Enterasys Networks 2.2.1 Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Enterasys Networks 2.2.1 an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Enterasys Networks 2.2.1, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Enterasys Networks 2.2.1 die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Enterasys Networks 2.2.1. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Enterasys Networks 2.2.1 sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Enterasys Networks 2.2.1
- Den Namen des Produzenten und das Produktionsjahr des Geräts Enterasys Networks 2.2.1
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Enterasys Networks 2.2.1
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Enterasys Networks 2.2.1 zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Enterasys Networks 2.2.1 und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Enterasys Networks finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Enterasys Networks 2.2.1 zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Enterasys Networks 2.2.1, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Enterasys Networks 2.2.1 widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    Generic SNMP User Guide[...]

  • Seite 2

    [...]

  • Seite 3

    i Notice Enterasys Networks r e s er v es the right to m a k e changes i n specificatio ns an d other in format i on contained i n this document without prio r notic e . The re ader should in a ll cas e s consult Enterasys Networks to determine whether any such changes have been made. The ha rd wa r e , firmwa r e, or softw a r e described in this [...]

  • Seite 4

    ii AppleT alk, Apple, Macintosh, and T okenT alk ar e register ed trademarks; and Apple Remote Access and EtherT alk ar e trademarks of Apple Computer , Inc. SmartBoost is a trademark of American Power Conversion ST is a registered trademark and C++ is a trademark of A T&T Banyan and VINES a re r egistered tra demarks of Banyan Systems, Inc. ci[...]

  • Seite 5

    iii ANNEX, ANNEX-II , ANN E X- IIe , ANNEX-3, ANNEX-802.5, MICRO-ANN E X-XL, and MICRO- ANNEX-ELS are trademarks of X ylogics, In c. MAXserver and Xy ple x a r e trademarks o f Xyplex, Inc. Restricted Rights Notice (Applicable to licenses to the Unite d States Government on l y .) 1. Use , duplication, or disclosu r e by th e Governmen t is subject[...]

  • Seite 6

    iv[...]

  • Seite 7

    v Contents Chapter 1 Intr o duction Using the Generic SNMP User ’s Guide ............. ....................... ................. ................ 1-1 Related Manuals........................ ....................... ................. ............................ ................ 1-2 Useful Definitions ............... ....................... .......[...]

  • Seite 8

    Contents vi Chapter 7 Using the IP Ro uting T able Window Modifying Entries in the IP Routing T able .................... ................ ..................... 7- 5 Chapter 8 Using the N et to Media T a bl e Editing the Net to Media T able ...................... ........... ................. .......................... 8-2 Modifying Entries in the [...]

  • Seite 9

    1-1 Chapter 1 Intr oduction How to use this guide; r elated guide s; useful definiti ons; software c on ventions; ge tting help W elcom e to the Generic SNMP User ’s Guide. This guide is a reference for using NetSight Element Manager to m anage and contr o l any SNMP-compliant devices on yo ur netw ork. Using the G eneric SNMP User’ s Guide Thi[...]

  • Seite 10

    Introductio n 1-2 Related Ma nuals Chapter 7, Using the I P Routing T able W indow , discusses the IP Routing T a ble and how to route data through your netw ork. Chapter 8, Using the Net to Media T able , discusses the IP Address T ranslation T able used for mapping IP addr esses to physical addresses for IP datagram s. Chapter 9, V iewing I CMP G[...]

  • Seite 11

    Useful Def initions 1-3 Introductio n Active open A sequence of events occurring when a n entity using an application pr otocol of the Internet suite (such as SMTP—the E-mail pr otocol; F TP—File T ransfer Protoco l; or T elnet—terminal service pr otocol) dir ects the T ransmission Contr ol Protocol to establish a connection over the ph ysica[...]

  • Seite 12

    Introductio n 1-4 Useful De finitions Theref ore, a site’s core gateway must have r o uting information on all networks availabl e within the aut onomous site, an d must be able to pass reachabilit y (of other Internet sites) informa tion (using EGP) to each network gatewa y in that site. Flags The contr ol bits indicating special functions for a[...]

