Page 2
Cabletron Systems reserves the right to make changes in specifications and other information contained in this document without prior notice. The reader should in all cases consult Cabletron Systems to determine whether any such changes have been made. The hardware, firmware, or software described in this manual is subject to change without notice.
NOTICE FCC NOTICE This device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. NOTE: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC rules.
Consequently, when used in a residential area or in an adjacent area thereto, radio interference may be caused to radios and TV receivers, etc. Read the instructions for correct handling. CABLETRON SYSTEMS, INC. PROGRAM LICENSE AGREEMENT IMPORTANT: Before utilizing this product, carefully read this License Agreement.
NOTICE CABLETRON SOFTWARE PROGRAM LICENSE 1. LICENSE. You have the right to use only the one (1) copy of the Program provided in this package subject to the terms and conditions of this License Agreement. You may not copy, reproduce or transmit any part of the Program except as permitted by the Copyright Act of the United States or as authorized in writing by Cabletron.
Page 6
EXCLUSION OF WARRANTY AND DISCLAIMER OF LIABILITY 1. EXCLUSION OF WARRANTY. provided by Cabletron in writing, Cabletron makes no warranty, expressed or implied, concerning the Program (including Its documentation and media). CABLETRON DISCLAIMS ALL WARRANTIES, OTHER THAN THOSE SUPPLIED TO YOU BY CABLETRON IN WRITING, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, WITH...
Government is subject to restrictions as set forth in subparagraph (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at 252.227-7013. Cabletron Systems, Inc., 35 Industrial Way, Rochester, New Hampshire 03867. EMM-E6 User’s Guide...
TABLE OF CONTENTS CHAPTER 1 INTRODUCTION USING THIS MANUAL... 1-1 EMM-E6 FEATURES ... 1-4 THE MMAC WITH FLEXIBLE NETWORK BUS ... 1-10 ETHERNET CHANNELS A, B, C, D, E, and F... 1-12 1.4.1 Ethernet Channel A ... 1-12 1.4.2 Ethernet Channels B and C... 1-13 1.4.3 Other FNB Modules...
Page 10
CHAPTER 4 ATTACHING A CONSOLE CONFIGURING YOUR TERMINAL ... 4-1 CONFIGURING A CONSOLE CABLE ... 4-3 4.2.1 Connecting to a VT Series Terminal ... 4-4 4.2.2 Connecting to an IBM PC or Compatible ... 4-5 PINOUT DESCRIPTIONS... 4-6 CONFIGURING A UPS CABLE ... 4-6 CHAPTER 5 ACCESSING LOCAL MANAGEMENT CHAPTER 6 COMMUNITY NAMES ACCESSING THE COMMUNITY NAME TABLE ...
CHAPTER 1 INTRODUCTION Welcome to the Cabletron Systems EMM-E6 User’s Guide. This manual explains how to set-up, configure, and locally manage the Cabletron Systems 6-port Ethernet Bridge/Management Module (EMM-E6). 1.1 USING THIS MANUAL Read through this manual completely to familiarize yourself with its content and to gain an understanding of the features and capabilities of the EMM-E6 and its Local Management, or LM, functions.
Page 14
CHAPTER 1: INTRODUCTION Chapter 5, Accessing Local Management, describes how to access LM after you attach the management console. Chapter 6, Community Names, explains how to use the Community Name Table screen to set both local and remote access levels. Chapter 7, Configuration Screen, describes how to assign IP addresses, subnet masks, and the default gateway to the EMM-E6.
Page 15
USING THIS MANUAL Appendix A, EMM-E6 Specifications, details the properties of the EMM-E6 and currently available EPIM modules. Appendix B, OID Descriptions, supplies information detailing the Object Identifiers that may be accessed for managing the EMM-E6. Following the Appendices is a brief Glossary of Terms which provides short definitions for terms related to items and concepts referred to in this manual.
CHAPTER 1: INTRODUCTION 1.2 EMM-E6 FEATURES • i960 Processor Design • IEEE 802.1d Compliant • Available Routing Services • Special Filtering Database • Six port Ethernet Bridge • Integrated BRIM technology • User Configurable EPIMs • Expandable Flash EEPROM Memory and Runtime download •...
Page 17
Fiber Distributed Data Interface (FDDI) network backbones. The following lists optional BRIMs: For current information on the available BRIM modules supported by the EMM-E6, please refer to the Release Notes shipped with the NOTE module or contact Cabletron Systems. EMM-E6 User’s Guide EMM-E6 FEATURES...
