Introduction
The
Following is a description of the applications covered in this guide; while we provide as much background information as we can, we do assume that you’re familiar with Ethernet networks and general network management concepts:
•Chapter 1, Introduction, provides a list of related documentation, describes certain software conventions, and shows you how to contact the Cabletron Systems Global Call Center.
•Chapter 2, Using the
•Chapter 3, Alarm Configuration, describes how to set thresholds and enable or disable alarms at the network (channel), module, and port levels. You can access the Alarm Configuration application from the icon menu, the Hub View, or the command line.
•Chapter 4, Link/Seg Traps, describes how to configure link and segmentation traps to suit your management needs. You can access the Link/Seg Traps application from the icon menu, the Hub View, or the command line.
•Chapter 5, Redundancy, describes how to configure redundant circuits to keep your network connections up and running in the event of a single port’s failure. You can access the Redundancy application from the icon menu, the Hub View, or the command line.
•Chapter 6, Source Addressing, describes how to display the Source Address List, how to set the ageing time, and how to configure source address traps; it also discusses the effects of source address locking. You can access the Source Address application from the icon menu, the Hub View, or the command line.
•Chapter 7, Security, describes how to configure intruder protection for all MIMs installed in the
Using the |