Gebruiksaanwijzing /service van het product EMM-E6 van de fabrikant Cabletron Systems
Ga naar pagina of 118
Title Page Portable Management Application for the EMM-E6 User’s Guide ®.
.
i Notice Cabletron Systems r eserves the right to make changes in specifications and other information contained in this document without prior notice. The reader should in all cases consult Cabletr on Systems to determine whether any such changes have been made.
ii Restricted Rights Notice (Applicable to licenses to the United States Government only .) 1. Use, duplication, or disclosure by the Government is subject to r estrictions as set forth in subparagraph (c) (1) (ii) of the Rights in T echnical Data and Computer Software clause at DF ARS 252.
iii Contents Chapter 1 Intr oduction Using the EMM-E6 User ’s Guide ............................................................................... 1-1 What’s NOT in the EMM-E6 User ’s Guide. . . .................................................
Contents iv Chapter 3 Alarm Configuration Using Alarm Configuration ......................................................................................... 3-2 Configuring Alarms ...................................................................
v Contents Enabling Security and T raps ...................................................................................... 7-12 Repeater-level Security and T raps ..................................................................... 7-14 Module-level Security and T raps .
Contents vi.
1-1 Chapter 1 Intr oduction How to use the EMM-E6 User’ s Guide; manual conv entions; contacting the Cabletron Systems Global Call Center ; EMM-E6 fir mware versions supported by SPMA The EMM-E6 (Ethernet Management Module for Ethernet with six ports) provides intelligence for Cabletr on Systems’ Multi-Media Access Center (MMAC) hubs.
Introduction 1-2 Using the EMM-E6 User’ s Guide Stand-alone Launcher or the command line (if you are r unning in stand-alone mode); in addition, several applications can also be accessed from within the Hub V iew , a graphical display of the EMM-E6 and the hub it is managing.
Using the EMM-E6 User’ s Guide 1-3 Introduction • Chapter 8, Front Panel Redundancy , describes how to configure r edundancy for the two Channel D EPIM ports on the EMM-E6’s front panel. Y ou can access the Front Panel Redundancy application fr om the icon menu, the Hub V iew , or the command line.
Introduction 1-4 Conv entions Instructions on discovering Cabletr on devices, creating icons, and accessing the icon menus within your management platform are included in your Installing and Using SPECTRUM for .
Conv entions 1-5 Introduction graphical interface in use. For the sake of consistency , the following conventions will be followed throughout this and other SPMA guides. Screen Displa ys SPMA runs under a variety of differ ent operating systems and graphical user interfaces.
Introduction 1-6 Conv entions Some windows will also contain a button; selecting this button launches a History window ( Figure 1-2 ) which lists all footer messages that have been displayed since the window was first invoked. This window can help you keep track of management actions you have taken since launching a management application.
Getting Help 1-7 Introduction If you’re using a two-button mouse, don’t worry . SPMA doesn’t make use of mouse button 2. Just click the left button for button 1 and the right mouse button when instructed to use mouse button 3.
EMM-E6 Fir mware 1-8 Introduction Modem Setting 8N1: 8 data bits, 1 stop bit, No parity For additional information about Cabletron Systems pr oducts, visit our W orld W ide W eb site: http://www .cabletron.com/ . For technical support, select Service and Support .
2-1 Chapter 2 Using the EMM-E6 Hub Vie w Navigating through the Hub View; monitor ing hub perf or mance; managing the hub The heart of the SPECTRUM Portable Management Application (SPMA) for the EMM-E6 is the Hub V iew , a graphical interface that gives you access to many of the functions that provide contr ol over the EMM-E6-managed hub.
Using the EMM-E6 Hub View 2-2 Using the Hub View Navigating Thr ough the Hub View W ithin the Hub V iew , you can click mouse buttons in different ar eas of the window to access various menus and initiate certain management tasks.
Using the Hub View 2-3 Using the EMM-E6 Hub View Contact Status is a color code that shows the status of the connection between SPMA and the device: • Green means a valid connection. • Blue means that SPMA is trying to r each the device but doesn’t yet know if the connection will be successful.
Using the EMM-E6 Hub View 2-4 Using the Hub View Figure 2-2. EMM-E6 Hub V iew Device Menu The Device menu lets you perform the following: • Open the Device Status window • Access the IP Address T .
