LEC Priority Queues Screen

SEARCH (Command)

Performs a search of the LEC ARP Cache based on the search term specified in the ADDR or VPI/VCI fields below the Search By field. This command is only available if a valid search term is entered.

3.15.1 Performing a Search

To perform a LEC ARP cache search, perform the following steps:

1.Use the arrow keys to highlight the LEC Index field.

2.Use the SPACE bar to move through the available indexes until the appropriate LEC Index displays.

3.Use the arrow keys to highlight the Search By field.

4.Press the SPACE bar to toggle through the options until the desired search method displays.

5.Use the arrow keys to move to the field that displays below the Search By field.

6.Enter the search term. Depending on the setting of the Search By field, enter one of the following items:

an ATM address

a VPI, VCI pair

a MAC address

7.Use the arrow keys to highlight the SEARCH command at the bottom of the screen and press

ENTER.

When the search is completed, the screen refreshes with the results of the search.

3.16 LEC PRIORITY QUEUES SCREEN

The LEC Priority Queues screen is used to assign up to eight 802.1P priorities to a LEC.

To access the LEC Priority Queues screen from the LAN Emulation Clients menu screen, perform the following steps:

1.Use the arrow keys to highlight the LEC TRANSMIT QUEUES menu item of the LAN Emulation Clients screen.

2.Press ENTER. The LEC Priority Queues screen, Figure 3-19, displays.

3-54Local Management

Page 88
Image 88
Enterasys Networks VHSIM2-A6DP manual Performing a Search, LEC Priority Queues Screen, Search Command

VHSIM2-A6DP specifications

Enterasys Networks VHSIM2-A6DP is a versatile component designed to enhance the efficiency and functionality of network infrastructure. This module is part of the Enterasys family of products, known for their reliability and advanced networking capabilities. The VHSIM2-A6DP is specifically engineered to support a range of applications, particularly in enterprise environments.

One of the most notable features of the VHSIM2-A6DP is its ability to provide high-density connectivity. This module supports multiple ports, allowing businesses to connect numerous devices seamlessly. This high-capacity connectivity is crucial for organizations looking to expand their network without significant overhauls, thus reducing operational costs.

In terms of technologies, the VHSIM2-A6DP is built on the foundation of robust Ethernet standards, which ensures compatibility with a wide variety of devices and systems. It supports both Power over Ethernet (PoE) capabilities and standard Ethernet connections, which enables the simultaneous delivery of power and data to connected devices. This is particularly useful for powering devices like IP cameras, VoIP phones, and wireless access points without needing separate power sources.

The VHSIM2-A6DP also incorporates support for advanced security features. With the growing importance of cybersecurity, this module includes capabilities to enhance network protection, safeguarding sensitive data and maintaining compliance with industry standards. This includes features like secure authentication, encryption protocols, and traffic segmentation, which together contribute to a more secure network environment.

Additionally, the module is designed with ease of management in mind. It comes equipped with user-friendly interfaces and is compatible with Enterasys' management software tools, allowing for streamlined network administration. Administrators can easily monitor performance metrics, configure settings, and deploy firmware updates, all contributing to reduced downtime and improved network performance.

Scalability is another key characteristic of the VHSIM2-A6DP. Organizations can start with a basic configuration and expand as needed without significant changes to the existing infrastructure. This adaptability makes it an ideal choice for companies looking to grow while maintaining cost efficiency.

Overall, the Enterasys Networks VHSIM2-A6DP stands out in its category thanks to its high-density connectivity, support for advanced technologies, robust security features, ease of management, and scalability. These characteristics make it a valuable asset in the toolkit of any IT department aiming to build a flexible and secure networking environment.