Cabletron Systems SSR-HFX11-08, CoreWatch, SSR-GLX19-02, SSR-GLX70-01, SSR-GSX11-02, SSR-HFX29-08 User manual

  • Hello! I am an AI chatbot trained to assist you with the Cabletron Systems SSR-HFX11-08 User manual. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
CoreWatch User’s Manual
9032564-04
Notice
2 CoreWatch User’s Manual
CoreWatch User’s Manual 3
Notice
Notice
Cabletron Systems reserves the right to make changes in specifications and other information
contained in this document without prior notice. The reader should in all cases consult Cabletron
Systems to determine whether any such changes have been made.
The hardware, firmware, or software described in this manual is subject to change without notice.
IN NO EVENT SHALL CABLETRON SYSTEMS BE LIABLE FOR ANY INCIDENTAL, INDIRECT,
SPECIAL, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING BUT NOT LIMITED
TO LOST PROFITS) ARISING OUT OF OR RELATED TO THIS MANUAL OR THE INFORMATION
CONTAINED IN IT, EVEN IF CABLETRON SYSTEMS HAS BEEN ADVISED OF, KNOWN, OR
SHOULD HAVE KNOWN, THE POSSIBILITY OF SUCH DAMAGES.
© Copyright December 1998 by:
Cabletron Systems, Inc.
P.O. Box 5005
Rochester, NH 03866-5005
All Rights Reserved
Printed in the United States of America
Order Number: 9032564-04
Cabletron Systems, SPECTRUM, and LANVIEW are registered trademarks and APIM, Element
Manager, FE-100TX, FE-100FX, FE-100F3, HSIM, HubSTACK, SecureFast, SmartSwitch,
SmartSwitch Router, and Synthesis are trademarks of Cabletron Systems, Inc.
All other product names mentioned in this manual may be trademarks or registered trademarks of
their respective companies.
Notice
4 CoreWatch User’s Manual
FCC Notice
This device complies with Part 15 of the FCC rules. Operation is subject to the following two
conditions: (1) this device may not cause harmful interference, and (2) this device must accept any
interference received, including interference that may cause undesired operation.
NOTE: This equipment has been tested and found to comply with the limits for a Class A digital
device, pursuant to Part 15 of the FCC rules. These limits are designed to provide reasonable
protection against harmful interference when the equipment is operated in a commercial environment.
This equipment uses, generates, and can radiate radio frequency energy and if not installed in
accordance with the operator’s manual, may cause harmful interference to radio communications.
Operation of this equipment in a residential area is likely to cause interference in which case the user
will be required to correct the interference at his own expense.
WARNING: Changes or modifications made to this device which are not expressly approved by the
party responsible for compliance could void the user’s authority to operate the equipment.
Industry Canada Notice
This digital apparatus does not exceed the Class A limits for radio noise emissions from digital
apparatus set out in the Radio Interference Regulations of the Canadian Department of
Communications.
Le présent appareil numérique n’émet pas de bruits radioélectriques dépassant les limites applicables
aux appareils numériques de la class A prescrites dans le Règlement sur le brouillage radioélectrique
édicté par le ministère des Communications du Canada.
VCCI Notice
This is a Class A product based on the standard of the Voluntary Control Council for Interference by
Information Technology Equipment (VCCI). If this equipment is used in a domestic environment,
radio disturbance may arise. When such trouble occurs, the user may be required to take corrective
actions.
CoreWatch User’s Manual 5
Notice
Cabletron Systems, Inc. Program License Agreement
IMPORTANT: Before utilizing this product, carefully read this License Agreement.
This document is an agreement between you, the end user, and Cabletron Systems, Inc. (“Cabletron”)
that sets forth your rights and obligations with respect to the Cabletron software program (the
“Program”) contained in this package. The Program may be contained in firmware, chips or other
media. BY UTILIZING THE ENCLOSED PRODUCT, YOU ARE AGREEING TO BECOME BOUND
BY THE TERMS OF THIS AGREEMENT, WHICH INCLUDES THE LICENSE AND THE
LIMITATION OF WARRANTY AND DISCLAIMER OF LIABILITY. IF YOU DO NOT AGREE TO
THE TERMS OF THIS AGREEMENT, PROMPTLY RETURN THE UNUSED PRODUCT TO THE
PLACE OF PURCHASE FOR A FULL REFUND.