Using the Hub View 2-5 Using the EMM-E6 Hub View If you need to call the Cabletron Systems Global Call Center about a pr oblem with the Hub V iew application, you’ll need the information provided in the Info window: Figure 2-3.
Using the EMM-E6 Hub View 2-6 Using the Hub View Figure 2-4. EMM-E6 Ports Using the Mouse in a Hub Vie w Module Each media interface module, or MIM, installed in the EMM-E6-controlled hub will be displayed in the hub view; use the mouse as indicated in the illustration below to access Network, Module, and Port menus and functions.
Using the Hub View 2-7 Using the EMM-E6 Hub View Figure 2-5. Mousing Around a Module Display Hub Vie w P or t Color Codes The Port Status boxes in the Hub V iew are color coded to indicate the port’s connection status. The colors are consistent for all Port Display Forms except Admin Status and FNB Channel; the exceptions are noted below .
Using the EMM-E6 Hub View 2-8 Monitoring Hub P erf or mance • Green indicates that the port is active; that is, the port has been enabled by management, has a valid Link signal (if applicable), and is able to communicate with the station at the other end of the port’s cable segment.
Monitoring Hub P erf or mance 2-9 Using the EMM-E6 Hub View Figure 2-6. The EMM-E6’s Device, Network, Module, and Port Menus Hub performance data available through these menus includes: • Device, Network, Module, and Port status descriptions. • Network, Module, and Port statistics, which provide a complete br eakdown of packet activity .
Using the EMM-E6 Hub View 2-10 Monitoring Hub P erf or mance Changing the port display form via the Device menu will affect all manageable ports in the hub; using the Network menu will affect all ports on a specific channel, or network; and using the Module menu will affect all ports on the appropriate module.
Monitoring Hub P erf or mance 2-11 Using the EMM-E6 Hub View • OOW (Out-of-W indow) Collisions For error type descriptions, see Checking Statistics on page 2-20 . Protocols Displays a percentage for each active port that r epresents what portion of that port’s traffic is of a particular pr otocol type.
Using the EMM-E6 Hub View 2-12 Monitoring Hub P erf or mance - SEG (Segmented) indicates that the port has been segmented by the repeater due to an excessive collision level. • Admin Status displays either ON or OFF , an indication of whether management has the port enabled or disabled.
Monitoring Hub P erf or mance 2-13 Using the EMM-E6 Hub View Chec king Device Status and Updating Fr ont Panel Inf o The Device Status window is where you change the information displayed on the Hub V iew Front Panel and wher e you can see summary information about the current state of the hub.
Using the EMM-E6 Hub View 2-14 Monitoring Hub P erf or mance Chassis T ype Indicates the type of hub that houses this EMM-E6 — MMAC-M3FNB, MMAC-M5FNB, and so forth — and whether or not the hub contains a shunting backplane. T o change the name, location, contact, date, or time: 1.
Monitoring Hub P erf or mance 2-15 Using the EMM-E6 Hub View or Click mouse b utton 3 on the appropriate Network Connection bo x to open the Network menu.
Using the EMM-E6 Hub View 2-16 Monitoring Hub P erf or mance Chec king Module Status Y ou can open a Module Status window for any manageable module in the EMM-E6-controlled hub. T o open the Module Status window: 1. Click b utton 1 in the Module T ype bo x.
Monitoring Hub P erf or mance 2-17 Using the EMM-E6 Hub View Chec king P or t Status Y ou can open a Port Status window for any port on any manageable module installed in the hub. T o open the Port Status window: 1. Click b utton 3 in the P or t Index or P or t Status box to displa y the P or t men u.
Using the EMM-E6 Hub View 2-18 Monitoring Hub P erf or mance • Not Supported — The selected port does not support the Link feature, so the EMM-E6 cannot determine link status; this value will show only for thin coax (BNC), AUI, or transceiver ports.
Monitoring Hub P erf or mance 2-19 Using the EMM-E6 Hub View • AUI EPIM • T ransceiver Port AUI EPIM • T wisted Pair: RJ45 EPIM • Multi-Mode Fiber: SMA EPIM • Multi-Mode Fiber: ST EPIM • S.
