Enterasys Networks 2000 manual Index-4

Page 186

Index

Oversized 4-4

Owner 3-15,3-22

P

packet capture events 3-1

Packet count 5-17 Packet Type 4-3 Packets 4-3,5-19 Packets Received 2-23,4-8 Packets Transmitted 2-24, 4-8 Payload 8-3,8-5

Peak Values 4-2,4-4,4-5,5-6 Percent Load 5-10 Performance 6-2

Permanent Virtual Circuits (PVCs) 7-1 Physical Status 2-20

Polling Interval 3-5

Port Assignment 2-15, 2-63 port display, color codes 2-2 Port Menus 2-10

Port Number 1-9, 3-4

Port Operational Modes 2-66

Port Priority Configuration window 2-48 assigning transmit priority to ports 2-49

Port Status 2-3

Port Status Color Codes 2-15 Port Status Menu 2-7

Port Status Views 2-11 Port VLAN ID 2-58port-based VLANs 1-1,2-57 portLinkDown (trap) 5-22 portLinkUp (trap) 5-22 PortSecurityViolation (trap) 5-23 portSegmenting (trap) 5-22 PortTypeChanged (trap) 5-23 portUnsegmenting (trap) 5-22 portViolationReset (trap) 5-23 Primary 1 6-5

Primary 2 6-5

priority packet forwarding 2-47 PVID 2-58,2-61

R

Rate 2-22,6-11

Raw 802.3 6-16

Raw Counts 2-21

Readme 1-11

Receive Frames 6-11

Refresh button 6-9

Requested Target Token Rotation Time 6-5 Ring Configuration 6-6

Ring Management 6-1 Ring Ops 6-11Ring-Op6-3Ring-Op-Dup6-4 rising action 3-5,3-7

rising alarm threshold 3-1,3-2 Rising Event Index 3-19

Rising Threshold 3-5,3-6, 3-7, 3-12,3-18,3-19RMON Action

deleting 3-25RMON Alarm

create/edit 3-13 deleting 3-25 description 3-26 variable 3-15,3-24

RMON Alarm Event Log 3-25 RMON Alarm/Event list 3-10RMON Event

create/edit 3-20 deleting 3-25

RMON Thresholds 3-27 RMT 6-1

Runts 5-5,5-11,5-17

S

Sample Type 3-19

Second Generation Modules 2-35 Secondary 1 6-5

Secondary 2 6-6 SecureFast switching 1-1 SEG (segmented) 2-14 Segmentation Traps 5-20 Selecting Port Status Views 2-11 Set button 1-9

