beautypg.com

Enterasys Networks 700 User Manual

Page 151

background image

Viewing FDDI Information

5-7

FDDI Management

The following table summarizes the FDDI connection rules:

V —valid connection
X —illegal connection
U —undesirable (but legal) connection; this requires that SMT is notified.
P —valid, but when both A and B are connected to M ports (a dual-homing

configuration), only the B connection is used.

Each SMT entity maintains its own connection policy; however, when two
interfaces attempt to connect, their combined established connection policies
dictate the connections that will be allowed. In an attempted connection between
two nodes, the most lenient policy will determine whether the connection (as long
as it is legal) can be made. For example, if two FDDI nodes attempt an A—>A
connection, and this connection is not allowed at one FDDI node but allowed at
the other, the connection would be accepted. If the connection policy at both
nodes disallows the connection, the connection will be rejected.

This is a read-only window; you currently cannot edit the DELHF-UA’s
connection policy via NetSight Element Manager.

Table 5-1. FDDI Connection Rules

A

B

S

M

A

V, U

V

V, U

V, P

B

V

V, U

V, U

V, P

S

V, U

V, U

V

V

M

V

V

V

X

!

CAUTION

Though technically legal under FDDI connection rules, undesirable connections will
cause a twisted or wrapped ring.