Cabletron Software Program License
1. LICENSE. You have the right to use only the one (1) copy of the Program provided in this package
subject to the terms and conditions of this License Agreement.
You may not copy, reproduce or transmit any part of the Program except as permitted by the
Copyright Act of the United States or as authorized in writing by Cabletron.
2. OTHER RESTRICTIONS
. You may not reverse engineer, decompile, or disassemble the Program.
3. APPLICABLE LAW
. This License Agreement shall be interpreted and governed under the laws
and in the state and federal courts of New Hampshire. You accept the personal jurisdiction and
venue of the New Hampshire courts.
Exclusion of Warranty and Disclaimer of Liability
1. EXCLUSION OF WARRANTY. Except as may be specifically provided by Cabletron in writing,
Cabletron makes no warranty, expressed or implied, concerning the Program (including its
documentation and media).
CABLETRON DISCLAIMS ALL WARRANTIES, OTHER THAN THOSE SUPPLIED TO YOU BY
CABLETRON IN WRITING, EITHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT
LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
PARTICULAR PURPOSE, WITH RESPECT TO THE PROGRAM, THE ACCOMPANYING
WRITTEN MATERIALS, AND ANY ACCOMPANYING HARDWARE.
2. NO LIABILITY FOR CONSEQUENTIAL DAMAGES
. IN NO EVENT SHALL CABLETRON OR
ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT
LIMITATION, DAMAGES FOR LOSS OF BUSINESS, PROFITS, BUSINESS INTERRUPTION,
LOSS OF BUSINESS INFORMATION, SPECIAL, INCIDENTAL, CONSEQUENTIAL, OR
RELIANCE DAMAGES, OR OTHER LOSS) ARISING OUT OF THE USE OR INABILITY TO USE
THIS CABLETRON PRODUCT, EVEN IF CABLETRON HAS BEEN ADVISED OF THE
POSSIBILITY OF SUCH DAMAGES. BECAUSE SOME STATES DO NOT ALLOW THE
EXCLUSION OR LIMITATION OF LIABILITY FOR CONSEQUENTIAL OR INCIDENTAL
DAMAGES, OR ON THE DURATION OR LIMITATION OF IMPLIED WARRANTIES, IN SOME
INSTANCES THE ABOVE LIMITATIONS AND EXCLUSIONS MAY NOT APPLY TO YOU.
Notice
6 CoreWatch User’s Manual
United States Government Restricted Rights
The enclosed product (a) was developed solely at private expense; (b) contains “restricted computer
software” submitted with restricted rights in accordance with Section 52227-19 (a) through (d) of the
Commercial Computer Software - Restricted Rights Clause and its successors, and (c) in all respects is
proprietary data belonging to Cabletron and/or its suppliers.
For Department of Defense units, the product is licensed with “Restricted Rights” as defined in the
DoD Supplement to the Federal Acquisition Regulations, Section 52.227-7013 (c) (1) (ii) and its
successors, and use, duplication, disclosure by the Government is subject to restrictions as set forth in
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at 252.227-7013.
Cabletron Systems, Inc., 35 Industrial Way, Rochester, New Hampshire 03867-0505.
CoreWatch User’s Manual 7
Notice
SAFETY INFORMATION
CLASS 1 LASER TRANSCEIVERS
The SSR-HFX11-08 100Base-FX Module, SSR-GSX11-02 1000BASE-LX Module, SSR-GLX19-02
1000BASE-LX Module, SSR-HFX29-08 100BASE-FX SMF Module, and SSR-GLX70-01 1000BASE-LLX
Module use Class 1 Laser transceivers. Read the following safety information before installing
or operating these modules.