Slave 6-6 SMT 6-2,6-3 SMT Version 6-4 Soft Errors 5-5 source address 2-59

Source Address Traps 5-20 sourceAddressTimeout (trap) 5-23 Spanning Tree 2-58

Startup Alarm 3-19 Station 6-10 Station List 6-2 Station Management 6-2

Index-4

Image 186
Contents SmartSwitch 2000 User’s Guide Page Virus Disclaimer Restricted Rights Notice Contents Alarm Configuration Chapter Managing Ethernet MicroLAN Switches Chapter StatisticsChapter HSIM-W87 Configuration Chapter Fddi ApplicationsIndex Introduction Introduction Introduction Introduction Using the SmartSwitch 2000 User’s Guide Using the Mouse Related ManualsSoftware Conventions Left Mouse Button Right Mouse Button IP Address Common SmartSwitch 2000 Window FieldsDevice Name LocationUsing Window Buttons Using On-line HelpGetting Help Accessing On-line Documentation Getting Help from the Global Technical Assistance CenterLogin Introduction Getting Help SmartSwitch 2000 Chassis View Viewing Chassis Information Front Panel InformationConnection Status Firmware Boot PromPort Status TimeSmartSwitch 2000 Chassis View Menu Structure Menu StructureDevice Menu Port Status Menu Repeater Menu Fddi MenuUtilities Menu Help MenuModule Menu Port Menus Port Status Displays Selecting a Port Status ViewStatus Load Speed ErrorsMapping TypeSmartSwitch 2000 Chassis View Errors or Frame Size Port AssignmentChassis Manager Window Port Status Color CodesViewing Hardware Types Device TypeModule Type Connection TypeViewing I/F Summary Information Interface DescriptionPhysical Status IndexDescription Logical StatusRaw Counts Rate Viewing Interface DetailUnicast ErrorAddress Non-UnicastTransmit Queue Size Transmit only Unknown Protocol Received onlyPackets Received Received only Packets Transmitted Transmit onlyUsing Device Find Source Address ComponentPort Instance Component Configuring Ports Managing the HubConfiguring Standard Ethernet and Fddi Ports 12. The Port Configuration WindowStandard Mode Configuring Fast Ethernet Ports on First Generation DevicesFull Duplex 13. The Fast Ethernet Port Configuration Window Port Type Current Operational ModeDesired Operational Mode Link StateAdvertised Abilities Remote CapabilitiesSetting the Desired Operational Mode For 100Base-FX ports, options areConfiguring Ethernet Ports on Second Generation Devices 14. The Ethernet Configuration Window Auto Negotiate Mode Remote Auto SignalAuto Negotiate Config Operational Mode FieldsDuplex Flow ControlAuto Negotiation Technologies Setting Advertised Abilities for Auto Negotiation Configuring the COM PortCom Port Admin Com Port FunctionUsing an Uninterruptable Power Supply UPS Accessing the UPS WindowSpeed Selection UPS ID Setting the UPS ID Redirecting Traffic on the SmartSwitch Using the Test OptionUsing the Disconnect Option To access the Port Redirect window Priority Configuration Configuring Priority Queuing Based on Receive Port 18. The Port Priority Configuration Window Configuring Priority Queuing Based on MAC-layer Information 19. The MAC Based Priority Configuration WindowFrame Type Current Priority EntriesAddress Type PriorityTo assign a transmit priority based on MAC-layer information Configuring Priority Queuing Based on Packet Type System Resources Window Sram Installed Flash Memory InstalledDram Installed Nvram InstalledReserving CPU Bandwidth What is a VLAN? 802.1Q VLANsWhat is an 802.1Q Port-Based VLAN? About 802.1Q Vlan Configuration and Operation802.1Q Port Types Ingress List OperationEgress List Operation 1Q TrunkConfiguring Your 802.1Q Vlans Setting Vlan Parameters and Operational ModesHybrid Admin Status Vlan NameCreating and Modifying VLANs Deleting VLANsUpdating Vlan Config Window Information Performing Ingress List ConfigurationEnabling and Disabling VLANs Slot/Port ModePort Discard Port Operational ModeDiscard Assigning Vlan Membership to PortsUpdating Vlan Port Config Window Information Setting Port Operational ModesSetting Port Frame Discard Formats Performing Egress List ConfigurationSlot Number NameEgress Untagged List Broadcast SuppressionEgress Ports Building an Egress ListPeak Rate Port #Total RX Time Since PeakThreshold Setting the Device Date and Time 26. The Edit Time WindowEnabling and Disabling Ports SmartSwitch 2000 Chassis View Managing the Hub Alarm Configuration About Rmon Alarms and EventsBasic Alarm Configuration Alarm ConfigurationAccessing the Basic Alarm Configuration Window Rmon Basic Alarm Configuration WindowIf Number Viewing Alarm StatusKilobits Total Errors Broadcasts/Multicasts If TypeRising Threshold Log/TrapPolling Interval Rising ActionCreating and Editing a Basic Alarm Alarm Configuration Disabling a Basic Alarm Viewing the Basic Alarm Log Advanced Alarm Configuration Accessing the Rmon Advanced Alarm/Event ListRmon Advanced Alarm/Event List Window Alarm Configuration Creating and Editing an Advanced Alarm Rmon Create/Edit Alarms Window Alarm Configuration Alarm Configuration Alarm Configuration Table index.lengthin bytes.instancein decimal format Alarm Configuration Creating and Editing an Event Rmon Create/Edit Events Window Alarm Configuration Adding Actions to an Event Rmon Create/Edit Actions Window Deleting an Alarm, Event, or Action Viewing an Advanced Alarm Event LogAlarm Configuration How Rising and Falling Thresholds Work Alarm Configuration How Rising and Falling Thresholds Work Accessing the Statistics Windows StatisticsRmon Statistics StatisticsPackets ProblemsBytes Drop EventsFrame Size Bytes Packets Viewing Total, Delta, and Accumulated Statistics If Statistics Printing StatisticsIf Statistics Discarded Managing Ethernet MicroLAN Switches Repeater StatisticsAccessing the Statistics Windows Statistics WindowsTo access the port-level Statistics window Active Users Hard ErrorsStatistics Defined BroadcastsSoft Errors Using the Total and Delta Option ButtonsTimer Statistics Accessing the Timer Statistics WindowsTo access the port-level Timer Statistics window Setting the Timer Statistics Interval Repeater Performance GraphsAccessing the Performance Graph Windows Total Errors Red Percent Load GreenFrames Blue Configuring the Performance Graphs Detail ButtonError Breakdown Frame Status BreakdownAlarm Limits Accessing the Alarm Limits WindowsManaging Ethernet MicroLAN Switches Managing Ethernet MicroLAN Switches Collisions Errors of Type Broadcast PacketsConfiguring Alarms Setting the Alarm Limits Time IntervalWithin Setting Alarm Limits Trap SelectionAccessing the Trap Selection Windows Trap Definitions Link State TrapsSegmentation Traps Source Address TrapsConfiguring Traps Managing Ethernet MicroLAN Switches Fddi Applications Concentrator Configuration Click on Fddi StatisticsConcentrator Configuration Window MAC StateSMT Version Concentrator M Ports Req. Requested Target Token Rotation TimeNeg. Negotiated Concentrator Non-M PortsRing Configuration Connection Policy WindowFddi Applications Station List Number of NodesAddress Mode Stations PanelTopology Fddi PerformanceNode Class Upstream NeighborReceive Frames Frame ErrorsTransmit Frames Lost FramesKBytes/sec Fddi StatisticsFrames/sec Peak KBytes/secUtil Configuring Fddi Frame Translation SettingsSetting the Fddi Statistics Poll Rate Click on Frame TranslationInformation about Ethernet and Fddi Frame Types Frame Translation WindowEthernet Frames EthernetFddi Frames Ethernet 802.3 Ethernet RawEthernet Snap FddiTranslate all Non-Novell Fddi Snap frames to Fddi Frame Translation OptionsIP Fragmentation Translate all Ethernet Raw frames toTranslate all Novell Fddi MAC frames to Translate all Novell Fddi Snap frames toTranslate all Novell Fddi 802.2 frames to Auto Learn Novell Frame TranslationATM Configuration Accessing the ATM Connections WindowSettings Connection DataAdd DeleteRefresh Configuring Connections Adding a New ConnectionDeleting a Connection HSIM-W87 Configuration T3 Configuration WindowTime Elapsed Valid IntervalsT3 Line Type T1 Configuration WindowLine Status T3 Loop BackT1 Line Number T1 Frame Type T1 Loop BackT1 Line BuildOut Configuring IP Priority Max EntriesNumber of Entries IP Priority Queue StatusHSIM-W87 Configuration Configuring IP Priority Symbols NumericsIndex-2 Index-3 Index-4 Index-5 Index Index-6
Related manuals
Manual 86 pages 11.98 Kb

