CH1Book Page 1 Wednesday, March 20, 1996 7:48 AM EMM-E6 SN BRIM-A100 RESET CPU D C B A STBY RCV XMT CLN RCV LNK EPIM-A XMT STY BRIM-F6 USER’S PWR EMM-E6 E P I M 1 E SYNC EPIM-A PWR BRIM-WT1 GUIDE E P I M TST RED SYN CTS TST C O M 1 T1/FT1 LNK YEL STB DSR LNK 2 F C O M 2 ETHERNET CABLETRON SYSTEMS, P.O.
CH1Book Page i Wednesday, March 20, 1996 7:48 AM NOTICE Cabletron Systems reserves the right to make changes in specifications and other information contained in this document without prior notice. The reader should in all cases consult Cabletron Systems to determine whether any such changes have been made. The hardware, firmware, or software described in this manual is subject to change without notice.
CH1Book Page ii Wednesday, March 20, 1996 7:48 AM NOTICE FCC NOTICE This device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. NOTE: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC rules.
CH1Book Page iii Wednesday, March 20, 1996 7:48 AM NOTICE VCCI NOTICE This equipment is in the Class I Category (information equipment to be used in commercial and/or industrial areas) and conforms to the standards set by the Voluntary Control Council for Interference by Information Technology Equipment (VCCI) aimed at preventing radio interference in commercial and/or industrial areas.
CH1Book Page iv Wednesday, March 20, 1996 7:48 AM NOTICE CABLETRON SOFTWARE PROGRAM LICENSE 1. LICENSE. You have the right to use only the one (1) copy of the Program provided in this package subject to the terms and conditions of this License Agreement. You may not copy, reproduce or transmit any part of the Program except as permitted by the Copyright Act of the United States or as authorized in writing by Cabletron. 2. OTHER RESTRICTIONS.
CH1Book Page v Wednesday, March 20, 1996 7:48 AM NOTICE EXCLUSION OF WARRANTY AND DISCLAIMER OF LIABILITY 1. EXCLUSION OF WARRANTY. Except as may be specifically provided by Cabletron in writing, Cabletron makes no warranty, expressed or implied, concerning the Program (including Its documentation and media).
CH1Book Page vi Wednesday, March 20, 1996 7:48 AM NOTICE UNITED STATES GOVERNMENT RESTRICTED RIGHTS The enclosed product (a) was developed solely at private expense; (b) contains “restricted computer software” submitted with restricted rights in accordance with Section 52227-19 (a) through (d) of the Commercial Computer Software - Restricted Rights Clause and its successors, and (c) in all respects is proprietary data belonging to Cabletron and/or its suppliers.
CH1Book Page vii Wednesday, March 20, 1996 7:48 AM TABLE OF CONTENTS CHAPTER 1 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 1.10 1.11 1.12 1.13 1.14 INTRODUCTION USING THIS MANUAL........................................................ 1-1 EMM-E6 FEATURES .......................................................... 1-4 THE MMAC WITH FLEXIBLE NETWORK BUS ................. 1-10 ETHERNET CHANNELS A, B, C, D, E, and F.................... 1-12 1.4.1 Ethernet Channel A ................................................
CH1Book Page viii Wednesday, March 20, 1996 7:48 AM TABLE OF CONTENTS CHAPTER 2 2.1 2.2 2.3 2.4 2.5 REQUIREMENTS / CONFIGURATIONS NETWORK REQUIREMENTS ........................................... 2-1 2.1.1 10BASE-T Twisted Pair Network ........................... 2-2 2.1.2 Multimode Fiber Optic Network ............................. 2-4 2.1.3 Single Mode Fiber Optic Network .......................... 2-5 2.1.4 Thin-net Network ...................................................
CH1Book Page ix Wednesday, March 20, 1996 7:48 AM TABLE OF CONTENTS CHAPTER 4 4.1 4.2 4.3 4.4 ATTACHING A CONSOLE CONFIGURING YOUR TERMINAL .................................... 4-1 CONFIGURING A CONSOLE CABLE ................................ 4-3 4.2.1 Connecting to a VT Series Terminal ...................... 4-4 4.2.2 Connecting to an IBM PC or Compatible ............... 4-5 PINOUT DESCRIPTIONS................................................... 4-6 CONFIGURING A UPS CABLE ...............................
CH1Book Page x Wednesday, March 20, 1996 7:48 AM TABLE OF CONTENTS CHAPTER 10 CHAPTER 11 11.1 11.2 11.3 ROUTER SETUP SCREEN DEVICE STATISTICS SCREEN DEVICE STATISTICS......................................................... 11-2 DEVICE STATISTICS SCREEN COMMANDS .................. 11-3 11.2.1 Selecting an Update Frequency ............................ 11-4 11.2.2 Selecting a Network/Slot/Port ................................ 11-5 11.2.3 Enabling Ports .....................................................
CH1Book Page xi Wednesday, March 20, 1996 7:48 AM TABLE OF CONTENTS APPENDIX A A.1 A.2 A.3 A.4 A.5 A.6 A.7 A.8 A.9 A.10 A.11 A.12 EMM-E6 SPECIFICATIONS BRIDGING FUNCTIONALITY ............................................. A-1 REPEATER FUNCTIONALITY ........................................... A-2 COM 1 PORT ...................................................................... A-3 COM 2 PORT ...................................................................... A-3 ENVIRONMENTAL REQUIREMENTS ..............
CH1Book Page 1 Wednesday, March 20, 1996 7:48 AM CHAPTER 1 INTRODUCTION Welcome to the Cabletron Systems EMM-E6 User’s Guide. This manual explains how to set-up, configure, and locally manage the Cabletron Systems 6-port Ethernet Bridge/Management Module (EMM-E6). 1.1 USING THIS MANUAL Read through this manual completely to familiarize yourself with its content and to gain an understanding of the features and capabilities of the EMM-E6 and its Local Management, or LM, functions.
CH1Book Page 2 Wednesday, March 20, 1996 7:48 AM CHAPTER 1: INTRODUCTION Chapter 5, Accessing Local Management, describes how to access LM after you attach the management console. Chapter 6, Community Names, explains how to use the Community Name Table screen to set both local and remote access levels. Chapter 7, Configuration Screen, describes how to assign IP addresses, subnet masks, and the default gateway to the EMM-E6. This chapter also explains how to enable and disable all ports.
CH1Book Page 3 Wednesday, March 20, 1996 7:48 AM USING THIS MANUAL Appendix A, EMM-E6 Specifications, details the properties of the EMM-E6 and currently available EPIM modules. Appendix B, OID Descriptions, supplies information detailing the Object Identifiers that may be accessed for managing the EMM-E6. Following the Appendices is a brief Glossary of Terms which provides short definitions for terms related to items and concepts referred to in this manual.
CH1Book Page 4 Wednesday, March 20, 1996 7:48 AM CHAPTER 1: INTRODUCTION 1.2 EMM-E6 FEATURES • i960 Processor Design • IEEE 802.
CH1Book Page 5 Wednesday, March 20, 1996 7:48 AM EMM-E6 FEATURES i960 Processor Design The EMM-E6 is equipped with an advanced Intel i960 microprocessor that provides a scalable RISC-based architecture. IEEE 802.1d Compliant The EMM-E6 is a fully IEEE 802.1d compliant Ethernet bridge. The EMM-E6 supports both the IEEE and DEC Spanning Tree algorithms, allowing it to operate in several fault-tolerant bridging environments.
CH1Book Page 6 Wednesday, March 20, 1996 7:48 AM CHAPTER 1: INTRODUCTION • • • • BRIM-E6: Ethernet module with selectable EPIM connection CRBRIM-W/E-IP: Cisco Router Ethernet/Wide Area module for TCP/IP traffic. CRBRIM-W/E-DESKTOP: Cisco Router Ethernet/Wide Area module for IP, IPX, DECNet, and AppleTalk traffic. CRBRIM-W/E-ENT: Cisco Router Ethernet/Wide Area module for all standard Cisco protocols.
CH1Book Page 7 Wednesday, March 20, 1996 7:48 AM EMM-E6 FEATURES • BRIM-A6: 100/155 Mbps ATM Station connection with configurable connector. The BRIM-A6 uses ATM Port Interface Modules (APIMs). APIMs allow a media flexibility for ATM connections like that provided by FPIMs (described above).
CH1Book Page 8 Wednesday, March 20, 1996 7:48 AM CHAPTER 1: INTRODUCTION Flash memory allows for the downloading of firmware to the module without requiring that the module be shut down. The firmware download may be performed at any time during the operation of the module, and the new firmware image will be utilized at the next reset of the module. Expandable LDRAM The EMM-E6 comes with 8 MB of Local Dynamic Random Access Memory (LDRAM).
CH1Book Page 9 Wednesday, March 20, 1996 7:48 AM EMM-E6 FEATURES DLM Support The EMM-E6 allows the option of using Cabletron Distributed LAN Monitor (DLM) software to locally poll and monitor any Simple Network Management Protocol (SNMP) or Internet Protocol (IP) device. The EMM-E6 itself tallies the polling results and can be configured to contact a management station when a predetermined threshold is exceeded.
CH1Book Page 10 Wednesday, March 20, 1996 7:48 AM CHAPTER 1: INTRODUCTION 1.3 THE MMAC WITH FLEXIBLE NETWORK BUS The Multi Media Access Center with Flexible Network Bus (MMAC-FNB) provides the operational platform for the EMM-E6. The MMAC-FNB (backplane) provides two physically separate buses Channel A (operating over the MMAC Power and Management bus), and Channels B and C (on the FNB). Each of these channels/buses allows different MIM types to access the EMM-E6 (Figure 1-1).
CH1Book Page 11 Wednesday, March 20, 1996 7:48 AM THE MMAC WITH FLEXIBLE NETWORK BUS Table 1-1. MMACs with Shunting Capabilities NOTE MMAC Chassis Part # MMAC-3FNB FC000000000 or above MMAC-5FNB CC000000000 or above MMAC-8FNB CG000000000 or above MMAC-M8FNB DK000000000 or above MMAC-M5FNB all MMAC-M3FNB all If your MMAC does not have a shunting backplane, upgrade kits are available.
CH1Book Page 12 Wednesday, March 20, 1996 7:48 AM CHAPTER 1: INTRODUCTION 1.4 ETHERNET CHANNELS A, B, C, D, E, and F The EMM-E6 manages all Ethernet bridging traffic within its resident hub. This means that the EMM-E6 controls up to six of the Ethernet bridging channels - A, B, C, D, E, and, in the future, F. These channels access the same EMM-E6 shared memory, so bridging between channels is concurrent. 1.4.
CH1Book Page 13 Wednesday, March 20, 1996 7:48 AM ETHERNET CHANNELS A, B, C, D, E, and F 1.4.2 Ethernet Channels B and C The Cabletron Systems MultiChannel family of MIMs includes the Repeater Interface Controller Media Interface Module (RIC MIM), an IEEE 802.3 compliant multi-port repeater. You can configure these modules to operate on either the Ethernet Channels B or C, or as a standalone repeater, using hardware jumpers or management software.
CH1Book Page 14 Wednesday, March 20, 1996 7:48 AM CHAPTER 1: INTRODUCTION When frames have destination addresses for a different bus: • the sending RIC MIM transmits the frames over its designated Ethernet bus; • the other RIC MIMs on this bus receive the frames, and repeat them; • the EMM-E6, after determining the source and destination, forwards the traffic accordingly.
CH1Book Page 15 Wednesday, March 20, 1996 7:48 AM ETHERNET CHANNELS A, B, C, D, E, and F FDDI and Token Ring Modules - The EMM-E6 recognizes the following FDDI and Token Ring modules, but the EMM-E6 management does not provide control or statistics. • • • • • • CRM-3T SNACMIM TRMIM-32A TRMIM-34A TRRMIM-F2T TRRMIM-F3T With TRMMIM version 2.
