Enterasys Networks Generic SNMP User Manual

Generic SNMP
User Guide

Notice

Enterasys Networks reserves the right to make changes in specificatio ns and other information contained in this document without prior notice. The reader should in all cases consult Enterasys Networks to determine whether any such changes have been made.
The hardware, firmware, or software described in this manual is subject to change without notice. IN NO EVENT SHALL CABLETRON SYSTEMS BE LIABLE FOR ANY INCIDENTAL, INDIRECT,
SPECIAL, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING BUT NOT LIMITED TO LOST PROFITS) ARISING OUT OF OR RELATED TO THIS MA NUAL OR THE INFORMATION CONTAINED IN IT, EVEN IF CABLETRON SYSTEMS HAS BEEN ADVISED OF, KNOWN, OR SHOULD HAVE KNOWN, THE POSSIBILITY OF SUCH DAMAGES.
Virus Disclaimer
Enterasys Networks has tested its software with current virus checking technologies. However, because no anti­virus system is 100% reliable, we strongly caution you to write protect and then verify that the Licensed Software, prior to installing it, is virus-free with an an ti-virus system in which you have confidence.
Enterasys Networks makes no representations or warranties to the effect that the Licensed Software is virus-free.
Copyright  2000 by Enterasys Networks . All rights reserved. Printed in the United States of America. Order Number:9031620-04April 2000
Enterasys Networks P.O. Box 5005 Rochester, NH 03866-5005
Cabletron Systems, SPECTRUM, BRIM, DNI, FNB, INA, Integrated Network Architecture, LANVIEW, LANVIEW Secure, Multi Media Access Center, MiniMMAC, and TRMM are registered trademarks, and Bridge/Router Interface Modules, BRIM-A100, CRBRIM-W/E, CRXMIM, CXRMIM, Desktop Network Interface, Distributed LAN Monitoring, Distributed Network Server, DLM, DNSMIM, E1000, E2000, E3000, EFDMIM, EMM-E6, EMME, EPIM, EPIM-3PS, EPIM-A, EPIM-C, EPIM-F1, EPIM-F2, EPIM-F3, EPIM-T, EPIM-T1, EPIM-X, ESXMIM, ETSMIM, ETWMIM, FDCMIM-04, FDCMIM-08, FDMMIM, FDMMIM-04, Flexible Network Bus, FOMIM, FORMIM, HubSTACK, IRBM, IRM, IRM-2, IRM-3, Media Interface Module, MicroMMAC, MIM, MMAC, MMAC-3, MMAC-3FNB, MMAC-5, MMAC-5FNB, MMAC-8, MMAC-8FNB, MMAC-M8FNB, MMAC-Plus, MRX, MRXI, MRXI-24, MultiChannel, NB20E, NB25E, NB30, NB35, NBR-220/420/620, RMIM, SecureFast Switch, SecureFast Packet Switching, SFS, SFPS, SPECTRUM Element Manager, SPECTRUM for Open Systems, SPIM-A, SPIM-C, SPIM-F1, SPIM-F2, SPIM-T, SPIM-T1, TPMIM, TPMIM-22, TPMIM-T1, TPRMIM, TPRMIM-36, TPT-T, TRBMIM, TRMM-2, TRMMIM, and TRXI are trademarks of Cabletron Systems, Inc.
i
AppleTalk, Apple, Macintosh, and TokenTalk are registered trademarks; and Apple Remote Access and EtherTalk are trademarks of Apple Computer, Inc.
SmartBoost is a trademark of American Power Conversion ST is a registered trademark and C++ is a trademark of AT&T Banyan and VINES are registered trademarks of Banyan Systems, Inc. cisco, ciscoSystems, and AGS+ are register ed trad emarks; and cBus, cisco Router, CRM, IGS, and MGS
are trademarks of cisco Systems, Inc. GatorBox is a registered trademark; and GatorMail, GatorMIM, GatorPrint, GatorShare, GatorStar,
GatorStar GX-M, and XGator are trademarks of Cayman Systems, Inc. CompuServe is a registered trademark of CompuServe Incorporated X Window System is a trademark of Consortium, Inc. CTERM, DECnet, and ULTRIX are registered trademarks; and DEC, DEC C++, DECnet-DOS,
DECstation, VAX DOCUMENT, VMA, and VT are trademarks of Digital Equipment Corporation Fore Systems, ForeRunner, and ForeRunner ASX-100 are trademarks of Fore Systems, Inc. PC/TCP is a registered trademark of FTP Software, Inc. HP OpenView is a registered trademark of Hewlett-Packard, Inc. AIX, IBM, OS/2, NetView, and PS/2 are registered trademarks; and AT, Micro Channel, PC, PC-DOS,
PC/XT, Personal Computer AT, Operating System/2, Personal System/2, RISC System/6000, and Workplace Shell are trademarks of International Business Machines Corporation
i960 microprocessor is a registered trademark; and Intel and Multichannel are trademarks of Intel Corporation
Microsoft, MS-DOS, and Windows are registered trademarks of Microsoft Corporation Chameleon, ChameleonNFS, Chameleon 32, IPX/link, and NEWT are trademarks of
NETMANAGE, Inc. NetWare and Novell are registered trademarks; and Internetwork Packet Exchange (IPX), IPX, and
