Introduction

Stand-alone Launcher or the command line (if you are running in stand-alone mode); in addition, several applications can also be accessed from within the Hub View, a graphical display of the EMM-E6 and the hub it is managing.

The EMM-E6 User’s Guide describes how to use many of the applications included with the module; note that the instructions provided in this guide apply to the EMM-E6 module regardless of the operating system or management platform you are using. Instructions for launching each individual function from the command line (stand-alone mode) are also included in each chapter.

Following is a description of the applications covered in this guide; while we provide as much background information as we can, we do assume that you’re familiar with Ethernet networks and general network management concepts:

Chapter 1, Introduction, provides a list of related documentation, describes certain software conventions, and shows you how to contact the Cabletron Systems Global Call Center.

Chapter 2, Using the EMM-E6 Hub View, describes the visual display of the Hub and explains how to use the mouse within the Hub View; the operation of some basic functions (changing the Hub View display, opening menus and windows, enabling and disabling ports, checking device and module status, and so on) available only from within the Hub View is also described. You can access the Hub View application from the icon menu or the command line.

Chapter 3, Alarm Configuration, describes how to set thresholds and enable or disable alarms at the network (channel), module, and port levels. You can access the Alarm Configuration application from the icon menu, the Hub View, or the command line.

Chapter 4, Link/Seg Traps, describes how to configure link and segmentation traps to suit your management needs. You can access the Link/Seg Traps application from the icon menu, the Hub View, or the command line.

Chapter 5, Redundancy, describes how to configure redundant circuits to keep your network connections up and running in the event of a single port’s failure. You can access the Redundancy application from the icon menu, the Hub View, or the command line.

Chapter 6, Source Addressing, describes how to display the Source Address List, how to set the ageing time, and how to configure source address traps; it also discusses the effects of source address locking. You can access the Source Address application from the icon menu, the Hub View, or the command line.

Chapter 7, Security, describes how to configure intruder protection for all MIMs installed in the EMM-E6-controlled hub, and how to configure eavesdropper protection for any installed LANVIEWSECURE MIMs. You can access the Security application from the icon menu, the Hub View, or the command line.

1-2

Using the EMM-E6 User’s Guide

Page 10
Image 10
Cabletron Systems manual Using the EMM-E6 User’s Guide