Graphs Setting the Timer Statistics IntervalAccessing the Performance Graph Windows Frames Blue Total Errors RedPercent Load Green Detail Button Configuring the Performance GraphsFrame Status Breakdown Error BreakdownAccessing the Alarm Limits Windows Alarm LimitsManaging Ethernet MicroLAN Switches Managing Ethernet MicroLAN Switches Collisions Broadcast Packets Errors of TypeWithin Configuring AlarmsSetting the Alarm Limits Time Interval Trap Selection Setting Alarm LimitsAccessing the Trap Selection Windows Link State Traps Trap DefinitionsSource Address Traps Segmentation TrapsConfiguring Traps Managing Ethernet MicroLAN Switches Fddi Applications Click on Fddi Statistics Concentrator ConfigurationMAC State Concentrator Configuration WindowSMT Version Neg. Negotiated Req. Requested Target Token Rotation TimeConcentrator M Ports Concentrator Non-M PortsConnection Policy Window Ring ConfigurationFddi Applications Number of Nodes Station ListStations Panel Address ModeNode Class Fddi PerformanceTopology Upstream NeighborTransmit Frames Frame ErrorsReceive Frames Lost FramesFrames/sec Fddi StatisticsKBytes/sec Peak KBytes/secSetting the Fddi Statistics Poll Rate Configuring Fddi Frame Translation SettingsUtil Click on Frame TranslationFrame Translation Window Information about Ethernet and Fddi Frame TypesEthernet Ethernet FramesEthernet Snap Ethernet 802.3 Ethernet RawFddi Frames FddiIP Fragmentation Fddi Frame Translation OptionsTranslate all Non-Novell Fddi Snap frames to Translate all Ethernet Raw frames toTranslate all Novell Fddi 802.2 frames to Translate all Novell Fddi Snap frames toTranslate all Novell Fddi MAC frames to Auto Learn Novell Frame TranslationAccessing the ATM Connections Window ATM ConfigurationConnection Data SettingsRefresh AddDelete Deleting a Connection Configuring ConnectionsAdding a New Connection T3 Configuration Window HSIM-W87 ConfigurationValid Intervals Time ElapsedLine Status T1 Configuration WindowT3 Line Type T3 Loop BackT1 Line Number T1 Line BuildOut T1 Frame TypeT1 Loop Back Max Entries Configuring IP PriorityIP Priority Queue Status Number of EntriesHSIM-W87 Configuration Configuring IP Priority Numerics SymbolsIndex-2 Index-3 Index-4 Index-5 Index Index-6
Related manuals
Manual 86 pages 11.98 Kb

2000 specifications

Enterasys Networks, a key player in the networking space in 2000, was renowned for its innovative solutions that combined high-performance networking with robust security features. Founded with the vision of providing enterprise-level networking infrastructure, Enterasys positioned itself to cater to the growing demands of business networks during the dot-com boom.

One of the main features of Enterasys Networks was its focus on delivering secure, scalable networking solutions that could seamlessly integrate with existing enterprise systems. The company developed a range of products including switches, routers, and wireless solutions that were designed to optimize performance while ensuring security at every layer. Their core offerings provided businesses with the reliability required to handle increasing volumes of data traffic.

A standout technology of Enterasys was its identity and access management solutions. These technologies allowed organizations to control who could access network resources and under what conditions. This was particularly crucial in a time when cyber threats were on the rise, and businesses were becoming more aware of the need for strict network security protocols. The features included role-based access control and authentication measures, which were fundamental in safeguarding sensitive information.

Enterasys also introduced intelligent networking features, which enabled dynamic traffic management and prioritization. This technology helped organizations optimize their network performance by automatically adjusting to changing workload demands. Such capabilities were essential for businesses relying on bandwidth-intensive applications and services.

The company also embraced the rising trend of wireless networking, providing solutions that combined wired and wireless technologies for a unified experience. Enterasys Wireless LAN solutions were groundbreaking at the time, offering seamless connectivity and security to mobile devices, thereby enhancing productivity and flexibility within enterprise environments.

In addition to hardware, Enterasys developed network management software that simplified the administration of complex networks. This software enabled IT professionals to monitor performance, troubleshoot issues, and implement security policies efficiently.

Overall, Enterasys Networks in 2000 was characterized by its commitment to delivering secure, intelligent networking solutions that catered to the needs of modern enterprises. With its innovative technologies and features, Enterasys played a significant role in shaping the networking landscape, laying the groundwork for future advancements in network security and management.