Cabletron Systems EMM-E6 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Cabletron Systems EMM-E6 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Cabletron Systems EMM-E6, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Cabletron Systems EMM-E6 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Cabletron Systems EMM-E6. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Cabletron Systems EMM-E6 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Cabletron Systems EMM-E6
- Den Namen des Produzenten und das Produktionsjahr des Geräts Cabletron Systems EMM-E6
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Cabletron Systems EMM-E6
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Cabletron Systems EMM-E6 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Cabletron Systems EMM-E6 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Cabletron Systems finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Cabletron Systems EMM-E6 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Cabletron Systems EMM-E6, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Cabletron Systems EMM-E6 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    Title Page Portable Management Application for the EMM-E6 User’s Guide ®[...]

  • Seite 2

    [...]

  • Seite 3

    i Notice Cabletron Systems r eserves the right to make changes in specifications and other information contained in this document without prior notice. The reader should in all cases consult Cabletr on Systems to determine whether any such changes have been made. The hardwar e, firmware, or softwar e described in this manual is subject to change [...]

  • Seite 4

    ii Restricted Rights Notice (Applicable to licenses to the United States Government only .) 1. Use, duplication, or disclosure by the Government is subject to r estrictions as set forth in subparagraph (c) (1) (ii) of the Rights in T echnical Data and Computer Software clause at DF ARS 252.227-7013. Cabletron Systems, Inc., 35 Industrial W ay , Roc[...]

  • Seite 5

    iii Contents Chapter 1 Intr oduction Using the EMM-E6 User ’s Guide ............................................................................... 1-1 What’s NOT in the EMM-E6 User ’s Guide. . . ................................................... 1-3 Conventions ................................................................................[...]

  • Seite 6

    Contents iv Chapter 3 Alarm Configuration Using Alarm Configuration ......................................................................................... 3-2 Configuring Alarms ............................................................................................... 3-3 Setting Repeater Alarms ..........................................[...]

  • Seite 7

    v Contents Enabling Security and T raps ...................................................................................... 7-12 Repeater-level Security and T raps ..................................................................... 7-14 Module-level Security and T raps ....................................................................... 7-1[...]

  • Seite 8

    Contents vi[...]

  • Seite 9

    1-1 Chapter 1 Intr oduction How to use the EMM-E6 User’ s Guide; manual conv entions; contacting the Cabletron Systems Global Call Center ; EMM-E6 fir mware versions supported by SPMA The EMM-E6 (Ethernet Management Module for Ethernet with six ports) provides intelligence for Cabletr on Systems’ Multi-Media Access Center (MMAC) hubs. The EMM-[...]

  • Seite 10

    Introduction 1-2 Using the EMM-E6 User’ s Guide Stand-alone Launcher or the command line (if you are r unning in stand-alone mode); in addition, several applications can also be accessed from within the Hub V iew , a graphical display of the EMM-E6 and the hub it is managing. The EMM-E6 User ’ s Guide describes how to use many of the applicatio[...]

  • Seite 11

    Using the EMM-E6 User’ s Guide 1-3 Introduction • Chapter 8, Front Panel Redundancy , describes how to configure r edundancy for the two Channel D EPIM ports on the EMM-E6’s front panel. Y ou can access the Front Panel Redundancy application fr om the icon menu, the Hub V iew , or the command line. • Appendix A, EMM-E6 MIB Components , lis[...]

  • Seite 12

    Introduction 1-4 Conv entions Instructions on discovering Cabletr on devices, creating icons, and accessing the icon menus within your management platform are included in your Installing and Using SPECTRUM for ... guide. If you are using SPMA for the EMM-E6 in stand-alone mode — that is, without benefit of a specific network management system ?[...]

  • Seite 13

    Conv entions 1-5 Introduction graphical interface in use. For the sake of consistency , the following conventions will be followed throughout this and other SPMA guides. Screen Displa ys SPMA runs under a variety of differ ent operating systems and graphical user interfaces. T o maintain a consistent presentation, scr een displays in this and other[...]

  • Seite 14

    Introduction 1-6 Conv entions Some windows will also contain a button; selecting this button launches a History window ( Figure 1-2 ) which lists all footer messages that have been displayed since the window was first invoked. This window can help you keep track of management actions you have taken since launching a management application. Figure [...]

  • Seite 15

    Getting Help 1-7 Introduction If you’re using a two-button mouse, don’t worry . SPMA doesn’t make use of mouse button 2. Just click the left button for button 1 and the right mouse button when instructed to use mouse button 3. Whenever possible, we will instruct you on which mouse button to employ; however , menu buttons within SPMA applicati[...]

  • Seite 16

    EMM-E6 Fir mware 1-8 Introduction Modem Setting 8N1: 8 data bits, 1 stop bit, No parity For additional information about Cabletron Systems pr oducts, visit our W orld W ide W eb site: http://www .cabletron.com/ . For technical support, select Service and Support . EMM-E6 Firmware SPMA for the EMM-E6 has been tested against firmware versions 3.22.0[...]

