Nortel Networks 5399, 8000 User Manual

Version 8.0
Part No. 300861-C Rev. 00 December 1999
4401 Great America Parkway Santa Clara, CA 95054
Nortel Networks 5399 and 8000 Access Switch SNMP MIB Reference
Copyright © 1999 Nortel Networks
All rights reserved. Printed inthe USA. December 1999. The information in this document is subject to change without notice. The statements,configurations, technical data,
and recommendations in this document are believedto be accurate and reliable, but are presented without express or implied warranty.Usersmust take full responsibility for theirapplications of any products specified in this document. The information in this document is proprietaryto Nortel Networks NA Inc.
The software described in this documentis furnished under a license agreement and may only be used in accordance with the terms of that license. A summary of the Software License is included in this document.
Trademarks
NORTEL NETWORKS i s a trademark of Nortel Networks. Bay Ne tworks, ACE, AFN, AN, BCN, BLN, BN, BNX, CN, FRE, LN, Optivity,Optivity Policy Services, and PPX
are registered trademarks and Advanced Remote Node, ANH, ARN, ASN, BayRS, BaySecure, BayStack, BayStream, BCC, BCNX, BLNX, Centillion, EtherSpeed, FN, IP AutoLearn,Passport, SN, SPEX, Switch Node, System 5000, and TokenSpeed are trademarksof Nortel Networks.
Microsoft, Windows, and Windows NT are registered trademarks of Microsoft Corporation. All other trademarks and registered trademarks are the property of their respective owners.
Restricted Rights Legend
Use, duplication,or disclosure by the United States Government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS252.227-7013.
Notwithstanding any other l icense agreement that may pertain to, or accompany the delivery of, this computer software, the rights of the United States Government regarding its use, reproduction,and disclosureare as set forth in the Commercial Computer Software-Restricted Rights clause at FAR 52.227-19.
In the interest of improving internaldesign,operational function, and/or reliability, Nortel Networks NA Inc. reserves the right to make changes to the productsdescribed in this documentwithout notice.
Nortel Networks NA Inc. does not assume any liability that may occur due to the use or application of the product(s) or circuit layout(s) described herein.
Portionsof the code in this software product may be Copyright © 1988, Regents of the University of California. All rights reserved. Redistribution and use in source and binary forms of such portions are permitted, provided that the above copyrightnotice and this paragraph are duplicated in all such forms and that any documentation, advertising materials, and other materialsrelated to such distribution and use acknowledge that such portionsof the softwarewere developed by the University of California, Berkeley.The name of the Universitymay not be used to endorse or promote products derived from such portions of the software without specific prior written permission.
SUCH PORTIONS OF THE SOFTWARE ARE PROVIDED “AS IS” A ND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
In addition, the program and information contained herein are licensedonly pursuant to a license agreement that containsrestrictions on use and disclosure (that may incorporate by referencecertain limitations and notices imposed by third parties).
Nortel Networks NA Inc. S of tware License Agreement
NOTICE: Please carefullyread this license agreementbefore copying or using the accompanyingsoftware or installing the hardware unit with pre-enabled software (each of which is referredto as “Software” in this Agreement). BY COPYING OR USING THE SOFTWARE, YOU ACCEPT ALL OF THE TERMS AND CONDITIONS OF THIS LICENSE AGREEMENT. THE TERMS EXPRESSED IN T HI S AGREEMENT ARE THE ONLY TERMS UNDER WHICH NORTEL NETWORKS WILL PERMIT YOU TO USE THE SOFTWARE. If you do not accept
these terms and conditions, return the product,unused and in the original shipping container, within 30 days of purchase to obtain a credit for the full purchase price.
1. License Grant. Nortel Networks NA Inc. (“Nortel Networks”) grants the end user of the Software (“Licensee”) a personal, nonexclusive, nontransferable license:a) to use the Software eitheron a single computer or,if applicable, on a single authorized device identified by host ID, for which it was originally acquired; b) to copy the Software solely for backup purposes in support of authorized use of the Software; and c) to use and copy the associated user manual solelyin support of authorizeduseof the Softwareby Licensee.This licenseapplies to the Softwareonlyanddoes not extend to Nortel Networks Agent software or other Nortel Networks software products. Nortel Networks Agent software or other Nortel Networkssoftware products are licensed for use under the terms of the applicable Nortel NetworksNAInc. SoftwareLicense Agreement that accompaniessuchsoftware and upon payment by the end user of the applicable licensefees for such software.