Page 18
CHAPTER 1: INTRODUCTION • BRIM-E6: Ethernet module with selectable EPIM connection • CRBRIM-W/E-IP: Cisco Router Ethernet/Wide Area module for TCP/IP traffic. • CRBRIM-W/E-DESKTOP: Cisco Router Ethernet/Wide Area module for IP, IPX, DECNet, and AppleTalk traffic. • CRBRIM-W/E-ENT: Cisco Router Ethernet/Wide Area module for all standard Cisco protocols.
Page 19
• BRIM-A6: 100/155 Mbps ATM Station connection with configurable connector. The BRIM-A6 uses ATM Port Interface Modules (APIMs). APIMs allow a media flexibility for ATM connections like that provided by FPIMs (described above). The following APIM types are currently available: •...
Page 20
CHAPTER 1: INTRODUCTION Flash memory allows for the downloading of firmware to the module without requiring that the module be shut down. The firmware download may be performed at any time during the operation of the module, and the new firmware image will be utilized at the next reset of the module. Expandable LDRAM The EMM-E6 comes with 8 MB of Local Dynamic Random Access Memory (LDRAM).
Page 21
EMM-E6 FEATURES DLM Support The EMM-E6 allows the option of using Cabletron Distributed LAN Monitor (DLM) software to locally poll and monitor any Simple Network Management Protocol (SNMP) or Internet Protocol (IP) device. The EMM-E6 itself tallies the polling results and can be configured to contact a management station when a predetermined threshold is exceeded.
CHAPTER 1: INTRODUCTION 1.3 THE MMAC WITH FLEXIBLE NETWORK BUS The Multi Media Access Center with Flexible Network Bus (MMAC-FNB) provides the operational platform for the EMM-E6. The MMAC-FNB (backplane) provides two physically separate buses - Channel A (operating over the MMAC Power and Management bus), and Channels B and C (on the FNB).
Page 23
Table 1-1. MMACs with Shunting Capabilities MMAC Chassis MMAC-3FNB MMAC-5FNB MMAC-8FNB MMAC-M8FNB MMAC-M5FNB MMAC-M3FNB If your MMAC does not have a shunting backplane, upgrade NOTE kits are available. For additional information on shunting backplanes, or how to upgrade your hub, contact Cabletron Systems Technical Support.
1.4.1 Ethernet Channel A Channel A operates over the MMAC Power and Management Bus, Cabletron’s original Ethernet channel. Only Cabletron Systems non-repeater MIMs (i.e., TPMIMs, FOMIMs, and THN-MIMs) access the EMM-E6 through Ethernet Channel A. Additionally, the TPXMIM Ethernet Port Assignment modules are able to communicate through Ethernet Channel A, as well as the additional backplane channels.
1.4.2 Ethernet Channels B and C The Cabletron Systems MultiChannel family of MIMs includes the Repeater Interface Controller Media Interface Module (RIC MIM), an IEEE 802.3 compliant multi-port repeater. You can configure these modules to operate on either the Ethernet Channels B or C, or as a standalone repeater, using hardware jumpers or management software.
CHAPTER 1: INTRODUCTION When frames have destination addresses for a different bus: • the sending RIC MIM transmits the frames over its designated Ethernet bus; • the other RIC MIMs on this bus receive the frames, and repeat them; • the EMM-E6, after determining the source and destination, forwards the traffic accordingly.
FDDI and Token Ring Modules - The EMM-E6 recognizes the following FDDI and Token Ring modules, but the EMM-E6 management does not provide control or statistics. • CRM-3T • SNACMIM • TRMIM-32A • TRMIM-34A • TRRMIM-F2T • TRRMIM-F3T With TRMMIM version 2.02 or greater, both Token Ring and Ethernet modules can reside in the same chassis and support physical management capabilities of the Token Ring MIMs using the TRMMIM as the Token Ring management module.
CHAPTER 1: INTRODUCTION Only one EPIM operates at any given time. However, using both EPIM slots in a redundancy configuration ensures that if the primary bridging port fails, or the connecting cable segment becomes inoperable, the backup port automatically takes over the bridging operation. This is referred to as Front Panel Redundancy.
1.6 BRIDGES An Ethernet bridge is a device that allows the expansion of a network beyond the limitations of the IEEE 802.3 specified limits for repeated Ethernet networks. If an Ethernet network has a repeater hop of four repeaters or a round trip propagation delay near the 51.2 s maximum, a bridge can be used to build an extended network.
