Introduction to SPMA for the SEHI-22/24 and SEHI-32/34
applications can be accessed from the icon menu (if you are using a management platform) and from the command line (if you are running in
The SEHI User’s Guide describes how to use many of the applications included with the module; note that the instructions provided in this guide apply to the SEHI regardless of the operating system or management platform you are using. Instructions for launching each individual function from the command line
Following is a description of the applications described in this guide; while we provide as much background information as we can, we do assume that you’re familiar with Ethernet networks and general network management concepts:
•Chapter 1, Introduction to SPMA for the
•Chapter 2, Using the SEHI Hub View, describes the visual display of the Hub and explains how to use the mouse within the Hub View; the operation of some basic functions available only from within the Hub View (changing the Hub View display, opening menus and windows, enabling and disabling ports, checking device and port status, and so on) are also described.
•Chapter 3, Link/Seg Traps, describes how to configure link and segmentation traps to suit your management needs. You can access the Link/Seg Traps application from the icon menu, the Hub View, or the command line.
•Chapter 4, Redundancy, describes how to configure redundant circuits to keep your network connections up and running in the event of a single port’s failure. You can access the Redundancy application from the icon menu, the Hub View, or the command line.
•Chapter 5, Source Address, describes how to display the Source Address List, how to set the ageing time, and how to configure source address traps; it also discusses the effects of source address locking. You can access the Source Address application from the icon menu, the Hub View, or the command line.
•Chapter 6, Security, describes how to configure intruder protection for all MIMs installed in the
•Appendix A, SEHI MIB Components, lists the IETF MIBs supported by the SEHI, and describes their arrangement in a series of MIB components. A description of the objects controlled by each component is also included.
Using the SEHI User’s Guide |