The Class 1 laser transceivers use an optical feedback loop to maintain Class 1 operation limits. This
control loop eliminates the need for maintenance checks or adjustments. The output is factory set, and
does not allow any user adjustment. Class 1 Laser transceivers comply with the following safety
standards:
21 CFR 1040.10 and 1040.11 U.S. Department of Health and Human Services (FDA).
IEC Publication 825 (International Electrotechnical Commission).
CENELEC EN 60825 (European Committee for Electrotechnical Standardization).
When operating within their performance limitations, laser transceiver output meets the Class 1
accessible emission limit of all three standards. Class 1 levels of laser radiation are not considered
hazardous.
SAFETY INFORMATION
CLASS 1 LASER TRANSCEIVERS
Laser Radiation and Connectors
When the connector is in place, all laser radiation remains within the fiber. The maximum amount of
radiant power exiting the fiber (under normal conditions) is -12.6 dBm or 55 x 10
-6
watts.
Removing the optical connector from the transceiver allows laser radiation to emit directly from the
optical port. The maximum radiance from the optical port (under worst case conditions) is
0.8 W cm
-2
or 8 x 10
3
W m
2
sr-1.
Do not use optical instruments to view the laser output. The use of optical instruments to view laser
output increases eye hazard. When viewing the output optical port, power must be removed from the
network adapter.
CoreWatch User’s Manual 8
Notice
DECLARATION OF CONFORMITY
ADDENDUM
Application of Council Directive(s): 89/336/EEC
73/23/EEC
Manufacturer’s Name: Cabletron Systems, Inc.
Manufacturer’s Address: 35 Industrial Way
PO Box 5005
Rochester, NH 03867
European Representative Name: Mr. J. Solari
European Representative Address: Cabletron Systems Limited
Nexus House, Newbury
Business Park
London Road, Newbury
Berkshire RG13 2PZ, England
Conformance to Directive(s)/Product Standards:
EC Directive 89/336/EEC
EC Directive 73/23/EEC
EN 55022
EN 50082-1
EN 60950
Equipment Type/Environment: Networking Equipment, for
use in a Commercial or Light
Industrial Environment.
We the undersigned, hereby declare, under our sole responsibility, that the equipment packaged with
this notice conforms _to the above directives.
Manufacturer Legal Representative in Europe
Mr. Ronald Fotino Mr. J. Solari
Full Name Full Name
Principal Compliance Engineer Managing Director - E.M.E.A.
Title Title
Rochester, NH, USA Newbury, Berkshire, England
Location Location
CoreWatch User’s Manual 9
Contents
Preface..................................................................................................... 17
About This Manual ................................................................................................................17
Who Should Read This Manual? .........................................................................................17
How to Use This Manual ......................................................................................................17
Related Documentation.........................................................................................................19
Chapter 1: A Look at CoreWatch ........................................................... 21
What Are CoreWatch’s Features?........................................................................................21
System Requirements ............................................................................................................ 22
CoreWatch Capabilities.........................................................................................................22
A Look at the Modes of CoreWatch ....................................................................................23
Which MIBs Does the SSR Support? ...................................................................................23
Chapter 2: CoreWatch Installation ........................................................ 25
Installing CoreWatch.............................................................................................................25
Installing on a Solaris System........................................................................................25
Installing on a Windows NT, Windows 95, or Windows 98 System ......................26
Chapter 3: Learning CoreWatch Basics.................................................. 27
Starting CoreWatch................................................................................................................27
Starting CoreWatch in Solaris .......................................................................................28
Starting CoreWatch in Windows NT, Windows 95, or Windows 98......................28
Starting CoreWatch from within SPECTRUM Enterprise Manager .......................28
Starting CoreWatch from within HP OpenView 5.x .................................................29
A Look at the CoreWatch Interface .....................................................................................29
Front Panel View.............................................................................................................30
A Look at the Modules............................................................................................31
Schematic View ...............................................................................................................32
Opening the Schematic View.................................................................................32
Using the Schematic View......................................................................................33
CoreWatch Menus ..........................................................................................................33
CoreWatch Toolbar.........................................................................................................33
CoreWatch Passwords...........................................................................................................33
Changing the Login Password......................................................................................34
Changing the Privileged Password..............................................................................34
Accessing Help .......................................................................................................................35
Exiting CoreWatch.................................................................................................................36
Contents
10 CoreWatch User’s Manual
Chapter 4: Learning Configuration Expert Basics................................. 37
What Is Configuration Expert?............................................................................................ 37
Starting Configuration Expert............................................................................................. 38
Starting Configuration Expert from the Front Panel View...................................... 38
Starting Configuration Expert in Solaris..................................................................... 38
Starting Configuration Expert in Windows NT, Windows 95, or Windows 98 ... 39
A Look at the Configuration Expert Window................................................................... 39
Configuration Tree......................................................................................................... 40
A Look at the Configuration Tree Icons .............................................................. 43
Wizards and Dialog Boxes............................................................................................ 43
Copying Configuration Settings with Drag-and-Drop.................................................... 44
Finding Objects...................................................................................................................... 44
Deleting Objects..................................................................................................................... 45