CHAPTER 1: INTRODUCTION The bridge is considered a node on the network and performs store and forward functions for packets on each network. This contrasts with a repeater which repeats the signal bit by bit from one side of the network to the other.
BRIDGES 1.6.2 Spanning Tree Algorithm The Spanning Tree Algorithm (STA) is used by bridges to detect data loops (duplicate data paths). The bridges will then automatically break the loop and use the now open path as a backup in case the primary path fails. When a bridge is powered up, it goes through a series of self tests to check its internal operation.
CHAPTER 1: INTRODUCTION 1.7 LOCAL MANAGEMENT FEATURES Local Management for the EMM-E6 provides tools that allow you to manage the device and its attached segments. Through Local Management you can: • Assign an IP address and subnet mask to the EMM-E6 bridge via the Configuration Screen menu.
1.8 COMMUNITY NAMES When using Local or Remote Management tools to access the EMM-E6 it is important that the Network Manager has the ability to maintain network security. Community Names provide some network security by acting as passwords into the device and the software running it. The Network Manager (Super-user) controls access by establishing four (4) passwords.
CHAPTER 1: INTRODUCTION 1.9.1 MIBs The Management Information Bases (MIBs) are a database resident on the EMM-E6. Objects in the information base are uniquely identified by administratively assigned identifiers (called object identifiers or OIDs), and can be viewed, retrieved, or changed using an SNMP packet exchange over the network.
REVIEW OF ADDRESSING As MAC addresses are often used to perform management and control functions for networking hardware, it is important to be able to identify a MAC address when it is requested or returned by network management. Since most MAC addresses are set at manufacture and cannot be altered by users, this manual does not examine MAC addressing in greater detail.
Page 36
CHAPTER 1: INTRODUCTION Range of Network IDs: Binary translation: (of first octet) Range for the Host ID: Range of Network IDs: Binary translation: (of first octet) Range for the Host ID: Range of Network IDs: Binary translation: (of first octet) Range for the Host ID: 1-24 Table 1-2.
1.10.3 Identifying IP Address Classes In the event that you have an existing IP address and need to quickly determine what fields are available for Host IP address configuration, make that determination based on the binary value of the first DDN field. Tables 1-1 to 1-3 show that different address classes have different initial bits in the first octet.
CHAPTER 1: INTRODUCTION Subnet addresses, when used with routing, allow discrimination between devices and groups of devices based on IP addresses. Networks of different subnets, even those on the same physical network segment, may be isolated, from a functional standpoint, from one another through the implementation of routing.
Page 39
The binary 1’s in the mask “mask-out” the Network ID and the 0’s show where the Host ID is located. When using part of the Host ID as a subnet address, define a Subnet Mask that will mask-out the bits of the Host ID that are being used as a subnet address.
Page 40
CHAPTER 1: INTRODUCTION The example in Figure 1-3 masks out the three high order bits of the only octet available for modification, the last octet. This provides for up to six subnets and up to 30 Host IDs within each subnet. Modifying the default mask for a Class B address (255.255.0.0) to mask out the third octet for subnet purposes (255.255.255.0) would provide up to 254 subnets each containing up to 254 Host IDs.
CHAPTER 1: INTRODUCTION 1.10.6 Operation of the Subnet Mask The Subnet Mask defines how your EMM-E6 treats SNMP Trap IP destination addresses in its Trap table (see Chapter 7, Trap Table Screen, for additional information on traps). When using the Subnet Mask, the EMM-E6 logically determines one of two possible locations, either on or not on its own subnet, for each Trap IP destination address in its trap table.
1.10.8 Addressing Example A network manager, planning for the configuration of a network of 60 hosts, desires to implement subnets to create logical divisions between different groups of workstations and devices. The Internet Assigned Numbers Authority has supplied the company with a Class C Network Address;...
Page 44
CHAPTER 1: INTRODUCTION For any SNMP Trap-generating network devices not residing on the same subnet as the network management station, the default Subnet Mask utilized on that device must be altered to match the subnet scheme. In the above example, the default Subnet Mask is modified from 255.
1.11 LANVIEW LEDs AND RESET SWITCH The EMM-E6 incorporates the Cabletron Systems LANVIEW Status Monitoring and Diagnostics System. LANVIEW LEDs can help diagnose any problems, such as a power failure or a cable fault. The module includes the following LANVIEW LEDs: •...