  • Seite 13

    Useful Def initions 1-5 Introductio n Maximum transmission unit (MTU) The lar gest amount of user -data (e.g. the lar gest size of an IP datagram) that can be sent in a single f rame on a particular medium. P assive open A sequence of events occurring when a n entity using an application pr otocol of the Internet suite (e.g., SMTP , F TP , SNMP , o[...]

  • Seite 14

    Introductio n 1-6 Soft war e Con v ention s Subnet A physical netw ork within th e IP network. Subnet mask A 32-bit quantity (fo ur binary octets) that filters a destination IP addr ess to determine whether it exists on the sour ce IP’s subnetwork and therefo re can be reach ed dir ectly , or must be forwar ded through a gateway or r outer . In t[...]

  • Seite 15

    Software Conventions 1-7 Introductio n Using the M ouse This document a ssu mes you are using a W indows-com patible mouse with two buttons; if you are using a three-button mouse, you shoul d ignore the operation of the middle button when fol lowing procedures in this document. Procedures within the NetSig ht Element Manager document set refer to t[...]

  • Seite 16

    Introductio n 1-8 Soft war e Con v ention s • Draggi ng means to move the mouse pointer acr oss the screen while holding the mouse button down. It is often used for drag-and-drop operations to copy information fr om one window of the scr een into another , and to highlight editable text. Common Ge neric SNMP Window Fields Similar descriptive info[...]

  • Seite 17

    Getting H elp 1-9 Introductio n An OK , Set , or App ly button appears in windows that have configurable values; it allow s you to confirm and SET changes you have made to those valu es. In some windows, yo u may have to use this butt on to confirm each individual set; in other windows, you can set several values at once an d confirm the sets with [...]

  • Seite 18

    Introductio n 1-10 Getting Help Getting Help fr om the Global T echnical Assistance Center If you need techn ical support related to NetSight E l ement Manager, co ntact the Global T echnical A ssistanc e Center via one of the f ollowing methods: By phone: (603) 33 2-9400 24 hours a day, 365 days a year By fax: (603) 33 7-3075 By mail: Enterasys T [...]

  • Seite 19

    2-1 Chapter 2 System Gr oup The Syste m Group wi ndow; using the Other Gr oups menu The System Grou p window pro vides basic information about the ty pe of device currently being monitor ed, including the System Object ID and Uptime, as well as administrative information, including the device’s name, location, contact person, and the level of Ope[...]

  • Seite 20

    System Gr ou p 2-2 Modifyin g the System Group Administrative Fields The System Grou p window displays the followi ng fields: Object ID Displays the unique identifier of the device being managed. This value is allocated within the SMI enterprises subtree (1 .3.6.1.4.1). Uptime Displays the amount of time that the device has been running since the n[...]

  • Seite 21

    Modifyi ng the Syste m Group Administrati v e Fields 2-3 System G roup Figur e 2-3. Con tact T ext Box b . T ype i n the new contact in f or mation in the text box; then click on OK . 2. T o modi fy the Name fiel d: a. Click the I-bar cur sor ( ) to the r ight of the Name field. The Name text box opens, Figure 2-4 . Figure 2 - 4. Name T ext Box b .[...]

  • Seite 22

    System Gr ou p 2-4 Modifyin g the System Group Administrative Fields Figur e 2-6. Oth er Gr oup M enu T o acce ss the Oth e r Groups drop-down m enu via the S ystem Grou p window: 1. Click on the Other Groups button. The Othe r Gro ups drop-down m enu displ ays , as sho wn in Figure 2-6 . Non -suppor te d options will be gray ed-out. 2. Click on th[...]

  • Seite 23

    3-1 Chapter 3 Vie wing the Interface Gr oup Viewing inter f ace stati stics; us ing the Ad min/Status option a nd the L ast Change field The Interface Gr oup window displays statistics for each interface on the device. The port type is displayed for each interface along with the statistics associated with that interface. Use th e scroll bar to disp[...]