  • Seite 17

    2-1 Chapter 2 Using the EMM-E6 Hub Vie w Navigating through the Hub View; monitor ing hub perf or mance; managing the hub The heart of the SPECTRUM Portable Management Application (SPMA) for the EMM-E6 is the Hub V iew , a graphical interface that gives you access to many of the functions that provide contr ol over the EMM-E6-managed hub. Using the[...]

  • Seite 18

    Using the EMM-E6 Hub View 2-2 Using the Hub View Navigating Thr ough the Hub View W ithin the Hub V iew , you can click mouse buttons in different ar eas of the window to access various menus and initiate certain management tasks. The following diagrams describe the information displayed in the Hub V iew and show you how to use the mouse to display[...]

  • Seite 19

    Using the Hub View 2-3 Using the EMM-E6 Hub View Contact Status is a color code that shows the status of the connection between SPMA and the device: • Green means a valid connection. • Blue means that SPMA is trying to r each the device but doesn’t yet know if the connection will be successful. • Red means that SPMA is unable to contact or [...]

  • Seite 20

    Using the EMM-E6 Hub View 2-4 Using the Hub View Figure 2-2. EMM-E6 Hub V iew Device Menu The Device menu lets you perform the following: • Open the Device Status window • Access the IP Address T able • Open the Polling Intervals window • Change the Port Display Form • Launch the Global Find MAC Address T ool • Start the Alarm Configur[...]

  • Seite 21

    Using the Hub View 2-5 Using the EMM-E6 Hub View If you need to call the Cabletron Systems Global Call Center about a pr oblem with the Hub V iew application, you’ll need the information provided in the Info window: Figure 2-3. Hub Information W indow Clicking mouse button 1 on the Quit button closes all Hub V iew application windows; any open ap[...]

  • Seite 22

    Using the EMM-E6 Hub View 2-6 Using the Hub View Figure 2-4. EMM-E6 Ports Using the Mouse in a Hub Vie w Module Each media interface module, or MIM, installed in the EMM-E6-controlled hub will be displayed in the hub view; use the mouse as indicated in the illustration below to access Network, Module, and Port menus and functions. EMM-E6 Menu Click[...]

  • Seite 23

    Using the Hub View 2-7 Using the EMM-E6 Hub View Figure 2-5. Mousing Around a Module Display Hub Vie w P or t Color Codes The Port Status boxes in the Hub V iew are color coded to indicate the port’s connection status. The colors are consistent for all Port Display Forms except Admin Status and FNB Channel; the exceptions are noted below . NO TE [...]

  • Seite 24

    Using the EMM-E6 Hub View 2-8 Monitoring Hub P erf or mance • Green indicates that the port is active; that is, the port has been enabled by management, has a valid Link signal (if applicable), and is able to communicate with the station at the other end of the port’s cable segment. Note that an AUI or transceiver port will display as active as[...]

  • Seite 25

    Monitoring Hub P erf or mance 2-9 Using the EMM-E6 Hub View Figure 2-6. The EMM-E6’s Device, Network, Module, and Port Menus Hub performance data available through these menus includes: • Device, Network, Module, and Port status descriptions. • Network, Module, and Port statistics, which provide a complete br eakdown of packet activity . • [...]

  • Seite 26

    Using the EMM-E6 Hub View 2-10 Monitoring Hub P erf or mance Changing the port display form via the Device menu will affect all manageable ports in the hub; using the Network menu will affect all ports on a specific channel, or network; and using the Module menu will affect all ports on the appropriate module. T o change the port display form: 1. [...]

  • Seite 27

    Monitoring Hub P erf or mance 2-11 Using the EMM-E6 Hub View • OOW (Out-of-W indow) Collisions For error type descriptions, see Checking Statistics on page 2-20 . Protocols Displays a percentage for each active port that r epresents what portion of that port’s traffic is of a particular pr otocol type. Y ou can display any one of the following[...]

  • Seite 28

    Using the EMM-E6 Hub View 2-12 Monitoring Hub P erf or mance - SEG (Segmented) indicates that the port has been segmented by the repeater due to an excessive collision level. • Admin Status displays either ON or OFF , an indication of whether management has the port enabled or disabled. A port can be ON but not operational; for example, under the[...]

  • Seite 29

    Monitoring Hub P erf or mance 2-13 Using the EMM-E6 Hub View Chec king Device Status and Updating Fr ont Panel Inf o The Device Status window is where you change the information displayed on the Hub V iew Front Panel and wher e you can see summary information about the current state of the hub. T o open the Device Status window: 1. Click on to disp[...]

  • Seite 30

    Using the EMM-E6 Hub View 2-14 Monitoring Hub P erf or mance Chassis T ype Indicates the type of hub that houses this EMM-E6 — MMAC-M3FNB, MMAC-M5FNB, and so forth — and whether or not the hub contains a shunting backplane. T o change the name, location, contact, date, or time: 1. Highlight the appropriate field and type the new v alues. 2. Pr[...]