Order of Configuration Tasks.............................................................................................. 45
Saving and Applying Your Configuration Changes........................................................ 46
Saving Changes to a Configuration File: .................................................................... 46
Loading a Configuration File into an SSR .................................................................. 46
Retrieving a Configuration File from an SSR............................................................. 47
Exiting Configuration Expert .............................................................................................. 48
Chapter 5: Changing System Settings ................................................... 49
Providing System Information............................................................................................ 49
Configuring an SSR Chassis ................................................................................................ 50
Configuring Ports.................................................................................................................. 52
Configuring Global Settings on All Ports................................................................... 52
Configuring an Individual Port ................................................................................... 54
Configuring the SSR for a SYSLOG Server........................................................................ 57
Configuring for DNS ............................................................................................................ 59
Configuring the SSR for SNMP........................................................................................... 60
Setting Up a Target for SNMP Traps .......................................................................... 60
Establishing Community Strings................................................................................. 62
Chapter 6: Configuring SSR Bridging..................................................... 65
A Look at Bridging on the SSR............................................................................................ 65
Configuring the Bridging Mode of Ports........................................................................... 66
Configuring a Port for Flow-Based Bridging............................................................. 67
Configuring a Port for Address-Based Bridging....................................................... 68
Controlling the Aging State of SSR Bridging .................................................................... 70
Setting Up a Default Aging Timeout........................................................................... 70
Overriding the Default Timeout Interval on a Port .................................................. 71
Disabling Aging on a Port............................................................................................. 72
Enabling Aging on a Port.............................................................................................. 74
Setting Up STP on the SSR................................................................................................... 76
Defining STP Settings for SSR Bridging...................................................................... 77
Defining STP Attributes on an Individual Port......................................................... 78
Enabling STP on a Port.................................................................................................. 79
Disabling STP on a Port................................................................................................. 81
Configuring SmartTRUNK Behavior on the SSR ............................................................. 82
Defining SmartTRUNK Settings for SSR Bridging.................................................... 83
CoreWatch User’s Manual 11
Contents
Chapter 7: Configuring VLANs on the SSR............................................ 87
A Look at VLANs on the SSR...............................................................................................87
VLAN Configuration Tips....................................................................................................88
Defining Access Ports and Trunk Ports..............................................................................89
Creating a Protocol-Based VLAN........................................................................................91
Creating a Port-Based VLAN ...............................................................................................96
Modifying VLANs ...............................................................................................................100
Changing a Port-Based VLAN’s Name or ID...........................................................101
Changing a Protocol-Based VLAN’s Name, ID, or Protocol Binding...................102
Replacing an Interface’s VLAN..........................................................................................103
Changing Which Ports a VLAN Includes.........................................................................103
Dragging Ports to Add Them to a VLAN .................................................................103
Adding and Removing a VLAN’s Ports Through a Dialog Box............................104
Chapter 8: Configuring IP Interfaces for the SSR ............................... 107
What Is IP? ............................................................................................................................107
A Look at IP Addresses................................................................................................108
Creating IP Interfaces ..........................................................................................................110
Creating IP Interfaces Bound to a Single Port ..........................................................110
Creating IP Interfaces Bound to a VLAN..................................................................116
Modifying IP Interface Definitions....................................................................................121
Configuring the SSR for VRRP...........................................................................................124
Specifying VRRP Trace Options .................................................................................125
Configuring a New VRRP Router ..............................................................................126
Modifying an Existing VRRP Router .........................................................................129
What to Do Next...................................................................................................................130
Chapter 9: Configuring Unicast Routing on the SSR.......................... 131
Configuring Unicast Global Parameters and Static Entries...........................................131
Setting Global Parameters for Unicast Routing........................................................132
Defining Static ARP Entries.........................................................................................133
Defining Static Route Entries ......................................................................................135
A Look at RIP Routing in the IP Environment ................................................................137
What Is Preference? ......................................................................................................138
Configuring the SSR for RIP...............................................................................................139
Setting RIP Global Parameters....................................................................................139
Defining IP RIP Interfaces............................................................................................141
