beautypg.com

Cabletron Systems SEHI-22/24 User Manual

Page 8

background image

Introduction to SPMA for the SEHI-22/24 and SEHI-32/34

1-2

Using the SEHI User’s Guide

applications can be accessed from the icon menu (if you are using a management
platform) and from the command line (if you are running in stand-alone mode);
in addition, several applications can also be accessed from within the Hub View, a
graphical display of the SEHI and its ports.

The

SEHI User’s Guide

describes how to use many of the applications included

with the module; note that the instructions provided in this guide apply to the
SEHI regardless of the operating system or management platform you are using.
Instructions for launching each individual function from the command line
(stand-alone mode) are also included in each chapter.

Following is a description of the applications described in this guide; while we
provide as much background information as we can, we do assume that you’re
familiar with Ethernet networks and general network management concepts:

Chapter 1,

Introduction to SPMA for the SEHI-22/24 and SEHI-32/34

,

describes the

SEHI User’s Guide

and the conventions used in this and other

SPMA manuals, explains where to find information about the SEHI, and tells
you how to contact Cabletron Systems Technical Support.

Chapter 2,

Using the SEHI Hub View

, describes the visual display of the Hub

and explains how to use the mouse within the Hub View; the operation of
some basic functions available only from within the Hub View (changing the
Hub View display, opening menus and windows, enabling and disabling
ports, checking device and port status, and so on) are also described.

Chapter 3,

Link/Seg Traps

, describes how to configure link and segmentation

traps to suit your management needs. You can access the Link/Seg Traps
application from the icon menu, the Hub View, or the command line.

Chapter 4,

Redundancy

, describes how to configure redundant circuits to keep

your network connections up and running in the event of a single port’s
failure. You can access the Redundancy application from the icon menu, the
Hub View, or the command line.

Chapter 5,

Source Address

, describes how to display the Source Address List,

how to set the ageing time, and how to configure source address traps; it also
discusses the effects of source address locking. You can access the Source
Address application from the icon menu, the Hub View, or the command line.

Chapter 6,

Security

, describes how to configure intruder protection for all

MIMs installed in the SEHI-controlled hubstack, and how to configure
eavesdropper protection for any installed

LANVIEW

SECURE

hubs. You can

access the Security application from the icon menu, the Hub View, or the
command line.

Appendix A,

SEHI MIB Components

, lists the IETF MIBs supported by the

SEHI, and describes their arrangement in a series of MIB components. A
description of the objects controlled by each component is also included.

This manual is related to the following products: