
Introduction to SPMA for the SEHI-22/24 and SEHI-32/34
1-2
Using the SEHI User’s Guide
applications can be accessed from the icon menu (if you are using a management
platform) and from the command line (if you are running in stand-alone mode);
in addition, several applications can also be accessed from within the Hub View, a
graphical display of the SEHI and its ports.
The
SEHI User’s Guide
describes how to use many of the applications included
with the module; note that the instructions provided in this guide apply to the
SEHI regardless of the operating system or management platform you are using.
Instructions for launching each individual function from the command line
(stand-alone mode) are also included in each chapter.
Following is a description of the applications described in this guide; while we
provide as much background information as we can, we do assume that you’re
familiar with Ethernet networks and general network management concepts:
•
Chapter 1,
Introduction to SPMA for the SEHI-22/24 and SEHI-32/34
,
describes the
SEHI User’s Guide
and the conventions used in this and other
SPMA manuals, explains where to find information about the SEHI, and tells
you how to contact Cabletron Systems Technical Support.
•
Chapter 2,
Using the SEHI Hub View
, describes the visual display of the Hub
and explains how to use the mouse within the Hub View; the operation of
some basic functions available only from within the Hub View (changing the
Hub View display, opening menus and windows, enabling and disabling
ports, checking device and port status, and so on) are also described.
•
Chapter 3,
Link/Seg Traps
, describes how to configure link and segmentation
traps to suit your management needs. You can access the Link/Seg Traps
application from the icon menu, the Hub View, or the command line.
•
Chapter 4,
Redundancy
, describes how to configure redundant circuits to keep
your network connections up and running in the event of a single port’s
failure. You can access the Redundancy application from the icon menu, the
Hub View, or the command line.
•
Chapter 5,
Source Address
, describes how to display the Source Address List,
how to set the ageing time, and how to configure source address traps; it also
discusses the effects of source address locking. You can access the Source
Address application from the icon menu, the Hub View, or the command line.
•
Chapter 6,
Security
, describes how to configure intruder protection for all
MIMs installed in the SEHI-controlled hubstack, and how to configure
eavesdropper protection for any installed
LANVIEW
SECURE
hubs. You can
access the Security application from the icon menu, the Hub View, or the
command line.
•
Appendix A,
SEHI MIB Components
, lists the IETF MIBs supported by the
SEHI, and describes their arrangement in a series of MIB components. A
description of the objects controlled by each component is also included.
Summary of Contents for SEHI-22/24
Page 2: ......
Page 14: ...Introduction to SPMA for the SEHI 22 24 and SEHI 32 34 1 8 SEHI Firmware...
Page 38: ...Using the SEHI Hub View 2 24 Managing the Hub...
Page 64: ...Source Addressing 5 14 Finding a Source Address...
Page 82: ...Security 6 18 Enabling Security and Traps...
Page 86: ...SEHI MIB Structure A 4 SEHI MIB Structure...
Page 90: ...Index Index 4...