FDDI Management

!

CAUTION

The following table summarizes the FDDI connection rules:

Table 6-1. FDDI Connection Rules

 

A

B

S

M

 

 

 

 

 

A

V, U

V

V, U

V, P

 

 

 

 

 

B

V

V, U

V, U

V, P

 

 

 

 

 

S

V, U

V, U

V

V

 

 

 

 

 

M

V

V

V

X

 

 

 

 

 

V—valid connection X —illegal connection

U —undesirable (but legal) connection; this requires that SMT is notified. P —valid, but when both A and B are connected to M ports (a dual-homing

configuration), only the B connection is used.

Though technically legal under FDDI connection rules, undesirable connections will cause a twisted or wrapped ring.

Each SMT entity maintains its own connection policy; however, when two interfaces attempt to connect, their combined established connection policies dictate the connections that will be allowed. In an attempted connection between two nodes, the most lenient policy will determine whether the connection (as long as it is legal) can be made. For example, if two FDDI nodes attempt an A—>A connection, and this connection is not allowed at one FDDI node but allowed at the other, the connection would be accepted. If the connection policy at both nodes disallows the connection, the connection will be rejected.

This is a read-only window; you currently cannot edit the HSIM-F6’s connection policy via NetSight Element Manager.

Viewing FDDI Information

6-7

Page 198
Image 198
Enterasys Networks 6000, Matrix E7 manual Fddi Management