Introduction
1-2 Using the EMM-E6 User’s Guide
Stand-alone Launcher or the command line (if you are running in stand-alone
mode); in addition, several applications can also be accessed from within the Hub
View, a graphical display of the EMM-E6 and the hub it is managing.
The EMM-E6
User’s Guide
describes how to use many of the applications
included with the module; note that the instructions provided in this guide apply
to the EMM-E6 module regardless of the operating system or management
platform you are using. Instructions for launching each individual function from
the command line (stand-alone mode) are also included in each chapter.
Following is a description of the applications covered in this guide; while we
provide as much background information as we can, we do assume that you’re
familiar with Ethernet networks and general network management concepts:
• Chapter 1,
Introduction
, provides a list of related documentation, describes
certain software conventions, and shows you how to contact the Cabletron
Systems Global Call Center.
• Chapter 2,
Using the EMM-E6 Hub View
, describes the visual display of the
Hub and explains how to use the mouse within the Hub View; the operation
of some basic functions (changing the Hub View display, opening menus and
windows, enabling and disabling ports, checking device and module status,
and so on) available only from within the Hub View is also described. You can
access the Hub View application from the icon menu or the command line.
• Chapter 3,
Alarm Configuration
, describes how to set thresholds and enable
or disable alarms at the network (channel), module, and port levels. You can
access the Alarm Configuration application from the icon menu, the Hub View,
or the command line.
• Chapter 4,
Link/Seg Traps
, describes how to configure link and segmentation
traps to suit your management needs. You can access the Link/Seg Traps
application from the icon menu, the Hub View, or the command line.
• Chapter 5,
Redundancy
, describes how to configure redundant circuits to keep
your network connections up and running in the event of a single port’s
failure. You can access the Redundancy application from the icon menu, the
Hub View, or the command line.
• Chapter 6,
Source Addressing
, describes how to display the Source Address
List, how to set the ageing time, and how to configure source address traps; it
also discusses the effects of source address locking. You can access the Source
Address application from the icon menu, the Hub View, or the command line.
• Chapter 7,
Security
, describes how to configure intruder protection for all
MIMs installed in the EMM-E6-controlled hub, and how to configure
eavesdropper protection for any installed
LANVIEW
SECURE
MIMs. You can
access the Security application from the icon menu, the Hub View, or the
command line.