CH1Book Page 16 Wednesday, March 20, 1996 7:48 AM CHAPTER 1: INTRODUCTION Only one EPIM operates at any given time. However, using both EPIM slots in a redundancy configuration ensures that if the primary bridging port fails, or the connecting cable segment becomes inoperable, the backup port automatically takes over the bridging operation. This is referred to as Front Panel Redundancy. As it does for Channels B and C, the EMM-E6 only bridges (i.e., it does not repeat) Channel D traffic.
CH1Book Page 17 Wednesday, March 20, 1996 7:48 AM BRIDGES 1.6 BRIDGES An Ethernet bridge is a device that allows the expansion of a network beyond the limitations of the IEEE 802.3 specified limits for repeated Ethernet networks. If an Ethernet network has a repeater hop of four repeaters or a round trip propagation delay near the 51.2 µs maximum, a bridge can be used to build an extended network.
CH1Book Page 18 Wednesday, March 20, 1996 7:48 AM CHAPTER 1: INTRODUCTION The bridge is considered a node on the network and performs store and forward functions for packets on each network. This contrasts with a repeater which repeats the signal bit by bit from one side of the network to the other. The bridge actually reads each packet, checks the packet for accuracy, then decides whether the packet should be sent to the other network based on the destination address.
CH1Book Page 19 Wednesday, March 20, 1996 7:48 AM BRIDGES 1.6.2 Spanning Tree Algorithm The Spanning Tree Algorithm (STA) is used by bridges to detect data loops (duplicate data paths). The bridges will then automatically break the loop and use the now open path as a backup in case the primary path fails. When a bridge is powered up, it goes through a series of self tests to check its internal operation. During this time the bridge is in a standby, or blocking, condition and does not forward traffic.
CH1Book Page 20 Wednesday, March 20, 1996 7:48 AM CHAPTER 1: INTRODUCTION 1.7 LOCAL MANAGEMENT FEATURES Local Management for the EMM-E6 provides tools that allow you to manage the device and its attached segments. Through Local Management you can: • Assign an IP address and subnet mask to the EMM-E6 bridge via the Configuration Screen menu. • Select a default gateway and default interface. • Control EMM-E6 local and remote access by establishing Community Names.
CH1Book Page 21 Wednesday, March 20, 1996 7:48 AM COMMUNITY NAMES 1.8 COMMUNITY NAMES When using Local or Remote Management tools to access the EMM-E6 it is important that the Network Manager has the ability to maintain network security. Community Names provide some network security by acting as passwords into the device and the software running it. The Network Manager (Super-user) controls access by establishing four (4) passwords.
CH1Book Page 22 Wednesday, March 20, 1996 7:48 AM CHAPTER 1: INTRODUCTION 1.9.1 MIBs The Management Information Bases (MIBs) are a database resident on the EMM-E6. Objects in the information base are uniquely identified by administratively assigned identifiers (called object identifiers or OIDs), and can be viewed, retrieved, or changed using an SNMP packet exchange over the network. 1.
CH1Book Page 23 Wednesday, March 20, 1996 7:48 AM REVIEW OF ADDRESSING As MAC addresses are often used to perform management and control functions for networking hardware, it is important to be able to identify a MAC address when it is requested or returned by network management. Since most MAC addresses are set at manufacture and cannot be altered by users, this manual does not examine MAC addressing in greater detail. 1.10.
CH1Book Page 24 Wednesday, March 20, 1996 7:48 AM CHAPTER 1: INTRODUCTION Table 1-2. Class A Range of Network IDs: 1 - 126. host. host. host [1 octet for the Network ID (127 reserved)] Binary translation: (of first octet) 0000001 - 01111111 [first bit is always 0] Range for the Host ID: net. 1 - 254. 1 - 254. 1 - 254 [3 octets for the Host ID - allows 16,777,214 hosts per network] Table 1-3. Class B Range of Network IDs: 128 - 191. 1 - 254. host.
CH1Book Page 25 Wednesday, March 20, 1996 7:48 AM REVIEW OF ADDRESSING 1.10.3 Identifying IP Address Classes In the event that you have an existing IP address and need to quickly determine what fields are available for Host IP address configuration, make that determination based on the binary value of the first DDN field. Tables 1-1 to 1-3 show that different address classes have different initial bits in the first octet.
CH1Book Page 26 Wednesday, March 20, 1996 7:48 AM CHAPTER 1: INTRODUCTION Subnet addresses, when used with routing, allow discrimination between devices and groups of devices based on IP addresses. Networks of different subnets, even those on the same physical network segment, may be isolated, from a functional standpoint, from one another through the implementation of routing.
CH1Book Page 27 Wednesday, March 20, 1996 7:48 AM REVIEW OF ADDRESSING The binary 1’s in the mask “mask-out” the Network ID and the 0’s show where the Host ID is located. When using part of the Host ID as a subnet address, define a Subnet Mask that will mask-out the bits of the Host ID that are being used as a subnet address.
CH1Book Page 28 Wednesday, March 20, 1996 7:48 AM CHAPTER 1: INTRODUCTION The example in Figure 1-3 masks out the three high order bits of the only octet available for modification, the last octet. This provides for up to six subnets and up to 30 Host IDs within each subnet. Modifying the default mask for a Class B address (255.255.0.0) to mask out the third octet for subnet purposes (255.255.255.0) would provide up to 254 subnets each containing up to 254 Host IDs.
CH1Book Page 29 Wednesday, March 20, 1996 7:48 AM REVIEW OF ADDRESSING Table 1-7. Examples of Class B Subnet Masks Decimal Mask Binary Equivalent Available Subnet Addresses Host IDs Per Subnet 192. 0 11000000 00000000 64 and 192 16,382 224. 0 11100000 00000000 32, 64, 96, 128, 192, 224 8,190 240. 0 11110000 00000000 16 - 240 increments of 16 4,094 248. 0 11111000 00000000 8 - 248 increments of 8 2,046 252. 0 11111100 00000000 4 - 252 increments of 4 1,022 254.
CH1Book Page 30 Wednesday, March 20, 1996 7:48 AM CHAPTER 1: INTRODUCTION 1.10.6 Operation of the Subnet Mask The Subnet Mask defines how your EMM-E6 treats SNMP Trap IP destination addresses in its Trap table (see Chapter 7, Trap Table Screen, for additional information on traps). When using the Subnet Mask, the EMM-E6 logically determines one of two possible locations, either on or not on its own subnet, for each Trap IP destination address in its trap table.
CH1Book Page 31 Wednesday, March 20, 1996 7:48 AM REVIEW OF ADDRESSING 1.10.8 Addressing Example A network manager, planning for the configuration of a network of 60 hosts, desires to implement subnets to create logical divisions between different groups of workstations and devices. The Internet Assigned Numbers Authority has supplied the company with a Class C Network Address; 222. 131. 99. XXX.
CH1Book Page 32 Wednesday, March 20, 1996 7:48 AM CHAPTER 1: INTRODUCTION For any SNMP Trap-generating network devices not residing on the same subnet as the network management station, the default Subnet Mask utilized on that device must be altered to match the subnet scheme. In the above example, the default Subnet Mask is modified from 255. 255. 255. 0 to 255. 255. 255. 240. For each SNMP Trap-generating device with a modified Subnet Mask, a Default Gateway is assigned.
CH1Book Page 33 Wednesday, March 20, 1996 7:48 AM LANVIEW LEDs AND RESET SWITCH 1.11 LANVIEW LEDs AND RESET SWITCH The EMM-E6 incorporates the Cabletron Systems LANVIEW Status Monitoring and Diagnostics System. LANVIEW LEDs can help diagnose any problems, such as a power failure or a cable fault.
CH1Book Page 34 Wednesday, March 20, 1996 7:48 AM CHAPTER 1: INTRODUCTION LANVIEWSECURE modules also provide a “Full security” configuration, under which broadcast and multicast packets contain modified data fields such as those used in eavesdrop prevention (described above). Ports set to Full security mode will not see or respond to these types of packets. The default setting for Full security is disabled. Enabling the Full security function modifies the broadcast and multicast packets.
CH1Book Page 35 Wednesday, March 20, 1996 7:48 AM GETTING HELP 1.13 GETTING HELP If you need additional support related to installation, configuration, or management of the EMM-E6, or if you have any questions, comments, or suggestions concerning this manual, contact Cabletron Systems Technical Support: By phone.......................... (603) 332-9400 Monday-Friday; 8am - 8pm ET By CompuServe............... GO CTRON from any ! prompt By Internet mail ............... support@ctron.com 1.
CH1Book Page 1 Wednesday, March 20, 1996 7:48 AM CHAPTER 2 REQUIREMENTS / CONFIGURATIONS This chapter contains general networking guidelines. Before attempting to install the EMM-E6 or any additional EPIMs or BRIMs, review the requirements and specifications outlined in this chapter. ! CAUTION 2.1 Your network installation must meet the conditions, guidelines, specifications, and requirements included in this chapter to ensure satisfactory performance of this equipment.
CH1Book Page 2 Wednesday, March 20, 1996 7:48 AM CHAPTER 2: REQUIREMENTS / CONFIGURATIONS 2.1.1 10BASE-T Twisted Pair Network When connecting a 10BASE-T segment at any of the 10BASE-T hub ports or a 10BASE-T Ethernet Port Interface Module (EPIM-T), ensure that the network meets the following requirements: • Length - The IEEE 802.3 10BASE-T standard requires that 10BASE-T devices transmit over a 100 meter (328 foot) link using 22-24 AWG unshielded twisted pair wire.
CH1Book Page 3 Wednesday, March 20, 1996 7:48 AM NETWORK REQUIREMENTS • Jitter - Intersymbol interference and reflections can cause jitter in the bit cell timing, resulting in data errors. 10BASE-T links must not generate more than 5.0 ns of jitter. Make sure your cable meets 10BASE-T link impedance requirements to rule out jitter as a concern. • Delay - The maximum propagation delay of a 10BASE-T link segment must not exceed 1000 ns.
CH1Book Page 4 Wednesday, March 20, 1996 7:48 AM CHAPTER 2: REQUIREMENTS / CONFIGURATIONS 2.1.2 Multimode Fiber Optic Network When connecting a multimode fiber optic link segment to the hub (via EPIM-F1/F2), ensure the network meets the following requirements: • Cable Type - Use the EPIM-F1 and EPIM-F2 for the following multimode fiber optic media: - • Attenuation - You must test the fiber optic cable with a fiber optic attenuation test set adjusted for an 850 nm wavelength.
CH1Book Page 5 Wednesday, March 20, 1996 7:48 AM NETWORK REQUIREMENTS 2.1.3 Single Mode Fiber Optic Network When connecting a single mode fiber optic link segment to the hub (via EPIM-F3), ensure the network meets the following requirements: • Cable Type - Fiber optic link segments should consist of 8/125 to 12/125 µm single mode fiber optic cabling. You can also use 62.
CH1Book Page 6 Wednesday, March 20, 1996 7:48 AM CHAPTER 2: REQUIREMENTS / CONFIGURATIONS 2.1.4 Thin-net Network When connecting a thin-net (coaxial) segment to your hub (via an EPIM-C), ensure your network meets the following requirements: • Cable Type - Use only 50 ohm RG-58A/U type coaxial cable for thin-net cable segments. • Length - The thin-net segment must not exceed 185 meters. • Terminators - Terminate each end of a thin-net segment.
CH1Book Page 7 Wednesday, March 20, 1996 7:48 AM REPEATER MEDIA INTERFACE MODULES 2.3 REPEATER MEDIA INTERFACE MODULES The EMM-E6 communicates with the Repeater MIMs over Ethernet Channels B and C of the MMAC-FNB. The following repeater MIMs are currently available: • CXRMIM: coaxial repeater MIM; twelve 10BASE-2 coaxial connectors; one EPIM. • FORMIM-22: fiber optic repeater MIM; twelve FOIRL/ 10BASE-FL ports; ST type connectors.