2. Restrictions on use; reservation of rights. The Software and user manuals are protected under copyright laws. Nortel Networks and/or its licensors retain all title and ownership in both the Software and user manuals, including any revisionsmade by Nortel Networks or its licensors. The copyright notice must be reproduced and included with any copy of any portion of the Software or user manuals.Licensee may not modify,translate, decompile, disassemble, use for any competitive analysis, reverse engineer, distribute, or createderivative works from the Software or user manuals or any copy, in whole or in part. Except as expressly providedin this Agreement, Licensee may not copy or transfer the Software or user manuals,in whole or in part. The Software and user manuals embody NortelNetworks’ and its licensors’ confidential and proprietary intellectualproperty.Licensee shall not sublicense, assign, or otherwise disclose to any third party the Software, or any information about the operation, design, performance, or implementation of the Software and user manuals that is confidential to Nortel Networksand its licensors; however, Licenseemay grant permission to its consultants, subcontractors, and agentsto use the Software at Licensee’s facility, provided theyhave agreed to use the Software only in accordancewith the terms of this license.
3. Limited warranty. Nortel Networks warrants each item of Software, as delivered by Nortel Networks and properly installed and operated on Nortel Networkshardwareor other equipment it is originally licensedfor, to function substantially as described in its accompanying user manual during its warranty period, which begins on the date Software is firstshippedto Licensee. If any itemof Softwarefailstoso functionduringitswarranty period, as the sole remedyNortelNetworks will at its discretionprovide a suitablefix, patch, or workaround for the problemthat may be included in a future Softwarerelease. Nortel Networks further warrants to Licensee that the media on which the Software is providedwill be free from defectsin materialsand workmanship under normal use for a period of 90 days from the date Softwareis first shipped to Licensee. Nortel Networks will replace defective media at no chargeif it is returned to Nortel Networks during the warranty period along with proof of the date of shipment. This warranty does not apply if the media has been damaged as a resultof accident, misuse, or abuse.The Licensee assumes all responsibility for selection of the Software to achieve Licensee’s intended results and for the installation,use, and resultsobtained from the Software. Nortel Networks does not warrant a) that the functions contained in the software will meet the Licensee’s requirements,b) that the Software will operate in the hardware or software combinationsthat the Licensee may select,c) that the operation of the Software will be uninterrupted or error free, or d) that all defects in the operationof the Softwarewill be corrected. NortelNetworksis not obligatedto remedyany Software defect that cannot be reproduced with the latest Software release. These warranties do not apply to the Software if it has been ( i) altered, exceptby Nortel Networks or in accordance with its instructions; (ii) used in conjunction with another vendor’s product, resulting in the defect;or (iii) damagedby improper environment, abuse, misuse, accident, or negligence. THE FOREGOING WARRANTIES AND LIMITATIONS ARE EXCLUSIVE REMEDIES AND ARE IN LIEU OF ALL OTHER WARRANTIES EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION ANY WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Licensee is r esponsible for the security of its own data and information and for maintaining adequate procedures apart from the Software to reconstruct lost or altered files, data, or programs.
4. Limitation of liability. IN NO EVENT WILL N ORTEL NETWORKS OR ITS LICENSORS BE LIABLE FOR ANY COST OF SUBSTITUTE PROCUREMENT; SPECIAL, INDIRECT,INCIDENTAL, OR CONSEQUENTIAL DAMAGES; OR ANY DAMAGES RESULTING FROM INACCURATE OR LOST DATA OR LOSS OF USE OR PROFITS ARISING OUT OF OR IN CONNECTION WITH THE PERFORMANCE OF THE SOFTWARE, EVEN IF NORTEL NETWORKS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. IN NO EVENT