  • Seite 24

    Viewing the Inte rf ace Grou p 3-2 Figure 3-1. Interface Gr oup W indow The following fields are non-statistical interface descriptions fields: Address The interface’s physical addr ess ( ifPhysAddr ) at the pro tocol layer immediately below the networ k layer in the pr otocol stack. For interf aces which do not have such an addr es s (e.g., a se[...]

  • Seite 25

    3-3 Viewing the Inte rf ace Grou p Last Change The Last Change field (bottom of the window) displays the date an d the time since the system was last reinitialized. Vie w ing Stat istics The following sta tistics are collected from re c ei ved and transmitted packets. Unicast The number of subnetwork unicast (sent to one station) packets r eceived [...]

  • Seite 26

    Viewing the Inte rf ace Grou p 3-4 Unknown P rotocol (Received Pac kets only) The number of packets received via the interface w hich were discar ded because of an unknown or unsupported pr otocol , accord ing to the ifI nUnknownProtos. T ra nsmit Queue Siz e (T ransmi tted P ac kets only) The length of the output packet queue (in packets), accor d[...]

  • Seite 27

    4-1 Chapter 4 Using the Ad dress T ranslation T abl e The Addre ss T ranslati on T able window; ed iting the A ddress T ranslation T able The Address T ranslation T able utilizes ARP (Address Resolution Protocol) to translate IP addresses into Physica l addresses. ARP is used to achieve mapping between IP addresses which are 32 bits in length and P[...]

  • Seite 28

    Usi n g the Addr ess T ran sla tion T ab le 4-2 Figure 4-1. A d dress T ranslatio n T able W ind ow The display pan el (upper section) of the A ddress T ranslatio n window lists th e addresses associated wi th the interface. The V alues set for section lets you add and modify entries in the pan el. Interface Index The network interface s on which t[...]

  • Seite 29

    4-3 Using t he Addre ss T ranslati on T able Editing the Address T ranslation T able Y ou can modify existing entries in, or add new entries to the Address T ranslation T able. Modifying Entries in t he Address T ranslation T able By modifying an entry in the Addr ess T ranslation T able you will change the mapping that was discover ed by the ARP p[...]

  • Seite 30

    Usi n g the Addr ess T ran sla tion T ab le 4-4[...]

  • Seite 31

    5-1 Chapter 5 Vie wing IP Gr oup Statistics The IP Group window; using the Time T o L ive option The Internet Pro tocol (IP) is the pr otocol used in the Internet layer . Each IP datagram conta in s identifying inf ormation such as the datagram ’s originato r , the datagram’s length, the for mat used (version), and the quality of service. Each [...]

  • Seite 32

    Viewing IP Group Stat istics 5-2 Figure 5-1. IP G roup W indow Forwarding S tate Displays wheth er this entity is acting as an IP gateway in respect to the forwar di ng of datagra ms received by — but not addr essed to — this entity , according to the ipForwardi ng . IP gateways forward datagrams; IP host s do no t (except those source-r outed [...]

  • Seite 33

    5-3 Viewing IP Group Sta tistics datagrams, this counter includes datagrams discar ded because the destination addr ess was not a local addr ess. This field displays the ipInAddrEr rors . Forwar ded The number of r eceived datagrams for which this entity was not their final IP destina tion, as a r esult of which an attempt was m ade to find a r out[...]

  • Seite 34

    Viewing IP Group Stat istics 5-4 No Route The number of IP datagrams discar ded because no route could be found to transmit them to their destination. This counter includes packets counted in ipForw Datagr am s which meet this ‘no-r oute’ criterion, and an y datagrams a host cannot route because all of its default gateways are down. This field [...]

  • Seite 35

    5-5 Viewing IP Group Sta tistics Setting the Tim e T o Live Option When a device transmits an IP datagram, it sets the amount of time, in seconds, the datagram is allowed to exist, by setting the T ime-T o-Live (TTL) field located in the datagram ’s header . This eliminates the po ssibility tha t a datagram cou ld travel aro und a network for eve[...]