CH1Book Page 8 Wednesday, March 20, 1996 7:48 AM CHAPTER 2: REQUIREMENTS / CONFIGURATIONS 2.4 PORT ASSIGNMENT MODULES • TPXMIM-20/TPXMIM-22: twisted pair port and bank assignment repeater MIM; RJ45 connectors (TPXMIM-20 has nine, TPXMIM22 has twenty-one); one EPIM. • TPXMIM-32/TPXMIM-36: twisted pair port and bank assignment repeater MIM; RJ71 connectors (TPXMIM-32 has one, TPXMIM36 has two); one EPIM. Figure 2-1.
CH1Book Page 9 Wednesday, March 20, 1996 7:48 AM SAMPLE NETWORK CONFIGURATIONS 2.5 SAMPLE NETWORK CONFIGURATIONS This section provides you with several examples for configuring networks with the EMM-E6. These examples illustrate the flexibility and advantages to using the EMM-E6 and RIC MIM technology: 2.5.1 2.5.2 2.5.3 2.5.4 2.5.
CH1Book Page 10 Wednesday, March 20, 1996 7:48 AM CHAPTER 2: REQUIREMENTS / CONFIGURATIONS 2.5.1 Three Networks With a Single MMAC-FNB One of the basic applications of the EMM-E6 is for configuring three separate networks within one MMAC. This provides you with the advantages of having three separate networks in one wiring closet, with full bridging and SNMP management for each network. Figure 2-2 illustrates an example of the three network configuration.
CH1Book Page 11 Wednesday, March 20, 1996 7:48 AM SAMPLE NETWORK CONFIGURATIONS 2.5.3 Adding Users to a Separate Segment The example in Figure 2-3 compares two methods of connecting 48 additional users to a network.
CH1Book Page 12 Wednesday, March 20, 1996 7:48 AM CHAPTER 2: REQUIREMENTS / CONFIGURATIONS 2.5.4 A Fault Tolerant Wiring Hierarchy The example in Figure 2-4 illustrates a fault tolerant wiring hierarchy. D D C B A MiniMMAC D D Closet 1 D BRIDGE STAR HUB D BRIDGE A B A B C C Closet 2 BRIDGE A Closet 3 B C BRIDGE A B C Figure 2-4.
CH1Book Page 13 Wednesday, March 20, 1996 7:48 AM SAMPLE NETWORK CONFIGURATIONS The Star Hub, which is an MMAC-FNB that uses a configuration similar to the closet hubs, is the central repeater interconnect for the closets, but does not constitute a single point of failure. The EMM-E6 in each MMAC-FNB utilizes the 802.1d Spanning Tree Algorithm.
CH1Book Page 14 Wednesday, March 20, 1996 7:48 AM CHAPTER 2: REQUIREMENTS / CONFIGURATIONS 2.5.5 The EMM-E6 and BRIMs The example in Figure 2-5 illustrates just one possible EMM-E6 and BRIM configuration. The EMM-E6/BRIM combination provides various connection possibilities, depending on the BRIM(s) you use. Refer to individual BRIM manuals and/or Cabletron Systems’ Router Services documentation to better understand the capabilities of each device.
CH1Book Page 1 Wednesday, March 20, 1996 7:48 AM CHAPTER 3 INSTALLATION This chapter contains instructions for: • unpacking and inventorying the contents of the EMM-E6 carton • locating, identifying and setting the EMM-E6 mode switches • adding/replacing optional modules (i.e., Single In-line Memory Modules and Ethernet Port Interface Modules) • identifying BRIM connector locations • installing the EMM-E6 into a Multi Media Access Center (MMAC) • connecting your device to a network.
CH1Book Page 2 Wednesday, March 20, 1996 7:48 AM CHAPTER 3: INSTALLATION 3.1 UNPACKING THE EMM-E6 Unpack the EMM-E6 as follows: ! Observe all anti-static precautions when handling sensitive electronic equipment. CAUTION 1. Remove the shipping material covering the EMM-E6. 2. Verify the contents of the packing carton. The carton is shipped with the following items: Item Quantity EMM-E6 1 Firmware Image 1 Grounding Strap 1 RJ45 Adapter Kit 1 Release Notes 1 3.
CH1Book Page 3 Wednesday, March 20, 1996 7:48 AM SETTING MODE SWITCHES 3.2 SETTING MODE SWITCHES The bank of dip switches located at the top of the EMM-E6 (Figure 3-1) are set to their default positions prior to shipping. Check these switches to ensure that they are in the correct position for normal EMM-E6 operation. Switches EMM-E6 ON On Off 1 2 3 4 5 6 7 8 Figure 3-1. EMM-E6 Mode Switches The potential for electric shock is present inside the MMAC chassis when power is applied.
CH1Book Page 4 Wednesday, March 20, 1996 7:48 AM CHAPTER 3: INSTALLATION NOTE Changes to switch positions only activate their associated functions after the EMM-E6 is reset. Switch definitions are as follows: • Switch 1 - Cabletron Systems use only. • Switch 2 - Cabletron Systems use only. • Switch 3 - For manufacturing use only. Keep in OFF position. • Switch 4 - MIMREV (Management Interface Module Revision). This switch remains in the OFF position for normal operation.
CH1Book Page 5 Wednesday, March 20, 1996 7:48 AM SETTING MODE SWITCHES After changing the state of Switch 6 and repowering the device, the EMM-E6 will request a new image until it either receives the image, or you reset the EMM-E6 again by: - using the reset button on the front panel - removing the EMM-E6 from the chassis backplane and plugging it back in - cycling the MMAC-FNB power. After resetting the EMM-E6, the device attempts to locate a BOOTP server again.
CH1Book Page 6 Wednesday, March 20, 1996 7:48 AM CHAPTER 3: INSTALLATION 3.3 SIMM UPGRADES The EMM-E6 allows memory upgrades for SDRAM, LDRAM, and FLASH EEPROM. This section explains how to locate and add or replace a Single In-line Memory Module (SIMM) for any of these memory types. NOTE 3.3.1 For additional information on SIMMs, or how to upgrade the memory in your Module, contact Cabletron Systems Technical Support.
CH1Book Page 7 Wednesday, March 20, 1996 7:48 AM SIMM UPGRADES Local Dynamic Random Access Memory (LDRAM) SIMM Slot FLASH Memory SIMM Slot Direction of Install EMM-E6 Shared Dynamic Random Access Memory (SDRAM) SIMM Slot Figure 3-2.
CH1Book Page 8 Wednesday, March 20, 1996 7:48 AM CHAPTER 3: INSTALLATION 3.3.2 Installing SIMMs Installing a SIMM is a simple two step process. After finding the proper SIMM slot location, refer to Figure 3-3 and the following instructions to install your SIMM. SIMM Slot Connector Teeth Clips 1 SIMM Slot Post 2 SIMM SIMM Hole Figure 3-3. Installing a SIMM To install a SIMM: ! Observe all anti-static precautions when handling sensitive electronic equipment. CAUTION 1.
CH1Book Page 9 Wednesday, March 20, 1996 7:48 AM ADDING/REPLACING EPIMs 3.4 ADDING/REPLACING EPIMs This section contains procedures on how to add/replace an Ethernet Port Interface Module (EPIM) to upgrade or change the capabilities of your hub. After installing your new EPIM, refer to appropriate EPIM sections in this chapter to verify proper operation. Observe all anti-static precautions when handling sensitive electronic equipment.
CH1Book Page 10 Wednesday, March 20, 1996 7:48 AM CHAPTER 3: INSTALLATION 3.5 LOCATING BRIMs This section points out Bridge Router Interface Module (BRIM) connector locations on your EMM-E6 board. Refer to your BRIM Guide for installation procedures and additional information. The following diagram (Figure 3-5) shows BRIM connector locations for the EMM-E6: BRIM-F Ribbon Cable Connector Channel F BRIM Connector Channel E BRIM Connector Standoff EMM-E6 Figure 3-5.
CH1Book Page 11 Wednesday, March 20, 1996 7:48 AM PRE-INSTALLATION TEST 3.6 PRE-INSTALLATION TEST Before installing the EMM-E6 in a live network, test the module in a controlled situation to ensure that it is repeating and bridging packets. You can perform this test with two workstations (see Figure 3-6), using an MMAC-FNB, or MMAC-MFNB, installed with an EMM-E6 and a Media Interface Module (MIM) as follows: 1. Install the EMM-E6 and any MIM (e.g., TPMIM, THN-MIM, CXRMIM, FORMIM, etc.
CH1Book Page 12 Wednesday, March 20, 1996 7:48 AM CHAPTER 3: INSTALLATION 6. Send packets between the two workstations to verify the proper operation of the EMM-E6. NOTE Note: If using UNIX workstations, a “ping” test verifies the EMM-E6 is operating properly. If a failure occurs, refer to Chapter 14, Troubleshooting. tTPRMIM-33 MMAC-M3FNB EMM-E6 TPT Figure 3-6.
CH1Book Page 13 Wednesday, March 20, 1996 7:48 AM INSTALLING THE EMM-E6 3.7 INSTALLING THE EMM-E6 Installing the EMM-E6 into any MMAC hub is an easy operation and requires no special skills or tools. However, when you install your device, keep the following in mind: Any installation operations should be performed only by qualified personnel • You must install the EMM-E6 in slots 1 and 2 (furthest slots to the right) of the MMAC chassis.
CH1Book Page 14 Wednesday, March 20, 1996 7:48 AM CHAPTER 3: INSTALLATION 4. Firmly press the module connections into the backplane. Do not try to force the module into place or use the knurled knobs to draw the module into the backplane. Forcing a misaligned module into place can damage the EMM-E6 or the MMAC backplane. MMAC M8FNB EMM-E6 EMM-E6 Chassis Slots 1 and 2 Knurled Knobs Figure 3-7. Installing the EMM-E6 5. Secure the module to the MMAC chassis by tightening the knurled knobs.
CH1Book Page 15 Wednesday, March 20, 1996 7:48 AM INSTALLING THE EMM-E6 7. Observe the status of the LANVIEW LEDs on the EMM-E6. When the CPU LED is flashing, the STBY (standby) LEDs indicate the module’s boot state. During this period (up to 5 minutes), the LEDs cycle through a series of internal diagnostics. (See Figure 3-8) EMM-E6 SN BRIM-A100 RESET CPU D C B A STBY RCV XMT CLN Figure 3-8. EMM-E6 LANVIEW LEDs 8.
CH1Book Page 16 Wednesday, March 20, 1996 7:48 AM CHAPTER 3: INSTALLATION 3.8 INSTALLATION CHECK-OUT After connecting to the network, verify that packets can pass over the network segments via the EMM-E6. Again, you can use two workstations set up as file server and client. Keep the server workstation stationary in the wiring closet with the EMM-E6, and use the client workstation to move to each node connected to the EMM-E6. See Figure 3-9. 1.
CH1Book Page 17 Wednesday, March 20, 1996 7:48 AM INSTALLATION CHECK-OUT MMAC-M3FNB with EMM-E6 and TPRMIM tTPRMIM-33 MMAC-M3FNB EMM-E6 TPT Office Locations File Server Workstation Client Workstation Figure 3-9.
CH1Book Page 18 Wednesday, March 20, 1996 7:48 AM CHAPTER 3: INSTALLATION 3.9 CONNECTING TO THE NETWORK This section gives procedures for connecting the EMM-E6 to the network using the various EPIMs available. When the EMM-E6 is first powered up, the EPIM 1 port acts as the bridge port and the EPIM 2 port is OFF. Once you have successfully powered up your EMM-E6, you can add network connections. The procedure for connecting Ethernet segments to a hub varies depending on the media and ports you connect.
