Cabletron Systems EMM-E6 Network Cables User Manual


 
Contents
iv
Chapter 3 Alarm Configuration
Using Alarm Configuration.........................................................................................3-2
Configuring Alarms...............................................................................................3-3
Setting Repeater Alarms...............................................................................................3-4
Setting and Changing Alarms..............................................................................3-5
Setting Module and Port Alarms ................................................................................3-6
Setting Module Alarms .........................................................................................3-6
Setting Port Alarms................................................................................................3-8
Chapter 4 Link/Seg Traps
What is a Segmentation Trap? .....................................................................................4-1
What is a Link Trap? .....................................................................................................4-2
Enabling and Disabling Link/Seg Traps ...................................................................4-2
Configuring Link/Seg Traps for the Repeater...................................................4-4
Viewing and Configuring Link/Seg Traps for Hub Modules.........................4-4
Viewing and Configuring Link/Seg Traps for Ports ........................................4-6
Chapter 5 Repeater Redundancy
Setting Network Circuit Redundancy........................................................................5-1
Configuring a Redundant Circuit........................................................................5-2
Monitoring Redundancy..............................................................................................5-6
Chapter 6 Source Addressing
Displaying the Source Address List............................................................................6-1
Setting the Aging Time..........................................................................................6-4
Setting the Hash Type...................................................................................................6-4
Locking Source Addresses ...........................................................................................6-5
Source Address Locking on Older Devices........................................................6-6
Configuring Source Address Traps.............................................................................6-7
Repeater-level Traps ..............................................................................................6-8
Module- and Port-level Traps...............................................................................6-9
Finding a Source Address .......................................................................................... 6-11
Chapter 7 Security
What is LANVIEWsecure?...........................................................................................7-2
The Newest LANVIEWsecure Features..............................................................7-4
Security on Non-LANVIEWsecure MIMs..........................................................7-5
Configuring Security.....................................................................................................7-6
Boards with Multiple Caches .............................................................................7-10
Resetting Learned Addresses............................................................................. 7-11
Tips for Successfully Implementing Eavesdropper Protection ..................... 7-11