  • Seite 31

    Monitoring Hub P erf or mance 2-15 Using the EMM-E6 Hub View or Click mouse b utton 3 on the appropriate Network Connection bo x to open the Network menu. 2. Drag down to Status and release. Figure 2-8. EMM-E6 Network Status window Note that the information in the Network Status window applies to all MIMs connected to the selected channel, regar dl[...]

  • Seite 32

    Using the EMM-E6 Hub View 2-16 Monitoring Hub P erf or mance Chec king Module Status Y ou can open a Module Status window for any manageable module in the EMM-E6-controlled hub. T o open the Module Status window: 1. Click b utton 1 in the Module T ype bo x. or Click b utton 3 in the Module Index, Module T ype , or P or t Displa y Form box to displa[...]

  • Seite 33

    Monitoring Hub P erf or mance 2-17 Using the EMM-E6 Hub View Chec king P or t Status Y ou can open a Port Status window for any port on any manageable module installed in the hub. T o open the Port Status window: 1. Click b utton 3 in the P or t Index or P or t Status box to displa y the P or t men u. 2. Drag down to Status and release. Figure 2-10[...]

  • Seite 34

    Using the EMM-E6 Hub View 2-18 Monitoring Hub P erf or mance • Not Supported — The selected port does not support the Link feature, so the EMM-E6 cannot determine link status; this value will show only for thin coax (BNC), AUI, or transceiver ports. • Unknown — The EMM-E6 can’t determine a link status. Status The port’s Status can be on[...]

  • Seite 35

    Monitoring Hub P erf or mance 2-19 Using the EMM-E6 Hub View • AUI EPIM • T ransceiver Port AUI EPIM • T wisted Pair: RJ45 EPIM • Multi-Mode Fiber: SMA EPIM • Multi-Mode Fiber: ST EPIM • Single-Mode Fiber: ST EPIM • Hardwir ed AUI EPIM • Unknown (for boards that don’ t support media type) T opology T ype Indicates how the port is [...]

  • Seite 36

    Using the EMM-E6 Hub View 2-20 Monitoring Hub P erf or mance T o view the IP Address T able: 1. Click on to access the De vice menu. 2. Drag down to IP Address T able and release. Figure 2-1 1. EMM-E6 IP Address T able Note that the I/F Description for the highlighted interface is repeated in the text box at the bottom of the window; this allows fo[...]

  • Seite 37

    Monitoring Hub P erf or mance 2-21 Using the EMM-E6 Hub View T o view hub statistics at the Network, Module, or Port levels: 1. Displa y the Network, Module, or P or t menu by clic king mouse button 3 in the appropriate area (refer to Figure 2-5 , page 2-7 ). 2. Drag down to Statistics and then right to either General/Errors or Protocols/Frames , a[...]

  • Seite 38

    Using the EMM-E6 Hub View 2-22 Monitoring Hub P erf or mance General/Error Statistics The General/Errors statistics windows display the following fields: Received Bytes The total number of bytes of data received by this network (channel), module, or port since the statistics window was opened or the Reset button was pressed. T otal Pac kets The to[...]

  • Seite 39

    Monitoring Hub P erf or mance 2-23 Using the EMM-E6 Hub View “legal” collisions, as opposed to the OOW collisions described below) are a natural by-product of a busy network; if you ar e experiencing high numbers of collisions, it may be time to redir ect network traffic by using bridges or r outers. Extremely high collision rates can also ind[...]

  • Seite 40

    Using the EMM-E6 Hub View 2-24 Monitoring Hub P erf or mance Runt Frames The total number of received packets smaller than the minimum Ethernet frame size of 64 bytes (excluding preamble). This minimum size is tied to the maximum propagation time of an Ethernet network segment — the maximum pr opagation time is 51.2 µ s, and it takes approximate[...]

  • Seite 41

    Monitoring Hub P erf or mance 2-25 Using the EMM-E6 Hub View Protocols/Frames Statistics The Protocols/Frames statistics windows display the following fields: Protocols • OSI Frames • Novell Frames • Banyan Frames • DECNet Frames • XNS (Xerox Network Systems) Frames • IP Frames • Ctron Frames • AppleT alk Frames • Other Frames Fr[...]

  • Seite 42

    Using the EMM-E6 Hub View 2-26 Monitoring Hub P erf or mance Figure 2-13. Port Source Address List The Source Address List window displays the MAC addr esses of all devices that have transmitted packets through the selected port within a time period less than the SA T’s defined aging time (addresses that have not transmitted a packet during one [...]

  • Seite 43

    Managing the Hub 2-27 Using the EMM-E6 Hub View Managing the Hub In addition to the performance information described in the preceding sections, the Hub V iew also provides you with the tools you need to configur e your hub and keep it operating properly . Hub management functions include setting polling intervals, changing a RIC MIM’s channel a[...]

  • Seite 44

    Using the EMM-E6 Hub View 2-28 Managing the Hub Figure 2-14. EMM-E6 Polling Intervals 3. T o activate the desired polling, click mouse b utton 1 on the selection box to the right of each polling type field. 4. T o change a polling inter v al, highlight the value y ou would lik e to change, and enter a new v alue in seconds. Note that the Use Defau[...]