300861-C Rev.00 iii
SHALL THE LIABILITY OF NORTEL NETWORKS RELATING TO THE SOFTWARE OR THIS AGREEMENT EXCEED THE PRICE PAID TO NORTEL NETWORKS FOR THE SOFTWARE LICENSE.
5. Government Licensees. This provision applies to all Software and documentationacquired directly or indirectly by or on behalf of the United States Government.The Softwareand documentation are commercial products,licensed on the open market at market prices, and were developed entirely at private expense and without the use of any U.S. Government funds. The license to the U.S. Government is granted only with restricted rights, and use, duplication,or disclosure by the U.S. Governmentis subject to the restrictionsset forth in subparagraph(c)(1)of the Commercial Computer Software––Restricted Rights clause of FAR 52.227-19 and the limitations set out in this licensefor civilian agencies, and subparagraph(c)(1)(ii) of the Rights in Technical Data and Computer Software clause of DFARS
252.227-7013, for agencies of the Departmentof Defense or their successors, whichever is applicable.
6. Use of Software in the European Community.This provision applies to all Softwareacquired for use within the European Community. If Licensee uses the Software within a country in the European Community, the Software Directive enacted by the Council of European Communities Directive dated 14 May, 1991, will apply to the examination of the Software to facilitate interoperability. Licensee agrees to notify Nortel Networksof any such intended examination of the Software and may procure support and assistance from Nortel Networks.
7. Termand termination. This license is effective until terminated; however, all of the restrictions with respect to NortelNetworks’ copyrightin the Softwareand user manuals will cease being effective at the date of expiration of the Nortel Networks copyright; those restrictions relating to use and disclosureof Nortel Networks’ confidential information shall continue in effect. Licensee may terminate this license at any time. The license will automatically terminate if Licensee fails to complywith any of the terms and conditions of the license. Upon terminationfor any reason, Licensee will immediately destroyor return to Nortel Networksthe Software, user manuals, and all copies. Nortel Networks is not liable to Licenseefor damages in any form solely by reason of the terminationof this license.
8. Export and Re-export. Licensee agrees not to export, directly or indirectly, the Software or related technical data or information without first obtaininganyrequired export licensesor other governmental approvals.Without limiting the foregoing,Licensee, on behalf of itself and its subsidiaries and affiliates,agreesthat it will not, without first obtainingall export licenses and approvals required by the U.S. Government: (i) export, re-export, transfer, or divert any such Software or technicaldata, or any direct product thereof, to any country to which such exports or re-exports are restricted or embargoed under United States export control laws and regulations, or to any nationalor resident of such restrictedor embargoed countries; or (ii) provide the Software or related technical data or information to any militaryend user or for any military end use, including the design, development, or productionof any chemical, nuclear, or biologicalweapons.
9. General. If any provision of this Agreement is held to be invalid or unenforceable by a court of competent jurisdiction, the remainder of the provisions of this Agreement shall remain in full force and effect. This Agreement will be governed by the laws of the state of California.
Should you have any questions concerning this Agreement, contact Nortel Networks,4401 Great America Parkway, P.O. Box 58185, Santa Clara, California 95054-8185.
LICENSEE ACKNOWLEDGES THAT LICENSEE HAS READ THIS AGREEMENT, UNDERSTANDS IT, AND AGREES TO BE BOUND BY ITS TERMS AND CONDITIONS. LICENSEE FURTHER AGREES THAT THIS AGREEMENT IS THE ENTIRE AND EXCLUSIVE AGREEMENT BETWEEN NORTEL NETWORKS AND LICENSEE, WHICH SUPERSEDES ALL PRIOR ORAL AND WRITTEN AGREEMENTS AND COMMUNICATIONS BETWEEN THE PARTIES PERTAINING TO THE SUBJECT MATTER OF THIS AGREEMENT. NO DIFFERENT OR ADDITIONAL TERMS WILL BE ENFORCEABLE AGAINST NORTEL NETWORKS UNLESS NORTEL NETWORKS GIVES ITS EXPRESS WRITTEN CONSENT, INCLUDING AN EXPRESS WAIVEROF THE TERMS OF THIS AGREEMENT.