Adding Trusted Gateways ..........................................................................................144
Adding Source Gateways ............................................................................................145
What to Do Next...................................................................................................................145
Chapter 10: Configuring Multicast Routing on the SSR..................... 147
What Is DVMRP? .................................................................................................................147
Configuring DVMRP Routing on the SSR........................................................................148
Setting DVMRP Global Parameters on the SSR........................................................149
Configuring DVMRP Interfaces..................................................................................150
Defining DVMRP Tunnels...........................................................................................151
Contents
12 CoreWatch User’s Manual
Enabling or Disabling DVMRP on Tunnels ............................................................. 153
What Is IGMP?..................................................................................................................... 154
Configuring IGMP Interfaces on the SSR ........................................................................ 155
Setting IGMP Global Parameters ............................................................................... 155
Enabling or Disabling IGMP on Interfaces............................................................... 156
What to Do Next.................................................................................................................. 158
Chapter 11: Configuring the SSR for IPX Routes ................................ 159
What Is IPX?......................................................................................................................... 159
Creating IPX Interfaces....................................................................................................... 161
Creating IPX Interfaces Bound to a Single Port....................................................... 161
Creating IPX Interfaces Bound to a VLAN............................................................... 167
Modifying IPX Interface Definitions ................................................................................ 172
Configuring Static IPX SAP Entries.................................................................................. 175
What to Do Next.................................................................................................................. 178
Chapter 12: Configuring QoS on the SSR............................................ 179
What Is QoS?........................................................................................................................ 179
Establishing the SSR’s Queuing Policy ............................................................................ 180
Associating Precedences to Layer-3/Layer-4 Flows...................................................... 181
Assigning IP QoS Precedence............................................................................................ 181
Assigning IPX QoS Precedence.................................................................................. 183
Creating QoS Profiles.......................................................................................................... 184
Creating a QoS Profile for an IP Flow....................................................................... 185
Creating a QoS Profile for an IPX Flow .................................................................... 190
Creating a QoS Profile for a Layer-2 Flow................................................................ 195
Modifying QoS Profiles...................................................................................................... 199
Redefining an IP Flow ................................................................................................. 199
Redefining an IPX Flow Definition............................................................................ 200
Redefining a Layer-2 Flow Definition....................................................................... 201
Changing an IP or IPX Flow’s Interface List............................................................ 202
Adding or Deleting a Flow’s Interfaces through a Dialog Box...................... 203
Dragging an Interface to Apply a Flow to the Interface.................................. 204
Changing a Layer-2 Port List...................................................................................... 204
Chapter 13: Configuring Security on the SSR ..................................... 207
A Look at ACLs ................................................................................................................... 207
Setting IP Security ............................................................................................................... 208
Setting IPX Security............................................................................................................. 212
Configuring an IPX ACL............................................................................................. 212
Setting Up IPX RIP Filters........................................................................................... 217
Setting Up IPX SAP Filters.......................................................................................... 221
Applying ACLs to IP or IPX Interfaces ............................................................................ 224
Copying an ACL to Apply It to an Interface............................................................ 225
Applying an ACL by Editing an Interface’s Definition.......................................... 226
Setting Layer-2 Security...................................................................................................... 228
Configuring Layer-2 Address Filters ........................................................................ 229
Configuring Layer-2 Port-to-Address Lock Filters ................................................. 231
Configuring Layer-2 Static-Entry Filters .................................................................. 234
CoreWatch User’s Manual 13
Contents
Configuring Layer-2 Secure Port Filters....................................................................238
Modifying the SSR’s Security Settings..............................................................................241
Changing an ACL’s Name...........................................................................................242
Adding or Modifying ACL Rules...............................................................................243
Modifying Layer-2 Security Filters.............................................................................243
Modifying a Filter’s Settings ................................................................................243
Modifying a Filter’s Port Bindings......................................................................244
Chapter 14: Configuring OSPF on the SSR .......................................... 247
A Look at OSPF Routing on the SSR.................................................................................247
Setting OSPF Global Parameters........................................................................................248
Configuring OSPF Area Tables...................................................................................249
Creating OSPF Area Tables..................................................................................250
Modifying Area Tables .........................................................................................267