Using the EMM-E6 Hub View 2-20 Monitoring Hub P erf or mance T o view the IP Address T able: 1. Click on to access the De vice menu. 2. Drag down to IP Address T able and release.
Monitoring Hub P erf or mance 2-21 Using the EMM-E6 Hub View T o view hub statistics at the Network, Module, or Port levels: 1. Displa y the Network, Module, or P or t menu by clic king mouse button 3 in the appropriate area (refer to Figure 2-5 , page 2-7 ).
Using the EMM-E6 Hub View 2-22 Monitoring Hub P erf or mance General/Error Statistics The General/Errors statistics windows display the following fields: Received Bytes The total number of bytes of data received by this network (channel), module, or port since the statistics window was opened or the Reset button was pressed.
Monitoring Hub P erf or mance 2-23 Using the EMM-E6 Hub View “legal” collisions, as opposed to the OOW collisions described below) are a natural by-product of a busy network; if you ar e experiencing high numbers of collisions, it may be time to redir ect network traffic by using bridges or r outers.
Using the EMM-E6 Hub View 2-24 Monitoring Hub P erf or mance Runt Frames The total number of received packets smaller than the minimum Ethernet frame size of 64 bytes (excluding preamble). This minimum size is tied to the maximum propagation time of an Ethernet network segment — the maximum pr opagation time is 51.
Monitoring Hub P erf or mance 2-25 Using the EMM-E6 Hub View Protocols/Frames Statistics The Protocols/Frames statistics windows display the following fields: Protocols • OSI Frames • Novell Fram.
Using the EMM-E6 Hub View 2-26 Monitoring Hub P erf or mance Figure 2-13. Port Source Address List The Source Address List window displays the MAC addr esses of all devices that have transmitted packe.
Managing the Hub 2-27 Using the EMM-E6 Hub View Managing the Hub In addition to the performance information described in the preceding sections, the Hub V iew also provides you with the tools you need to configur e your hub and keep it operating properly .
Using the EMM-E6 Hub View 2-28 Managing the Hub Figure 2-14. EMM-E6 Polling Intervals 3. T o activate the desired polling, click mouse b utton 1 on the selection box to the right of each polling type field. 4. T o change a polling inter v al, highlight the value y ou would lik e to change, and enter a new v alue in seconds.
Managing the Hub 2-29 Using the EMM-E6 Hub View Device Configuration This polling interval controls how often a survey is conducted of the type of equipment installed in the EMM-E6-managed hub; information from this poll would change the Hub V iew to reflect the addition and/or r emoval of a MIM or MIMs.
Using the EMM-E6 Hub View 2-30 Managing the Hub Configuring RIC MIM Connections Because each RIC MIM repeats packets independently , you can insert it into the network via backplane channels B or C, or isolate it to act as a self-contained network. T o change a RIC MIM’s channel assignment: 1.
Managing the Hub 2-31 Using the EMM-E6 Hub View mode. When configured to operate on channels B or C, the TPXMIM pr ovides its own repeating; when operating on Channel A, its ports depend on the EMM-E6 for repeater functionality . All TPXMIM ports default to channel B when first installed.
Using the EMM-E6 Hub View 2-32 Managing the Hub If you have configured the ports on the TPXMIM so that they ar e connected to differ ent channels, the board’s Network Connection box will display a letter repr esenting each channel to which a TPXMIM port is connected.
Managing the Hub 2-33 Using the EMM-E6 Hub View T o change a port’s topology status: 1. Click mouse b utton 3 on the appropr iate P or t Status box to open the P or t menu. 2. Drag down to T runk T ype , then right to Force T runk or Not Forced , and release.
Using the EMM-E6 Hub View 2-34 Managing the Hub Enabling/Disab ling MIM P or ts Y ou can enable and disable ports on any manageable MIM from both the Module menu, which affects all ports on a single module, and the Port menu, which affects individual ports.
3-1 Chapter 3 Alarm Configuration Using Alar m Configuration; setting repeater alar m configuration; setting por t and module alar m configuration Alarms work in conjunction with your network management system to let you know when defined thresholds have been r eached.
