Enterasys Networks reserves the right to make changes in specificatio ns and other information
contained in this document without prior notice. The reader should in all cases consult Enterasys
Networks to determine whether any such changes have been made.
The hardware, firmware, or software described in this manual is subject to change without notice.
IN NO EVENT SHALL CABLETRON SYSTEMS BE LIABLE FOR ANY INCIDENTAL, INDIRECT,
SPECIAL, OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING BUT NOT LIMITED
TO LOST PROFITS) ARISING OUT OF OR RELATED TO THIS MA NUAL OR THE INFORMATION
CONTAINED IN IT, EVEN IF CABLETRON SYSTEMS HAS BEEN ADVISED OF, KNOWN, OR
SHOULD HAVE KNOWN, THE POSSIBILITY OF SUCH DAMAGES.
Virus Disclaimer
Enterasys Networks has tested its software with current virus checking technologies. However, because no antivirus system is 100% reliable, we strongly caution you to write protect and then verify that the
Licensed Software, prior to installing it, is virus-free with an an ti-virus system in which you have
confidence.
Enterasys Networks makes no representations or warranties to the effect that the Licensed Software is
virus-free.
Copyright 2000 by Enterasys Networks . All rights reserved.
Printed in the United States of America.
Order Number:9031620-04April 2000
Cabletron Systems, SPECTRUM, BRIM, DNI, FNB, INA, Integrated Network Architecture,
LANVIEW, LANVIEW Secure, Multi Media Access Center, MiniMMAC, and TRMM are registered
trademarks, and Bridge/Router Interface Modules, BRIM-A100, CRBRIM-W/E, CRXMIM,
CXRMIM, Desktop Network Interface, Distributed LAN Monitoring, Distributed Network Server,
DLM, DNSMIM, E1000, E2000, E3000, EFDMIM, EMM-E6, EMME, EPIM, EPIM-3PS, EPIM-A,
EPIM-C, EPIM-F1, EPIM-F2, EPIM-F3, EPIM-T, EPIM-T1, EPIM-X, ESXMIM, ETSMIM, ETWMIM,
FDCMIM-04, FDCMIM-08, FDMMIM, FDMMIM-04, Flexible Network Bus, FOMIM, FORMIM,
HubSTACK, IRBM, IRM, IRM-2, IRM-3, Media Interface Module, MicroMMAC, MIM, MMAC,
MMAC-3, MMAC-3FNB, MMAC-5, MMAC-5FNB, MMAC-8, MMAC-8FNB, MMAC-M8FNB,
MMAC-Plus, MRX, MRXI, MRXI-24, MultiChannel, NB20E, NB25E, NB30, NB35, NBR-220/420/620,
RMIM, SecureFast Switch, SecureFast Packet Switching, SFS, SFPS, SPECTRUM Element
Manager, SPECTRUM for Open Systems, SPIM-A, SPIM-C, SPIM-F1, SPIM-F2, SPIM-T, SPIM-T1,
TPMIM, TPMIM-22, TPMIM-T1, TPRMIM, TPRMIM-36, TPT-T, TRBMIM, TRMM-2, TRMMIM,
and TRXI are trademarks of Cabletron Systems, Inc.
i
AppleTalk, Apple, Macintosh, and TokenTalk are registered trademarks; and Apple Remote Access
and EtherTalk are trademarks of Apple Computer, Inc.
SmartBoost is a trademark of American Power Conversion
ST is a registered trademark and C++ is a trademark of AT&T
Banyan and VINES are registered trademarks of Banyan Systems, Inc.
cisco, ciscoSystems, and AGS+ are register ed trad emarks; and cBus, cisco Router, CRM, IGS, and MGS
are trademarks of cisco Systems, Inc.
GatorBox is a registered trademark; and GatorMail, GatorMIM, GatorPrint, GatorShare, GatorStar,
GatorStar GX-M, and XGator are trademarks of Cayman Systems, Inc.
CompuServe is a registered trademark of CompuServe Incorporated
X Window System is a trademark of Consortium, Inc.