  • Seite 45

    Managing the Hub 2-29 Using the EMM-E6 Hub View Device Configuration This polling interval controls how often a survey is conducted of the type of equipment installed in the EMM-E6-managed hub; information from this poll would change the Hub V iew to reflect the addition and/or r emoval of a MIM or MIMs. P or t Operational State This polling inte[...]

  • Seite 46

    Using the EMM-E6 Hub View 2-30 Managing the Hub Configuring RIC MIM Connections Because each RIC MIM repeats packets independently , you can insert it into the network via backplane channels B or C, or isolate it to act as a self-contained network. T o change a RIC MIM’s channel assignment: 1. Click mouse b utton 3 in the appropr iate area to di[...]

  • Seite 47

    Managing the Hub 2-31 Using the EMM-E6 Hub View mode. When configured to operate on channels B or C, the TPXMIM pr ovides its own repeating; when operating on Channel A, its ports depend on the EMM-E6 for repeater functionality . All TPXMIM ports default to channel B when first installed. T o configure FNB connectivity for the boar d as a whole:[...]

  • Seite 48

    Using the EMM-E6 Hub View 2-32 Managing the Hub If you have configured the ports on the TPXMIM so that they ar e connected to differ ent channels, the board’s Network Connection box will display a letter repr esenting each channel to which a TPXMIM port is connected. If the entire board is in stand-alone mode, thr ee dashes (---) will display; i[...]

  • Seite 49

    Managing the Hub 2-33 Using the EMM-E6 Hub View T o change a port’s topology status: 1. Click mouse b utton 3 on the appropr iate P or t Status box to open the P or t menu. 2. Drag down to T runk T ype , then right to Force T runk or Not Forced , and release. Once Source Address Locking is enabled, a port’s topology state (trunk or station) can[...]

  • Seite 50

    Using the EMM-E6 Hub View 2-34 Managing the Hub Enabling/Disab ling MIM P or ts Y ou can enable and disable ports on any manageable MIM from both the Module menu, which affects all ports on a single module, and the Port menu, which affects individual ports. T o enable or disable all ports in a module: 1. Click b utton 3 on the Module Index or Modul[...]

  • Seite 51

    3-1 Chapter 3 Alarm Configuration Using Alar m Configuration; setting repeater alar m configuration; setting por t and module alar m configuration Alarms work in conjunction with your network management system to let you know when defined thresholds have been r eached. Y ou define the conditions that will trigger an alarm using the Alarm Con?[...]

  • Seite 52

    Alar m Configuration 3-2 Using Alar m Configuration Using Alarm Configuration T o open the Alarms window from the icon: 1. Click on the appropriate EMM-E6 icon to displa y the icon menu. 2. Drag down to Alarm Configuration and release. from the Hub View: 1. In the Hub View , click on to displa y the Device men u. 2. Drag do wn to Alarm Configu[...]

  • Seite 53

    Using Alar m Configuration 3-3 Alar m Configuration Configuring Alarms While configuring alarms for your EMM-E6 you must set the threshold and timebase that will factor in triggering the alarm. From the r epeater alarms window you set an alarm timebase that applies to all enabled alarms at the repeater , module and port level; this timebase is [...]

  • Seite 54

    Alar m Configuration 3-4 Setting Repeater Alar ms Alignment If this check box is selected, all misaligned packets will be included in calculating the overall percentage of errors. A misaligned packet is one with an non-integral number of bytes; these are also sometimes r eferred to as framing errors. Runts If this check box is selected, the number[...]

  • Seite 55

    Setting Repeater Alar ms 3-5 Alar m Configuration Setting and Changing Alarms 1. In the Alar ms window , click mouse button 1 on a repeater selection in the scroll list. 2. Click mouse b utton 1 on to open the Set Repeater Alarms window . Figure 3-2. Set Repeater Alarms W indow 3. In the Set Repeater Alar ms window , select one of the alar m types[...]

  • Seite 56

    Alar m Configuration 3-6 Setting Module and P or t Alarms Setting Module and P or t Alarms The following sections describe procedur es for setting module and port alarm limits. Module-level alarms are based on the combined traf fic within a particular module, while port-level alarms are based on an individual port. Setting Module Alarms 1. In the[...]

  • Seite 57

    Setting Module and P or t Alarms 3-7 Alar m Configuration Figure 3-3. Set Module Alarms W indow 3. Select one or more modules in the scroll list. T o apply one set of conditions to all modules, y ou can either select each module in the list or use the Set Alarm For bo x at the bottom of the window to choose either Selected Modules , which applies [...]

  • Seite 58

    Alar m Configuration 3-8 Setting Module and P or t Alarms 7. If you select Ye s for Disab le Module on Alarm , the defined condition will cause the de vice to disable the module . 8. Click mouse b utton 1 on . Setting P or t Alarms 1. In the Alar ms window , click mouse button 1 on a repeater selection in the scroll list. 2. Click mouse b utton 1[...]