Chapter 15: Configuring BGP on the SSR............................................ 269
BGP Overview ......................................................................................................................269
Configuring Your SSR for BGP ..........................................................................................270
Setting BGP Global Parameters ..................................................................................270
Configuring a New BGP Peer Group.........................................................................271
Modifying an Existing BGP Peer Group....................................................................288
Chapter 16: Configuring Routing Policies on the SSR........................ 297
Routing Policies on the SSR................................................................................................297
RIP and OSPF Routing Policy Defaults ............................................................................297
Setting RIP Routing Policy Defaults...........................................................................298
Setting OSPF Routing Policy Defaults .......................................................................299
A Look at the Building Blocks of Routing Policies..........................................................300
Export Destination Building Blocks ...........................................................................301
Configuring and Modifying RIP Export Destinations .....................................301
Configuring and Modifying OSPF Export Destinations..................................303
Configuring and Modifying BGP Export Destinations....................................304
Aggregate Destination Building Blocks.....................................................................306
Configuring Aggregate Destinations..................................................................306
Modifying Aggregate Destinations.....................................................................308
Export Source Building Blocks....................................................................................309
Configuring and Modifying RIP Export Sources..............................................309
Configuring and Modifying OSPF Export Sources ..........................................311
Configuring and Modifying BGP Export Sources ............................................312
Configuring and Modifying Autonomous System Path Export Sources......314
Configuring and Modifying Tag Export Sources..............................................316
Configuring and Modifying Direct Export Sources .........................................318
Configuring and Modifying Static Export Sources...........................................319
Configuring and Modifying Aggregate Export Sources..................................321
Import Source Building Blocks ...................................................................................322
Configuring and Modifying RIP Import Sources .............................................323
Configuring and Modifying OSPF Import Sources..........................................325
Configuring and Modifying BGP Import Sources............................................327
Configuring and Modifying Aggregate Source Building Blocks...........................329
Contents
14 CoreWatch User’s Manual
IP Route Filter Building Blocks .................................................................................. 330
Configuring IP Route Filters ............................................................................... 331
Modifying IP Route Filters .................................................................................. 333
Configuring and Modifying Optional Attribute Building Blocks ........................ 334
Export Policies ..................................................................................................................... 335
Configuring Export Policies ....................................................................................... 336
Modifying Export Policies .......................................................................................... 341
Import Policies..................................................................................................................... 342
Configuring Import Policies....................................................................................... 342
Modifying Import Policies.......................................................................................... 346
Aggregate Policies............................................................................................................... 347
Configuring Aggregate Policies................................................................................. 347
Modifying Aggregate Policies.................................................................................... 352
Redistribute Policies............................................................................................................ 353
Configuring Redistribute Policies.............................................................................. 353
Modifying Redistribute Policies................................................................................. 357
Summarize Routes .............................................................................................................. 358
Configuring Summarize Routes ................................................................................ 358
Modifying Summarize Routes ................................................................................... 362
Chapter 17: Checking System Status ................................................... 365
Obtaining Chassis Information ......................................................................................... 365
Obtaining Port Information ............................................................................................... 366
Obtaining Trap Information .............................................................................................. 368
Obtaining SmartTRUNK Information.............................................................................. 369
Chapter 18: Monitoring Real-Time Performance ................................ 371
Monitoring System Performance ...................................................................................... 371
Setting the Scaling of Dials ......................................................................................... 373
Monitoring Port Utilization ............................................................................................... 374
Obtaining Statistics About an Individual Port................................................................ 376
Obtaining Packet Statistics.......................................................................................... 377
Obtaining Port Byte Statistics..................................................................................... 378
Obtaining Port Error Statistics ................................................................................... 379
Monitoring IP Interface Statistics...................................................................................... 381
Obtaining IP Packet Statistics..................................................................................... 381
Obtaining IP Reassembly Statistics ........................................................................... 382
Obtaining IP Error Statistics ....................................................................................... 384
Monitoring IPX Interface Statistics ................................................................................... 385
Obtaining IPX Packet Statistics .................................................................................. 386