Alar m Configuration 3-2 Using Alar m Configuration Using Alarm Configuration T o open the Alarms window from the icon: 1. Click on the appropriate EMM-E6 icon to displa y the icon menu. 2. Drag down to Alarm Configuration and release. from the Hub View: 1.
Using Alar m Configuration 3-3 Alar m Configuration Configuring Alarms While configuring alarms for your EMM-E6 you must set the threshold and timebase that will factor in triggering the alarm.
Alar m Configuration 3-4 Setting Repeater Alar ms Alignment If this check box is selected, all misaligned packets will be included in calculating the overall percentage of errors. A misaligned packet is one with an non-integral number of bytes; these are also sometimes r eferred to as framing errors.
Setting Repeater Alar ms 3-5 Alar m Configuration Setting and Changing Alarms 1. In the Alar ms window , click mouse button 1 on a repeater selection in the scroll list. 2. Click mouse b utton 1 on to open the Set Repeater Alarms window . Figure 3-2.
Alar m Configuration 3-6 Setting Module and P or t Alarms Setting Module and P or t Alarms The following sections describe procedur es for setting module and port alarm limits. Module-level alarms are based on the combined traf fic within a particular module, while port-level alarms are based on an individual port.
Setting Module and P or t Alarms 3-7 Alar m Configuration Figure 3-3. Set Module Alarms W indow 3. Select one or more modules in the scroll list. T o apply one set of conditions to all modules, y ou .
Alar m Configuration 3-8 Setting Module and P or t Alarms 7. If you select Ye s for Disab le Module on Alarm , the defined condition will cause the de vice to disable the module . 8. Click mouse b utton 1 on . Setting P or t Alarms 1. In the Alar ms window , click mouse button 1 on a repeater selection in the scroll list.
Setting Module and P or t Alarms 3-9 Alar m Configuration 3. Select one or more por ts in the scroll list. T o apply one set of conditions to all por ts, you can either select each port in the list o.
Alar m Configuration 3-10 Setting Module and P or t Alarms.
4-1 Chapter 4 Link/Seg T raps What are Link and Segmentation traps; enabling and disab ling these traps at the de vice, module, and por t lev els Among the traps which Cabletron devices ar e designed .
Link/Seg T raps 4-2 What is a Link T r ap? What is a Link T rap? Some Cabletron Ethernet r epeater ports — including RJ45 twisted pair and fiber optic ports — generate a link signal to monitor the status of their connection with the device at the other end of the cable segment.
Enabling and Disab ling Link/Seg T r aps 4-3 Link/Seg T raps from the Hub View: 1. Click on to displa y the Device men u. 2. Drag down to Link/Seg T raps and release.
Link/Seg T raps 4-4 Enab ling and Disabling Link/Seg T raps Configuring Link/Seg T raps f or the Repeater T o enable or disable Link and Segmentation traps for all ports on a repeater: 1. In the Repeater Link/Seg T raps windo w , click mouse b utton 1 on the repeater interf ace for which y ou would like to configure link and segmentation traps .
Enabling and Disab ling Link/Seg T r aps 4-5 Link/Seg T raps Figure 4-3. The Module T raps W indow 3. In the Module T raps windo w , click mouse b utton 1 to select the module f or which you wish to configure link and segmentation tr aps.
Link/Seg T raps 4-6 Enab ling and Disabling Link/Seg T raps Viewing and Configuring Link/Seg T raps f or P or ts T o enable or disable Link and Segmentation traps for individual ports: 1. In the Repeater Link/Seg T raps windo w , select a repeater in the scroll list.
Enabling and Disab ling Link/Seg T r aps 4-7 Link/Seg T raps 5. Click on the appropriate selection in the Segmenting T raps field to Enable or Disable segmenting traps , as desired.
Link/Seg T raps 4-8 Enab ling and Disabling Link/Seg T raps.
5-1 Chapter 5 Repeater Redundanc y This chapter describes how to configure and enable redundant circuits Setting Netw ork Cir cuit Redundancy The redundancy application gives you the ability to define r edundant circuits for your EMM-E6 to ensure that critical network connections r emain operational.
Repeater Redundancy 5-2 Setting Network Circuit Redundancy from the command line (stand-alone mode) 1. F rom the appropr iate director y , type: spmarun r4red <IP address> <community name> The main Repeater Redundancy window , Figure 5-1 , will appear .