CH1Book Page 19 Wednesday, March 20, 1996 7:48 AM CONNECTING TO THE NETWORK 3.9.1 Connecting a Twisted Pair Segment to an EPIM-T Before connecting a segment to the EPIM-T, check each end of the segment to determine wire cross-over. If the wires do not cross over, use the switch on the EPIM-T to internally cross over the RJ45 port. Refer to Figure 3-10 to properly set the EPIM-T cross-over switch.
CH1Book Page 20 Wednesday, March 20, 1996 7:48 AM CHAPTER 3: INSTALLATION 2. Check that the LNK LED for the port is on. If the LED is not on, perform each of the following steps until it is: a. Check that the 10BASE-T device at the other end of the twisted pair segment is powered. b. Verify that the RJ45 connectors on the twisted pair segment have the proper pinouts (Figure 3-11). c. Check the cable for continuity. d.
CH1Book Page 21 Wednesday, March 20, 1996 7:48 AM CONNECTING TO THE NETWORK 3.9.2 NOTE Connecting an AUI Cable to an EPIM-X The Signal Quality Error (SQE) switch remains in the OFF position for most network connections. However, some Data Terminal Equipment (DTE) requires SQE. Refer to your DTE manual for SQE requirement information. To connect an EPIM-X to a device not requiring SQE: 1. Verify that the SQE LED on the EPIM-X is off. If the SQE LED is on, set the position of the SQE switch to off.
CH1Book Page 22 Wednesday, March 20, 1996 7:48 AM CHAPTER 3: INSTALLATION 3.9.3 Connecting to an EPIM-F1/F2, or EPIM-F3 When connecting a fiber optic link segment to an EPIM-F1/F2, or EPIM-F3 keep the following in mind: • When connecting a fiber optic link segment with SMA 906 connectors to an EPIM-F1 with SMA ports, make sure each connector uses half alignment, NOT full alignment, sleeves. NOTE A full alignment sleeve damages the receive port. SMA 905 connectors do not need alignment sleeves.
CH1Book Page 23 Wednesday, March 20, 1996 7:48 AM CONNECTING TO THE NETWORK We recommend that you label the fiber optic cables to indicate Receive and Transmit ends. Cabletron Systems prelabels its cable. At one end of the cable, one fiber is labeled 1, and the other fiber is labeled 2. This pattern repeats at the other end of the cable. If you did not purchase your cable from Cabletron Systems, be sure to label your cable in this manner.
CH1Book Page 24 Wednesday, March 20, 1996 7:48 AM CHAPTER 3: INSTALLATION F1/F2 ST Connectors F1/F2 SMA 906 Connectors w/ Half Alignment Sleeves SMA 905 Connectors F3 ST Connectors Figure 3-13. The EPIM-F1/F2 and EPIM-F3 5. Check that the LNK LED on the applicable module port is on. If the LED is not on, perform each of the following steps until it is: a. Check that the device at the other end of the link is powered. b.
CH1Book Page 25 Wednesday, March 20, 1996 7:48 AM CONNECTING TO THE NETWORK 3.9.4 Connecting a Thin-Net Segment to an EPIM-C To connect a thin-net segment to an EPIM-C: 1. Set the Internal Termination Switch (Figure 3-14), located above the port (when the EPIM has been inserted into the EMM-E6) and labeled TERM to: • the ON position ( ) to internally terminate the thin-net segment at the port. • the OFF position ( ) if you do not want the thin-net segment to internally terminate at the port. 2.
CH1Book Page 26 Wednesday, March 20, 1996 7:48 AM CHAPTER 3: INSTALLATION When internal termination switch is set to off ( ): Connect BNC T-connector to port. Attach a terminator or terminated thin-net segment to one female connector of tee-connector. Connect a terminated thin-net segment to other female connector of T-connector. Attach thin-net segment directly to BNC connector when internal termination switch is set to on ( ). Figure 3-14.
CH1Book Page 27 Wednesday, March 20, 1996 7:48 AM CONNECTING TO THE NETWORK 3.9.5 NOTE Connecting an AUI Cable to an EPIM-A Ensure that the external transceiver to which you connect the EPIM-A does not have the Signal Quality Error (SQE or “heartbeat”) test function enabled. The EPIM does not operate if the transceiver has the SQE test function enabled. Refer to the applicable transceiver manual for additional information. To connect an EPIM-A to an external network segment: 1.
CH1Book Page 28 Wednesday, March 20, 1996 7:48 AM CHAPTER 3: INSTALLATION 5. Lock the AUI connector into place using the connector slide latch. 6. If the transceiver PWR LED is off with the AUI cable connected: a. Check the AUI connections for proper pinouts. Appendix A lists the pinouts for the transceiver connection. b. Check the cable for continuity. c. Reconnect the AUI cable to the EMM-E6 and the device. If the transceiver PWR LED remains off, contact Cabletron Systems Technical Support.
CH1Book Page 1 Wednesday, March 20, 1996 7:48 AM CHAPTER 4 ATTACHING A CONSOLE This chapter describes how to attach a Local Management console to the EMM-E6, and lists the setup and configuration requirements for: • • • 4.1 console/terminal console cable console cable connections. CONFIGURING YOUR TERMINAL The following instructions outline how to configure your console (terminal) to communicate with Local Management. Refer to your specific terminal manual for more instructions if necessary.
CH1Book Page 2 Wednesday, March 20, 1996 7:48 AM CHAPTER 4: ATTACHING A CONSOLE Table 4-1. VT Terminal Setup Display Setup Menu Columns .......................... -> 80 Columns Controls ........................... -> Interpret Controls Auto Wrap ........................ -> No Auto Wrap Scroll................................ -> Jump Scroll Text Cursor....................... -> Cursor Cursor Style ..................... -> Underline Cursor Style General Setup Menu Mode................................
CH1Book Page 3 Wednesday, March 20, 1996 7:48 AM CONFIGURING A CONSOLE CABLE 4.2 CONFIGURING A CONSOLE CABLE This section outlines the proper cable configurations for connecting the EMM-E6 to a Local Management terminal. For information on the appropriate pinouts, refer to Appendix A of this User’s Guide.
CH1Book Page 4 Wednesday, March 20, 1996 7:48 AM CHAPTER 4: ATTACHING A CONSOLE 4.2.1 Connecting to a VT Series Terminal To connect a VT Series terminal to a Cabletron module Console port (Figure 4-1): 1. Connect the RJ45 connector at one end of the cable to the Console port on the Cabletron module. 2. Plug the RJ45 connector at the other end of the cable into the RJ45 to DB25 female adapter. 3. Connect the DB25 adapter to the port labeled COMM on the VT terminal. VT S i T i l Figure 4-1.
CH1Book Page 5 Wednesday, March 20, 1996 7:48 AM CONFIGURING A CONSOLE CABLE 4.2.2 Connecting to an IBM PC or Compatible To connect an IBM PC or compatible running VT terminal emulation to a Cabletron module Console port (Figure 4-2): 1. Connect the RJ45 connector at one end of the cable to the Console port on the Cabletron module. 2. Plug the RJ45 connector at the other end of the cable into the RJ45 to DB9 adapter. 3. Connect the DB9 adapter to the communications port on the PC. PC Figure 4-2.
CH1Book Page 6 Wednesday, March 20, 1996 7:48 AM CHAPTER 4: ATTACHING A CONSOLE 4.3 PINOUT DESCRIPTIONS Table 4-2. RJ45 to DB9 Adapter (PC Adapter): RJ45 Pin DB9 Color Pin Description 1 Blue 2 Receive 4 Red 3 Transmit 5 Green 5 Ground 2 Orange 7 Send Request 6 Yellow 8 Clear to Send Table 4-3. RJ45 to DB25 Adapter (VT Series Adapter): RJ45 Pin 4.
CH1Book Page 1 Wednesday, March 20, 1996 7:48 AM CHAPTER 5 ACCESSING LOCAL MANAGEMENT With your terminal properly configured, and the correct physical cable connections in place, you can access the Local Management interface. To access Local Management: 1. Turn the terminal on, and press the Return key. The EMM-E6 Password Screen, Figure 5-1, appears. EMM-E6-960 LOCAL MANAGEMENT Cabletron EMM-E6 Revision 0.00.00 Cabletron Systems Incorporated 35 Industrial Way, P.O. Box 5005 Rochester, NH 03867-0505 U.
CH1Book Page 2 Wednesday, March 20, 1996 7:48 AM CHAPTER 5: ACCESSING LOCAL MANAGEMENT 2. Enter your Password and press Return. The default Super-User access password is the Return key (which defaults internally to ‘public’). NOTE Your password is one of the community names specified in the Community Name Table. Access to certain LM capabilities depends on the degree of access accorded that community name. See Chapter 6, Community Names, for additional information.
CH1Book Page 3 Wednesday, March 20, 1996 7:48 AM 3. Use the arrow keys to highlight an option, and press Return (or simply use the corresponding Function key). The selected screen appears. If you do nothing on LM for 15 minutes, the Password Screen reappears. At this point, you must re-enter the password to continue using EMM-E6 Local Management.
CH1Book Page 1 Wednesday, March 20, 1996 7:48 AM CHAPTER 6 COMMUNITY NAMES The Community Name Table option lets you set Local Management community names. These names act as passwords to LM and provide security for your EMM-E6. You can control EMM-E6 access by establishing up to four different levels of security authorization - basic read-only, read-only, read-write, and super-user.
CH1Book Page 2 Wednesday, March 20, 1996 7:48 AM CHAPTER 6: COMMUNITY NAMES 6.2 COMMUNITY NAME TABLE SCREEN FIELDS This section briefly explains each Community Name Table Screen field. Community Name Displays the community name through which a user can access LM. All community names act as passwords to Local Management. Depending on the assigned access, community names can vary in privileges. Access Indicates the privileges accorded each community name.
CH1Book Page 3 Wednesday, March 20, 1996 7:48 AM ESTABLISHING COMMUNITY NAMES 6.3 ESTABLISHING COMMUNITY NAMES In order for any Community Name Table edits to take effect, you must have super-user access. In other words, when you log into LM, you must do so with a super-user password. A password from any of the other levels of access (basic-read, read-only, or read-write) does not allow you to edit the Community Name Table Screen.
CH1Book Page 1 Wednesday, March 20, 1996 7:48 AM CHAPTER 7 CONFIGURATION SCREEN In the EMM-E6 Configuration Screen you can assign an IP address and Subnet Mask to the EMM-E6. You can also: • • • • 7.1 set the Default Interface set the Default Gateway override locked ports enable all ports. ACCESSING THE CONFIGURATION SCREEN To access the Configuration Screen: 1. From the Features Selection Screen, use the arrow keys to highlight the IP Address Assignment option, and press the Return key.
CH1Book Page 2 Wednesday, March 20, 1996 7:48 AM CHAPTER 7: CONFIGURATION SCREEN 7.2 CONFIGURATION SCREEN FIELDS The following briefly explains each Configuration Screen field. I/F Displays the interface number (1 to 6) corresponding to a particular EMM-E6 channel. This number allows the EMM-E6 to accurately identify MIB II channel information. The following table illustrates the I/F number to channel association.
CH1Book Page 3 Wednesday, March 20, 1996 7:48 AM CONFIGURATION SCREEN FIELDS SubNET Mask Displays the Subnet Mask for each of the six EMM-E6 channels in dotted decimal notation. MAC Address Displays the physical address of each bridge interface. Default Interface Displays the default interface number for the EMM-E6 default gateway. This field defaults to NONE. Default Gateway Displays the default gateway for the EMM-E6.
CH1Book Page 4 Wednesday, March 20, 1996 7:48 AM CHAPTER 7: CONFIGURATION SCREEN 7.3 SETTING THE HOST IP ADDRESS The table on the Configuration screen allows you to assign an IP address and Subnet Mask to the EMM-E6. The Host IP applies to each interface. NOTE To set the Host IP: 1. Use the arrow keys to highlight the IP Address field. 2. Enter the IP address into this field. The format for this entry is XXX.XXX.XXX.XXX, with values for XXX ranging from 0 to 254.