  • Seite 59

    Setting Module and P or t Alarms 3-9 Alar m Configuration 3. Select one or more por ts in the scroll list. T o apply one set of conditions to all por ts, you can either select each port in the list or use the Set Alarm For box at the bottom of the window to choose either Selected P orts , which applies the conditions to the por ts you selected in [...]

  • Seite 60

    Alar m Configuration 3-10 Setting Module and P or t Alarms[...]

  • Seite 61

    4-1 Chapter 4 Link/Seg T raps What are Link and Segmentation traps; enabling and disab ling these traps at the de vice, module, and por t lev els Among the traps which Cabletron devices ar e designed to generate are traps that indicate when a repeater port gains or loses a link signal, when the r epeater segments (disconnects) a port due to collisi[...]

  • Seite 62

    Link/Seg T raps 4-2 What is a Link T r ap? What is a Link T rap? Some Cabletron Ethernet r epeater ports — including RJ45 twisted pair and fiber optic ports — generate a link signal to monitor the status of their connection with the device at the other end of the cable segment. If the cable is removed or br oken, the port’s link status goes [...]

  • Seite 63

    Enabling and Disab ling Link/Seg T r aps 4-3 Link/Seg T raps from the Hub View: 1. Click on to displa y the Device men u. 2. Drag down to Link/Seg T raps and release. from the command line (stand-alone mode): 1. F rom the appropr iate director y , type spmarun r4hwtr <IP address> <community name> The main Repeater Link/Seg T raps window[...]

  • Seite 64

    Link/Seg T raps 4-4 Enab ling and Disabling Link/Seg T raps Configuring Link/Seg T raps f or the Repeater T o enable or disable Link and Segmentation traps for all ports on a repeater: 1. In the Repeater Link/Seg T raps windo w , click mouse b utton 1 on the repeater interf ace for which y ou would like to configure link and segmentation traps . [...]

  • Seite 65

    Enabling and Disab ling Link/Seg T r aps 4-5 Link/Seg T raps Figure 4-3. The Module T raps W indow 3. In the Module T raps windo w , click mouse b utton 1 to select the module f or which you wish to configure link and segmentation tr aps. If the Set T rap Status For field displa ys Selected Modules (the def ault setting), y ou can clic k to selec[...]

  • Seite 66

    Link/Seg T raps 4-6 Enab ling and Disabling Link/Seg T raps Viewing and Configuring Link/Seg T raps f or P or ts T o enable or disable Link and Segmentation traps for individual ports: 1. In the Repeater Link/Seg T raps windo w , select a repeater in the scroll list. 2. Click mouse b utton 1 on ; the por t traps window , Figure 4-4 , will appear .[...]

  • Seite 67

    Enabling and Disab ling Link/Seg T r aps 4-7 Link/Seg T raps 5. Click on the appropriate selection in the Segmenting T raps field to Enable or Disable segmenting traps , as desired. 6. Click on to sa ve y our changes; click on to e xit the window .[...]

  • Seite 68

    Link/Seg T raps 4-8 Enab ling and Disabling Link/Seg T raps[...]

  • Seite 69

    5-1 Chapter 5 Repeater Redundanc y This chapter describes how to configure and enable redundant circuits Setting Netw ork Cir cuit Redundancy The redundancy application gives you the ability to define r edundant circuits for your EMM-E6 to ensure that critical network connections r emain operational. Each circuit has a designated primary port and[...]

  • Seite 70

    Repeater Redundancy 5-2 Setting Network Circuit Redundancy from the command line (stand-alone mode) 1. F rom the appropr iate director y , type: spmarun r4red <IP address> <community name> The main Repeater Redundancy window , Figure 5-1 , will appear . Figure 5-1. The Repeater Redundancy W indow Configuring a Redundant Cir cuit T o es[...]

  • Seite 71

    Setting Network Circuit Redundancy 5-3 Repeater Redundancy Figure 5-2. The Channel X Redundancy W indow 2. If you w ant to change a circuit’ s name or the number of retries, highlight the appropriate circuit and click . The Change Circuit window , Figure 5-3 , will appear . Figure 5-3. The Change Circuit W indow[...]

  • Seite 72

    Repeater Redundancy 5-4 Setting Network Circuit Redundancy In the appropriate box es, enter a new circuit name (up to 16 alphan umeric characters) and/or number of retries; Retries is the number of times the EMM-E6 tests the connection to the first IP address listed in the Circuit Addresses window bef ore it gives up and mov es on to the next addr[...]

  • Seite 73

    Setting Network Circuit Redundancy 5-5 Repeater Redundancy 5. By def ault, all por ts are created as Inactive Backup por ts. Y ou should set one por t to be the Pr imar y por t and one por t to be the Activ e por t. T ypically , the same por t is both Pr imar y and Active b ut this is not required. T o select primar y and activ e ports, click b utt[...]