Page 46
CHAPTER 1: INTRODUCTION LANVIEW modules also provide a “Full security” configuration, SECURE under which broadcast and multicast packets contain modified data fields such as those used in eavesdrop prevention (described above). Ports set to Full security mode will not see or respond to these types of packets. The default setting for Full security is disabled.
1.13 GETTING HELP If you need additional support related to installation, configuration, or management of the EMM-E6, or if you have any questions, comments, or suggestions concerning this manual, contact Cabletron Systems Technical Support: By phone... (603) 332-9400 Monday-Friday; 8am - 8pm ET By CompuServe...
REQUIREMENTS / CONFIGURATIONS This chapter contains general networking guidelines. Before attempting to install the EMM-E6 or any additional EPIMs or BRIMs, review the requirements and specifications outlined in this chapter. Your network installation must meet the conditions, guidelines, specifications, and requirements included in this chapter to ensure satisfactory performance of this equipment.
• Impedance - Cabletron Systems 10BASE-T Twisted Pair products work on twisted pair cable with 75 to 165 impedance. Unshielded twisted pair cables typically have an impedance of between 85 and 110 .
Page 50
• Jitter - Intersymbol interference and reflections can cause jitter in the bit cell timing, resulting in data errors. 10BASE-T links must not generate more than 5.0 ns of jitter. Make sure your cable meets 10BASE-T link impedance requirements to rule out jitter as a concern.
CHAPTER 2: REQUIREMENTS / CONFIGURATIONS 2.1.2 Multimode Fiber Optic Network When connecting a multimode fiber optic link segment to the hub (via EPIM-F1/F2), ensure the network meets the following requirements: • Cable Type - Use the EPIM-F1 and EPIM-F2 for the following multimode fiber optic media: 50/125 m fiber optic cabling 62.5/125 m fiber optic cabling...
2.1.3 Single Mode Fiber Optic Network When connecting a single mode fiber optic link segment to the hub (via EPIM-F3), ensure the network meets the following requirements: • Cable Type - Fiber optic link segments should consist of 8/125 to 12/125 m single mode fiber optic cabling.
(e.g., finished wall plates with BNC feed-throughs), you may need to reduce the number of host connections. For special network design, contact Cabletron Systems Technical Support. • Grounding - For safety, ground only one end of a thin-net segment.
RJ71 connector provides twelve 10BASE-T twisted pair ports (twelve total for TPRMIM-33, twenty-four total for TPRMIM-36); each MIM has one EPIM; the TPRMIM-36 also has one AUI port. For more information regarding Cabletron Systems Repeater MIMs, refer to your Repeater Media Interface Modules (TPRMIM/FORMIM/ CXRMIM) Installation Guide.
CHAPTER 2: REQUIREMENTS / CONFIGURATIONS 2.4 PORT ASSIGNMENT MODULES • TPXMIM-20/TPXMIM-22: twisted pair port and bank assignment repeater MIM; RJ45 connectors (TPXMIM-20 has nine, TPXMIM- 22 has twenty-one); one EPIM. • TPXMIM-32/TPXMIM-36: twisted pair port and bank assignment repeater MIM; RJ71 connectors (TPXMIM-32 has one, TPXMIM- 36 has two);...
2.5 SAMPLE NETWORK CONFIGURATIONS This section provides you with several examples for configuring networks with the EMM-E6. These examples illustrate the flexibility and advantages to using the EMM-E6 and RIC MIM technology: 2.5.1 Three networks with a single MMAC-FNB 2.5.2 The EMM-E6 as a multi-port router 2.5.3 Adding users to an existing network...
An EMM-E6 routing image allows you to set up the module as a multi- port router. For information on how to upgrade the EMM-E6 to perform routing functions, and how to configure the EMM-E6 as a multi-port router, refer to Cabletron Systems’ Router Services Manual or contact Cabletron Systems Technical Support. 2-10...
2.5.3 Adding Users to a Separate Segment The example in Figure 2-3 compares two methods of connecting 48 additional users to a network. Single - Channel Single - Channel Single - Channel TPMIM-24 TPMIM-24 IRM3 TPMIM-24 TPMIM-24 IRM3 Bridge TPMIM-24 TPMIM-24 IRM3 TPMIM-24...
CHAPTER 2: REQUIREMENTS / CONFIGURATIONS 2.5.4 A Fault Tolerant Wiring Hierarchy The example in Figure 2-4 illustrates a fault tolerant wiring hierarchy. MiniMMAC Closet 1 BRIDGE STAR HUB BRIDGE Closet 2 BRIDGE Closet 3 BRIDGE Figure 2-4. Configuring a Fault Tolerant Wiring Scheme Closets 1, 2, and 3 each contain an MMAC-FNB with an EMM-E6, MIMs, and RIC MIMs operating on Ethernet channels A, B, and C.