CH1Book Page 5 Wednesday, March 20, 1996 7:48 AM MODIFYING A SUBNET MASK 7.4 MODIFYING A SUBNET MASK NOTE Consult your Network Administrator prior to modifying any of the natural Subnet Masks. The EMM-E6 automatically enters the natural Subnet Mask for any IP address that you enter. A natural Subnet Mask is a logical separation between network and host identifiers within the IP address. The EMM-E6 allows you to modify this mask to best suit your needs.
CH1Book Page 6 Wednesday, March 20, 1996 7:48 AM CHAPTER 7: CONFIGURATION SCREEN • the EMM-E6 does NOT provide a natural Subnet Mask that fits your host/network identifier scheme. NOTE Make sure to modify the Subnet Mask option in conjunction with the Default Gateway option. To modify the Subnet Mask: 1. Use the arrow keys to highlight the appropriate Subnet Mask field. 2. Enter the Subnet Mask in this field in the format of XXX.XXX.XXX.XXX, with XXX ranging from 0 to 255. 3. Press the Return key. 4.
CH1Book Page 7 Wednesday, March 20, 1996 7:48 AM SETTING DEFAULT GATEWAY AND INTERFACE To set the Default Gateway and its associated Default Interface: 1. Use the arrow keys to highlight the Default Interface field. 2. Enter the interface number of the EMM-E6 for the Default Gateway in this field. The interface number will be a value between 1 and 6. A table of the interface numbers may be found in section 7.2.
CH1Book Page 8 Wednesday, March 20, 1996 7:48 AM CHAPTER 7: CONFIGURATION SCREEN 7.6 CONNECTING/DISCONNECTING A UPS The EMM-E6 provides the option of connecting to an Uninterruptible Power Supply (UPS) using Local Management. To enable the UPS connection using EMM-E6/LM: 1. Use the arrow keys to highlight the COM 1 Application: field. 2. Press the Return key until “UPS” appears in the field. This field toggles between “OFFLINE”, which is the default value, “UPS”, and “SLIP”. 3.
CH1Book Page 9 Wednesday, March 20, 1996 7:48 AM UNLOCKING PORTS 7.7 UNLOCKING PORTS When you lock the chassis for security reasons (e.g., using remote inband management), unauthorized devices cannot communicate through an MMAC-FNB chassis station port. The Port LOCK Override function provides fail-safe recovery if you cannot unlock ports using remote inband SNMP. To use the Port LOCK Override: 1. Use the arrow keys to highlight the Port LOCK Override field. 2. Press the Return key.
CH1Book Page 1 Wednesday, March 20, 1996 7:48 AM CHAPTER 8 TRAP TABLE SCREEN As an SNMP compliant device, the EMM-E6 can authenticate an SNMP request. The Trap Table defines the management stations to receive SNMP Traps for alarm/event notification. 8.1 ACCESSING THE TRAP TABLE SCREEN To access the Trap Table Screen: 1. From the Features Selection Screen, use the arrow keys to highlight the Component Trap Table option. 2. Press the Return key. The Trap Table Screen, Figure 8-1, appears.
CH1Book Page 2 Wednesday, March 20, 1996 7:48 AM CHAPTER 8: TRAP TABLE SCREEN 8.2 TRAP TABLE SCREEN FIELDS The Trap Table contains three modifiable fields. The fields, shown in Figure 8-1, allow the user to direct trap information to users on the network. The three fields are: SNMP Community Name Displays the community name associated with the network management station IP address to which the EMM-E6 sends trap messages.
CH1Book Page 3 Wednesday, March 20, 1996 7:48 AM CONFIGURING THE TRAP TABLE 6. Using the arrow keys, highlight the desired Trap IP Address field. 7. Enter the IP address of the workstation to which you want the EMM-E6 to send traps. Use the XXX.XXX.XXX.XXX format with the value of XXX ranging from 0 to 254. 8. Using the arrow keys, highlight the SAVE command. 9. Press the Return key. The message “SAVED OK” appears. If you exit without saving, you lose all edits. NOTE 10.
CH1Book Page 1 Wednesday, March 20, 1996 7:48 AM CHAPTER 9 SNMP TOOLS SCREEN This section describes specific commands and features within the SNMP Tools screen. This screen allows you to access management information bases (MIBs), and varies according to your level of security access. The following descriptions outline the super-user management capabilities. From SNMP Tools you can: • • • 9.
CH1Book Page 2 Wednesday, March 20, 1996 7:48 AM CHAPTER 9: SNMP TOOLS SCREEN 9.2 SNMP TOOLS SCREEN FIELDS The following describes the SNMP Tools Screen fields and commands. COMMUNITY NAME Identifies the community name MIB access level password. OID PREPEND Specifies the number prefix common to all object identifiers (OIDs) found in a MIB. The prefix ‘1.3.6.1’ is the default. You can modify this field to suit your needs. GET Allows you to retrieve MIB objects, one at a time, using SNMP protocol.
CH1Book Page 3 Wednesday, March 20, 1996 7:48 AM THE SECURITY ACCESS LEVEL CYCLES Allows you to specify the number of GET NEXT requests to walk through and how much time elapses between each request. REPEAT Repeats the Get command, allowing you to monitor any changes to a specific OID. 9.3 THE SECURITY ACCESS LEVEL Each MIB component that the EMM-E6 supports (e.g., RMON, DLM, Repeater Rev. 4, etc.) has its own “password” for each possible level of access (ranging from Basic Read-Only to Super-User).
CH1Book Page 4 Wednesday, March 20, 1996 7:48 AM CHAPTER 9: SNMP TOOLS SCREEN In order to access a specific MIB’s components, you must set the appropriate MIB password in the COMMUNITY NAME field. NOTE The default super-user password (public) allows you to access most MIB components. To change the SNMP Tools screen COMMUNITY NAME field, you must have super-user access to Local Management. To set the SNMP Tools screen COMMUNITY NAME: 1.
CH1Book Page 5 Wednesday, March 20, 1996 7:48 AM GETTING AND SETTING OIDS 4. Press the Return key. If there is no instance of that OID, the EMM-E6 displays “MIB_NO_INSTANCE.” Otherwise, the EMM-E6 displays that OID’s data type, length, and value. To get the next OID: 1. Highlight GETNEXT, using the arrow keys. 2. Press the Return key. “ OID (=|F9)” appears. 3. Enter the OID. 4. Press the Return key. If that OID does not exist, the EMM-E6 displays “MIB_NO_INSTANCE”.
CH1Book Page 6 Wednesday, March 20, 1996 7:48 AM CHAPTER 9: SNMP TOOLS SCREEN TIP If you have previously entered an OID, press F9 to recall that entry. You can use the arrow keys to modify the recalled OID, or if you have not previously entered the OID, save yourself some keystrokes by typing the OID minus the OID’s prepend. 5. Enter the OID’s Data Type. NOTE When setting a String, SNMP tools requests the kind of data you plan to enter — HEX or ASCII. 6. Press the Return key.
CH1Book Page 7 Wednesday, March 20, 1996 7:48 AM SCROLLING THROUGH MIB OIDS To walk through the MIB: 1. Highlight WALK, using the arrow keys. 2. Press the Return key. “ OID (=|F9)” appears. 3. Enter the OID. 4. Press the Return key. LM begins walking through the sublayers of the MIB available from the specified OID. Each OID in the list displays the specified OID, its size, its data type, and the data value. 5.
CH1Book Page 8 Wednesday, March 20, 1996 7:48 AM CHAPTER 9: SNMP TOOLS SCREEN To step through: 1. Highlight GETNEXT, using the arrow keys. 2. Press the Return key. “ OID (=|F9)” appears. 3. Enter the OID (only the suffix is necessary). 4. Press the Return key. The initial OID details, including its size, data type, and data value, appear. 5. Highlight STEP, using the arrow keys. 6. Press the Return key to page through the MIB to the next OID.
CH1Book Page 1 Wednesday, March 20, 1996 7:48 AM CHAPTER 10 ROUTER SETUP SCREEN This chapter shows the Router Setup Screen, Figure 10-1, below. Using this screen the user can select the protocol to be used by any Routing Services previously installed in the EMM-E6. The user should use the Routing Services Manual to make the correct selections from the Router Setup Screen. The EMM-E6 User’s Guide does not cover routing and all data on this window will be found in the Routing Services Manuals.
CH1Book Page 1 Wednesday, March 20, 1996 7:48 AM CHAPTER 11 DEVICE STATISTICS SCREEN This chapter describes the features of the Device Statistics screen. Using this screen, you can view error, collision, and traffic statistics for the entire network, a selected slot, or a selected port. This screen also provides the option of enabling and disabling ports. To access the Statistics screen: 1. From the Features Selection screen, use the arrow keys to highlight the Device Statistics option. 2.
CH1Book Page 2 Wednesday, March 20, 1996 7:48 AM CHAPTER 11: DEVICE STATISTICS SCREEN 11.1 DEVICE STATISTICS This section describes Device Statistics screen data fields. BYTES RECEIVED Displays the number of bytes received. FRAMES RECEIVED Displays the number of frames received. FRAMES FILTERED Displays the total number of frames filtered. FRAMES TRANSMITTED Displays the total number of frames transmitted. ERRORS RECEIVED Displays the total number of errors received.
CH1Book Page 3 Wednesday, March 20, 1996 7:48 AM DEVICE STATISTICS SCREEN COMMANDS RUNT PACKETS Displays the number of runt packets received from the network. A runt packet is less than the minimum Ethernet frame size of 64 bytes, not including preamble. GIANT PACKETS Displays the number of giant packets receivedfrom the network. A giant packet is greater than the maximum Ethernet frame size of 1518 bytes, not including preamble. PORT ADMIN.
CH1Book Page 4 Wednesday, March 20, 1996 7:48 AM CHAPTER 11: DEVICE STATISTICS SCREEN NETWORK This command lets you select the network you want to monitor. The choices range from A to F, depending on the configuration of your network and the options available from this configuration. For example, if you do not have a Media Interface Module running on the A Channel, the EMM-E6 automatically disallows Channel A as a network selection.
CH1Book Page 5 Wednesday, March 20, 1996 7:48 AM DEVICE STATISTICS SCREEN COMMANDS 11.2.2 Selecting a Network/Slot/Port When the Device Statistics screen first appears, statistics are displayed for Network 1, Slot 1, and Port 1. To view statistics for another Network, Slot, and Port, use the NETWORK X, SLOT X, or PORT X commands at the bottom of the screen. To select a Network, Slot, or Port: 1. Using the arrow keys, highlight the NETWORK X, SLOT X, or PORT X command. 2.
CH1Book Page 6 Wednesday, March 20, 1996 7:48 AM CHAPTER 11: DEVICE STATISTICS SCREEN 11.2.4 Disabling Ports The DISABLE PORT command lets you disable the port selected in the PORT command. You must first use the PORT command to select the desired port. To set the PORT DISABLE command: 1. Use the arrow keys to highlight the DISABLE PORT command at the bottom of the screen. 2. Press the Return key. The PORT ADMIN. STATUS field displays “DISABLED”. 11.
CH1Book Page 1 Wednesday, March 20, 1996 7:48 AM CHAPTER 12 COMMAND LINE INTERFACE SCREEN The Command Line Interface (CLI) Screen, Figure 12-1, will function in future releases of the EMM-E6. EMM-E6-960 LOCAL MANAGEMENT Cabletron EMM-E6 Revision 0.00.00 CLI INFORMATION THIS SCREEN RESERVED FOR THE CABLETRON COMMAND LINE INTERFACE COMMUNITY NAMES F7 I P TA B L E F8 T R A P TA B L E F9 S N M P TO O L S F10 RETURN Figure 12-1.