CTERM, DECnet, and ULTRIX are registered trademarks; and DEC, DEC C++, DECnet-DOS,
DECstation, VAX DOCUMENT, VMA, and VT are trademarks of Digital Equipment Corporation
Fore Systems, ForeRunner, and ForeRunner ASX-100 are trademarks of Fore Systems, Inc.
PC/TCP is a registered trademark of FTP Software, Inc.
HP OpenView is a registered trademark of Hewlett-Packard, Inc.
AIX, IBM, OS/2, NetView, and PS/2 are registered trademarks; and AT, Micro Channel, PC, PC-DOS,
PC/XT, Personal Computer AT, Operating System/2, Personal System/2, RISC System/6000, and
Workplace Shell are trademarks of International Business Machines Corporation
i960 microprocessor is a registered trademark; and Intel and Multichannel are trademarks of Intel
Corporation
Microsoft, MS-DOS, and Windows are registered trademarks of Microsoft Corporation
Chameleon, ChameleonNFS, Chameleon 32, IPX/link, and NEWT are trademarks of
NETMANAGE, Inc.
NetWare and Novell are registered trademarks; and Internetwork Packet Exchange (IPX), IPX, and
Network File System (NFS) are trademarks of Novell, Inc.
Motif and MS are r egist ered tr ademarks; and Open Softwar e Fou ndation, OS F, OSF/1, and OSF/Motif
are trademarks of The Open Software Foundation, Inc.
Silicon Graphics and IRIS are registered trademarks; and Indigo and IRIX are trademarks of Silicon
Graphics, Inc.
NFS, PC-NFS, SPARC, Sun Microsystems, and Sun Workstation are registered trademarks; and
OpenWi ndows, SPARCstation, SPARCstation IPC, SPARCstation IPX, Sun, Sun-2, Sun-3, Sun-4,
Sun386i, SunNet, SunOS, SunSPARC, and SunView are trademarks of Sun Microsystems, Inc.
OPEN LOOK and UNIX are registered trademarks of Unix System Laboratories, Inc.
Ethernet, NS, Xerox Network Systems and XNS are trademarks of Xerox Corporation
ii
ANNEX, ANNEX-II, ANNEX-IIe, ANNEX-3, ANNEX-802.5, MICRO-ANNEX-XL, and MICROANNEX-ELS are trademarks of Xylogics, Inc.
MAXserver and Xyplex are trademarks of Xyplex, Inc.
Restricted Rights Notice
(Applicable to licenses to the United States Government only.)
1. Use, duplication, or disclosure by the Government is subject to restrictions as set forth in
subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS
2. (a)This computer software is submitted with restricted rights. It may not be used, reproduced, or
disclosed by the Government except as provided in paragraph (b) of this Notice or as otherwise
expressly stated in the contract.
(b)This computer software may be:
(1) Used or copied for use in or with the computer or computers for which it was acquired,
including use at any Government installation to which such computer or computers may
be transferred;
(2) Used or copied for use in a backup computer if any computer for which it was acquired
is inoperative;
(3) Reproduced for safekeeping (archives) or backup purposes;
(4) Modified, adapted, or combined with other computer software, provided that the
modified, combined, or adapted portions of the derivative software incorporating
restricted computer software are made subject to the same restricted rights;
(5) Disclosed to and reproduced for use by support service contractors in accordance with
subparagraphs (b) (1) through (4) of this clause, provided the Government makes such
disclosure or reproduction subject to these restricted rights; and
(6) Used or copied for use in or transferred to a replacement computer.
(c)Notwithstanding the foregoing, if this computer software is published copyrighted computer
software, it is licensed to the Government, without disclosure prohibitions, with the minimum
rights set forth in paragraph (b) of this clause.
(d)Any other rights or limitations regarding the use, duplication, or disclosure of this computer
software are to be expressly stated in, or incorporated in, the contract.
(e)This Notice shall be marked on any reproduction of this computer software, in whole or in part.
iii
iv
Chapter 1Introduction
Using the Generic SNMP User’s Guide.....................................................................1-1
Related Manuals............................................................................................................1-2
How to use this guide; related guides; useful definitions; software conventions; getting help
Welcome to the Generic SNMP User’s Guide. This guide is a reference for using
NetSight Element Manager to manage and control any SNMP-compliant devices
on your network.