Contents

Preface
Before You Begin .............................................................................................................. ix
Text Conventions ...............................................................................................................x
Acronyms ..........................................................................................................................xii
Hard-Copy Tec hnical Manuals . ........................................................................................ x ii i
How to Get Help ..............................................................................................................xiii
Chapter 1 Simple Network Management Protocol (SNMP)
SNMP Overview .............................................................................................................1-1
SNMP Commands .......................................................................................................... 1-2
Using SNMP set to Send Commands to the RAC ...................................................1-3
Internet Group Management Protocol (IGMP) .........................................................1-3
Chapter 2 Configuring the RAC for SNMP
Configuring the SNMP Agent . . .......................................................................................2-1
Defining the Community String ................................................................................ 2-3
Defining Trap Hosts and Traps .................................................................................2-4
Defining the Contact String ......................................................................................2-5
Defining the Location String ..................................................................................... 2-5
Defining the disabled_modules Parameter ..............................................................2-5
Defining the allow_snmp_sets Parameter ................................................................2-6
Configuring BootP Relay ..........................................................................................2-6
Chapter 3 Private MIBs and Standard MIB Support
StandardRFC MIBs .......................................................................................................3-1
MIB Object Hierarchy ......................................................................................................3-2
Understanding MIB Objec ts ............................................................................................3-3
300861-C Rev.00 v
Restrictions on Standard MIBs .......................................................................................3-3
RFC 1213 MIB-II Restrictions ..................................................................................3-3
RFC 1243 AppleTalk MIB Restrictions .....................................................................3-4
RFC 1643 Ethernet MIB Res trictions .......................................................................3-5
RFC 1724 RIP V2 MIB Restri ctions .........................................................................3-6
RFC 1406 DS1 MIB Restrictions .............................................................................3-6
Private Enterprise MIBs .................................................................................................. 3-7
Location of Private MIB Files ................................................................................... 3-7
Private MIB Filenames .............................................................................................3-7
Chapter 4 Call Management
Active Call Statistics .......................................................................................................4-1
Active Modem Calls .................................................................................................4-2
Active MP Calls ........................................................................................................4-2
Port Action Table ......................................................................................................4-2
Call History Statistics ......................................................................................................4-3
Modem Call History Statistics .................................................................................. 4-3
MP Call History Statistics .........................................................................................4-4
Internet Group Management Protocol (IGMP) ................................................................4-4
Modem MIBs ..................................................................................................................4-4
Modem Identification ................................................................................................4-4
Modem Control .........................................................................................................4-4
Modem Statistics ......................................................................................................4-5
WANStatistics ................................................................................................................4-5
Chapter 5 Error Handling
Error Counters ................................................................................................................5-1
Thresholds ......................................................................................................................5-4
PPP Trace-to-Syslog ......................................................................................................5-5
Trap Configuration .......................................................................................................... 5-6
Proprietary Traps ......................................................................................................5-7
Chapter 6 Troubleshooting
Index

Tables

Table 1-1. Supported SNMP Commands .................................................................1-2
Table 2-1. Supported Standard SNMP Traps ...........................................................2-5
Table 3-1. Standard MIBs Supp orted by the RAC ....................................................3-2
Table 3-2. RFC 1213 MIB-II Objects .........................................................................3-4
Table 3-3. RFC 1243 AppleTalk ................................................................................ 3-5
Table 3-4. RFC 1643 Ethernet MIB Objects .............................................................3-6
Table 3-5. RFC 1724 RIP V2 MIB Objects ................................................................3-6
Table 3-6. RFC 1406 DS1 MIB Objects ....................................................................3-7
Table 3-7. Private MIB Filenames . ............................................................................3-8
Table 3-8. Prefixes for MIB Object Names Related to the RAC ................................3-9
Table 5-1. Current Error Counter MIBs .....................................................................5-2
Table 5-2. Interval Error Counter M IBs .....................................................................5-3
Table 5-3. Total Error Counter MIBs .........................................................................5-4
Table 5-4. Threshold MIBs ........................................................................................ 5-5
Table 5-5. Proprietary Traps .....................................................................................5-7
300861-C Rev.00 vii
If you are responsible for developing custom applications for configuring or managing a Nortel Networks 5399 Access Switch or 8000 Access Switch (formerly known as Model 5399 and Model 8000 Remote Access Concentrator (RAC)) using SNMP, you need to read this guide.
Note: The Access S witch product na me appears only on the title page.
Whenever the term Remote Access C oncentrator (RAC) appears in this document, it refers to the Nortel Networks 5399 or 8000 Access Switch.