Network File System (NFS) are trademarks of Novell, Inc. Motif and MS are r egist ered tr ademarks; and Open Softwar e Fou ndation, OS F, OSF/1, and OSF/Motif
are trademarks of The Open Software Foundation, Inc. Silicon Graphics and IRIS are registered trademarks; and Indigo and IRIX are trademarks of Silicon
Graphics, Inc. NFS, PC-NFS, SPARC, Sun Microsystems, and Sun Workstation are registered trademarks; and
OpenWi ndows, SPARCstation, SPARCstation IPC, SPARCstation IPX, Sun, Sun-2, Sun-3, Sun-4, Sun386i, SunNet, SunOS, SunSPARC, and SunView are trademarks of Sun Microsystems, Inc.
OPEN LOOK and UNIX are registered trademarks of Unix System Laboratories, Inc. Ethernet, NS, Xerox Network Systems and XNS are trademarks of Xerox Corporation
ii
ANNEX, ANNEX-II, ANNEX-IIe, ANNEX-3, ANNEX-802.5, MICRO-ANNEX-XL, and MICRO­ANNEX-ELS are trademarks of Xylogics, Inc.
MAXserver and Xyplex are trademarks of Xyplex, Inc.
Restricted Rights Notice
(Applicable to licenses to the United States Government only.)
1. Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS
252.227-7013. Enterasys Networks , 35 Industrial Way, Rochester, New Hampshire 03867-0505.
2. (a)This computer software is submitted with restricted rights. It may not be used, reproduced, or
disclosed by the Government except as provided in paragraph (b) of this Notice or as otherwise expressly stated in the contract.
(b)This computer software may be:
(1) Used or copied for use in or with the computer or computers for which it was acquired,
including use at any Government installation to which such computer or computers may be transferred;
(2) Used or copied for use in a backup computer if any computer for which it was acquired
is inoperative;
(3) Reproduced for safekeeping (archives) or backup purposes;
(4) Modified, adapted, or combined with other computer software, provided that the
modified, combined, or adapted portions of the derivative software incorporating restricted computer software are made subject to the same restricted rights;
(5) Disclosed to and reproduced for use by support service contractors in accordance with
subparagraphs (b) (1) through (4) of this clause, provided the Government makes such disclosure or reproduction subject to these restricted rights; and
(6) Used or copied for use in or transferred to a replacement computer.
(c)Notwithstanding the foregoing, if this computer software is published copyrighted computer
software, it is licensed to the Government, without disclosure prohibitions, with the minimum rights set forth in paragraph (b) of this clause.
(d)Any other rights or limitations regarding the use, duplication, or disclosure of this computer
software are to be expressly stated in, or incorporated in, the contract.
(e)This Notice shall be marked on any reproduction of this computer software, in whole or in part.
iii
iv
Chapter 1 Introduction
Using the Generic SNMP User’s Guide.....................................................................1-1
Related Manuals............................................................................................................1-2
Useful Definitions......................................................................................................... 1-2
Software Conventions.................................................................................................. 1-6
Using the Mouse....................................................................................................1-7
Common Generic SNMP Window Fields ..........................................................1-8
Using Window Buttons.........................................................................................1-8
Getting Help .............................. ...... ................................................................... ...... .....1-9
Using On-line Help................................................................................................ 1-9
Accessing On-line Documentation......................................................................1-9
Getting Help from the Global Technical Assistance Center..........................1-10
Chapter 2 System Group
Modifying the System Group Administrative Fields..............................................2-2
Using the Other Groups Menu............................................................................ 2-3