Page 60
SAMPLE NETWORK CONFIGURATIONS The Star Hub, which is an MMAC-FNB that uses a configuration similar to the closet hubs, is the central repeater interconnect for the closets, but does not constitute a single point of failure. The EMM-E6 in each MMAC-FNB utilizes the 802.1d Spanning Tree Algorithm.
The example in Figure 2-5 illustrates just one possible EMM-E6 and BRIM configuration. The EMM-E6/BRIM combination provides various connection possibilities, depending on the BRIM(s) you use. Refer to individual BRIM manuals and/or Cabletron Systems’ Router Services documentation to better understand the capabilities of each device. FDDI Backbone...
This chapter contains instructions for: • unpacking and inventorying the contents of the EMM-E6 carton • locating, identifying and setting the EMM-E6 mode switches • adding/replacing optional modules (i.e., Single In-line Memory Modules and Ethernet Port Interface Modules) • identifying BRIM connector locations •...
4. Visually inspect the module. If there are any signs of damage, contact Cabletron Systems Technical Support immediately. 5. Place the static grounding strap properly on your wrist before opening the non-conductive bag.
3.2 SETTING MODE SWITCHES The bank of dip switches located at the top of the EMM-E6 (Figure 3-1) are set to their default positions prior to shipping. Check these switches to ensure that they are in the correct position for normal EMM-E6 operation. Figure 3-1.
Page 65
NOTE functions after the EMM-E6 is reset. Switch definitions are as follows: • Switch 1 - Cabletron Systems use only. • Switch 2 - Cabletron Systems use only. • Switch 3 - For manufacturing use only. Keep in • Switch 4 - MIMREV (Management Interface Module Revision).
Page 66
After changing the state of Switch 6 and repowering the device, the EMM-E6 will request a new image until it either receives the image, or you reset the EMM-E6 again by: using the reset button on the front panel removing the EMM-E6 from the chassis backplane and plugging it back in cycling the MMAC-FNB power.
Single In-line Memory Module (SIMM) for any of these memory types. For additional information on SIMMs, or how to upgrade the NOTE memory in your Module, contact Cabletron Systems Technical Support. 3.3.1 Locating SIMMs Each memory type has a specific SIMM slot location on the EMM-E6 mother board.
Page 68
SIMM UPGRADES Local Dynamic Random Access Memory (LDRAM) SIMM Slot FLASH Memory SIMM Slot Direction Install EMM-E6 Shared Dynamic Random Access Memory (SDRAM) SIMM Slot Figure 3-2. SIMM Slot Locations EMM-E6 User’s Guide...
CHAPTER 3: INSTALLATION 3.3.2 Installing SIMMs Installing a SIMM is a simple two step process. After finding the proper SIMM slot location, refer to Figure 3-3 and the following instructions to install your SIMM. SIMM Slot Connector Teeth SIMM Figure 3-3. Installing a SIMM To install a SIMM: Observe all anti-static precautions when handling sensitive electronic equipment.
3.4 ADDING/REPLACING EPIMs This section contains procedures on how to add/replace an Ethernet Port Interface Module (EPIM) to upgrade or change the capabilities of your hub. After installing your new EPIM, refer to appropriate EPIM sections in this chapter to verify proper operation. Observe all anti-static precautions when handling sensitive electronic equipment.
CHAPTER 3: INSTALLATION 3.5 LOCATING BRIMs This section points out Bridge Router Interface Module (BRIM) connector locations on your EMM-E6 board. Refer to your BRIM Guide for installation procedures and additional information. The following diagram (Figure 3-5) shows BRIM connector locations for the EMM-E6: Channel E BRIM Connector BRIM-F Ribbon Cable Connector...
3.6 PRE-INSTALLATION TEST Before installing the EMM-E6 in a live network, test the module in a controlled situation to ensure that it is repeating and bridging packets. You can perform this test with two workstations (see Figure 3-6), using an MMAC-FNB, or MMAC-MFNB, installed with an EMM-E6 and a Media Interface Module (MIM) as follows: 1.
Page 73
CHAPTER 3: INSTALLATION 6. Send packets between the two workstations to verify the proper operation of the EMM-E6. Note: If using UNIX workstations, a “ping” test verifies the NOTE EMM-E6 is operating properly. If a failure occurs, refer to Chapter 14, Troubleshooting. Figure 3-6.
