Cabletron Systems EMM-E6 User Manual

Page 10

Advertising
background image

Introduction

1-2

Using the EMM-E6 User’s Guide

Stand-alone Launcher or the command line (if you are running in stand-alone
mode); in addition, several applications can also be accessed from within the Hub
View, a graphical display of the EMM-E6 and the hub it is managing.

The EMM-E6

User’s Guide

describes how to use many of the applications

included with the module; note that the instructions provided in this guide apply
to the EMM-E6 module regardless of the operating system or management
platform you are using. Instructions for launching each individual function from
the command line (stand-alone mode) are also included in each chapter.

Following is a description of the applications covered in this guide; while we
provide as much background information as we can, we do assume that you’re
familiar with Ethernet networks and general network management concepts:

Chapter 1,

Introduction

, provides a list of related documentation, describes

certain software conventions, and shows you how to contact the Cabletron
Systems Global Call Center.

Chapter 2,

Using the EMM-E6 Hub View

, describes the visual display of the

Hub and explains how to use the mouse within the Hub View; the operation
of some basic functions (changing the Hub View display, opening menus and
windows, enabling and disabling ports, checking device and module status,
and so on) available only from within the Hub View is also described. You can
access the Hub View application from the icon menu or the command line.

Chapter 3,

Alarm Configuration

, describes how to set thresholds and enable

or disable alarms at the network (channel), module, and port levels. You can
access the Alarm Configuration application from the icon menu, the Hub View,
or the command line.

Chapter 4,

Link/Seg Traps

, describes how to configure link and segmentation

traps to suit your management needs. You can access the Link/Seg Traps
application from the icon menu, the Hub View, or the command line.

Chapter 5,

Redundancy

, describes how to configure redundant circuits to keep

your network connections up and running in the event of a single port’s
failure. You can access the Redundancy application from the icon menu, the
Hub View, or the command line.

Chapter 6,

Source Addressing

, describes how to display the Source Address

List, how to set the ageing time, and how to configure source address traps; it
also discusses the effects of source address locking. You can access the Source
Address application from the icon menu, the Hub View, or the command line.

Chapter 7,

Security

, describes how to configure intruder protection for all

MIMs installed in the EMM-E6-controlled hub, and how to configure
eavesdropper protection for any installed

LANVIEW

SECURE

MIMs. You can

access the Security application from the icon menu, the Hub View, or the
command line.

Advertising