Cabletron Systems TRMMIM Power Roller User Manual


 
v
Contents
Refreshing the Station List....................................................................................5-4
Monitoring Ring and Station Statistics ...................................................................... 5-4
Creating a Pie Chart ..............................................................................................5-5
Creating a Graph or Meter ................................................................................... 5-6
Ring and Station Variables........................................................................................... 5-8
General .................................................................................................................... 5-8
Protocols.................................................................................................................. 5-8
Frame Sizes ............................................................................................................. 5-9
Isolating Errors....................................................................................................... 5-9
Non-Isolating Errors............................................................................................5-10
Chapter 6 Ring Security Configuration
About Ring Security .....................................................................................................6-1
Launching the Security Configuration Window ...................................................... 6-2
Configuring Security .................................................................................................... 6-7
Building the Allowed List Automatically .......................................................... 6-7
Adding New Stations to the Allowed or Disallowed Stations List ................ 6-7
Deleting Stations from the Allowed or Disallowed Lists................................. 6-8
Moving a Station Between the Allowed and Disallowed Stations List.......... 6-9
Clearing All Entries in the Allowed or Disallowed List...................................6-9
Changing the Ring Security Mode .................................................................... 6-10
Appendix A TRMMIM MIB Structure
IETF MIB Support........................................................................................................ A-1
TRMMIM MIB Structure.............................................................................................A-1
A Brief Word About MIB Components and Community Names ..................A-3