  • Seite 74

    Repeater Redundancy 5-6 Monitoring Redundancy Monitoring Redundancy Once you have configured your r edundant circuits, you can use the fields in the All Circuits box to set the parameters that the EMM-E6 uses to periodically test each of the circuits. The EMM-E6 automatically polls all enabled cir cuits through the Primary port and all Backup por[...]

  • Seite 75

    6-1 Chapter 6 Sour ce Addressing Displa ying the Source Address list; setting the Aging Time; selecting the Hash T ype; effects of Source Address Locking; configur ing Source Address traps; finding a Source Address Displa ying the Sour ce Address List The Source Address List, or T able (SA T), contains the MAC address and its associated vendor na[...]

  • Seite 76

    Source Addressing 6-2 Displa ying the Source Address List The Repeater Source Address window , Figur e 6-1 , will appear . Figure 6-1. The Repeater Source Address W indow The Repeater Source Address window pr ovides a list of the repeater interfaces available on the EMM-E6, as well as command buttons that allow you to display the Source Address Lis[...]

  • Seite 77

    Displa ying the Source Address List 6-3 Source Addressing T o view the source addr ess list for the device, highlight the interface for which you wish to view the SA T , then click mouse button 1 on ; the Source Address List window , Figur e 6-2 , will appear . Figure 6-2. The Source Address List W indow The Source Address List window displays addr[...]

  • Seite 78

    Source Addressing 6-4 Setting the Hash T ype Setting the Aging Time The source addr ess list Aging T ime determines the minimum amount of time an inactive source addr ess will remain in the Sour ce Address T able befor e it is purged. The sour ce address timer r uns continuously beginning at the time the device is turned on; source addr esses that [...]

  • Seite 79

    Locking Source Addresses 6-5 Source Addressing 2. Click mouse b utton 1 on ; the Channel X Source Address List window , Figure 6-2 ( page 6-3 ), will appear . 3. In the Hash T ype field, clic k mouse button 1 on the appropriate selection to apply Dec or nonDec hashing to all por ts on the selected repeater channel. 4. Click mouse b utton 1 on to s[...]

  • Seite 80

    Source Addressing 6-6 Locking Source Addresses In addition to activating the security measures as configur ed via the Security application, locking source addr esses has the following effects: • On devices running older versions of firmwar e, unlinked ports will be disabled immediately after locking has been enabled; these ports can be re- enab[...]

  • Seite 81

    Configuring Source Address T raps 6-7 Source Addressing • A port’s topology status (station or trunk) remains fixed while locking is in effect, even if the number of detected addr esses changes. • Any ports disabled due to a violation (or because they were unlinked when locking was enabled) must be manually re-enabled via their Port menus, [...]

  • Seite 82

    Source Addressing 6-8 Configuring Source Address T raps Other traps that will be sent in response to changes in sour ce addressing (even when the above traps have been disabled) include: • PortT ypeChanged traps are issued when a port’s topology status changes from station to tr unk, or vice versa. The interesting information includes the boar[...]

  • Seite 83

    Configuring Source Address T raps 6-9 Source Addressing Module- and P or t-level T raps T o set module- and port-level source addr essing traps, select the appropriate channel in the Repeater Source Address window , then click on to enable and disable module-level traps, or on to enable and disable port-level traps. As with repeater -level trap st[...]

  • Seite 84

    Source Addressing 6-10 Configuring Source Address T raps Figure 6-3. The Module Source Address T raps W indow T o enable or disable port-level traps: 1. In the P or t Source Address T raps windo w ( Figure 6-4 , below), clic k mouse button 1 to select the port or por ts f or which you wish to enable or disab le traps . If the Set T rap Status For [...]

  • Seite 85

    Finding a Source Address 6-11 Source Addressing Figure 6-4. The Port Source Address T raps W indow 2. Click on the appropriate selection in the T rap Status field to enable or disab le traps f or the selected por t(s), as desired. 3. Click on to sav e your changes . Finding a Sour ce Address Y ou can use the button to locate a source addr ess in t[...]

  • Seite 86

    Source Addressing 6-12 Finding a Source Address Figure 6-5. Find Source Address W indow 2. In the MA C Address field, enter the source address you wish to locate in a he xadecimal (XX:XX:XX:XX:XX:XX) format. 3. Click on . If the address is in the table at the time the search is initiated, the remaining fields in the window will displa y the modul[...]

  • Seite 87

    7-1 Chapter 7 Security Launching the Security application; LANVIEW SECURE defined; configur ing security; enabling security and traps at the repeater , module, and por t le vels; security on non-LANVIEW SECURE MIMs The Security application allows you to configure and manage the LANVIEW SECURE feature incorporated into the new generation of Cable[...]

  • Seite 88

    Security 7-2 What is LANVIEWsecure? from the command line (stand-alone mode): 1. F rom the appropr iate director y , type spmarun r4sec <IP address> <SU community name> The Repeater Security window , Figure 7-1 , will appear . Figure 7-1. The Repeater Security W indow The Repeater Security window provides a list of the r epeater interfa[...]