  • Seite 36

    Viewing IP Group Stat istics 5-6[...]

  • Seite 37

    6-1 Chapter 6 Vie wing the IP Ad dress T able The IP Addre ss T able window The IP Addr ess T able displays the IP Addr es ses and the subnet masks for each of the device’s interfaces. In additi on , you can see whether network broadcasts will be sent with 1 s or 0s in the h ost portion of the IP A ddress, and the maximum size fragment that ca n [...]

  • Seite 38

    Viewing the IP Addres s T able 6-2 The display panel of the IP Addr ess T a ble window contains address info rmation for each entry in the table. If there are m ore entries in the IP Addre ss T able than can fit in the display pa nel, scroll bars displays so tha t yo u can view the r ema inin g en trie s in the ta ble . Interface Index The number o[...]

  • Seite 39

    7-1 Chapter 7 Using the IP Routing T ab le Windo w IP Rout ing T able window; m odifying the routing inf or mation; The IP Routing T able provides a way for devices to exchange data. Y o ur local IP dev ice mu st det ermi ne th e next “h op” o r stop on the dat a route. If the d esti nati on is on the same IP network, then the next hop is the d[...]

  • Seite 40

    Using the IP Routing T able Window 7-2 Figure 7 -1. IP Routing T able W indow The IP Routing T a ble displays the followi ng fields: Dest inatio n The destination IP addr ess of this ro ute, accord ing to the ipRouteDest . An entry with a value of 0.0.0.0 is consider ed a default route. Multiple ro utes to a single destination can appea r in the ta[...]

  • Seite 41

    7-3 Using th e IP Routin g T able Wind ow Route Mask Indicates the m ask to be logical-ANDed w ith the destin ation address before being compared to the value in the ipRouteDest field, accor ding to the ip RouteMask . For those system s that do no t support arbitrar y subnet masks, a n agent constructs t he value of the ipRouteMask by determining w[...]

  • Seite 42

    Using the IP Routing T able Window 7-4 Route Info A ref erence to MIB def i nitions specific to the particular r o uting protocol which is respon sible for this route, a s determined by the value specified in the r ou te’s ipRouteProto value. If this in formation is n ot present, its value should be set to the OBJECT IDENTIFIER {0,0}, which is a [...]

  • Seite 43

    7-5 Using th e IP Routin g T able Wind ow Modifying Entries in the IP Routing T able 1. Click in the Dest ination fiel d, enter th e desired destination I P addres s. 2. Click in the Next Hop fiel d, enter th e IP addres s that you want to sp ecify as the next hop of the r oute. 3. Click in the Route Metrics fiel d(s), ente r the des ired metr ic v[...]

  • Seite 44

    Using the IP Routing T able Window 7-6[...]

  • Seite 45

    8-1 Chapter 8 Using the Net to Media T able The Net T o Media T a ble window; modifyi ng an entr y The Net to Media T able is used by MIB-II devices to map IP addresses to physical addresses when transmitting an IP datagram for devices on each network segment directly connected to the monitor ed device. The table in cludes the media type for each p[...]

  • Seite 46

    Using the Net to Medi a T able 8-2 The display panel (top section) of the Net to Media T able displays addr ess information fo r the associated interface. The Va l u e s s e t f o r section lets you modify entries in th e displa y panel and make stati c entries to the ARP cache. Interface Index The interface on which this en try’s equivalence is [...]

  • Seite 47

    8-3 Using the Net to Medi a T able 2. Enter th e desired c hanges i n the Physical Addr field within th e V alues set for area. 3. Click on the opti on button corres ponding t o the way y o u want that entr y mapped in to the d atabase ( other , invalid , d ynamic , or st atic ). Sele cting in v alid as the mapping t ype disa b les the select ed tr[...]

  • Seite 48

    Using the Net to Medi a T able 8-4[...]

