Cabletron Systems TRMMIM manual Restricted Rights Notice

Page 4

Restricted Rights Notice

(Applicable to licenses to the United States Government only.)

1.Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013.

Cabletron Systems, Inc., 35 Industrial Way, Rochester, New Hampshire 03867-0505.

2.(a) This computer software is submitted with restricted rights. It may not be used, reproduced, or disclosed by the Government except as provided in paragraph (b) of this Notice or as otherwise expressly stated in the contract.

(b)This computer software may be:

(1)Used or copied for use in or with the computer or computers for which it was acquired, including use at any Government installation to which such computer or computers may be transferred;

(2)Used or copied for use in a backup computer if any computer for which it was acquired is inoperative;

(3)Reproduced for safekeeping (archives) or backup purposes;

(4)Modified, adapted, or combined with other computer software, provided that the modified, combined, or adapted portions of the derivative software incorporating restricted computer software are made subject to the same restricted rights;

(5)Disclosed to and reproduced for use by support service contractors in accordance with subparagraphs (b) (1) through (4) of this clause, provided the Government makes such disclosure or reproduction subject to these restricted rights; and

(6)Used or copied for use in or transferred to a replacement computer.

(c)Notwithstanding the foregoing, if this computer software is published copyrighted computer software, it is licensed to the Government, without disclosure prohibitions, with the minimum rights set forth in paragraph (b) of this clause.

(d)Any other rights or limitations regarding the use, duplication, or disclosure of this computer software are to be expressly stated in, or incorporated in, the contract.

(e)This Notice shall be marked on any reproduction of this computer software, in whole or in part.

ii

Image 4
Contents Trmmim Page Virus Disclaimer Restricted Rights Notice Applicable to licenses to the United States Government onlyContents Chapter Ring Map Chapter Alarm ConfigurationChapter Statistics Chapter Ring Security Configuration Appendix a Trmmim MIB StructureContents Using the Trmmim User’s Guide TrmmimWhat’s not in the Trmmim Guide Introduction to Spma for the TrmmimConventions Screen DisplaysIntroduction to Spma for the Trmmim Using the Mouse ButtonGetting Help FTPTrmmim Firmware Introduction to Spma for the Trmmim Trmmim Firmware Using the Trmmim Hub View Using the Hub ViewUsing the Trmmim Hub View Navigating Through the Hub ViewHub View Front Panel Trmmim Hub ViewUptime Time and DateDevice Name Device LocationUsing the Trmmim Hub View Using the Mouse in a Hub View Module Module Index FNB Bypass State Hub View Port Color Codes Port Display FormErrors FramesTotal Bytes Port TypeFNB Display Monitoring Hub Performance Using the Trmmim Hub View Checking Device Status and Updating Front Panel Info Name and LocationChecking Module Status ContactDate and Time Total RingsSpeed Fault Speed Fault LocationModule Name ModuleAdmin State Checking Port StatusPort Name Module/PortLink State Time Checking Station StatusInsertion Trap Vendor Station NameUpstream Neighbor/Downstream Neighbor Physical Location PriorityPort Mapping Reverse MACsChecking Ring Port Status Configuring Station Name, Location, or PriorityFault State Time Media FaultClass Media TypeChecking Statistics Bytes LineBurst AbortManaging the Hub at the Device Level Managing the HubFind MAC Address Setting the Polling Intervals 12. The Find MAC Address Window13. Trmmim Polling Intervals Contact StatusDevice General Status Device ConfigurationPort Operational State StatisticsManaging the Hub at the Module Level Controlling Token Ring FNB Multiplexer ConnectionsINS Board Left ConnectRight Connect BypassControlling Token Ring Speed Clearing the Module FNB Configuration Window SelectionsControlling Token Ring MIM Management Mode Enabling All Ports on Token Ring ModulesAuto AUT Management MGTConverting a Station Port to a Ring-out Port Managing the Hub at the Port LevelEnabling and Disabling Station and Ring Ports Removing a Station from the Ring Ring Map From the command line stand-alone mode Launching the Ring MapFrom the icon From the Hub ViewSelecting a Ring to Map Ring NameRing Map Speed StationsName UtilizationViewing Station-specific Information Quick Info Popup WindowBoard and Port DropSetting a Station Name Performance and ErrorsSetting a Station Drop Viewing Management Station ConfigurationCommands Error Status Open StatusError Active MonitorError Report Timer Setting the Statistics Calculation ModeViewing Ring-level Information Viewing the Error Table Set Calculation Mode WindowError Table Window Total Errors Isolating ErrorsNon-Isolating Errors Changing the Station Labels Viewing Device Information Setting the Map Poll Interval Device Information WindowViewing Beacon History Active Monitor ChangesRing Purges Beacon EventsLongest Beacon Last Beacon TypeLast Beacon Beacon Configuration 12. The Beacon Configuration Window Using the Find Options Searching by Station Name, MAC Address, Board/Port, or Drop 13. Sample Find WindowsFinding the Active Monitor on the Network Finding the Management Station on the Network Frames or Errors measured/Δ Time in seconds Accessing Other Spma Applications 14. Sample Find Highest and Lowest WindowsAlarm Configuration Spmarun e5alarms IP address community name Setting and Viewing Ring Alarms Alarm Configuration Setting and Viewing Station Alarms Setting a Ring Level AlarmAlarm Configuration Alarm Configuration Alarm Configuration Setting a Station Level Alarm Alarm Configuration Setting and Viewing Station Alarms Using Statistics StatisticsViewing the Ring Station List Spmarun e5stats IP Address community nameModule and Port Stn NameUpstream Addr Downstream AddrMonitoring Ring and Station Statistics Using the Reverse MAC ButtonRefreshing the Station List Creating a Pie Chart Creating a Graph or Meter Click mouse button 1 on Ring and Station Variables GeneralProtocols KBytesIsolating Errors Line ErrorsBurst Error AC ErrorAbort Error Non-Isolating ErrorsInternal Error Token Errors Frequency ErrorsStatistics Ring and Station Variables Ring Security Configuration About Ring SecurityLaunching the Security Configuration Window Ring Security ConfigurationSecurity Configuration Ring Selection window, -1, will appear Allowed Station List Allowed CountDisallowed Station List Disallowed CountDisable Security Security Mode OptionsEnable Security Allowed/Disallowed List Configuration Buttons Configuring Security Building the Allowed List AutomaticallyDeleting Stations from the Allowed or Disallowed Lists Station Addition WindowClearing All Entries in the Allowed or Disallowed List Clear List WindowChanging the Ring Security Mode RemoveIetf MIB Support Trmmim MIB StructureChassis MGR Protocol StackSnmp Agent Network One, Network TwoBrief Word About MIB Components and Community Names TelnetTrmmim MIB Structure Index Index-2 Index-3 Index-4