Using the Generic SNMP User’s Guide
This guide contains information about software functions which are accessed
directly from the Generic SNMP icon or the System Group option available from
the Device menu. Each chapter in this guide describes one major group window
available for Generic SNMP management.
Chapter 1, Introduction, discusses the capabilities of Generic SNMP management
from NetSight Element Manager. This chapter includes a list of related guides,
recommended books, and SNMP definitions.
Chapter 2, System Group, describes the System Group window and its related
options. The System Group window is the initial window for Generic SNMP; it
displays summary and identification information about the SNMP device and
provides a menu for accessing other Generic SNMP windows.
Chapter 3, Viewing the Interface Group, discusses the Interface Group window,
which displays the number and types of packets received at and transm itted fr om
each interface on the monitored device.
Chapter 4, Using the Address Translation Table, allows you to view and modify
the mapping of IP Addresses and Physical Addresses via the Address Resolution
Protocol (ARP).
Chapter 5, Viewing IP Group Statistics, describes the Internet Protocol Group
window and its associated fields, including the Time To Live option.
Chapter 6, Viewing the IP Address Table, discusses the use of the Internet
Protocol Address Table.
1-1
Introduction
Chapter 7, Using the IP Routing Table Window, discusses the IP Routing Table
and how to route data through your network.
Chapter 8, Using the Net to Media Table, discusses the IP Address Tr anslation
Table used for mapping IP addresses to physical addresses for IP datagrams.
Chapter 9, Viewing ICMP Group Statistics, discusses the Internet Control
Message Protocol Group window, which summarizes ICMP message traffic.
Chapter 10, Viewing TCP Group Information, describes the Transmission
Control Protocol Group window, which provides TCP statistics and displays
current TCP connections.
Chapter 11, Viewing UDP Group Information, discusses the User Datagram
Protocol Group window and UDP datagra m statistics.
Chapter 12, Viewing EGP Group Information, discusses the Exterior Gateway
Protocol Group window, which provides information about router
communications on your network .
Chapter 13, Viewing SNMP Group Information, describes the SNMP Group
window, which displays SNMP message traffic statistics and lets you enable and
disable authentication-failure traps.
Related Manuals
The Generic SNMP User’s Guide is only part of a complete document set
designed to provide comprehensive information about the features available to
you through NetSight Element Manager. Other guides which include inf ormation
related to managing Generic SNMP devices include:
For more information about the capabilities of the SNMP device, con sult the
appropriate hardware doc u mentation.
Useful Definitions
To help you use G e neric SNMP management, we are providing a list of basic
definitions that are applicable to TCP/IP networks and SNMP management. This
list should not be taken as all-incl usive.
1-2Related Manuals
Introduction
Active open
A sequence of events occurring when an entity using an application protocol of
the Internet suite (such as SMTP—the E-mail protocol; FTP—File Transfer
Protocol; or Telnet—terminal service protocol) directs the Transmission Control
Protocol to establish a connection over the ph ysical medium with another user(s)
of the application’s particular service. See Transmission Control Protocol (TCP),
page 1-6, for more information.
Address mask
A bit mask that is used to select bits from an IP address for subnet addressing. The
mask is 32 bits long and selects the network portion of the IP address and one or
more bits of the local portion. See Subnet mask, page 1-6, for more information.
Address Resolution Protocol (ARP)
The Internet protocol that dynamically maps destination IP addresses to physical
media (Ethernet and other) addresses. This is needed so that a datagram
addressed to logical address can reach the correct physical media address.
If the addresses are alre ady mapped in transmitting device’s ARP cache (address
matching tables), the datagram can be sent directly.
Broadcast address
A physical or IP address referring to all stations on the media.
Connection
A logical binding between two or more users of a service so that data can be
transferred.
Connection-less mode
A service that has a single phase which combines both transmission control
mechanisms (e.g., addressing) and data transfer.
Connection-oriented mode
A service that divides into three phases: establishment, in which two or more
users are bound to a connection; data transfer, in which the users exchange data;
and release, in which the connection is discarded.