  • Seite 49

    9-1 Chapter 9 Vie wing ICMP Gr oup Statistics The ICMP Group wind ow ICMP (Internet Con trol Message Pr otocol) is the Internet Protoco l mechanism used by network devices to determine if a destination is reacha ble and to notify other devices about delivery pr oblems. Using PING (Packet Internet Groper), an ICMP echo req uest packet is sent to an [...]

  • Seite 50

    Viewing ICM P Group St atistics 9-2 Figure 9- 1. ICMP Group Wi ndow The ICMP Group window displa ys the followi ng m essage statis tics: ICMP Receiv ed Message S tatistics T ot al Messag es The total number of ICM P messages which the entity received, according to the icmpInMsgs . This counter includes all those counted by icmpInErrors . Errors The[...]

  • Seite 51

    9-3 Viewing ICMP Group Sta tistics Time Exceeded The number of ICMP T ime Exceede d messages received, accor ding to the icmpIn T imeExcds . When a device discar ds a datagram because th e time-to-live counter (hop count) reached zero, or because the r e a ssem bly counter expired while waiti ng f o r fragments, a router send s a time exceeded mess[...]

  • Seite 52

    Viewing ICM P Group St atistics 9-4 Address Mask Reques t The number of ICMP Addr ess Mask Request Messages r eceived, acco r din g to the icmpIn AddrMasks . Address Mask Reply The number of ICMP Addr ess Mask Reply messages received, accordin g to the icmpIn AddrMaskReps . T o determine the network subnet mas k, a machine can issue an addr ess mas[...]

  • Seite 53

    9-5 Viewing ICMP Group Sta tistics datagram. If the timer expir es before al l fragments ar e received, the sta tion discards the f r agm e nts it has already r e ceived, and transmits a time exceeded messa ge. P arameter P ro b lem The number of ICMP Parameter Pr oblem mess ages sent, according to the icmpOutPar mProbs . A parameter pr oblem messa[...]

  • Seite 54

    Viewing ICM P Group St atistics 9-6 Address Mask Reply The number of ICMP Address Mask Reply m e ssa ges sent, according to the icmpOu tAddrMaskReps . T o determine the network subnet mask, a device can issue an addr ess mask r equest, either tar geted to a specific addr ess or a bro adcast to the entire n etwork. A responding device in cludes the [...]

  • Seite 55

    10-1 Chapte r 10 Vie wing TCP Gr oup Inf ormation The TCP Group window The T ran sm ission Cont ro l Protocol (TCP) is of ten called reliable stream transport service because it is based on a connection between two nodes. Like IP , TCP’s purpose is to transfer data bet ween applications. TCP segments, the basic unit of data transfer within TCP , [...]

  • Seite 56

    Viewing TCP Group In f o rm ation 10-2 Figu r e 10-1. TC P Gr oup W indow The left portion of the TCP G roup window displays statistics abo ut TCP circuits. The right portion shows the curr ent active connections. TCP Statist ic s Retransmit Algorithm The algorithm used to determine the timeout value fo r retran smitting unacknowledged octets, acco[...]

  • Seite 57

    10-3 Viewing TCP Gr oup Informa tion Rto. Max. (Retransmit time out Maximum) The maximum value permitted by a TCP implementation for the r etransmission timeout (m easured in milliseconds) acco rding to the tcp RtoM ax . More refine d semantics for objects of this type depend upon the algorithm used to determine the re transmission timeout. In part[...]

  • Seite 58

    Viewing TCP Group In f o rm ation 10-4 Closed Connections The number of times the TCP connection s have made a d irect transition to the CLOSED state fr om either the EST ABLISHED state or the CLOSE-W AIT state, according to the tcpEstab Resets . Open Connections The number of TCP connections in which the cu rren t state is either EST ABLISHED or C[...]