Contents

Chapter 3 Viewing the Interface Group
Viewing Statistics...................................................................................................3-3
Setting the Interface Admin Status ..................................................................... 3-4
Chapter 4 Using the Address Translation Table
Editing the Address Translation Table................................................................4-3
Modifying Entries in the Address Translation Table.................................4-3
Adding Entries to the Address Translation Table......................................4-3
Chapter 5 Viewing IP Group Statistics
Setting the Time To Live Option..........................................................................5-5
Chapter 6 Viewing the IP Address Table
v
Contents
Chapter 7 Using the IP Routing Table Window
Modifying Entries in the IP Routing Table.........................................................7-5
Chapter 8 Using the Net to Media Table
Editing the Net to Media Table............................................................................8-2
Modifying Entries in the Net To Media Table ............................................8-2
Adding Entries to the Net to Media Table ..................................................8-3
Chapter 9 Viewing ICMP Group Statistics
Chapter 10 Viewing TCP Group Information
Chapter 11 Viewing UDP Group Information
Chapter 12 Viewing EGP Group Information
Displaying the EGP Group Neighbor Table Detail Window................................12-3
Setting the Event Trigger.....................................................................................12-5
Chapter 13 Viewing SNMP Group Information
Disabling/Enabling Authentication Failure Traps ....................................... ..13-6
Index
vi
Chapter 1

Introduction

How to use this guide; related guides; useful definitions; software conventions; getting help
Welcome to the Generic SNMP User’s Guide. This guide is a reference for using NetSight Element Manager to manage and control any SNMP-compliant devices on your network.

Using the Generic SNMP User’s Guide

This guide contains information about software functions which are accessed directly from the Generic SNMP icon or the System Group option available from the Device menu. Each chapter in this guide describes one major group window available for Generic SNMP management.
Chapter 1, Introduction, discusses the capabilities of Generic SNMP management from NetSight Element Manager. This chapter includes a list of related guides, recommended books, and SNMP definitions.
Chapter 2, System Group, describes the System Group window and its related options. The System Group window is the initial window for Generic SNMP; it displays summary and identification information about the SNMP device and provides a menu for accessing other Generic SNMP windows.
Chapter 3, Viewing the Interface Group, discusses the Interface Group window, which displays the number and types of packets received at and transm itted fr om each interface on the monitored device.
Chapter 4, Using the Address Translation Table, allows you to view and modify the mapping of IP Addresses and Physical Addresses via the Address Resolution Protocol (ARP).
Chapter 5, Viewing IP Group Statistics, describes the Internet Protocol Group window and its associated fields, including the Time To Live option.
Chapter 6, Viewing the IP Address Table, discusses the use of the Internet Protocol Address Table.
1-1
Introduction
Chapter 7, Using the IP Routing Table Window, discusses the IP Routing Table and how to route data through your network.
Chapter 8, Using the Net to Media Table, discusses the IP Address Tr anslation Table used for mapping IP addresses to physical addresses for IP datagrams.
Chapter 9, Viewing ICMP Group Statistics, discusses the Internet Control Message Protocol Group window, which summarizes ICMP message traffic.
Chapter 10, Viewing TCP Group Information, describes the Transmission Control Protocol Group window, which provides TCP statistics and displays current TCP connections.
Chapter 11, Viewing UDP Group Information, discusses the User Datagram Protocol Group window and UDP datagra m statistics.
Chapter 12, Viewing EGP Group Information, discusses the Exterior Gateway Protocol Group window, which provides information about router communications on your network .
Chapter 13, Viewing SNMP Group Information, describes the SNMP Group window, which displays SNMP message traffic statistics and lets you enable and disable authentication-failure traps.

Related Manuals

The Generic SNMP User’s Guide is only part of a complete document set designed to provide comprehensive information about the features available to you through NetSight Element Manager. Other guides which include inf ormation related to managing Generic SNMP devices include:
User’s Guide Tools Guide Remote Administration Tools User’s Guide Remote Monitoring (RMON) User’s Guide Alarm and Event Handling User’s Guide Network Troubleshooting Guide
For more information about the capabilities of the SNMP device, con sult the appropriate hardware doc u mentation.