CH1Book Page 1 Wednesday, March 20, 1996 7:48 AM CHAPTER 13 MIB NAVIGATOR This chapter describes the procedures required to access the MIB Navigator residing on the EMM-E6. The MIB Navigator Command Set is described and examples of each command are provided. 13.1 MANAGING DEVICE MIBs The MIB Navigator allows access to a command set from which you can configure and manage your device. The MIB Navigator enables you to manage objects in the device MIBs (Management Information Bases).
CH1Book Page 2 Wednesday, March 20, 1996 7:48 AM CHAPTER 13: MIB NAVIGATOR 13.2 ACCESSING THE MIB NAVIGATOR The MIB Navigator function resides on your Cabletron device (EMM-E6, ETWMIM, ESXMIM, etc.). Access the MIB Navigator in-band, through a device (i.e., workstation) connected to the same network or internetwork, using a Telnet connection. To access the MIB Navigator, perform the following actions from a PC or workstation: 1. Telnet to a device by typing telnet followed by pressing the Return key.
CH1Book Page 3 Wednesday, March 20, 1996 7:48 AM MIB NAVIGATOR COMMAND SET OVERVIEW 13.3 MIB NAVIGATOR COMMAND SET OVERVIEW There are three categories of commands in the command set. • Navigation Commands - Allows the user to access and manage the MIB for the device running the MIB Navigator. Some of commands also provide user community-string information.
CH1Book Page 4 Wednesday, March 20, 1996 7:48 AM CHAPTER 13: MIB NAVIGATOR • To abort the output or interrupt a process the escape character is ^C (where ^ equals the Control key). • A slash (/) proceeding an OID issues that command from the root directory regardless of where you are in the MIB. If no slash precedes the OID the command issues from your current MIB location. • Dot notation (1.1.1.1) is equivalent to slash notation (1/1/1/1).
CH1Book Page 5 Wednesday, March 20, 1996 7:48 AM MIB NAVIGATOR COMMAND SET OVERVIEW Navigation Commands (cont’d) cd Use this command to change directories within a MIB subtree. The path specified must be valid. This command has two special subtree options: .. - Moves you to one subtree above the current one. / - Moves you to the root. Format: cd [PATH] Example ctron MIBNav> cd iso/org/dod/internet/mgmt The ctron command enables you to change directories directly to the Cabletron MIB (1.3.6.1.4.1.
CH1Book Page 6 Wednesday, March 20, 1996 7:48 AM CHAPTER 13: MIB NAVIGATOR Navigation Commands (cont’d) dir, ls Each of these commands displays the contents of a specified sub-tree (the current directory displays if you do not specify a sub-tree). Options can be used separately or combined. When no option is used the ASCII name of the leaf object displays.
CH1Book Page 7 Wednesday, March 20, 1996 7:48 AM MIB NAVIGATOR COMMAND SET OVERVIEW Navigation Commands (cont’d) help The help command provides a list of available MIB Navigator commands. The command also provides help for individual MIB Navigator commands. Format: Example help (general help) help (specific help) MIBNav> help su Command: su Format: su Allows user to change his/her community name, in order to allow different access to the MIB.
CH1Book Page 8 Wednesday, March 20, 1996 7:48 AM CHAPTER 13: MIB NAVIGATOR Navigation Commands (cont’d) pwd The pwd command displays the full path name for the directory in which you are currently working. Format: Example pwd MIBNav> pwd # /iso/org/dod/internet/mgmt/mib-2 set The set command enables you to set the value of a managed object. This command is valid only for leaf entries in the current MIB tree, or for managed objects in the MIB.
CH1Book Page 9 Wednesday, March 20, 1996 7:48 AM MIB NAVIGATOR COMMAND SET OVERVIEW Navigation Commands (cont’d) su The su command enables you to change your community name to allow for different access to the MIB. The community name that you enter allows you either Basic Read, Read Only, Read/Write, or Super-User access to that device’s MIBs, depending on the level of security access assigned the password through the Local Management Community Table.
CH1Book Page 10 Wednesday, March 20, 1996 7:48 AM CHAPTER 13: MIB NAVIGATOR Navigation Commands (cont’d) whoami The whoami command displays your community string and access privileges to the MIB. When using the whoami command one of these four access levels will display: Basic Read, Read Only, Read/Write, and Super User.
CH1Book Page 11 Wednesday, March 20, 1996 7:48 AM MIB NAVIGATOR COMMAND SET OVERVIEW 13.3.3 Built-In Commands The following provides a brief description, the proper format, and an example of each Built-In command. arp The arp command provides access to the ARP (Address Resolution Protocol) cache, enabling you to view cache data, delete entries, or add a static route. Superuser access is required to delete an entry or add a static route.
CH1Book Page 12 Wednesday, March 20, 1996 7:48 AM CHAPTER 13: MIB NAVIGATOR Built-In Commands (cont’d) netstat The netstat provides a display of general network statistics for the managed device. The netstat command must be used with one of the following two display options: -i -r Displays status and capability information for each interface. Displays routing information for each interface.
CH1Book Page 13 Wednesday, March 20, 1996 7:48 AM MIB NAVIGATOR COMMAND SET OVERVIEW Built-In Commands (cont’d) snmpbranch The snmpbranch command enables you to query another SNMP device. The command provides a display of objects that match the specified OBJECT-ID. If no match is made, no object will display. Format: snmpbranch Example MIBNav> snmpbranch 2.4.8.1 public 1.3.6.2.1.
CH1Book Page 14 Wednesday, March 20, 1996 7:48 AM CHAPTER 13: MIB NAVIGATOR Built-In Commands (cont’d) snmpset The snmpset command enables you to set the value of an object in other SNMP devices. This command requires the appropriate community string and OID. When defining a new leaf, the set command prompts you for a value type.
CH1Book Page 15 Wednesday, March 20, 1996 7:48 AM MIB NAVIGATOR COMMAND SET OVERVIEW Built-In Commands (cont’d) traceroute The traceroute command generates a TRACEROUTE request to a specified IP address and provides a display of all next-hop routers in the path to the device. If the device is not reached, the command displays all next-hop routers to the point of failure. Format: Example # next-hop[1] # next-hop[2] EMM-E6 User’s Guide traceroute MIBNav> traceroute 122.144.11.52 122.144.61.
CH1Book Page 16 Wednesday, March 20, 1996 7:48 AM CHAPTER 13: MIB NAVIGATOR 13.3.4 Special Commands The following provides a brief description, the proper format, and an example applicable to each Special command. done, quit, exit These commands enable you to exit from the MIB Navigator and return to the operating system. Format: Example done MIBNav> done Connection closed.
CH1Book Page 1 Wednesday, March 20, 1996 7:48 AM USING LANVIEW CHAPTER 14 TROUBLESHOOTING This chapter includes information for troubleshooting network and EMME6 operational problems. The following sections describe the EMM-E6’s LANVIEW LEDs, provide a troubleshooting checklist, and explain how and when to reset the EMM-E6. 14.1 USING LANVIEW The EMM-E6 uses the Cabletron Systems built-in visual diagnostic and status monitoring system called LANVIEW.
CH1Book Page 2 Wednesday, March 20, 1996 7:48 AM CHAPTER 14: TROUBLESHOOTING Table 14-1. LANVIEW LEDs LED CPU Description Multicolor Flashing Green indicates that the board is operating properly. If OFF, or Red, the board has a problem. Indicates packets will not be forwarded as the Spanning Tree Algorithm has put the corresponding Bridge Port into a standby mode due to detecting a data loop condition. Network Management has placed the EMM-E6 in a Standby condition; a data loop condition exists.
CH1Book Page 3 Wednesday, March 20, 1996 7:48 AM USING LANVIEW Table 14-1. LANVIEW LEDs (Continued) LED XMT A,B,C,D (Transmit) Color Green Description LED flashes to indicate that a segment is transmitting a frame. If not connected to the LAN, the LED flashes every two seconds to indicate it is transmitting BPDU frames. CLN (Collision) Red EMM-E6 User’s Guide Collision detected on a segment. When the LAN is operating properly, occasional flashing is normal.
CH1Book Page 4 Wednesday, March 20, 1996 7:48 AM CHAPTER 14: TROUBLESHOOTING 14.2 TROUBLESHOOTING CHECKLIST If your EMM-E6 is not operating properly, the following checklist describes some of the problems that may occur with the EMM-E6 installed in an MMAC, possible causes for the problem, and suggestions for resolving the problem.
CH1Book Page 5 Wednesday, March 20, 1996 7:48 AM TROUBLESHOOTING CHECKLIST Table 14-2. Troubleshooting Checklist Problem Possible Causes No LEDs on. Loss of Power to the MMAC. EMM-E6 not properly installed. Recommended Action Check the proper installation of the MMAC power supply module and its access to a live outlet. Check that the MMAC has adequate power. Some configurations, especially those including FDDI modules, require that more than one power supply be installed in the MMAC.
CH1Book Page 6 Wednesday, March 20, 1996 7:48 AM CHAPTER 14: TROUBLESHOOTING Table 14-2. Troubleshooting Checklist (Continued) Problem Possible Causes Recommended Action A port on a MIM managed by the EMM-E6 cannot access the network, while other ports on the same MIM are able to access. The port is either off or segmented. Enable the port via local or remote management. Port cable is defective. Try connecting the port with a different cable.
CH1Book Page 7 Wednesday, March 20, 1996 7:48 AM USING THE RESET SWITCH 14.3 USING THE RESET SWITCH The EMM-E6 incorporates a recessed reset switch, located above the LEDs (see Figure 14-1). This reset switch initializes the EMM-E6 processor. This switch does NOT initialize Non-Volatile Random Access Memory (NVRAM), the non-volatile random access memory where the EMM-E6 stores network management parameters. To use the reset switch, use a pen or pencil to press the switch in.
CH1Book Page 1 Wednesday, March 20, 1996 7:48 AM CHAPTER 15 IMAGE FILE DOWNLOAD This chapter provides instructions for downloading an image file to the EMM-E6 using three different methods; altering hardware switch settings to force the module to accept new firmware, through UNIX operating System commands, and by setting specific MIB OID strings. To set OID strings, you can use the SNMP Tools screen described in Chapter 9 of this User’s Guide or any MIB walking tool.
CH1Book Page 2 Wednesday, March 20, 1996 7:48 AM CHAPTER 15: IMAGE FILE DOWNLOAD 15.1 GETTING STARTED Cabletron ships backup copies of image files for all of its intelligent devices. The first file, suffixed with .hex (after it has been decompressed from a .zip) is for Standard Local Downloading (any port, except the BRIM). The second file, suffixed with .fls (after it has been decompressed from a .zip) is for Remote Runtime Downloading through any network port, including the BRIM.
CH1Book Page 3 Wednesday, March 20, 1996 7:48 AM FORCED DOWNLOAD WITH UNIX 15.2 FORCED DOWNLOAD WITH UNIX Downloading an EMM-E6 image file with a UNIX workstation requires setting up a management station, and forcing the download. To force a download, you can use mode switch 6 on the EMM-E6 or set specific MIB OIDs. NOTE You can also download with other UNIX or DOS remote management packages. Refer to specific package documentation for image file download procedures.
CH1Book Page 4 Wednesday, March 20, 1996 7:48 AM CHAPTER 15: IMAGE FILE DOWNLOAD 2. Edit the /etc/hosts file by adding the EMM-E6 MAC address and follow it with the same unique name you used in step one above. (e.g., 00:00:1d:32:0c:1b EMME6). 3. If you already have a /tftpboot directory, confirm the rarp setup of your workstation as follows: Request a process status and grep for rarpd (e.g., unix% ps -aux | grep rarpd). The following information represents a typical output: user root root 161 87 88 7.
CH1Book Page 5 Wednesday, March 20, 1996 7:48 AM FORCED DOWNLOAD WITH UNIX 7. Edit the /etc/inetd.conf file by removing anything prior to the tftpboot daemon (e.g., the # sign) that comments-out the line. 8. Kill the inetd process (e.g., unix% kill -HUP ‘process ID number’), and then restart the process (e.g., unix% inetd), to enable the revised inetd.conf file. NOTE You must request a process status and grep for inetd to obtain the process ID number (see step 3 above).