  • Seite 89

    What is LANVIEWsecure? 7-3 Security When the LANVIEW SECURE feature is enabled, it pr ovides two kinds of protection: intruder pr otection will prevent any unauthorized sour ce addresses from communicating with the network via a secur e port, and can be configur ed to secure both station and tr unk ports; eavesdropper pr otection scrambles the dat[...]

  • Seite 90

    Security 7-4 What is LANVIEWsecure? Configurable violation response Before LANVIEW SECURE , any locked port which experienced a violation was shut down automatically; now , you can choose to allow ports to remain enabled even after an unsecured addr ess has attempted to access a locked port. If you choose not to disable a port which has experience[...]

  • Seite 91

    What is LANVIEWsecure? 7-5 Security Forced non-secure status W ith the original version of LANVIEW SECURE , all ports except those which had been forced to tr unk status could be locked, and would be locked automatically if locking were enabled at the r epeater or module level. W ith the enhanced version of LANVIEW SECURE , this has changed in two [...]

  • Seite 92

    Security 7-6 Configuring Secur ity Configurable violation response Y ou can still choose to allow ports to remain enabled even after an unsecur ed address has attempted to access a locked port. If you choose not to disable a port which has experienced a violation, however , the port’s only response to an intruder will be to issue a trap after t[...]

  • Seite 93

    Configuring Secur ity 7-7 Security Figure 7-2. Channel X Port Security W indow The top portion of the window contains a list box which displays each port communicating on the selected channel, designated by module and port number . Each port’s current Lock Status, violation r esponse, Security Level, and T rap status is also displayed. Note that[...]

  • Seite 94

    Security 7-8 Configuring Secur ity 2. In the On Violation field, click to select disable if y ou want the por t or por ts to be disabled if an y unauthorized source address is detected, or select noDisable if y ou wish the por t to remain operational after a violation. Note that selecting the noDisable option eff ectively remov es intr uder prote[...]

  • Seite 95

    Configuring Secur ity 7-9 Security Figure 7-3. The Addresses W indow 3. On the left side of the window , the Learned Addresses list bo x will displa y all source addresses detected by the selected port dur ing the last aging inter val (see Chapter 6, Source Ad dress , f or more information on the aging inter val). On the right side of the window ,[...]

  • Seite 96

    Security 7-10 Configuring Secur ity Figure 7-4. Add MAC Address W indow d. Enter the desired MA C address in an xx:xx:xx:xx:xx:xx format, then click on . A confir mation window will appear; if you clic k on Ye s to secure the address, it will appear in the Secure Ad dresses list bo x. 4. T o secure addresses for additional por ts, clic k to selec[...]

  • Seite 97

    Configuring Secur ity 7-11 Security Resetting Learned Addresses Y ou can clear all learned and secured addr esses out of a port’s address table, and allow that port to begin learning (and securing) new addresses, as follows: 1. In the Repeater Security window , click mouse b utton 1 on the repeater interf ace for which y ou would like to reset l[...]

  • Seite 98

    Security 7-12 Enabling Security and T r aps transmitted clean to all ports on that channel unless security has been enabled there, too. Packets bridged to Channel A will always be transmitted clean to all ports, regar dless of lock status; however , careful bridge configuration and prudent use of each port’s forwar ding and blocking abilities ca[...]

  • Seite 99

    Enabling Security and T r aps 7-13 Security •A newSourceAddress trap is generated when a station port — one receiving packets from zer o, one, or two source addr esses — receives a packet fr om a source addr ess that is not currently in its sour ce address table. Information included in this trap includes the board number , port number , and [...]

  • Seite 100

    Security 7-14 Enabling Security and T r aps Repeater -level Security and T raps Locking ports at the repeater , or channel, level applies all applicable security (as configured via the Port Security window) to every port on the channel. T o enable or disable security and traps for all ports on a repeater: 1. In the Repeater Security window , click[...]

  • Seite 101

    Enabling Security and T r aps 7-15 Security 5. Click mouse b utton 1 on to sav e your changes; the new status will be displa yed in each field to the right of the field name. Click on to e xit the window . Module-level Security and T raps Locking ports at the module level applies all applicable protections (as configur ed via the Port Security w[...]

  • Seite 102

    Security 7-16 Enabling Security and T r aps Figure 7-6. Channel X Module Security W indow 3. Use the Set Security For field or the mouse to select the module or modules f or which you wish to configure security (note that the settings in the Set Security For field will change automatically as you clic k to select or de-select modules). 4. In the[...]

  • Seite 103

    Enabling Security and T r aps 7-17 Security P or t-level Security and T raps T o enable or disable security and/or traps at the port level: 1. In the Repeater Security window , click to selected the desired repeater interf ace, or channel, in the scroll list. 2. Click ; the Channel X P or t Secur ity window , Figure 7-7 , will appear . Figure 7-7. [...]