Before You Begin

This guide is intended for network administrators and assumes that you have:

Preface

Basic familiarity with network administration
An understanding of the basic concepts of Integrated Services Digital Network (ISDN) and C hannelized T1/E1.
300861-C Rev.00 ix
Nortel Networks 5399 and 8000 Access Switch SNMP MIB Reference

Text Conventions

This guide uses the following text c onventions:
angle brackets (< >) Indicate that you choose the text to enter based on the
description inside the brackets. Do not type the brackets when entering the command. Example: If the command syntax is:
ping <
ip_address
ping 192.32.10.12
>, you enter:
bold text
Indicates command names and options and text that you need to enter. Example: Enter show ip {al erts | routes}. Example: Use the dinfo command.
braces ({}) Indicate required elements in syntax descriptions
where there is more than one option. You must choose only one of the options. Do not type the braces when entering the command. Example: If the command syntax is:
show ip {alerts | routes}, you must enter either: show ip alerts or show ip routes, but not both.
brackets ([ ]) Indicate optional elements in syntax descriptions. Do
not type the brackets when entering the command. Example: If the command syntax is:
show ip interfaces [-alerts], you can enter either: show ip interfaces or show ip interfaces -alerts.
Preface
ellipsis points (...) Indicate that you re peat the last element of the
command as needed. Example: If the command syntax is:
ethernet/2/1 [< ethernet/2/1 and as many parameter-value pairs as
parameter><value
>] ..., you enter
needed.
italic text Indicates file a nd directory names, new terms, book
titles, and variables in command syntax descriptions. Where a variable is two or more words, the words are connected by an underscore. Example: If the command syntax is:
show at <
valid_route
valid_route
>
is one variable and you substitute one value
for it.
screen text
Indicates system output, for example, prompts and system messages.
Example: Set Trap Monitor Filters
separator ( > ) Shows menu paths.
Example: Protocols > IP identifies the IP optionon the Protocols menu.
vertical line (
| ) Separates choices for command keywords and
arguments. Enter only one of the choices. Do not type the vertical line when e ntering the command. Example: If the command syntax is:
show ip {alerts | routes}, you enter either: show ip alerts or show ip routes, but not both.
300861-C Rev.00 xi
Nortel Networks 5399 and 8000 Access Switch SNMP MIB Reference

Acronyms

This guide uses the following acronyms:
AUI attachment unit interface BootP Bootstrap Protocol BRI basic rate interface CSMA/CD carrier sense multiple access/collision detection DLCMI Data Link Control Management Interface HDLC High-level Data Link Control HTTP Hypertext Transfer Protocol IGMP Internet Group Management Protocol IP Internet P rotocol ISDN Integrated Services Digital Network ISO International Organization for Standardization ITU-T International Telecommunication
Union-Telecommunication Standardization Sector
(formerly CCITT) MAC media access control MAU media access unit MDI-X medium dependent interface crossover NBMA nonbroadcast multi-access OSPF Open Shortest Path First PPP Point-to-Point Protocol RAC Remote Access Concentrator RADIUS Remote Authentication Dial-In User Service SMDS Switched Multimegabit Data Service SNMP Simple Network Management Protocol STP shielded twisted pair TPE twisted pair Ethernet WAN Wide Area Network

Hard-Copy Technical Manuals

You can print selected technical manuals and release notes free, directly from the Internet. Go to support.baynetworks.com/library/tpubs/. Find the product for which you need documentation. Then locate the specific category and model or versionfor your hardware or software product. Using Adobe Acrobat Reader,you can open the manuals and release notes, search for the sections you need, and print them on m ost standard printers. You can download Acrobat Reader free from the Adobe Systems Web site, www.adobe.com.
You can purchase selected documentation sets, CDs, a nd technical publications through the collateral catalog. The catalog is located on the World Wide We b at
support.baynetworks.com/catalog.html a nd is divided into sections arranged
alphabetically:
The “CD ROMs” section lists available CDs.
The “Guides/Books” section lists books on technical topics.
The “Technical Manuals” section lists available printed documentation sets.

How to Get Help

Preface
If you purchased a service contract for your Nortel Networks product from a distributor or authorized r eseller, contact the technical support staff for that distributor or reseller for assistance.
If you purchased a Nortel Networks service program, contact one of the following Nortel Networks Technical Solutions Centers:
Technical Solutions Center Telephone Number
Billerica, MA 800-2LANWAN (800-252-6926) Santa Clara, CA 800-2LANWAN (800-252-6926) Valbonne, France 33-4-92-96-69-68 Sydney, Australia 61-2-9927-8800 Tokyo, Japan 81-3-5402-7041
300861-C Rev.00 xiii
Simple Network Management Protocol (SNMP)
This chapter describes the Simple Network Management Protocol (SNMP) and the SNMP a gent provided by the RAC. This chapter includes the following sections:
SNMP Protocol Overview
SNMP Commands

