Glossary
480
CoreWatch User’s Manual
•
Define flows that act as templates for some IP and IPX packet fields.
•
Assign a precedence to the fields of the flows you define.
•
Establish queuing policies to specify how the SSR handles the different traffic
priorities.
Requests for Comments (RFCs)
Notes about the Internet that discuss a variety of topics regarding computing and
computer communication. RFCs typically focus on networking protocols, concepts,
procedures, and programs.
Reverse Path Forwarding (RPF)
Routing technique that finds the next neighbor by determining which router send the SSR
the packet.
RIP Peer
Routers from which the SSR has received a valid RIP update within the last 180 seconds.
Root Bridge
Bridge that forms the root of a bridged LAN. Root bridges use STP to prevent loops by
periodically exchanging topology information with other bridges.
Routing Information Protocol (RIP)
Distance-vector routing protocol that selects the route with the lowest metric as the best
route. The metric is a hop count representing the number of gateways through which data
must pass in order to reach its destination. The longest path that RIP accepts is 15 hops.
Schematic View
The Schematic view is a graphical representation of an SSR's functions (such as bridging,
switching, and routing services) and data objects (such as QoS flows). It also indicates
which functions are active, inactive, or in error. For details on opening this view and using
it to perform many CoreWatch tasks, see
“Schematic View” on page 32
.
Simple Network Management Protocol (SNMP)
Protocol that provides support for monitoring and controlling network devices, collecting
statistics, and managing configurations, performance, and security. SNMP is mainly used
by TCP/IP networks.
Simple Network Management Protocol (SNMP) Community
Logical group of network devices that are on the same domain.
Simple Network Management Protocol (SNMP) Trap Log
A file containing the SNMP traps the SSR sends. An SNMP trap is a message describing
an event (such as restarting the SSR or a link going down) that was detected by an SSR
function (such as a MIB or OSPF).
Summary of Contents for CoreWatch
Page 1: ...CoreWatch User s Manual 9032564 04...
Page 2: ...Notice 2 CoreWatch User s Manual...
Page 20: ...Preface 20 CoreWatch User s Manual...
Page 64: ...Chapter 5 Changing System Settings 64 CoreWatch User s Manual...
Page 86: ...Chapter 6 Configuring SSR Bridging 86 CoreWatch User s Manual...
Page 106: ...Chapter 7 Configuring VLANs on the SSR 106 CoreWatch User s Manual...
Page 206: ...Chapter 12 Configuring QoS on the SSR 206 CoreWatch User s Manual...
Page 246: ...Chapter 13 Configuring Security on the SSR 246 CoreWatch User s Manual...
Page 363: ...CoreWatch User s Manual 363 Chapter 16 Configuring Routing Policies on the SSR 9 Click OK...
Page 364: ...Chapter 16 Configuring Routing Policies on the SSR 364 CoreWatch User s Manual...
Page 370: ...Chapter 17 Checking System Status 370 CoreWatch User s Manual...
Page 390: ...Chapter 18 Monitoring Real Time Performance 390 CoreWatch User s Manual...
Page 396: ...Chapter 19 Checking the Status of Bridge Tables 396 CoreWatch User s Manual...
Page 430: ...Chapter 20 Checking the Status of Routing Tables 430 CoreWatch User s Manual...
Page 442: ...Chapter 22 Obtaining Reports 442 CoreWatch User s Manual...
Page 456: ...Appendix B CoreWatch Menus 456 CoreWatch User s Manual...