Install the EMM-E6 into the MMAC-FNB (backplane) as follows: We recommend powering down your MMAC when inserting or removing boards, even though Cabletron Systems modules NOTE have “hot swap” capabilities. 1. Remove the safety bars which protect the chassis and remove any module to be replaced or blank MMAC slot covers in accordance with the installation and removal procedures for these items.
Page 75
CHAPTER 3: INSTALLATION 4. Firmly press the module connections into the backplane. Do not try to force the module into place or use the knurled knobs to draw the module into the backplane. Forcing a misaligned module into place can damage the EMM-E6 or the MMAC backplane. MMAC M8FNB Chassis Slots 1 and 2 Figure 3-7.
Page 76
7. Observe the status of the LANVIEW LEDs on the EMM-E6. When the CPU LED is flashing, the STBY (standby) LEDs indicate the module’s boot state. During this period (up to 5 minutes), the LEDs cycle through a series of internal diagnostics. (See Figure 3-8) Figure 3-8.
CHAPTER 3: INSTALLATION 3.8 INSTALLATION CHECK-OUT After connecting to the network, verify that packets can pass over the network segments via the EMM-E6. Again, you can use two workstations set up as file server and client. Keep the server workstation stationary in the wiring closet with the EMM-E6, and use the client workstation to move to each node connected to the EMM-E6.
Page 78
INSTALLATION CHECK-OUT MMAC-M3FNB with EMM-E6 and TPRMIM MMAC-M3FNB Office Locations File Server Workstation Client Workstation Figure 3-9. Installation Checkout EMM-E6 User’s Guide 3-17...
CHAPTER 3: INSTALLATION 3.9 CONNECTING TO THE NETWORK This section gives procedures for connecting the EMM-E6 to the network using the various EPIMs available. When the EMM-E6 is first powered up, the EPIM 1 port acts as the bridge port and the EPIM 2 port is OFF. Once you have successfully powered up your EMM-E6, you can add network connections.
3.9.1 Connecting a Twisted Pair Segment to an EPIM-T Before connecting a segment to the EPIM-T, check each end of the segment to determine wire cross-over. If the wires do not cross over, use the switch on the EPIM-T to internally cross over the RJ45 port. Refer to Figure 3-10 to properly set the EPIM-T cross-over switch.
Page 81
CHAPTER 3: INSTALLATION 2. Check that the LNK LED for the port is on. If the LED is not on, perform each of the following steps until it is: a. Check that the 10BASE-T device at the other end of the twisted pair segment is powered.
3.9.2 Connecting an AUI Cable to an EPIM-X The Signal Quality Error (SQE) switch remains in the OFF NOTE position for most network connections. However, some Data Terminal Equipment (DTE) requires SQE. Refer to your DTE manual for SQE requirement information. To connect an EPIM-X to a device not requiring SQE: 1.
CHAPTER 3: INSTALLATION 3.9.3 Connecting to an EPIM-F1/F2, or EPIM-F3 When connecting a fiber optic link segment to an EPIM-F1/F2, or EPIM-F3 keep the following in mind: • When connecting a fiber optic link segment with SMA 906 connectors to an EPIM-F1 with SMA ports, make sure each connector uses half alignment, NOT full alignment, sleeves.
Page 84
At one end of the cable, one fiber is labeled 1, and the other fiber is labeled 2. This pattern repeats at the other end of the cable. If you did not purchase your cable from Cabletron Systems, be sure to label your cable in this manner.
Page 85
CHAPTER 3: INSTALLATION F1/F2 SMA 905 Connectors Figure 3-13. The EPIM-F1/F2 and EPIM-F3 5. Check that the LNK LED on the applicable module port is on. If the LED is not on, perform each of the following steps until it is: a.
3.9.4 Connecting a Thin-Net Segment to an EPIM-C To connect a thin-net segment to an EPIM-C: 1. Set the Internal Termination Switch (Figure 3-14), located above the port (when the EPIM has been inserted into the EMM-E6) and labeled TERM to: •...
Page 87
CHAPTER 3: INSTALLATION When internal termination switch is set to off ( ): Connect BNC T-connector to port. Attach a terminator or terminated thin-net segment to one female connector of tee-connector. Connect a terminated thin-net segment to other female connector of T-connector.
To connect an EPIM-A to an external network segment: 1. Check that the PWR LED on the EPIM-A is on. If the PWR LED is not on, contact Cabletron Systems Technical Support. 2. Attach an external transceiver to the network segment intended for AUI port connection.