Obtaining IPX Error Statistics............................................................................................ 387
Using the Graph Toolbar.................................................................................................... 389
Chapter 19: Checking the Status of Bridge Tables ............................. 391
Obtaining VLAN Information........................................................................................... 391
Obtaining STP Port Information ....................................................................................... 392
Obtaining L2 Interface Information.................................................................................. 394
CoreWatch User’s Manual 15
Contents
Chapter 20: Checking the Status of Routing Tables........................... 397
Checking IP Routing Status................................................................................................397
Obtaining IP Interface Information............................................................................398
Obtaining IP Forwarding Information ......................................................................399
Checking IPX Routing Status .............................................................................................400
Obtaining IPX Interface Information .........................................................................401
Obtaining IPX Forwarding Information....................................................................403
Checking OSPF Routing Status..........................................................................................405
Obtaining OSPF Interface Information......................................................................405
Obtaining OSPF Area Information.............................................................................409
Obtaining OSPF Neighbor Information ....................................................................410
Obtaining OSPF Link-State Database Information ..................................................412
Obtaining OSPF Area Aggregate Information .........................................................414
Checking RIP Routing Status .............................................................................................416
Obtaining RIP Interface Information .........................................................................416
Obtaining RIP Peer Information.................................................................................417
Checking DVMRP Routing Status.....................................................................................419
Obtaining DVMRP Interface Information.................................................................419
Obtaining DVMRP Neighbor Information................................................................421
Obtaining DVMRP Routing Information ..................................................................423
Obtaining DVMRP Next Hop Information...............................................................424
Checking IGMP Status ........................................................................................................425
Obtaining IGMP Interface Information .....................................................................426
Obtaining IGMP Cache Information..........................................................................428
Chapter 21: Checking the Status of QoS Tables................................. 431
Obtaining Layer-2 Priority Information ...........................................................................431
Obtaining Flow Priority Information................................................................................433
Obtaining Layer-2 Switching Information .......................................................................435
Obtaining Layer-3 and Layer-4 Switching Information.................................................436
Chapter 22: Obtaining Reports ............................................................ 439
Saving Multiple Tables as a Report...................................................................................439
Saving a Single Table as a Report ......................................................................................441
Appendix A: Working with Tables ...................................................... 443
Finding Text in a Table........................................................................................................443
Controlling the Contents of Tables....................................................................................444
Refreshing a Table................................................................................................................445
Restoring Table Information...............................................................................................445
Obtaining Table Records.....................................................................................................445
Saving a Single Table as a Report ......................................................................................445
Exporting Data from a Table ..............................................................................................446
Sorting Table Information...................................................................................................446
Appendix B: CoreWatch Menus........................................................... 447
File Menu...............................................................................................................................447
Monitor Menu.......................................................................................................................448
Contents
16 CoreWatch User’s Manual
Performance State Submenu....................................................................................... 448
System State Submenu ................................................................................................ 450
Bridging State Submenu.............................................................................................. 450
Routing State Submenu............................................................................................... 451
QoS State Submenu...................................................................................................... 453
Window Menu.....................................................................................................................454
Help Menu............................................................................................................................ 454
Appendix C: Supported Regular Expressions...................................... 457
Appendix D: Error Messages................................................................ 461
Missing or Invalid Field Error Messages ......................................................................... 461
Duplicate Objects Error Messages .................................................................................... 465
Already Exists or in Use Error Messages......................................................................... 465
Unavailable Objects Error Messages ................................................................................ 466
Miscellaneous Error Messages .......................................................................................... 467
Glossary ................................................................................................. 473
Index ...................................................................................................... 483
CoreWatch User’s Manual 17
Preface
About This Manual
This manual provides a general overview of CoreWatch and provides procedures for
using that application to configure and monitor a SmartSwitch Router (SSR). For product
information not available in this manual, see the manuals listed in “Related
Documentation” on page 19.