Datagram
A self-contained unit of data, with an associated destination IP address and
upper-layer protocol number, that is used in series to transmit a whole body of
data from one device to another to the correct service layer protocol.
Device
A network element.
Exterior Gateway Protocol (EGP)
An older protocol used by gateways in a two-level internet (autonomous internet
sites are connected to the Internet through core gateways). All traffic received
from or transmitted between internet sites passes through the core gateway(s).
Useful Definitions1-3
Introduction
Therefore, a site’s core gateway must have routing information on all networks
available within the autonomous site, and must be able to pass reachability (of
other Internet sites) information (using EGP) to each network gateway in that site.
Flags
The control bits indicating special functions for a TCP segment; for example, if the
datagram is allowed to be fragmented, and if so, whether other later fragments
exist.
Fragment
An IP datagram containing only a portion of the user-data from a larger IP
datagram. A datagram will be fragmented if its size is too large to be encapsulated
within the legal limits of a frame’s data field of the medium on which it is
transmitted (e.g., a datagram over 1500 bytes would be fragmented if it were to be
transmitted on an Ethernet network).
Fragmentation
The process of breaking an IP datagram into smaller parts, such that each
fragment can be transmitted in whole on a given physical medium.
Gateway
A router (for the purposes of this manual).
Internet
A large collection of connected networks, primarily in the United States, running
the Internet suite of protocols, also known as the DARPA Internet.
Internet Control Message Protocol (ICMP)
A simple protocol that provides low-level feedback that informs the internet layer
about its operating status. Control messa ges supported by this protocol include
destination unreachable; datagram discards because of timer expirations; IP
header problems; discards at a destination because of a lack of resources; r edirects
to a gateway closer than the device’s default one; IP addr ess r eachability tests and
results; delay times between transmission and reception of datagrams; and IP
network address and address mask requests.
Internet Protocol (IP)
The network protocol offering a connectionless mode network service in the
Internet Suite of protocols, in which address resolution and data transfer are
completed in a single phase.
Management Information Base (MIB)
A collection of objects (organized in accordance with the Structure of
Management Information) implemented in a network device, so that the device
can be accessed and managed by a network management protocol, such as SNMP.
Objects allow a device to be monitored (have information retrieved from it by a
management station); to be controlled (allow remote configuration of the device,
such as switching the operational state of a port); and to report abnormal events
to the management station (e.g., collision threshold exceeded).
1-4Useful Definitions
Introduction
Maximum transmission unit (MTU)
The largest amount of user-data (e.g. the largest size of an IP datagram) that can
be sent in a single frame on a particular medium.
Passive open
A sequence of events occurring when an entity using an application protocol of
the Internet suite (e.g., SMTP, FTP, SNMP, or Telnet) informs the Transmission
Control Protocol that it is willing to accept a connection to another user of the
application’s particular service. See Transmission Control Protocol (TCP),
page 1-6, for more information.
Ports
Integer quantities which identify to a transport protocol (UDP or TCP) the
particular application entity (e.g., SMTP, FTP, SNMP, or Telnet) used in the
transmission/reception of the data (e.g., UDP uses a port value of 161 decimal to
identify SNMP data).
Protocol Data Unit (PDU)
A unit of information, which uses a protocol to offer a service, that is exchanged
by protocol machines, A PDU usually contain s protocol control information (a
header identifying data to be transferred) and user data.
Reassembly
The process of recombining fragments, at the final destina tion, into the original
datagram.
Retransmission
The process of a source TCP entity resending a unit of data while waiting for an
acknowledgment of receipt by the destination TCP entity. Each time a source TCP
entity transmits a segment, it starts a retran smission timer. If this timer expires
before an acknowledgment from the destination, the segment will be transmitted
and the timer will be restarted. Retransmission can occur only a certain number of
times until the transmitting entity aborts the connection.
Segment
The unit used for data exchange between two entities using TCP.
Socket
A pairing of an IP address (destination or source) and a TCP port number. The
pairing of two internet sockets (destination and source IP addresses and TCP
ports) forms a connection.