Useful Definitions

To help you use G e neric SNMP management, we are providing a list of basic definitions that are applicable to TCP/IP networks and SNMP management. This list should not be taken as all-incl usive.
1-2 Related Manuals
Introduction
Active open
A sequence of events occurring when an entity using an application protocol of
the Internet suite (such as SMTP—the E-mail protocol; FTP—File Transfer Protocol; or Telnet—terminal service protocol) directs the Transmission Control Protocol to establish a connection over the ph ysical medium with another user(s) of the application’s particular service. See Transmission Control Protocol (TCP),
page 1-6, for more information.
Address mask
A bit mask that is used to select bits from an IP address for subnet addressing. The mask is 32 bits long and selects the network portion of the IP address and one or more bits of the local portion. See Subnet mask, page 1-6, for more information.
Address Resolution Protocol (ARP)
The Internet protocol that dynamically maps destination IP addresses to physical media (Ethernet and other) addresses. This is needed so that a datagram addressed to logical address can reach the correct physical media address.
If the addresses are alre ady mapped in transmitting device’s ARP cache (address matching tables), the datagram can be sent directly.
Broadcast address
A physical or IP address referring to all stations on the media.
Connection
A logical binding between two or more users of a service so that data can be transferred.
Connection-less mode
A service that has a single phase which combines both transmission control mechanisms (e.g., addressing) and data transfer.
Connection-oriented mode
A service that divides into three phases: establishment, in which two or more users are bound to a connection; data transfer, in which the users exchange data; and release, in which the connection is discarded.
Datagram
A self-contained unit of data, with an associated destination IP address and upper-layer protocol number, that is used in series to transmit a whole body of data from one device to another to the correct service layer protocol.
Device
A network element.
Exterior Gateway Protocol (EGP)
An older protocol used by gateways in a two-level internet (autonomous internet sites are connected to the Internet through core gateways). All traffic received from or transmitted between internet sites passes through the core gateway(s).
Useful Definitions 1-3
Introduction
Therefore, a site’s core gateway must have routing information on all networks available within the autonomous site, and must be able to pass reachability (of other Internet sites) information (using EGP) to each network gateway in that site.
Flags
The control bits indicating special functions for a TCP segment; for example, if the datagram is allowed to be fragmented, and if so, whether other later fragments exist.
Fragment
An IP datagram containing only a portion of the user-data from a larger IP datagram. A datagram will be fragmented if its size is too large to be encapsulated within the legal limits of a frame’s data field of the medium on which it is transmitted (e.g., a datagram over 1500 bytes would be fragmented if it were to be transmitted on an Ethernet network).
Fragmentation
The process of breaking an IP datagram into smaller parts, such that each fragment can be transmitted in whole on a given physical medium.
Gateway
A router (for the purposes of this manual).
Internet
A large collection of connected networks, primarily in the United States, running the Internet suite of protocols, also known as the DARPA Internet.
Internet Control Message Protocol (ICMP)
A simple protocol that provides low-level feedback that informs the internet layer about its operating status. Control messa ges supported by this protocol include destination unreachable; datagram discards because of timer expirations; IP header problems; discards at a destination because of a lack of resources; r edirects to a gateway closer than the device’s default one; IP addr ess r eachability tests and results; delay times between transmission and reception of datagrams; and IP network address and address mask requests.
Internet Protocol (IP)
The network protocol offering a connectionless mode network service in the Internet Suite of protocols, in which address resolution and data transfer are completed in a single phase.
Management Information Base (MIB)
A collection of objects (organized in accordance with the Structure of Management Information) implemented in a network device, so that the device can be accessed and managed by a network management protocol, such as SNMP. Objects allow a device to be monitored (have information retrieved from it by a management station); to be controlled (allow remote configuration of the device, such as switching the operational state of a port); and to report abnormal events to the management station (e.g., collision threshold exceeded).
1-4 Useful Definitions
Introduction
Maximum transmission unit (MTU)
The largest amount of user-data (e.g. the largest size of an IP datagram) that can be sent in a single frame on a particular medium.
Passive open
A sequence of events occurring when an entity using an application protocol of the Internet suite (e.g., SMTP, FTP, SNMP, or Telnet) informs the Transmission Control Protocol that it is willing to accept a connection to another user of the
application’s particular service. See Transmission Control Protocol (TCP),
page 1-6, for more information.
Ports
Integer quantities which identify to a transport protocol (UDP or TCP) the particular application entity (e.g., SMTP, FTP, SNMP, or Telnet) used in the transmission/reception of the data (e.g., UDP uses a port value of 161 decimal to identify SNMP data).
Protocol Data Unit (PDU)
A unit of information, which uses a protocol to offer a service, that is exchanged by protocol machines, A PDU usually contain s protocol control information (a header identifying data to be transferred) and user data.
Reassembly
The process of recombining fragments, at the final destina tion, into the original datagram.
Retransmission
The process of a source TCP entity resending a unit of data while waiting for an acknowledgment of receipt by the destination TCP entity. Each time a source TCP entity transmits a segment, it starts a retran smission timer. If this timer expires before an acknowledgment from the destination, the segment will be transmitted and the timer will be restarted. Retransmission can occur only a certain number of times until the transmitting entity aborts the connection.
Segment
The unit used for data exchange between two entities using TCP.
Socket
A pairing of an IP address (destination or source) and a TCP port number. The pairing of two internet sockets (destination and source IP addresses and TCP ports) forms a connection.
Simple Network Management Protocol (SNMP)
The application protocol which offers network mana gement services in the Internet suite of protocols. SNMP provides four operations for network management via a device’s MIB (its manageable objects): get (retrieval of specific management information), get-next (retrieval of management information in series by traversing the MIB), set (manipulation of management information), and trap (reports on extraordinary events at the device).
Useful Definitions 1-5
Introduction
Subnet
A physical network within the IP ne twork.
Subnet mask
A 32-bit quantity (four binary octets) that filters a destination IP address to
determine whether it exists on the source IP’s subnetwork and therefore can be reached directly, or must be forwarded through a gateway or router.
In the mask, all bits in the source IP address that correspond to its network portion (both site and subnet identifying bits) are set to 1, and all bits that correspond to the host portion are set to 0. The destination IP address is logically ANDed with the mask to determine its network portion. Its network portion is then compared to the network portion of the source. If the network portions match, the frame is transmitted directly; if they do not, the frame is routed.
Time to live
The upper bound, in seconds, that a datagram may be processed within the internet. Each time the datagram passes through the internet layer on any network device, the IP entity must decrement this field by at least one. If the field reaches zero at an intermediary device before reaching its intended destination, the datagram is discarded.
Transmission Control Protocol (TCP)
The Internet suite protocol which transports IP datagrams via a connection-oriented service. A connection oriented service requires that the interface layer (that responsible for transmitting datagrams on a single physical medium, e.g., Ethernet) perform connection management to find an underlying connection on which to transmit the datagram.
User Datagram Protocol (UDP)
The protocol offering a connectionless-mode transport service in the Inter net suite of protocols. A UDP datagram contains source and destination ports, a length field, a checksum, and user-data from the upper layer protocol.