CH1Book Page 6 Wednesday, March 20, 1996 7:48 AM CHAPTER 15: IMAGE FILE DOWNLOAD To force a download using the EMM-E6 download switch: 1. Remove the safety bars from the MMAC chassis. 2. Unscrew the knurled knobs at the top and bottom of the EMM-E6 front panel. 3. Slide the MIM out of the chassis until you can easily access the EMM-E6 switch panel located at the bottom of the board. 4. Change the state of EMM-E6 mode switch 6.
CH1Book Page 7 Wednesday, March 20, 1996 7:48 AM STANDARD LOCAL DOWNLOAD 15.3 STANDARD LOCAL DOWNLOAD Table 15-1 provides a step by step procedure for downloading the firmware image file. This section provides specific MIB OIDs, their names, and the required setting for proper image file download. Refer to your specific MIB walking tool documentation for instructions on how to set MIB OID strings. The Download OIDs for Cabletron products reside in Cabletron enterprise MIBs (group 52).
CH1Book Page 8 Wednesday, March 20, 1996 7:48 AM CHAPTER 15: IMAGE FILE DOWNLOAD 15.4 REMOTE RUNTIME DOWNLOAD NOTE If the Runtime Download is interrupted, the Firmware Image in Flash memory will be erased. The EMM-E6 will continue to operate until it is either Reset or Powered OFF and ON.
CH1Book Page 9 Wednesday, March 20, 1996 7:48 AM REMOTE RUNTIME DOWNLOAD Table 15-2. Runtime Download Procedure Step OID Name OID Number Data Type SNMP OID Data (1). ctDLTFTPRequestHost 1.3.6.1.4.1.52.4.1.5.8.1.18.0 IP address Enter the IP address of the tftp server. (2). ctDLTFTPRequest 1.3.6.1.4.1.52.4.1.5.8.1.19.0 string (ASCII) Enter the path to the image file. (3). ctDLOnLineDownload 1.3.6.1.4.1.52.4.1.5.8.1.16.0 integer 1 = Default setting (normal operation). 2= forceDownLoad.
CH1Book Page 10 Wednesday, March 20, 1996 7:48 AM CHAPTER 15: IMAGE FILE DOWNLOAD Table 15-2. Runtime Download Procedure (Continued) Step OID Name OID Number Data Type SNMP OID Data NOTE: If you selected forceDownLoadReset at Step 3, then DO NOT CONTINUE, you have completed all necessary settings. NOTE: If you selected forceDownLoad at Step 3, then you can reset the EMM-E6 at a later time.
CH1Book Page 1 Wednesday, March 20, 1996 7:48 AM APPENDIX A EMM-E6 SPECIFICATIONS This appendix provides the operating specifications for the Cabletron Systems EMM-E6. Cabletron Systems reserves the right to change these specifications at any time without notice. A.
CH1Book Page 2 Wednesday, March 20, 1996 7:48 AM APPENDIX A: EMM-E6 SPECIFICATIONS A.2 REPEATER FUNCTIONALITY Delay Times (port x in to port x out) Start of Packet: 1,450 ns max. Collision to JAM: 1,550 ns max. Preamble Input: Minimum of 40 bits to a max. of 64 bits required. Output: 64 bits min. (last 2 bits = 1, 1). JAM Output: If a collision occurs on one of the segments, a pattern of 1,0 is sent to the other segments. Minimum Packet Repeated: 96 bits including preamble.
CH1Book Page 3 Wednesday, March 20, 1996 7:48 AM A.3 COM 1 PORT Type: Standard RJ45 port Pin 1 2 3 4 5 6 7 8 A.4 Transmit Data (XMT) Data Set Ready (DSR) Not used Receive Data (RCV) Signal Ground (GND) Data Terminal Ready (DTR) Not used Not used From COM 1 port To COM 1 port To COM 1 port From COM 1 port COM 2 PORT Type: Standard RJ45 port Pin 1 2 3 4 5 6 7 8 A.
CH1Book Page 4 Wednesday, March 20, 1996 7:48 AM APPENDIX A: EMM-E6 SPECIFICATIONS A.6 SAFETY This unit meets the safety requirements of UL 1950 (without D3 deviations), CSA C22.2 No. 950, and EN 60950; the EMI requirements of FCC Part 15 Class A, EN 55022 Class A, and VCCI Class I; and the EMC requirements of EN 50082-1, including IEC 801-2 (ESD) levels 1 through 4, IEC 801-3 (Radiated Susceptibility) levels 1 through 4, and IEC 801-4 (EFT/B) levels 1 through 4. WARNING A.
CH1Book Page 5 Wednesday, March 20, 1996 7:48 AM A.8 EPIM-T (10BASE-T TWISTED PAIR PORT) Internal Transceiver: Cabletron Systems TPT 10BASE-T Twisted Pair Transceiver Type: 8 Pin RJ45 Jack (Figure A-1). Figure A-1. EPIM-T (with RJ45 Port) A slide switch on the EPIM-T determines the cross-over status of the cable pairs. The switch residing on the X side indicates the pairs internally cross over. If the switch resides on the = side, the pairs do not internally cross over. (See Figure A-2.
CH1Book Page 6 Wednesday, March 20, 1996 7:48 AM APPENDIX A: EMM-E6 SPECIFICATIONS A.9 EPIM-F1/F2 (MULTIMODE FIBER OPTIC PORT) Internal Transceiver: Type: EPIM-F1: EPIM-F2: Cabletron Systems FOT-F Fiber Optic Transceiver SMA fiber optic ports (Figure A-3) ST fiber optic ports (Figure A-3) Figure A-3. EPIM-F1 and EPIM-F2 NOTE The transmitter power and receive sensitivity levels, below, represent Peak Power Levels after optical overshoot.
CH1Book Page 7 Wednesday, March 20, 1996 7:48 AM A.10 EPIM-F3 (SINGLE MODE FIBER OPTIC PORT) Internal Transceiver: Cabletron Systems FOT-F3 Fiber Optic Transceiver Type: ST fiber optic ports (Figure A-4) Figure A-4. EPIM-F3 NOTE Transmitter power is inversely proportional to temperature rise. Use the Output Power Coefficient to calculate increased or decreased power output for your operating environment. For example, typical power output at 25C equals -16.4 dBm.
CH1Book Page 8 Wednesday, March 20, 1996 7:48 AM APPENDIX A: EMM-E6 SPECIFICATIONS Table A-2. EPIM-F3 Statistics Parameter Typical Minimum Maximum Transmitter Peak Wave Length: 1300 nm 1270 nm 1330 nm Spectral Width: 60 nm — 100 nm Rise Time: 3.0 ns 2.7 ns 5.0 ns Fall Time: 2.5 ns 2.2 ns 5.0 ns Duty Cycle: 50.1% 49.6% 50.7% TX Power: -15.1 dBm TX Budget: 14.4 dBm RX Sensitivity: -29.5 dBm MAX Receive Power: -6.
CH1Book Page 9 Wednesday, March 20, 1996 7:48 AM A.11 EPIM-C (BNC PORT) Internal Transceiver: Cabletron Systems TMS-3 Transceiver Type: BNC receptacle, with gold center contact, for use with BNC type T-connectors and RG-58 thin-net cable (Figure A-5). Internal Termination Switch = On (internally terminated) = Off (need external termination) Figure A-5.
CH1Book Page 10 Wednesday, March 20, 1996 7:48 AM APPENDIX A: EMM-E6 SPECIFICATIONS A.12 EPIM-A AND EPIM-X (AUI PORT) Interface Connector: DB-15 Port (female connector for EPIM-A, male connector for EPIM-X) (Figure A-6). Type: 15 position D type receptacle Figure A-6. EPIM-A and EPIM-X (AUI Port) Table A-3. DB-15 Pinouts Pin 1 2 3 4 5 6 7 8 Logic Ref. Collision + Transmit + Logic Ref. Receive + Power Return No Connection Logic Ref.
CH1Book Page 1 Wednesday, March 20, 1996 7:48 AM APPENDIX B EMM-E6 OIDs This Appendix contains a selected number of OID strings that are among the most frequently needed. The OIDs are implemented by using either the SNMP Tools procedures detailed in Chapter 9 or the MIB Navigator procedures located in Chapter 13. Note that the OIDs can be accessed using LANVIEW, SPECTRUM, SPMA, or the SNMP element management packages of other vendors. B.
CH1Book Page 2 Wednesday, March 20, 1996 7:48 AM APPENDIX B: COMMONLY-USED OIDs B.2 CONFIGURING ARP REQUEST PACKETS The EMM-E6’s SNMP Tools Screen allows you to generate an Address Resolution Protocol (ARP) Request packet utilizing specific framing through local management. An ARP Request is used to send an SNMP Trap to a destination node that has not yet made or established contact with the EMM-E6.
CH1Book Page 3 Wednesday, March 20, 1996 7:48 AM PORT GROUP SECURITY B.3 PORT GROUP SECURITY The next seven OIDs are used for port group security features. rptrSrcAddrMgmtPortLock Description: Setting this object to lock activates the network port security lock. Setting a value of portMisMatch (3) is invalid. A read of PortMisMatch means that the lock status between the port group, port and repeater levels do not agree. Object Identifier: Data Type: Values: Access Policy: 1.3.6.1.4.1.52.4.1.1.1.4.1.5.
CH1Book Page 4 Wednesday, March 20, 1996 7:48 AM APPENDIX B: COMMONLY-USED OIDs rptrPortSecurityLockStatus Description: Defines the lock status for this particular port entry. Object Identifier: Data Type: Values: Access Policy: 1.3.6.1.4.1.52.4.1.1.1.4.3.9.1.1.3 Integer 1 unlock 2 lock read-write rptrPortSecurityLockAddAddress Description: Setting a value to this object adds a new entry to the rptrPortSecurityListTable.
CH1Book Page 5 Wednesday, March 20, 1996 7:48 AM PORT GROUP SECURITY rptrPortSecurityDisableOnViolation Description: Designates whether port is disabled if source address is violated. A source address violation occurs when an address is detected which is not in the source address list for this port. If this port is disabled for this port address violation it can be enabled by setting rptrPortMgmtAdminState. Default state is enabled (2). Object Identifier: Data Type: Values: Access Policy: 1.3.6.1.4.1.52.
CH1Book Page 6 Wednesday, March 20, 1996 7:48 AM APPENDIX B: COMMONLY-USED OIDs B.4 ENABLING & DISABLING SNMP TRAPS The EMM-E6 supports the collection and reporting of SNMP Traps of several types and at several levels. SNMP Trap sending may be enabled or disabled for the following trap types: segmentation, link, and source addressing. The traps may be enabled on the network level, module level, or port level. B.4.
CH1Book Page 7 Wednesday, March 20, 1996 7:48 AM ENABLING & DISABLING SNMP TRAPS rptrSaTrapSetScraddr Description: Enables and disables source address traps for this network (i.e., Channel A, B, or C). Object Identifier: Data Type: Values: Access Policy: B.4.2 1.3.6.1.4.1.52.4.1.1.1.4.1.6.2.1 Integer 1 disable 2 enable read-write Enabling Module Level SNMP Traps The next three OIDs are for traps enable and disable at the board level.
CH1Book Page 8 Wednesday, March 20, 1996 7:48 AM APPENDIX B: COMMONLY-USED OIDs rptrPortGrpHwTrapSetSeg Description: Enables and disables segmentation traps for the specified port group at the board level. Object Identifier: Data Type: Values: Access Policy: 1.3.6.1.4.1.52.4.1.1.1.4.2.5.1.1.1.3. Integer 1 disable 2 enable read-write rptrPortGrpSaTrapSetSrcaddr Description: Enables and disables segmentation traps for the specified port group at the board level.
