Managing Ethernet MicroLAN Switches

Information included in a Link State trap will include the board number and port number associated with the trap.

Segmentation Traps

Ethernet repeaters count collisions at each port. If a port experiences 32 consecutive collisions, or if the port’s collision detector is on for more than

2-3 µs, the repeater segments the port to isolate the source of the collisions from the rest of the network. When the repeater segments a port, it generates a portSegmenting trap. As soon as a segmented port receives a good packet, the repeater reconnects the port to the network and generates a portUnsegmenting trap.

Because they do not support the Link signal, unterminated BNC (thin coax) ports appear as segmented. When you attach a thin coax cable or a terminator to a port, the repeater generates a portUnsegmenting trap; when you remove the cable or terminator, the repeater generates a portSegmenting trap. As mentioned above, these traps can serve as notification of changes in link status. Note, too, that devices at both ends of the cable segment will generate the portSegmenting and portUnsegmenting traps, even if only one end of the cable has been disconnected.

Information included in a Segmentation trap will include the board number and port number associated with the trap.

Source Address Traps

The Ethernet MicroLAN Switch can issue several different traps in response to changes in a port’s Source Address Table:

A newSourceAddress trap is generated when a station port – one receiving packets from no source addresses, or from one or two source addresses – receives a packet from a source address that is not currently in its source address table. Information included in this trap includes the module number, port number, and source address associated with the trap. Trunk ports – those receiving packets from three or more source addresses – will not issue newSourceAddress traps.

NOTE

Some older repeater devices, and devices with older versions of firmware may include a slightly different definition of station and trunk status: station ports are defined as those receiving packets from zero or one source addresses; trunk ports are defined as those receiving packets from two or more source addresses. If you have any questions about whether your device or firmware version falls into this older category, or if you would like information about upgrading your device firmware, contact the Global Technical Assistance Center.

A sourceAddressTimeout trap is issued anytime a source address is aged out of the Source Address Table due to inactivity. The trap’s interesting information includes the module and port index, and the source address that timed out.

PortTypeChanged traps are issued when a port’s topology status changes from station to trunk, or vice versa. The interesting information includes the module and port index, and the port’s new topology status.

5-22

Trap Selection

Page 150
Image 150
Enterasys Networks 2000 manual Segmentation Traps, Source Address Traps

2000 specifications

Enterasys Networks, a key player in the networking space in 2000, was renowned for its innovative solutions that combined high-performance networking with robust security features. Founded with the vision of providing enterprise-level networking infrastructure, Enterasys positioned itself to cater to the growing demands of business networks during the dot-com boom.

One of the main features of Enterasys Networks was its focus on delivering secure, scalable networking solutions that could seamlessly integrate with existing enterprise systems. The company developed a range of products including switches, routers, and wireless solutions that were designed to optimize performance while ensuring security at every layer. Their core offerings provided businesses with the reliability required to handle increasing volumes of data traffic.

A standout technology of Enterasys was its identity and access management solutions. These technologies allowed organizations to control who could access network resources and under what conditions. This was particularly crucial in a time when cyber threats were on the rise, and businesses were becoming more aware of the need for strict network security protocols. The features included role-based access control and authentication measures, which were fundamental in safeguarding sensitive information.

Enterasys also introduced intelligent networking features, which enabled dynamic traffic management and prioritization. This technology helped organizations optimize their network performance by automatically adjusting to changing workload demands. Such capabilities were essential for businesses relying on bandwidth-intensive applications and services.

The company also embraced the rising trend of wireless networking, providing solutions that combined wired and wireless technologies for a unified experience. Enterasys Wireless LAN solutions were groundbreaking at the time, offering seamless connectivity and security to mobile devices, thereby enhancing productivity and flexibility within enterprise environments.

In addition to hardware, Enterasys developed network management software that simplified the administration of complex networks. This software enabled IT professionals to monitor performance, troubleshoot issues, and implement security policies efficiently.

Overall, Enterasys Networks in 2000 was characterized by its commitment to delivering secure, intelligent networking solutions that catered to the needs of modern enterprises. With its innovative technologies and features, Enterasys played a significant role in shaping the networking landscape, laying the groundwork for future advancements in network security and management.