Simple Network Management Protocol (SNMP)
The application protocol which offers network mana gement services in the
Internet suite of protocols. SNMP provides four operations for network
management via a device’s MIB (its manageable objects): get (retrieval of specific
management information), get-next (retrieval of management information in
series by traversing the MIB), set (manipulation of management information), and
trap (reports on extraordinary events at the device).
Useful Definitions1-5
Introduction
Subnet
A physical network within the IP ne twork.
Subnet mask
A 32-bit quantity (four binary octets) that filters a destination IP address to
determine whether it exists on the source IP’s subnetwork and therefore can be
reached directly, or must be forwarded through a gateway or router.
In the mask, all bits in the source IP address that correspond to its network
portion (both site and subnet identifying bits) are set to 1, and all bits that
correspond to the host portion are set to 0. The destination IP address is logically
ANDed with the mask to determine its network portion. Its network portion is
then compared to the network portion of the source. If the network portions
match, the frame is transmitted directly; if they do not, the frame is routed.
Time to live
The upper bound, in seconds, that a datagram may be processed within the
internet. Each time the datagram passes through the internet layer on any
network device, the IP entity must decrement this field by at least one. If the field
reaches zero at an intermediary device before reaching its intended destination,
the datagram is discarded.
Transmission Control Protocol (TCP)
The Internet suite protocol which transports IP datagrams via a
connection-oriented service. A connection oriented service requires that the
interface layer (that responsible for transmitting datagrams on a single physical
medium, e.g., Ethernet) perform connection management to find an underlying
connection on which to transmit the datagram.
User Datagram Protocol (UDP)
The protocol offering a connectionless-mode transport service in the Inter net suite
of protocols. A UDP datagram contains source and destination ports, a length
field, a checksum, and user-data from the upper layer protocol.
Software Conventions
NetSight Element Manager’s device user interface contains a number of elements
which are common to most windows and which operate the same regardless of
the window in which they appear. A brief description of some of the most
common elements appears below.
In accordance with Year 2000 compliance requirements, NetSight Element Manager
NOTE
displays and allows you to set all dates with four-di git year v a lues.
1-6Software Conventions
Using the Mouse
This document assumes you are using a Windows-compatible mouse with two
buttons; if you are using a three-button mouse, you should ignore the operation of
the middle button when following procedures in this document. Procedures
within the NetSight Element Manager document set refer to these buttons as
follows:
Left Mouse Button
Right Mouse Button
Introduction
Figure 1-1. Mouse Buttons
For many mouse operations, this document assumes that the left (primary) mouse
button is to be used, and references to activating a menu or button will not
include instructions about which mouse button to use.
However, in instances in which right (secondary) mouse button functionality is
available, instructions will explic itly refer to right mouse button usage. Also, in
situations where you may be switching between mouse buttons in the same area
or window, in structions may also explicitly refer to both left and right mouse
buttons.
Instructions to perform a mouse operation include the following terms:
•Pointing means to position the mouse cursor over an area without pressing
either mouse button.
•Clicking means to position the mouse pointer over the indicated target, then
press and release the appropriate mouse button. This is most commonly used
to select or activate objects, such as menus or b uttons.
•Double-clicking means to position the mouse pointer over the indicated
target, then press and release the mouse button two times in rapid succession.
This is commonly used to activate an object’s default operation, such as
opening a window from an icon. Note that there is a distinction made between
“click twice” and “double-click,” since “click twice” implies a slower motion.
•Pressing means to position the mouse pointer over the indicated target, then
press and hold the mouse button until the described action is completed. It is
often a pre-cursor to Drag operations.
Software Conventions1-7
Introduction
•Dragging means to move the mouse pointer across the screen while holding
the mouse button down. It is often used for drag-and-drop operations to copy
information from one window of the screen into another, and to highlight
editable text.
Common Generic SNMP Window Fields
Similar descriptive information is displayed in text boxes at the top of most
device-specific windows in NetSight Element Manager, as illustrated in
Figure 1-2.
IP Address
System Description
MAC Address
Figure 1-2. Sample Window Showing Informational Text Boxes
System Description
Displays a textual description of the device. This description usually includes the
full name of the device, the version number of the system’s hardware type, the
software operating-system, and networking software.