Setting Network Circuit Redundancy 5-3 Repeater Redundancy Figure 5-2. The Channel X Redundancy W indow 2. If you w ant to change a circuit’ s name or the number of retries, highlight the appropriate circuit and click . The Change Circuit window , Figure 5-3 , will appear .
Repeater Redundancy 5-4 Setting Network Circuit Redundancy In the appropriate box es, enter a new circuit name (up to 16 alphan umeric characters) and/or number of retries; Retries is the number of ti.
Setting Network Circuit Redundancy 5-5 Repeater Redundancy 5. By def ault, all por ts are created as Inactive Backup por ts. Y ou should set one por t to be the Pr imar y por t and one por t to be the Activ e por t. T ypically , the same por t is both Pr imar y and Active b ut this is not required.
Repeater Redundancy 5-6 Monitoring Redundancy Monitoring Redundancy Once you have configured your r edundant circuits, you can use the fields in the All Circuits box to set the parameters that the EMM-E6 uses to periodically test each of the circuits.
6-1 Chapter 6 Sour ce Addressing Displa ying the Source Address list; setting the Aging Time; selecting the Hash T ype; effects of Source Address Locking; configur ing Source Address traps; finding .
Source Addressing 6-2 Displa ying the Source Address List The Repeater Source Address window , Figur e 6-1 , will appear . Figure 6-1. The Repeater Source Address W indow The Repeater Source Address w.
Displa ying the Source Address List 6-3 Source Addressing T o view the source addr ess list for the device, highlight the interface for which you wish to view the SA T , then click mouse button 1 on ; the Source Address List window , Figur e 6-2 , will appear .
Source Addressing 6-4 Setting the Hash T ype Setting the Aging Time The source addr ess list Aging T ime determines the minimum amount of time an inactive source addr ess will remain in the Sour ce Address T able befor e it is purged.
Locking Source Addresses 6-5 Source Addressing 2. Click mouse b utton 1 on ; the Channel X Source Address List window , Figure 6-2 ( page 6-3 ), will appear . 3. In the Hash T ype field, clic k mouse button 1 on the appropriate selection to apply Dec or nonDec hashing to all por ts on the selected repeater channel.
Source Addressing 6-6 Locking Source Addresses In addition to activating the security measures as configur ed via the Security application, locking source addr esses has the following effects: • On.
Configuring Source Address T raps 6-7 Source Addressing • A port’s topology status (station or trunk) remains fixed while locking is in effect, even if the number of detected addr esses changes.
Source Addressing 6-8 Configuring Source Address T raps Other traps that will be sent in response to changes in sour ce addressing (even when the above traps have been disabled) include: • PortT ypeChanged traps are issued when a port’s topology status changes from station to tr unk, or vice versa.
Configuring Source Address T raps 6-9 Source Addressing Module- and P or t-level T raps T o set module- and port-level source addr essing traps, select the appropriate channel in the Repeater Source Address window , then click on to enable and disable module-level traps, or on to enable and disable port-level traps.
Source Addressing 6-10 Configuring Source Address T raps Figure 6-3. The Module Source Address T raps W indow T o enable or disable port-level traps: 1. In the P or t Source Address T raps windo w ( Figure 6-4 , below), clic k mouse button 1 to select the port or por ts f or which you wish to enable or disab le traps .
Finding a Source Address 6-11 Source Addressing Figure 6-4. The Port Source Address T raps W indow 2. Click on the appropriate selection in the T rap Status field to enable or disab le traps f or the selected por t(s), as desired. 3. Click on to sav e your changes .
Source Addressing 6-12 Finding a Source Address Figure 6-5. Find Source Address W indow 2. In the MA C Address field, enter the source address you wish to locate in a he xadecimal (XX:XX:XX:XX:XX:XX) format.
7-1 Chapter 7 Security Launching the Security application; LANVIEW SECURE defined; configur ing security; enabling security and traps at the repeater , module, and por t le vels; security on non-LAN.
Security 7-2 What is LANVIEWsecure? from the command line (stand-alone mode): 1. F rom the appropr iate director y , type spmarun r4sec <IP address> <SU community name> The Repeater Security window , Figure 7-1 , will appear .