SNMP Overview

SNMP provides an alternative means of managing the RAC. SNMP ope rates over the UDP (Unreliable Datagram Protocol), which is part of the TCP/IP protocol suite.
Chapter 1
The Structure of M anagement Information (SMI), defined in RFC 1155, is a framework that describes what kinds of information can be manipulated using SNMP. Using SMI, objects are placed as nodes in an object tree. The object tree groups logically related objects into subtrees. Ea ch of these subtrees is called a MIB (Management Information Base).
MIBs located on the SNMP Network Management S tation describe the information that is relayed from the agents.
The SNMP network management station or application can send queries to the SNMP a gent located in each RAC.
Each SNMP agent c ollects information about its RAC and provides that information to the Network Management Station. The agent process acts as a server in a typical client-server model.
300861-C Rev.00 1-1

SNMP Commands

The SNMP a gent software in the RAC supports the SNMP commands get, get-next, set,andtrap a s defined in RFC 1157. Table 1-1 describes these
commands.
Table 1-1. Supported SNMP Commands
Action Description
get Retrieves the value of a specific object from one of the supported
get-next Traverses the MIB tree to retrieve the next object’s management
set Modifies the values of MIB objects. The RAC pri vate enterprise
trap Asynchronously reports significant events.
Nortel Networks 5399 and 8000 Access Switch SNMP MIB Reference
MIBs.
information.
MIB and several objects in the standard MIBs allow you to configure the RAC from an SNMP management stationon the network rather than using the na utility or CLI admin command.
When the allow_snmp_sets parameter is e nabled, the RAC accepts SNMP set commands from IP host addresses and communities that have read-write access permissions. W hen disabled, the RAC rejects all SNMP set commands; the RAC SNMPagentreturns the error no such name for the first object in the set command (for more details, see allow_snmp_sets in the Nortel Networks 5399 and 8000 Access Switch Software Reference).
SNMP version 1 is not a secure protocol. SNMP bypasses the RAC’s security measures. If security is a concern, the administrator should consider taking the following security measures:
Definethe community strings for specificIP addresses with read-write access.
Disable all other SNMP access by defining none or read-only access.
Institute filters on any firewall router to block SNMP traffic from outside the local network. This is good practice in all cases, not just concerning the RAC.
The specifics of using the SNMP commands depend on the management station (see your SNMP management station documentation). The MIB definitions in the files provided in the directory /annex_root/src/snmp must be c ompiled and included in your m anagement station database before you can manage the RAC using SNMP.
1-2 300861-C Rev. 00
Simple Network Management Protocol (SNMP)

Using SNMP set to Send Commands to the RAC

The private enterprise MIB objects allow you to change the configuration of the RAC.
Note: For some objects, the configuration changes do not take effect until the
RAC is rebooted.
Using the SNMP set command, you can broadcast a message, reseta port or subsystem, a nd reboot the RAC.
To broadcast a message, use SNMP set to write the message to the MIB object anxcBcastMsg and then set the broadcast type to the MIB object anxcBcast.
To reset a R AC subsystem, use SNMP set to write the desired type (all, macros, motd, nameserver, security) to the MIB object anxcReset.
To reset the RAC, use SNMP set to write the desired value to the MIB object anxcReset.
To reset a single internal m odem, use SNMP set to write a value to mdmCtlReset.
To reboot the RAC, set the desired image name using the MIB object
anxcBootImage and set any boot warning m essage using the MIB object anxcBootMsg. For a delayed boot, set the boot time using the MIB object anxcBootTime. Then set the boot type using the MIB object anxcBoot.
Note: To change the RAC’s configuration using set, SNMP must be enabled
at boot time. M ake sure the argument snmp is not disabled in the disabled_modules parameter. For more details, see disabled_modulesin the
Nortel Networks 5399 and 8000 Access Switch Software Reference). You cannot c onfigure filters through SNMP.

Internet Group Management Protocol (IGMP)

There are two IGMP limitation configuration parameters available f or the administrator. The use of the parameters allow an increase or a limit on the number of pending IGMP events and multicast packets for total num ber of IGMP events and packets proc essed by the system. Refer to the N ortel Networks 5399
and 8000 Access Switch SoftwareReference.
300861-C Rev.00 1-3
Loading...
+ 37 hidden pages