Software Conventions

NetSight Element Manager’s device user interface contains a number of elements which are common to most windows and which operate the same regardless of the window in which they appear. A brief description of some of the most common elements appears below.
In accordance with Year 2000 compliance requirements, NetSight Element Manager
NOTE
displays and allows you to set all dates with four-di git year v a lues.
1-6 Software Conventions

Using the Mouse

This document assumes you are using a Windows-compatible mouse with two buttons; if you are using a three-button mouse, you should ignore the operation of the middle button when following procedures in this document. Procedures within the NetSight Element Manager document set refer to these buttons as follows:
Left Mouse Button
Right Mouse Button
Introduction
Figure 1-1. Mouse Buttons
For many mouse operations, this document assumes that the left (primary) mouse button is to be used, and references to activating a menu or button will not include instructions about which mouse button to use.
However, in instances in which right (secondary) mouse button functionality is available, instructions will explic itly refer to right mouse button usage. Also, in situations where you may be switching between mouse buttons in the same area or window, in structions may also explicitly refer to both left and right mouse buttons.
Instructions to perform a mouse operation include the following terms:
Pointing means to position the mouse cursor over an area without pressing
either mouse button.
Clicking means to position the mouse pointer over the indicated target, then
press and release the appropriate mouse button. This is most commonly used to select or activate objects, such as menus or b uttons.
Double-clicking means to position the mouse pointer over the indicated
target, then press and release the mouse button two times in rapid succession. This is commonly used to activate an object’s default operation, such as opening a window from an icon. Note that there is a distinction made between “click twice” and “double-click,” since “click twice” implies a slower motion.
Pressing means to position the mouse pointer over the indicated target, then
press and hold the mouse button until the described action is completed. It is often a pre-cursor to Drag operations.
Software Conventions 1-7
Introduction
Dragging means to move the mouse pointer across the screen while holding
the mouse button down. It is often used for drag-and-drop operations to copy information from one window of the screen into another, and to highlight editable text.