What is LANVIEWsecure? 7-3 Security When the LANVIEW SECURE feature is enabled, it pr ovides two kinds of protection: intruder pr otection will prevent any unauthorized sour ce addresses from communic.
Security 7-4 What is LANVIEWsecure? Configurable violation response Before LANVIEW SECURE , any locked port which experienced a violation was shut down automatically; now , you can choose to allow ports to remain enabled even after an unsecured addr ess has attempted to access a locked port.
What is LANVIEWsecure? 7-5 Security Forced non-secure status W ith the original version of LANVIEW SECURE , all ports except those which had been forced to tr unk status could be locked, and would be locked automatically if locking were enabled at the r epeater or module level.
Security 7-6 Configuring Secur ity Configurable violation response Y ou can still choose to allow ports to remain enabled even after an unsecur ed address has attempted to access a locked port.
Configuring Secur ity 7-7 Security Figure 7-2. Channel X Port Security W indow The top portion of the window contains a list box which displays each port communicating on the selected channel, designated by module and port number . Each port’s current Lock Status, violation r esponse, Security Level, and T rap status is also displayed.
Security 7-8 Configuring Secur ity 2. In the On Violation field, click to select disable if y ou want the por t or por ts to be disabled if an y unauthorized source address is detected, or select noDisable if y ou wish the por t to remain operational after a violation.
Configuring Secur ity 7-9 Security Figure 7-3. The Addresses W indow 3. On the left side of the window , the Learned Addresses list bo x will displa y all source addresses detected by the selected port dur ing the last aging inter val (see Chapter 6, Source Ad dress , f or more information on the aging inter val).
Security 7-10 Configuring Secur ity Figure 7-4. Add MAC Address W indow d. Enter the desired MA C address in an xx:xx:xx:xx:xx:xx format, then click on . A confir mation window will appear; if you clic k on Ye s to secure the address, it will appear in the Secure Ad dresses list bo x.
Configuring Secur ity 7-11 Security Resetting Learned Addresses Y ou can clear all learned and secured addr esses out of a port’s address table, and allow that port to begin learning (and securing) new addresses, as follows: 1.
Security 7-12 Enabling Security and T r aps transmitted clean to all ports on that channel unless security has been enabled there, too. Packets bridged to Channel A will always be transmitted clean to.
Enabling Security and T r aps 7-13 Security •A newSourceAddress trap is generated when a station port — one receiving packets from zer o, one, or two source addr esses — receives a packet fr om a source addr ess that is not currently in its sour ce address table.
Security 7-14 Enabling Security and T r aps Repeater -level Security and T raps Locking ports at the repeater , or channel, level applies all applicable security (as configured via the Port Security window) to every port on the channel. T o enable or disable security and traps for all ports on a repeater: 1.
Enabling Security and T r aps 7-15 Security 5. Click mouse b utton 1 on to sav e your changes; the new status will be displa yed in each field to the right of the field name.
Security 7-16 Enabling Security and T r aps Figure 7-6. Channel X Module Security W indow 3. Use the Set Security For field or the mouse to select the module or modules f or which you wish to configure security (note that the settings in the Set Security For field will change automatically as you clic k to select or de-select modules).
Enabling Security and T r aps 7-17 Security P or t-level Security and T raps T o enable or disable security and/or traps at the port level: 1. In the Repeater Security window , click to selected the desired repeater interf ace, or channel, in the scroll list.
Security 7-18 Enabling Security and T r aps 4. In the Security Mode field, click mouse b utton 1 on the appropr iate selection to apply Full or Continuous loc k status to the selected por t(s), or to Unlock selected por ts.
8-1 Chapter 8 Fr ont P anel Redundanc y This chapter describes setting up front panel redundancy Setting Fr ont P anel Redundancy When you configure fr ont panel redundancy , you designate one of the EMM-E6’s redundant fr ont panel ports as the active port and the other port as the backup.
F ront Panel Redundancy 8-2 Setting F ront Panel Redundancy The Front Panel Redundancy window , Figur e 8-1 , will appear . Figure 8-1. Front Panel Redundancy W indow Configuring a Redundant Cir cuit.