IP Address
Displays the device’s IP (Internet Protocol) Address; this will be the IP address
used to define the device icon. IP addresses are assigned via Local Management
for the SNMP device; they cannot be changed via NetSight Element Manager.
MAC Address
Displays t he manufac turer-set MAC a ddress associated with the IP address used
to define the device icon created via NetSight Element Manager. This address is
factory-set and cannot be altered.
Using Window Buttons
The Cancel button that appears at the bottom of most windows allows you to exit
a window and terminate any unsaved changes you have made. You may also
have to use this button to close a window after you have made any necessary
changes and set them by clicking on an OK, Set, or Apply button.
1-8Software Conventions
An OK, Set, or Apply button appears in windows that have configurable values;
it allows you to confirm and SET changes you have made to those values. In some
windows, you may have to use this button to confirm each individual set; in other
windows, you can set several values at once and confirm the sets with one click
on the button.
The Help button brings up a Help window with information specific to the
current window. For more information, see Getting Help, page 1-9.
The command buttons, for example Bridge, launch a menu listing the windows,
or commands available for that topic.
Any menu topic followed by … (three dots)—for example Statistics…— launches
a window associated with that selection.
Getting Help
This section describes different methods of getting help for questions or concerns
you may have while using NetSight Element Manager.
Introduction
Using On-line Help
You can use the Generic SNMP window Help buttons to obtain information
specific to the device. When you click on a Help button, a window will appear
which contains context-sensitive on- screen docume ntation that will assist you in
the use of the windows and their associated command and menu options. Note
that if a Help button is grayed out, on-line help has not yet been implemented for
the associated window.
All of the online help windows use the Microsoft Windows help facility. If you are
NOTE
unfamiliar with this feature of Windows, you can select Help from the Windows Start
menu, or Help —> How to Use Help from the primary NetSight Element Manager
window.
Accessing On-line Documentation
The complete suite of documents available for NetSight Element Manager can be
accessed via a menu option from the primary window menu bar:
Help —> Online Documents. If you installed the documentation component,
selecting this option will launch A dob e’s Acrobat Reader and a menu file which
provides links to all other available documents.
If you have not yet installed the docu mentation, the Online Documents option will not
TIP
Getting Help1-9
be able to access the menu file; in order to activate this option, you must run setup.exe
again to install the documentation component. See the Installation Guide for details.
Introduction
Getting Help from the Global Technical Assistance Center
If you need technical support related to NetSight Element Manager, contact the
Global Technical Assista nce Center via one of the following methods:
By phone: (603) 332-9400
24 hours a day, 365 days a year
By fax:(603) 337-3075
By mail:Enterasys
Technical Support
35 Industrial Way
Rochester, NH 03867
By e-mail:support@enterasys.com
FTP:ftp.ctron.com (134.141.197.25)
Loginanonymous
Passwordyour email address
By BBS:(603) 335-3358
Modem Setting8N1: 8 data bits, 1 stop bit, No parity
Send your questions, comments, an d suggestions regarding NetSight
documentation to NetSight Technical Communications via the following e-mail
address:
Netsight_docs@enterasys.com
To locate product specific information, refer to the Enterasys Web site at the
following address:
http://www.enterasys.com
1-10Getting Help
System Group
The System Group window; using the Other Groups menu
The System Group window provides basic information about the type of device
currently being monitored, including the System Object ID and Uptime, as well as
administrative information, including the device’s name, location, contact person,
and the level of Open Systems Interconnection (OSI) services. You can access all
other Generic SNMP windows from the System Group window.
To open the System Group window from the Device View or Chassis View
window of any SNM P -compliant device:
Chapter 2
1. Select Device—>System Group in the Chassis View or Device View menu
bar. The System Group window as shown in, Figure 2-1, opens.
Figure 2-1. System Group Window
2-1
System Group
The System Group window displays the following fields:
Object ID
Displays the unique identifier of the device being managed. This value is
allocated within the SMI enterprises subtree (1.3.6.1.4.1).
Uptime
Displays the amount of time that the device has been running since the network
management portion of the system was last initialized. This is converted from
hundredths of a second (as stored in the device MIB) into a more useful days,
HH:MM:SS format.
Contact
Displays a text field which you can use to enter the name and/or telephone
number of the person responsible for the device.
Name
Displays a text field which you can use to assign a name for the device.
Location
Displays a text field which you can use to describe the node’s physical location.
Services
Displays the level of OSI (Open Systems Interconnection) services supported by
the device, examples of which are given in Figure 2-2.
Physical Layer……………………………….e.g. repeaters
Datalink/Subnetwork Layer………………e.g. bridges
Internet Layer…………………………..e.g. IP gateways
End-to-end Layer…………………………….e.g. IP hosts
Applications Layer……………………..e.g. mail relays
Figure 2-2. Examples of OSI Service Layers
Modifying the System Group Administrative Fields
If your device’s firmware supports MIB II, you can modify the Contact, Name,
and Location fields.
1. To modify the Contact field:
a. Click the I-bar cursor ( ) to the right of the Contact field. The Contact
text box opens, Figure 2-3.
2-2Modifying the System Group Administrative Fields
System Group
Figure 2-3. Contact Text Box
b. Type in the new contact information in the text box; then click on OK.
2. To modify the Name field:
a. Click the I-bar cursor ( ) to the right of the Name field. The Name text
box opens, Figure 2-4.
Figure 2-4. Name Text Box
b. Type in the new name in the text box; then click on OK.
3. To modify the location field:
a. Click on the I-bar cursor ( ) to the right of the Location field. The
Location text box opens, Figure 2-5.
Figure 2-5. Location Text Box
b. Type in the new location in the text box; then click on OK.
Using the Other Groups Menu
The Other Groups button displays a menu ( Figure 2-6), which lets you se lect
other Generic SNMP windows supported by the device.
Modifying the System Group Administrative Fields2-3
System Group
Figure 2-6. Other Group Menu
To access the Other Groups drop-down menu via the System Group win dow:
1. Click on the Other Groups button. The Other Groups drop-down menu
displays, as shown in Figure 2-6. Non-supported options will be grayed-out.
2. Click on the desired option. The appropriate window opens.
2-4Modifying the System Group Administrative Fields
Viewing the Interface Group
Viewing interface statistics; using the Admin/Status option and the Last Change field
The Interface Group window displays statistics for each interface on the device.
The port type is displayed for each interface along with the statistics associated
with that interface. Use the scroll bar to display the other available interfaces; the
interface number and the total number of interfaces on the device are displayed
above the scroll bar (e.g., 1 of 27).
Statistics are gathered for network activity levels occurring at the physical and
data-link layers. These statistics reflect the following types of packets being
transmitted and received:
Chapter 3
•Unicasts
•Multicasts
•Discarded Packets
•Error Packets
•Received Packets with unknown protocols
•Packets waiting to be transmitted
•Bytes
To open the Interface Group window from the System Group window:
1. Click on the Other Groups button. The Other Groups drop-down menu
displays.
2. Click on Interface Group. The Interface Group window, Figure 3-1, opens.
3-1
Viewing the Interface Group
Figure 3-1. Interface Group Window
The following fields are non-statistical interface descriptions fields:
Address
The interface’s physical address (ifPhysAddr) at the protocol layer immediately
below the network layer in the protocol stack. For interfaces which do not have
such an address (e.g., a serial line), this object should contain an octet string of
zero length.
Interface Type
The type of interface (ifType), distingui shed a ccording to the physical/link
protocol(s) immediately below the network layer in the protocol stack. MIB-II
defines 32 different interface types, including ethernet-csmacd, fddi,
iso88025-tokenRing, and softwareLoopBack.
MTU (Maximum Transfer Unit)
The size of the largest datagram which can be transmitted or received on the
interface (specified in octets), according to the ifMtu. For interfaces that are used
for transmitting network datagrams, this is the size of the largest network
datagram that can be sent on the interface. Frames that exceed the MTU are
discarded.
Speed
An estimate of the interface’s current bandwidth in bits per second, according to
the ifSpeed. For interfaces which do not vary in bandwidth or for those where no
accurate estimation can be made, this object should contain the nominal
bandwidth.
3-2
Loading...
+ 56 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.