beautypg.com

Frame status breakdown, Error breakdown, Using port locking and unlocking – Enterasys Networks 6000 User Manual

Page 176: Using port locking and unlocking -13

background image

Repeater Statistics

5-13

Managing Ethernet MicroLAN Modules

Frame Status Breakdown

With the Detail Breakdown window, you can see the status of the frames passing through
your each repeater channel and each board and port. The status conditions and
corresponding colors (for both the pie chart and numerical statistics) are:

Good (Green)

Total Errors (Red)

Collisions (Blue)

Error Breakdown

The Detail Breakdown window also displays the number of error packets received by a
repeater, board, or port. You can view both numerical statistics and a pie chart breakdown
for the following errors (note the corresponding colors):

Alignment (Green)

CRC (Red)

Runts (Blue)

Giants (Magenta)

OOW Colls (Maroon)

Using Port Locking and Unlocking

The Port Locking feature enables an Ethernet MicroLAN module to prevent any new
source addresses from accessing the ports connected to the selected repeater channel. The
Lock/Unlock Ports option is available from the Repeater menu in the Device View for the
Ethernet MicroLAN module.

When a source address attempts to access a port, the module will compare that address to
those in the Source Address Database for that port. If the port has been successfully locked
and the detected address has not been secured, the port will automatically shut down, no
traffic will be allowed through, and a trap will be sent to the management station (if traps
have been enabled and the Trap Table has been properly configured). Whether a port can
be successfully locked and how its addresses are “secured” depends both on the number of
source addresses in each port’s table at the time locking was enabled, and on the version of
firmware currently running on the selected device.

For older firmware versions:

For station ports (those detecting zero, one, or two source addresses at the time
locking was enabled), the first two detected addresses are automatically secured; port
locking will shut down the port if any additional addresses attempt access.

For trunk ports (those detecting three or more source addresses at the time locking
was enabled) there is no port shut-down security feature; if port locking is enabled, all
packets will continue to be allowed to pass.