Chapter 3 alarm configuration, Chapter 4 link/seg traps, Chapter 5 repeater redundancy – Cabletron Systems EMM-E6 User Manual

Page 6: Chapter 6 source addressing, Chapter 7 security

Advertising
background image

Contents

iv

Chapter 3

Alarm Configuration

Using Alarm Configuration ......................................................................................... 3-2

Configuring Alarms............................................................................................... 3-3

Setting Repeater Alarms............................................................................................... 3-4

Setting and Changing Alarms .............................................................................. 3-5

Setting Module and Port Alarms ................................................................................ 3-6

Setting Module Alarms ......................................................................................... 3-6
Setting Port Alarms................................................................................................ 3-8

Chapter 4

Link/Seg Traps

What is a Segmentation Trap? ..................................................................................... 4-1
What is a Link Trap? ..................................................................................................... 4-2
Enabling and Disabling Link/Seg Traps ................................................................... 4-2

Configuring Link/Seg Traps for the Repeater................................................... 4-4
Viewing and Configuring Link/Seg Traps for Hub Modules ......................... 4-4
Viewing and Configuring Link/Seg Traps for Ports ........................................ 4-6

Chapter 5

Repeater Redundancy

Setting Network Circuit Redundancy........................................................................ 5-1

Configuring a Redundant Circuit........................................................................ 5-2

Monitoring Redundancy .............................................................................................. 5-6

Chapter 6

Source Addressing

Displaying the Source Address List............................................................................ 6-1

Setting the Aging Time.......................................................................................... 6-4

Setting the Hash Type................................................................................................... 6-4
Locking Source Addresses ........................................................................................... 6-5

Source Address Locking on Older Devices ........................................................ 6-6

Configuring Source Address Traps............................................................................. 6-7

Repeater-level Traps .............................................................................................. 6-8
Module- and Port-level Traps............................................................................... 6-9

Finding a Source Address .......................................................................................... 6-11

Chapter 7

Security

What is LANVIEWsecure?........................................................................................... 7-2

The Newest LANVIEWsecure Features.............................................................. 7-4
Security on Non-LANVIEWsecure MIMs .......................................................... 7-5

Configuring Security..................................................................................................... 7-6

Boards with Multiple Caches ............................................................................. 7-10
Resetting Learned Addresses ............................................................................. 7-11
Tips for Successfully Implementing Eavesdropper Protection ..................... 7-11

Advertising