Setting F ront Panel Redundancy 8-3 F ront Panel Redundancy 1. Use mouse button 1 to highlight a port, either A UI #1 or A UI #2 . 2. Click on to access the Add Circuit Address window , Figure 8-2 . Figure 8-2. Add Circuit Address W indow 3. In the Add Circuit Address window , enter the IP Address of a network device and then click .
F ront Panel Redundancy 8-4 Setting F ront Panel Redundancy.
A-1 Appendix A EMM-E6 MIB Structure EMM-E6 management inf or mation base configuration IETF MIB Suppor t In addition to its proprietary featur es, the EMM-E6 currently supports the following IETF MIB.
EMM-E6 MIB Structure A-2 EMM-E6 MIB Structure MIB Components The EMM-E6 MIB components are described below . Note, however , that at any given time the component list displayed by your EMM-E6 may not .
EMM-E6 MIB Structure A-3 EMM-E6 MIB Structure Repeater One, Repeater T wo, and Repeater Three The Repeater MIB components control all r epeater functionality on the EMM-E6’s three internal r epeater channels: A, B, and C.
EMM-E6 MIB Structure A-4 EMM-E6 MIB Structure Distributed LAN Monitor The Distributed LAN Monitor , or DLM, MIB component is a proprietary feature that allows you to delegate a management station’s .
EMM-E6 MIB Structure A-5 EMM-E6 MIB Structure A Brief W or d About MIB Components and Comm unity Names As mentioned above, the arrangement of the EMM-E6’s MIB into a series of components provides a .
EMM-E6 MIB Structure A-6 EMM-E6 MIB Structure.
Inde x-1 Index A active port 5-5 Active Ports 2-12 Add Circuit Address 5-4 Admin Status 2-12 Advanced Router Config 1-4 Aging T ime 6-3, 6-4 aging time 2-26 alarm 3-5 Alarm Configuration 2-4, 3-2 Al.
Inde x Inde x-2 H History window 1-6 Host Services A-3 hostname 2-1 I IETF MIBs, supported by EMM-E6 A-1 inactive backup ports 5-5 intruder pr otection 7-3 IP addr ess 2-3 IP Addr ess T able 2-4 IP Se.
Inde x-3 Inde x RMON Host A-4 Runt Frames 2-24 S SA T 6-1 secure addr ess assignment 7-3, 7-5 secure addr esses 7-8 secureStateChange trap 7-13 Security 2-4, 6-5 security level 7-8 security parameters.
Inde x Inde x-4.
Een belangrijk punt na aankoop van elk apparaat Cabletron Systems EMM-E6 (of zelfs voordat je het koopt) is om de handleiding te lezen. Dit moeten wij doen vanwege een paar simpele redenen:
Als u nog geen Cabletron Systems EMM-E6 heb gekocht dan nu is een goed moment om kennis te maken met de basisgegevens van het product. Eerst kijk dan naar de eerste pagina\'s van de handleiding, die je hierboven vindt. Je moet daar de belangrijkste technische gegevens Cabletron Systems EMM-E6 vinden. Op dit manier kan je controleren of het apparaat aan jouw behoeften voldoet. Op de volgende pagina's van de handleiding Cabletron Systems EMM-E6 leer je over alle kenmerken van het product en krijg je informatie over de werking. De informatie die je over Cabletron Systems EMM-E6 krijgt, zal je zeker helpen om een besluit over de aankoop te nemen.
In een situatie waarin je al een beziter van Cabletron Systems EMM-E6 bent, maar toch heb je de instructies niet gelezen, moet je het doen voor de hierboven beschreven redenen. Je zult dan weten of je goed de alle beschikbare functies heb gebruikt, en of je fouten heb gemaakt die het leven van de Cabletron Systems EMM-E6 kunnen verkorten.
Maar de belangrijkste taak van de handleiding is om de gebruiker bij het oplossen van problemen te helpen met Cabletron Systems EMM-E6 . Bijna altijd, zal je daar het vinden Troubleshooting met de meest voorkomende storingen en defecten #MANUAl# samen met de instructies over hun opplosinge. Zelfs als je zelf niet kan om het probleem op te lossen, zal de instructie je de weg wijzen naar verdere andere procedure, bijv. door contact met de klantenservice of het dichtstbijzijnde servicecentrum.