Common Generic SNMP Window Fields

Similar descriptive information is displayed in text boxes at the top of most device-specific windows in NetSight Element Manager, as illustrated in
Figure 1-2.
IP Address
System Description
MAC Address
Figure 1-2. Sample Window Showing Informational Text Boxes
System Description
Displays a textual description of the device. This description usually includes the full name of the device, the version number of the system’s hardware type, the software operating-system, and networking software.
IP Address
Displays the device’s IP (Internet Protocol) Address; this will be the IP address used to define the device icon. IP addresses are assigned via Local Management for the SNMP device; they cannot be changed via NetSight Element Manager.
MAC Address
Displays t he manufac turer-set MAC a ddress associated with the IP address used to define the device icon created via NetSight Element Manager. This address is factory-set and cannot be altered.

Using Window Buttons

The Cancel button that appears at the bottom of most windows allows you to exit a window and terminate any unsaved changes you have made. You may also have to use this button to close a window after you have made any necessary changes and set them by clicking on an OK, Set, or Apply button.
1-8 Software Conventions
An OK, Set, or Apply button appears in windows that have configurable values; it allows you to confirm and SET changes you have made to those values. In some windows, you may have to use this button to confirm each individual set; in other windows, you can set several values at once and confirm the sets with one click on the button.
The Help button brings up a Help window with information specific to the current window. For more information, see Getting Help, page 1-9.
The command buttons, for example Bridge, launch a menu listing the windows, or commands available for that topic.
Any menu topic followed by … (three dots)—for example Statistics…— launches a window associated with that selection.

Getting Help

This section describes different methods of getting help for questions or concerns you may have while using NetSight Element Manager.
Introduction

Using On-line Help

You can use the Generic SNMP window Help buttons to obtain information specific to the device. When you click on a Help button, a window will appear which contains context-sensitive on- screen docume ntation that will assist you in the use of the windows and their associated command and menu options. Note that if a Help button is grayed out, on-line help has not yet been implemented for the associated window.
All of the online help windows use the Microsoft Windows help facility. If you are
NOTE
unfamiliar with this feature of Windows, you can select Help from the Windows Start menu, or Help —> How to Use Help from the primary NetSight Element Manager window.

Accessing On-line Documentation

The complete suite of documents available for NetSight Element Manager can be accessed via a menu option from the primary window menu bar: Help —> Online Documents. If you installed the documentation component, selecting this option will launch A dob e’s Acrobat Reader and a menu file which provides links to all other available documents.
If you have not yet installed the docu mentation, the Online Documents option will not
TIP
Getting Help 1-9
be able to access the menu file; in order to activate this option, you must run setup.exe again to install the documentation component. See the Installation Guide for details.
Introduction

Getting Help from the Global Technical Assistance Center

If you need technical support related to NetSight Element Manager, contact the Global Technical Assista nce Center via one of the following methods:
By phone: (603) 332-9400
24 hours a day, 365 days a year
By fax: (603) 337-3075 By mail: Enterasys
Technical Support 35 Industrial Way
Rochester, NH 03867 By e-mail: support@enterasys.com FTP: ftp.ctron.com (134.141.197.25)
Login anonymous Password your email address
By BBS: (603) 335-3358
Modem Setting 8N1: 8 data bits, 1 stop bit, No parity
Send your questions, comments, an d suggestions regarding NetSight documentation to NetSight Technical Communications via the following e-mail address:
Netsight_docs@enterasys.com
To locate product specific information, refer to the Enterasys Web site at the following address:
http://www.enterasys.com
1-10 Getting Help