Page 89
Check the AUI connections for proper pinouts. Appendix A lists the pinouts for the transceiver connection. b. Check the cable for continuity. c. Reconnect the AUI cable to the EMM-E6 and the device. If the transceiver PWR LED remains off, contact Cabletron Systems Technical Support. 3-28 EMM-E6 User’s Guide...
ATTACHING A CONSOLE This chapter describes how to attach a Local Management console to the EMM-E6, and lists the setup and configuration requirements for: • console/terminal • console cable • console cable connections. 4.1 CONFIGURING YOUR TERMINAL The following instructions outline how to configure your console (terminal) to communicate with Local Management.
Page 91
CHAPTER 4: ATTACHING A CONSOLE Table 4-1. VT Terminal Setup Columns ... -> Controls ... -> Auto Wrap ... -> Scroll... -> Text Cursor... -> Cursor Style ... -> Mode... -> ID number ... -> Cursor Keys ... -> Power Supply ... -> Communications Setup Menu Transmit ...
4.2 CONFIGURING A CONSOLE CABLE This section outlines the proper cable configurations for connecting the EMM-E6 to a Local Management terminal. For information on the appropriate pinouts, refer to Appendix A of this User’s Guide. You need the following hardware (supplied with your EMM-E6) to connect the EMM-E6 to a terminal: •...
CHAPTER 4: ATTACHING A CONSOLE 4.2.1 Connecting to a VT Series Terminal To connect a VT Series terminal to a Cabletron module Console port (Figure 4-1): 1. Connect the RJ45 connector at one end of the cable to the Console port on the Cabletron module.
4.2.2 Connecting to an IBM PC or Compatible To connect an IBM PC or compatible running VT terminal emulation to a Cabletron module Console port (Figure 4-2): 1. Connect the RJ45 connector at one end of the cable to the Console port on the Cabletron module.
CHAPTER 4: ATTACHING A CONSOLE 4.3 PINOUT DESCRIPTIONS Table 4-2. RJ45 to DB9 Adapter (PC Adapter): RJ45 Blue Green Orange Yellow Table 4-3. RJ45 to DB25 Adapter (VT Series Adapter): RJ45 Blue Yellow Green Orange 4.4 CONFIGURING A UPS CABLE To configure an Uninterruptible Power Supply (UPS) cable: 1.
CHAPTER 5: ACCESSING LOCAL MANAGEMENT 2. Enter your Password and press Return. The default Super-User access password is the Return key (which defaults internally to ‘public’). Your password is one of the community names specified in the NOTE Community Name Table. Access to certain LM capabilities depends on the degree of access accorded that community name.
Page 98
3. Use the arrow keys to highlight an option, and press Return (or simply use the corresponding Function key). The selected screen appears. If you do nothing on LM for 15 minutes, the Password Screen reappears. At this point, you must re-enter the password to continue using EMM-E6 Local Management.
COMMUNITY NAMES The Community Name Table option lets you set Local Management community names. These names act as passwords to LM and provide security for your EMM-E6. You can control EMM-E6 access by establishing up to four different levels of security authorization - basic read-only, read-only, read-write, and super-user.
CHAPTER 6: COMMUNITY NAMES 6.2 COMMUNITY NAME TABLE SCREEN FIELDS This section briefly explains each Community Name Table Screen field. Community Name Displays the community name through which a user can access LM. All community names act as passwords to Local Management. Depending on the assigned access, community names can vary in privileges.
6.3 ESTABLISHING COMMUNITY NAMES In order for any Community Name Table edits to take effect, you must have super-user access. In other words, when you log into LM, you must do so with a super-user password. A password from any of the other levels of access (basic-read, read-only, or read-write) does not allow you to edit the Community Name Table Screen.
CONFIGURATION SCREEN In the EMM-E6 Configuration Screen you can assign an IP address and Subnet Mask to the EMM-E6. You can also: • set the Default Interface • set the Default Gateway • override locked ports • enable all ports. 7.1 ACCESSING THE CONFIGURATION SCREEN To access the Configuration Screen: 1.
CHAPTER 7: CONFIGURATION SCREEN 7.2 CONFIGURATION SCREEN FIELDS The following briefly explains each Configuration Screen field. Displays the interface number (1 to 6) corresponding to a particular EMM-E6 channel. This number allows the EMM-E6 to accurately identify MIB II channel information. The following table illustrates the I/F number to channel association.