  • Seite 59

    10-5 Viewing TCP Gr oup Informa tion Active Connections T able The following information is displayed for each Active Connection in the TCP Gro up window . If there is no TCP conn ection at the devic e, “No Connection” displays in the connection Sta te fie ld. State The state of this TCP connection, acco rding to the tcpConn State . Possible st[...]

  • Seite 60

    Viewing TCP Group In f o rm ation 10-6 Remote P ort The r emote port number for this TCP connection, acco rding to the tcpConnR emPort . Most TCP applications use a set of well-known ports. W ell-known ports are alw ays 256 or lower . A few examples of well-known port numbers ar e 21 for F TP , 23 for T elnet, and 53 for do main name server . Other[...]

  • Seite 61

    11-1 Chapte r 11 Vie wing UDP Gr oup Inf ormation The UDP Gr oup window The User Datagram Pro tocol (UDP) is the piece of th e TCP/IP protocol suite that deals with getti ng a datagram from an applica tio n running on one ho st to an applicatio n running on a different host. UDP is able to cho ose the correct process on a host by delivering the dat[...]

  • Seite 62

    Viewing UDP G roup Informat ion 11-2 Figur e 1 1-1. UDP G roup W indow—MIB I and MIB II The UDP Group window displays stat istics about UDP connecti ons. The Listener T able (bottom portion) displays the curr ent UDP connections (MIB II only). UDP Gr oup Statistics Rece ive Data grams The total number of U DP datagrams delivered to UDP users, acc[...]

  • Seite 63

    11-3 Viewing UDP G roup Informa tion UDP Listener T able The UDP Listener T able, available for MIB-II devices, displays a list of the active UDP ports on the device. Local IP A ddress In the case of a UD P li stener which is wi lling to accept datag ram s for any IP interface associated with the node, the value 0.0.0.0 is used. This field displays[...]

  • Seite 64

    Viewing UDP G roup Informat ion 11-4[...]

  • Seite 65

    12-1 Chapte r 12 Vie wing EGP Gr oup Inf ormation The EGP Group window ; displaying the EG P Group N eighbor T a ble Detail wind ow ; using t he Event T rigg er button The Exter ior Gate wa y Protocol (E GP) controls how gate ways on n ei ghborin g autonomous systems exchange routing information; it tells an IP network device about the reachabilit [...]

  • Seite 66

    Viewing EGP Group Inf ormation 12-2 Figur e 12-1. EG P Gr oup W indow —MIB I I The EGP Group window displ ays the followin g statistics: Receive Mes sages The number of EGP messages r e ceived without errors, accor ding to egpI nMsg s . Rece ive Err ors The number of EGP messages r e ceived that proved to be in err or , accor ding to egpIn Errors[...]

  • Seite 67

    Displaying the EGP Gr oup Neigh bor T able De tail Win dow 12-3 Vie wing EGP Gro up In f or mati on State The EGP state of the local system with respect to this entry’s EGP neighbor , according to eg pNeigh State . Each EGP state is repr esented by a value that is one greater than t he numerical value associated w ith the EGP peer . Possible EGP [...]

  • Seite 68

    Viewing EGP Group Inf ormation 12-4 Displaying the E GP Group Ne ighbor T able Detail W indow The EGP Group Neighbor T able Detail window displ ay s the following statistics: Address The IP addr ess of the entry’s EGP neighbo r , according to egpNeighAdd r . State The EGP state of the local system with respect to this entry’s EGP neighbor , acc[...]

  • Seite 69

    Displaying the EGP Gr oup Neigh bor T able De tail Win dow 12-5 Vie wing EGP Gro up In f or mati on Hello The interval between EGP Hello co mmand retr ansmissions (in hundredths o f a second), according to egpN eighI nterva lHello . This repr esents the t1 timer as defined in RFC 904. Th e t1 timer contro ls Request (initiate communications with a [...]

  • Seite 70

    Viewing EGP Group Inf ormation 12-6 Displaying the E GP Group Ne ighbor T able Detail W indow[...]

