v

Contents

Refreshing the Station List....................................................................................5-4
Monitoring Ring and Station Statistics...................................................................... 5-4
Creating a Pie Chart.............................................................................................. 5-5
Creating a Graph or Meter................................................................................... 5-6
Ring and Station Variables...........................................................................................5-8
General.................................................................................................................... 5-8
Protocols..................................................................................................................5-8
Frame Sizes............................................................................................................. 5-9
Isolating Errors....................................................................................................... 5-9
Non-Isolating Errors............................................................................................5-10
Chapter 6 Ring Security Configuration

About Ring Security..................................................................................................... 6-1
Launching the Security Configuration Window...................................................... 6-2
Configuring Security.................................................................................................... 6-7
Building the Allowed List Automatically.......................................................... 6-7
Adding New Stations to the Allowed or Disallowed Stations List................ 6-7
Deleting Stations from the Allowed or Disallowed Lists.................................6-8
Moving a Station Between the Allowed and Disallowed Stations List..........6-9
Clearing All Entries in the Allowed or Disallowed List...................................6-9
Changing the Ring Security Mode.................................................................... 6-10
Appendix A TRMMIM MIB Structure

IETF MIB Support........................................................................................................ A-1
TRMMIM MIB Structure.............................................................................................A-1
A Brief Word About MIB Components and Community Names..................A-3