Who Should Read This Manual?
Read this manual if you are responsible for configuring or monitoring the SSR and you
want to do so using CoreWatch rather than using Command Line Interface (CLI)
commands.
How to Use This Manual
If You Want To See
Get an overview of CoreWatch Chapter 1 on page 21
Start CoreWatch or familiarize yourself with other basic
tasks and the CoreWatch interface
Chapter 3 on page 27
Start Configuration Expert and familiarize yourself with
its interface
Chapter 4 on page 37
Change system information that is needed before an SSR
can be configured
Chapter 5 on page 49
Configure bridging on the SSR Chapter 6 on page 65
Configure virtual local area networks (VLANs) on the SSR Chapter 7 on page 87
Configure Internet Protocol (IP) interfaces that you want
to use for unicast or multicast routing
Chapter 8 on page 107
Configure the SSR for the Routing Information Protocol
(RIP)
Chapter 9 on page 131
Preface
18 CoreWatch User’s Manual
Configure the SSR for the Distance Vector Multicast
Routing Protocol (DVMRP) and Internet Group
Management Protocol (IGMP), which IP uses to perform
multicast routing
Chapter 10 on page 147
Configure Internet Packet Exchange (IPX) routes on the
SSR
Chapter 11 on page 159
Configure Quality of Service (QoS) policies Chapter 12 on page 179
Configure security on the SSR Chapter 13 on page 207
Read an overview of OSPF routing and configure OSPF on
the SSR
Chapter 14 on page 247
Configure BGP on the SSR Chapter 15 on page 269
Configure Routing Policies on the SSR Chapter 16 on page 297
Check the status of the SSR chassis and ports Chapter 17 on page 365
Monitor real-time performance on the SSR Chapter 18 on page 371
Display tables that contain bridge information and data
about the SSR’s VLANs
Chapter 19 on page 391
Display tables that contain information about the routing
protocols you are using on the SSR
Chapter 20 on page 397
Obtain information about Layer-2, Layer-3, and
Layer-4
Chapter 21 on page 431
Obtain boot log information to perform fault monitoring Chapter 20 on page 329
Obtain reports that include information CoreWatch
displays in its tables
Chapter 22 on page 439
Work in CoreWatch tables Appendix A on page 443
Learn about the commands available on each CoreWatch
menu
Appendix B on page 447
Learn about the regular expressions CoreWatch supports Appendix C on page 457
Obtain information about CoreWatch error messages Appendix D on page 461
If You Want To See
CoreWatch User’s Manual 19
Preface
Related Documentation
The Cabletron Systems documentation set includes the following items. Refer to these
other documents to learn more about your product.
For Information About See the
The SmartSwitch Router (SSR) features and the
procedures for installing the SSR and setting it up
for management using CoreWatch software.
SmartSwitch Router Getting
Started Guide
How to use Command Line Interface (CLI)
commands to configure and manage the SSR
SmartSwitch Router User
Reference Manual
The complete syntax for all CLI commands SmartSwitch Router Command
Line Interface Reference Manual
SYSLOG messages and SNMP traps SmartSwitch Router Error
Reference Manual
Preface
20 CoreWatch User’s Manual
/