  • Seite 71

    13-1 Chapte r 13 Vie wing SNMP Gr oup Inf ormation The SNM P Group win dow; disabling and ena bling authenti cation failure t r aps The Simple Network M anagement Protocol (SNMP) facilitates co mmunicati on between a mana gement application, like NetSight Element Manager, and a network device, thr ough the use of Pro tocol Data Units (PDUs). A netw[...]

  • Seite 72

    Viewing SN MP Grou p Informati on 13-2 Figur e 13-1. SNM P Gr oup W indow The SNMP Group W ind ow displays a sum ma ry of PDU acti vity , and lets yo u enable or disable the device’s ability to issue authentication failure traps. SNMP Rece ived Statistics The fields described below r epresent counters which r ecord variou s categories of received[...]

  • Seite 73

    13-3 Viewing SNMP Group Infor mation Bad Community Names The total number of m essages delivered to the SNMP pro tocol entity which used a SNMP comm unity nam e not k nown to the ent ity , according to the snmpInBadCommu nityNames . An SNMP Get or Set request must be acco mpanied by a valid community n ame. Bad Community Operations The total number[...]

  • Seite 74

    Viewing SN MP Grou p Informati on 13-4 readO nly Errors The total number of va lid SNMP PDUs which wer e delivered to th e SNMP proto col entity and for which the value of the err or-status field is ‘r eadOnly’. It should be noted that it is a pr otocol error to gener a te a SNMP PDU which contains the value ‘r eadOnly’ in the error -status[...]

  • Seite 75

    13-5 Viewing SNMP Group Infor mation T otal T rap PDUs The total number of SNMP T rap PDUs which have been accepted and pr ocessed by the SNMP pro tocol entity , accor ding to snmpIn T r aps . This counter repr esents traps received by a devi ce. A device can not re ceive traps unless the sending device’s community names table is set up so that t[...]

  • Seite 76

    Viewing SN MP Grou p Informati on 13-6 T otal Get-Next PDUs The total number of S NMP Get-Next PDUs which have been gener ated by the SNMP proto col entity , according to the s nmpOu tGet Nexts . T otal Set-Request PDUs The total number of SNMP Set-Re quest PDUs which have been gen erated by the SNMP proto col entity , according to the sn mpOu tSet[...]

  • Seite 77

    Index-1 Index A Active open 1-3 Active Opens 10-3 Addr ess 3-2, 12-2 , 12-4 Address Err ors 5-2 Address mask 1 -3 Address Mask Reply 9-4, 9-6 Address Mask Req ues t 9-4, 9-5 Address Resolution Protocol (ARP) 1-3 Address T ranslatio n T able 4-1 adding entries 4 -3 editing 4-3 Admin Status 3-4 setting the Adm in S tatus 3-4 AS 12-4 AS Number 12-2 Au[...]

  • Seite 78

    Index Index-2 I ICMP Group window 9-1 Incoming Seg Err ors 10-4 InErrs 12 -3, 12-4 InMsgs 12-4 Interface Gr oup window 3-1 statistics 3-3 Interface Index 4-2, 6-2, 8 -2 Interface T ype 3-2 Internet 1-4 Internet Contr o l Message Protocol (ICMP) 1-4 Internet Pr otocol (IP) 1-4, 5- 1 IP Address 1-1, 1-8, 4-2, 6-2, 8-2 IP Address T able window 6-1 IP [...]

  • Seite 79

    Index-3 Index SNMP 1-5, 13-1 Socket 1- 5 Source Quench 9-3, 9-5 Spec if ic Mib Def. 3-4 Speed 3-2 State 10-5, 12- 3, 12-4 Subnet 1-6 Subnet Mask 1-6, 6-2 System Description 1-8 System Group w indow 2-1 T TCP 10-1 T echnical support 1-10 T ime Exceeded 9-3, 9-4 T ime to l ive 1-6, 5-5 T imestamp Reply 9-3, 9-5 T imest amp Request 9-3, 9-5 tooBig Err[...]

  • Seite 80

    Index Index-4[...]