2000 specifications

Enterasys Networks, a key player in the networking space in 2000, was renowned for its innovative solutions that combined high-performance networking with robust security features. Founded with the vision of providing enterprise-level networking infrastructure, Enterasys positioned itself to cater to the growing demands of business networks during the dot-com boom.

One of the main features of Enterasys Networks was its focus on delivering secure, scalable networking solutions that could seamlessly integrate with existing enterprise systems. The company developed a range of products including switches, routers, and wireless solutions that were designed to optimize performance while ensuring security at every layer. Their core offerings provided businesses with the reliability required to handle increasing volumes of data traffic.

A standout technology of Enterasys was its identity and access management solutions. These technologies allowed organizations to control who could access network resources and under what conditions. This was particularly crucial in a time when cyber threats were on the rise, and businesses were becoming more aware of the need for strict network security protocols. The features included role-based access control and authentication measures, which were fundamental in safeguarding sensitive information.

Enterasys also introduced intelligent networking features, which enabled dynamic traffic management and prioritization. This technology helped organizations optimize their network performance by automatically adjusting to changing workload demands. Such capabilities were essential for businesses relying on bandwidth-intensive applications and services.

The company also embraced the rising trend of wireless networking, providing solutions that combined wired and wireless technologies for a unified experience. Enterasys Wireless LAN solutions were groundbreaking at the time, offering seamless connectivity and security to mobile devices, thereby enhancing productivity and flexibility within enterprise environments.

In addition to hardware, Enterasys developed network management software that simplified the administration of complex networks. This software enabled IT professionals to monitor performance, troubleshoot issues, and implement security policies efficiently.

Overall, Enterasys Networks in 2000 was characterized by its commitment to delivering secure, intelligent networking solutions that catered to the needs of modern enterprises. With its innovative technologies and features, Enterasys played a significant role in shaping the networking landscape, laying the groundwork for future advancements in network security and management.