CH1Book Page 9 Wednesday, March 20, 1996 7:48 AM ENABLING & DISABLING SNMP TRAPS rptrPortHwTrapSetLink Description: Enables and disables link traps for this port. Object Identifier: Data Type: Values: Access Policy: 1.3.6.1.4.1.52.4.1.1.1.4.3.8.1.1.1.3..
Integer 1 disable 2 enable read-write rptrPortHwTrapSetSeg Description: Enables and disables segmentation traps for this port. Object Identifier: Data Type: Values: Access Policy: 1.3.6.1.4.1.52.4.1.1.1.4.3.8.1.1.1.4..
CH1Book Page 10 Wednesday, March 20, 1996 7:48 AM APPENDIX B: COMMONLY-USED OIDs B.5 ACTIVATING RMON GROUPS The initial configuration of the EMM-E6 at installation does not provide the activation of the RMON Default and Host Groups. These management groups may be activated or deactivated through local management using OID Sets.
CH1Book Page 11 Wednesday, March 20, 1996 7:48 AM BRIDGING B.6 BRIDGING The following OID is used to enable and disable the interface for the bridging function. dot1dstpPortEnable Description: The enabled/disabled status of the port. Object Identifier: Data Type: Values: Access Policy: B.7 1.3.6.1.2.1.17.2.15.1.4 Integer 1 enable 2 disable read-write TRUNK PORT SECURITY The following OID is required if security is not desired on a trunk port.
CH1Book Page 12 Wednesday, March 20, 1996 7:48 AM APPENDIX B: COMMONLY-USED OIDs B.8 CHANNEL SELECTION The following two OIDs are needed to select channel assignments (A, B, or C) for all boards or individual ports. These OIDs are needed for products supporting multichannel connectivity. fnbconnect Description: Denotes the connection status of the CSMA/CD board to the inter-RIC bus. Object Identifier: Data Type: Values: Access Policy: 1.3.6.1.4.1.52.1.6.1.2.2.1.1.2.
CH1Book Page 13 Wednesday, March 20, 1996 7:48 AM OID HASHING ON SOURCE ADDRESES B.9 OID HASHING ON SOURCE ADDRESES The following OID allows the enabling and disabling of DEC hashing, which may be necessary or desired in DECnet and mixed IEEE 802.3/ DECnet environments. rptrSrcAddrMgmtHashType Description: This enables and disables DECnet hashing on source addresses which is useful in DECnet environments. Object Identifier: Data Type: Values: Access Policy: B.10 1.3.6.1.4.1.52.4.1.1.1.4.1.5.3.4.
CH1Book Page 1 Wednesday, March 20, 1996 7:48 AM GLOSSARY This glossary provides brief descriptions of some of the recurrent terms in the main text, as well as related terms used in discussions of the relevant networking discussions. These descriptions are not intended to be comprehensive discussions of the subject matter. For further clarification of these terms, you may wish to refer to the treatments of these terms in the main text.
CH1Book Page 2 Wednesday, March 20, 1996 7:48 AM Attenuation to BRIM Attenuation Loss of signal power (measured in decibels) due to transmission through a cable. Attenuation is dependent on the type, manufacture and installation quality of cabling, and is expressed in units of loss per length, most often dB/m. AUI Attachment Unit Interface. A cabling type used in Ethernet networks, designed to connect network stations and devices to transceivers.
CH1Book Page 3 Wednesday, March 20, 1996 7:48 AM Broadcast to Connectivity Broadcast A type of network transmission; a broadcast transmission is one which is sent to every station on the network, regardless of location, identification, or address. Buses Physical portions of the backplane of a modular chassis which pass information between modules. Card See Module. Channel A portion of a backplane bus which is specifically partitioned off for the transmission of one type of network data.
CH1Book Page 4 Wednesday, March 20, 1996 7:48 AM Console to Decryption Console See Terminal. Cross-Over A length of multi-stranded cable in which the transmit wire(s) of one end is/are crossed over within the cable to connect to the receive wire(s) of the other end. CrossOvers are used to connect devices to like devices, ensuring that transmit and receive connections are properly made. Crosstalk A corruption of the electrical signal transmitted through a Shielded or Unshielded twisted pair cable.
CH1Book Page 5 Wednesday, March 20, 1996 7:48 AM Dedicated to Fault-Tolerance Dedicated Assigned to one purpose or function. Default Gateway the IP address of the network or host to which all packets addressed to unknown network or host are sent Device (network) Any discrete electronic item connected to a network which either transmits and receives information through it, facilitates that transmission and reception, or monitors the operation of the network directly. DLM Distributed LAN Monitor.
CH1Book Page 6 Wednesday, March 20, 1996 7:48 AM FDDI to Host FDDI Fiber Distributed Data Interface. A high-speed networking architecture. FDDI requires that stations only transmit data when they have been given permission by the operation of the network, and dictates that stations will receive information at pre-determined intervals. See also Token. Fiber optics Network media made of thin filaments of glass surrounded by a plastic cladding.
CH1Book Page 7 Wednesday, March 20, 1996 7:48 AM Hot Swap to IP Hot Swap Hot Swap capability indicates that a product is capable of being removed from an operating modular chassis and reinserted or replaced without requiring that the chassis and all associated modules be powered down. Hub See Modular Chassis. IANA Internet Assigned Numbers Authority. An agency which assigns and distributes IP addresses. IEEE Institute of Electrical and Electronic Engineers. A standards-making body.
CH1Book Page 8 Wednesday, March 20, 1996 7:48 AM IP Address to Mbps IP Address Internet Protocol address. The IP address is associated, by the network manager or network designer, to a specific interface. The availability of IP addresses is controlled by the IANA. ISO International Organization for Standardization. The ISO has developed a standard model on which network operation is based, called the OSI Model.
CH1Book Page 9 Wednesday, March 20, 1996 7:48 AM Media to Nanometer Media Physical cabling or other method of interconnection through which network signals are transmitted and received. MIB Management Information Base. A database of data related to a specific management or manageable network device, which may be viewed or modified through SNMP commands. MIB Tree The MIB Tree is the collection of all MIBs that can be used to monitor or control a network device.
CH1Book Page 10 Wednesday, March 20, 1996 7:48 AM Node to Port Assignment Node Any single end station on a network capable of receiving, processing, and transmitting packets. NVRAM Non-Volatile Random Access Memory. Memory which is protected from elimination during shutdown and between periods of activity, frequently through the use of batteries. Octet A numerical value made up of eight binary places (bits). Octets can represent decimal numbers from zero (0000 0000) to 255 (1111 1111).
CH1Book Page 11 Wednesday, March 20, 1996 7:48 AM Protocol to SDRAM Protocol A set of rules governing the flow of information within a communications infrastructure. Protocols control operations such as frame format, timing, and error correction. See also Architecture. PVC Polyvinyl Chloride. A material commonly used in the fabrication of cable insulation. This term is used to describe a non-plenum rated insulating material. See also Plenum. Redundant Extra or contingent.
CH1Book Page 12 Wednesday, March 20, 1996 7:48 AM Segment to SQE Segment A portion of a network which is separated from other networks. A segment may be one portion of a bridged, switched, or routed network. Segments must be capable of operating as their own networks, without requiring the services of other portions of the network. Server A workstation or host device that performs services for other devices (clients) on the network. SIMM Single In-line Memory Module.
CH1Book Page 13 Wednesday, March 20, 1996 7:48 AM ST to Throughput ST Straight-Tip. A modular connector and port system used with both multimode and single mode fiber optic cabling. The ST connector utilizes an insert and twist-lock mechanism. Station See node. STP Shielded Twisted Pair. Refers to a type of cabling, most commonly used in Token Ring networks, which consists of several strands of cables surrounded by foil shielding, which are twisted together. See also UTP.
CH1Book Page 14 Wednesday, March 20, 1996 7:48 AM Token to UTP Token A particular type of frame which informs a station in the Token Ring and FDDI network architectures that it may transmit data for a specified length of time. Once that time has expired, the station must stop transmitting and pass the token along to the next station in the network.
CH1Book Page i Wednesday, March 20, 1996 7:48 AM INDEX Numerics C 10BaseT 3-19 C Channel 1-13 cd 13-5 Channel B 1-13 Channel C 1-13 Channel D 1-15 Channel E 1-16 Channel F 1-16 Channels A, B, C 1-12 Class A/B/C 1-24 Collision handling 1-18 Command Set 13-3 Community Names 1-21, 3-5 Setting 6-1 Connecting to the Network 3-18 Crosstalk 2-3 ctron 13-5 CXRMIM 2-7 A A Channel 1-12 Address Classes identifying 1-25 Addressing 1-22 ARP B-2 arp 13-11 Attenuation Multimode 2-4 SingleMode 2-5 Twisted Pair 2-3 B
CH1Book Page ii Wednesday, March 20, 1996 7:48 AM E I E Channel 1-16 Eavesdrop Prevention 1-33 EMM-E6 Features 1-4 Enabling Ports 7-9 EPIMs 1-7 Errors, statistics 11-2 exit 13-16 IANA 1-23 Image File - Download 15-1 Impedance 10BaseT 2-2 Insertion Loss 10BaseT 2-2 Installing 3-13 Interface number 7-2 Introduction 1-1 Intruder Prevention 1-33 IP addresses 1-23 F F Channel 1-16 Fault Tolerant Wiring 2-12 Filter 1-18 Filter Rate A-1 Firmware Upgrades 15-1 Flash Memory 1-7 Flexible Network Bus 1-10 Forced
CH1Book Page iii Wednesday, March 20, 1996 7:48 AM M P MAC address 1-22 Memory 3-6, A-1 EEPROM 1-7 Local Dynamic 1-8 Shared Dynamic 1-8 MIB 1-22 access 13-2 description 13-1 hierarchy 13-1 managing devices 13-1 mib2 13-7 Mode Switches 3-3 Multi Media Access Center 1-10 Partitioning Networks 1-25 Password 3-5 Screen 5-1 Setting 6-1 ping 13-12 Ports enabling 7-9 Pinouts A-3 unlocking 7-9 Propagation Delay 10BaseT 2-3 multimode fiber 2-4 pwd 13-8 N Q Natural Mask 1-26 netstat 13-12 Network ID 1-23 next
CH1Book Page iv Wednesday, March 20, 1996 7:48 AM S T Safety A-4 Sample Configurations 2-9 Security 1-33 Community names 1-21 SET 1-21 set 13-8 SIMM Upgrade 3-6 Slash notation 13-4 SNMP 1-21 SNMP Tools screen 9-1 SNMP Traps 8-1 snmpbranch 13-13 snmpget 13-13 snmpset 13-14 snmptree 13-14 Spanning Tree Algorithm 1-19 Specifications A-1 Environmental A-3 Statistics, viewing 11-1 su 13-9 Subnet 1-26 Subnet address 1-25 Subnet Mask 1-26 Modifying 7-5 Operation 1-30 Super user 1-21, 6-2 Default password 5-2 T
CH1Book Page 5 Wednesday, March 20, 1996 7:48 AM EMM-E6 QUICK REFERENCE CARD LANVIEW LEDs LED CPU EMM-E6 STBY A, B, C, D BRIM-A100 RESET CPU STBY RCV Flashing Green: Board Operating Properly. Red: CPU error condition. SN D DESCRIPTION C B A RCV A, B, C, D XMT Amber indicates port or interface placed in standby state. Green indicates valid link from station to EMM-E6 interface. Amber indicates segment receiving traffic.
CH1Book Page 6 Wednesday, March 20, 1996 7:48 AM EMM-E6 QUICK REFERENCE CARD INSTALLATION • Slide the EMM-E6 into the first and second slots of the MMAC chassis (as shown below). EMM-E6 • • • • Secure the module by tightening the knurled knobs at the top and bottom of the module. Power on the MMAC chassis. Monitor the state of the CPU LED. The CPU LED will flash, indicating the EMM-E6 is in boot state.