  • Seite 104

    Security 7-18 Enabling Security and T r aps 4. In the Security Mode field, click mouse b utton 1 on the appropr iate selection to apply Full or Continuous loc k status to the selected por t(s), or to Unlock selected por ts. (Note that if your EMM-E6 does not support the newest security enhancements, or if the group of por ts you ha ve selected inc[...]

  • Seite 105

    8-1 Chapter 8 Fr ont P anel Redundanc y This chapter describes setting up front panel redundancy Setting Fr ont P anel Redundancy When you configure fr ont panel redundancy , you designate one of the EMM-E6’s redundant fr ont panel ports as the active port and the other port as the backup. Once a redundancy scheme has been defined and enabled, [...]

  • Seite 106

    F ront Panel Redundancy 8-2 Setting F ront Panel Redundancy The Front Panel Redundancy window , Figur e 8-1 , will appear . Figure 8-1. Front Panel Redundancy W indow Configuring a Redundant Cir cuit T o configure a r edundant circuit for the fr ont panel: NO TES The spmarun script invoked first in the above command temporarily sets the environm[...]

  • Seite 107

    Setting F ront Panel Redundancy 8-3 F ront Panel Redundancy 1. Use mouse button 1 to highlight a port, either A UI #1 or A UI #2 . 2. Click on to access the Add Circuit Address window , Figure 8-2 . Figure 8-2. Add Circuit Address W indow 3. In the Add Circuit Address window , enter the IP Address of a network device and then click . Once the circu[...]

  • Seite 108

    F ront Panel Redundancy 8-4 Setting F ront Panel Redundancy[...]

  • Seite 109

    A-1 Appendix A EMM-E6 MIB Structure EMM-E6 management inf or mation base configuration IETF MIB Suppor t In addition to its proprietary featur es, the EMM-E6 currently supports the following IETF MIBs: • RFC 1213 MIB for Network Management of TCP/IP-based Internets: MIB-II • RFC 1271 Remote Network Monitoring MIB • RFC 1493 Definitions of M[...]

  • Seite 110

    EMM-E6 MIB Structure A-2 EMM-E6 MIB Structure MIB Components The EMM-E6 MIB components are described below . Note, however , that at any given time the component list displayed by your EMM-E6 may not include some of the components described below , since the EMM-E6 has the ability to alter the components which make up its MIB in response to changes[...]

  • Seite 111

    EMM-E6 MIB Structure A-3 EMM-E6 MIB Structure Repeater One, Repeater T wo, and Repeater Three The Repeater MIB components control all r epeater functionality on the EMM-E6’s three internal r epeater channels: A, B, and C. These functions include port count, port enable/disable, port status, board number , repeater statistics (packets, bytes, coll[...]

  • Seite 112

    EMM-E6 MIB Structure A-4 EMM-E6 MIB Structure Distributed LAN Monitor The Distributed LAN Monitor , or DLM, MIB component is a proprietary feature that allows you to delegate a management station’s polling responsibilities to one or more strategically placed “smart hub” devices — like an EMM-E6 — on your network, reducing overall network [...]

  • Seite 113

    EMM-E6 MIB Structure A-5 EMM-E6 MIB Structure A Brief W or d About MIB Components and Comm unity Names As mentioned above, the arrangement of the EMM-E6’s MIB into a series of components provides a tr emendous amount of flexibility in controlling access to the EMM-E6’s configuration and statistical information, since each MIB component can ha[...]

  • Seite 114

    EMM-E6 MIB Structure A-6 EMM-E6 MIB Structure[...]

  • Seite 115

    Inde x-1 Index A active port 5-5 Active Ports 2-12 Add Circuit Address 5-4 Admin Status 2-12 Advanced Router Config 1-4 Aging T ime 6-3, 6-4 aging time 2-26 alarm 3-5 Alarm Configuration 2-4, 3-2 Alarm Threshold 3-5 alarm types 3-5 Alignment Errors 2-23 A TM_MIB A-3 Audible Chassis Alarm 2-14 A vg Packet Size 2-22 B Basic Router Config 1-4 Bridg[...]

  • Seite 116

    Inde x Inde x-2 H History window 1-6 Host Services A-3 hostname 2-1 I IETF MIBs, supported by EMM-E6 A-1 inactive backup ports 5-5 intruder pr otection 7-3 IP addr ess 2-3 IP Addr ess T able 2-4 IP Services A-3 Isolated 2-30, 2-31 L LANVIEWsecure 7-2 on non-secure MIMs 7-5 learnModeChange trap 7-13 learnStateChange trap 7-13 LIM A-2 Link signal 2-8[...]

  • Seite 117

    Inde x-3 Inde x RMON Host A-4 Runt Frames 2-24 S SA T 6-1 secure addr ess assignment 7-3, 7-5 secure addr esses 7-8 secureStateChange trap 7-13 Security 2-4, 6-5 security level 7-8 security parameters 7-6 security violation response 7-4, 7-6 segmentation traps 4-1 segmented 2-8 Set T rap Status For 4-5, 4-6, 6-9, 6-10 Setting Module Alarms 3-6 Sett[...]

  • Seite 118

    Inde x Inde x-4[...]