System Group

The System Group window; using the Other Groups menu
The System Group window provides basic information about the type of device currently being monitored, including the System Object ID and Uptime, as well as
administrative information, including the device’s name, location, contact person, and the level of Open Systems Interconnection (OSI) services. You can access all other Generic SNMP windows from the System Group window.
To open the System Group window from the Device View or Chassis View window of any SNM P -compliant device:
Chapter 2
1. Select Device—>System Group in the Chassis View or Device View menu bar. The System Group window as shown in, Figure 2-1, opens.
Figure 2-1. System Group Window
2-1
System Group
The System Group window displays the following fields:
Object ID
Displays the unique identifier of the device being managed. This value is allocated within the SMI enterprises subtree (1.3.6.1.4.1).
Uptime
Displays the amount of time that the device has been running since the network management portion of the system was last initialized. This is converted from hundredths of a second (as stored in the device MIB) into a more useful days, HH:MM:SS format.
Contact
Displays a text field which you can use to enter the name and/or telephone number of the person responsible for the device.
Name
Displays a text field which you can use to assign a name for the device.
Location
Displays a text field which you can use to describe the node’s physical location.
Services
Displays the level of OSI (Open Systems Interconnection) services supported by the device, examples of which are given in Figure 2-2.
Physical Layer……………………………….e.g. repeaters
Datalink/Subnetwork Layer………………e.g. bridges Internet Layer…………………………..e.g. IP gateways End-to-end Layer…………………………….e.g. IP hosts
Applications Layer……………………..e.g. mail relays
Figure 2-2. Examples of OSI Service Layers

Modifying the System Group Administrative Fields

If your device’s firmware supports MIB II, you can modify the Contact, Name, and Location fields.
1. To modify the Contact field: a. Click the I-bar cursor ( ) to the right of the Contact field. The Contact
text box opens, Figure 2-3.
2-2 Modifying the System Group Administrative Fields
System Group
Figure 2-3. Contact Text Box
b. Type in the new contact information in the text box; then click on OK.
2. To modify the Name field:
a. Click the I-bar cursor ( ) to the right of the Name field. The Name text
box opens, Figure 2-4.
Figure 2-4. Name Text Box
b. Type in the new name in the text box; then click on OK.
3. To modify the location field:
a. Click on the I-bar cursor ( ) to the right of the Location field. The
Location text box opens, Figure 2-5.
Figure 2-5. Location Text Box
b. Type in the new location in the text box; then click on OK.

Using the Other Groups Menu

The Other Groups button displays a menu ( Figure 2-6), which lets you se lect other Generic SNMP windows supported by the device.
Modifying the System Group Administrative Fields 2-3
System Group
Figure 2-6. Other Group Menu
To access the Other Groups drop-down menu via the System Group win dow:
1. Click on the Other Groups button. The Other Groups drop-down menu displays, as shown in Figure 2-6. Non-supported options will be grayed-out.
2. Click on the desired option. The appropriate window opens.
2-4 Modifying the System Group Administrative Fields

Viewing the Interface Group

Viewing interface statistics; using the Admin/Status option and the Last Change field
The Interface Group window displays statistics for each interface on the device. The port type is displayed for each interface along with the statistics associated with that interface. Use the scroll bar to display the other available interfaces; the interface number and the total number of interfaces on the device are displayed above the scroll bar (e.g., 1 of 27).
Statistics are gathered for network activity levels occurring at the physical and data-link layers. These statistics reflect the following types of packets being transmitted and received:
Chapter 3
•Unicasts
Multicasts
Discarded Packets
Error Packets
Received Packets with unknown protocols
Packets waiting to be transmitted
•Bytes To open the Interface Group window from the System Group window:
1. Click on the Other Groups button. The Other Groups drop-down menu
displays.
2. Click on Interface Group. The Interface Group window, Figure 3-1, opens.
3-1
Viewing the Interface Group
Figure 3-1. Interface Group Window
The following fields are non-statistical interface descriptions fields:
Address
The interface’s physical address (ifPhysAddr) at the protocol layer immediately below the network layer in the protocol stack. For interfaces which do not have such an address (e.g., a serial line), this object should contain an octet string of zero length.
Interface Type
The type of interface (ifType), distingui shed a ccording to the physical/link protocol(s) immediately below the network layer in the protocol stack. MIB-II defines 32 different interface types, including ethernet-csmacd, fddi, iso88025-tokenRing, and softwareLoopBack.
MTU (Maximum Transfer Unit)
The size of the largest datagram which can be transmitted or received on the interface (specified in octets), according to the ifMtu. For interfaces that are used for transmitting network datagrams, this is the size of the largest network datagram that can be sent on the interface. Frames that exceed the MTU are discarded.
Speed
An estimate of the interface’s current bandwidth in bits per second, according to the ifSpeed. For interfaces which do not vary in bandwidth or for those where no accurate estimation can be made, this object should contain the nominal bandwidth.
3-2
Loading...
+ 56 hidden pages