Page 104
CONFIGURATION SCREEN FIELDS SubNET Mask Displays the Subnet Mask for each of the six EMM-E6 channels in dotted decimal notation. MAC Address Displays the physical address of each bridge interface. Default Interface Displays the default interface number for the EMM-E6 default gateway. This field defaults to NONE.
CHAPTER 7: CONFIGURATION SCREEN 7.3 SETTING THE HOST IP ADDRESS The table on the Configuration screen allows you to assign an IP address and Subnet Mask to the EMM-E6. The Host IP applies to each interface. NOTE To set the Host IP: 1.
7.4 MODIFYING A SUBNET MASK Consult your Network Administrator prior to modifying any NOTE of the natural Subnet Masks. The EMM-E6 automatically enters the natural Subnet Mask for any IP address that you enter. A natural Subnet Mask is a logical separation between network and host identifiers within the IP address.
CHAPTER 7: CONFIGURATION SCREEN • the EMM-E6 does NOT provide a natural Subnet Mask that fits your host/network identifier scheme. Make sure to modify the Subnet Mask option in conjunction NOTE with the Default Gateway option. To modify the Subnet Mask: 1.
Page 108
SETTING DEFAULT GATEWAY AND INTERFACE To set the Default Gateway and its associated Default Interface: 1. Use the arrow keys to highlight the Default Interface field. 2. Enter the interface number of the EMM-E6 for the Default Gateway in this field. The interface number will be a value between 1 and 6. A table of the interface numbers may be found in section 7.2.
CHAPTER 7: CONFIGURATION SCREEN 7.6 CONNECTING/DISCONNECTING A UPS The EMM-E6 provides the option of connecting to an Uninterruptible Power Supply (UPS) using Local Management. To enable the UPS connection using EMM-E6/LM: 1. Use the arrow keys to highlight the COM 1 Application: field. 2.
7.7 UNLOCKING PORTS When you lock the chassis for security reasons (e.g., using remote inband management), unauthorized devices cannot communicate through an MMAC-FNB chassis station port. The Port LOCK Override function provides fail-safe recovery if you cannot unlock ports using remote inband SNMP.
TRAP TABLE SCREEN As an SNMP compliant device, the EMM-E6 can authenticate an SNMP request. The Trap Table defines the management stations to receive SNMP Traps for alarm/event notification. 8.1 ACCESSING THE TRAP TABLE SCREEN To access the Trap Table Screen: 1.
CHAPTER 8: TRAP TABLE SCREEN 8.2 TRAP TABLE SCREEN FIELDS The Trap Table contains three modifiable fields. The fields, shown in Figure 8-1, allow the user to direct trap information to users on the network. The three fields are: SNMP Community Name Displays the community name associated with the network management station IP address to which the EMM-E6 sends trap messages.
Page 113
6. Using the arrow keys, highlight the desired Trap IP Address field. 7. Enter the IP address of the workstation to which you want the EMM-E6 to send traps. Use the XXX.XXX.XXX.XXX format with the value of XXX ranging from 0 to 254. 8.
SNMP TOOLS SCREEN This section describes specific commands and features within the SNMP Tools screen. This screen allows you to access management information bases (MIBs), and varies according to your level of security access. The following descriptions outline the super-user management capabilities.
CHAPTER 9: SNMP TOOLS SCREEN 9.2 SNMP TOOLS SCREEN FIELDS The following describes the SNMP Tools Screen fields and commands. COMMUNITY NAME Identifies the community name MIB access level password. OID PREPEND Specifies the number prefix common to all object identifiers (OIDs) found in a MIB.
CYCLES Allows you to specify the number of GET NEXT requests to walk through and how much time elapses between each request. REPEAT Repeats the Get command, allowing you to monitor any changes to a specific OID. 9.3 THE SECURITY ACCESS LEVEL Each MIB component that the EMM-E6 supports (e.g., RMON, DLM, Repeater Rev.
CHAPTER 9: SNMP TOOLS SCREEN In order to access a specific MIB’s components, you must set the appropriate MIB password in the COMMUNITY NAME field. The default super-user password (public) allows you to NOTE access most MIB components. To change the SNMP Tools screen COMMUNITY NAME field, you must have super-user access to Local Management.
Page 118
4. Press the Return key. If there is no instance of that OID, the EMM-E6 displays “MIB_NO_INSTANCE.” Otherwise, the EMM-E6 displays that OID’s data type, length, and value. To get the next OID: 1. Highlight GETNEXT, using the arrow keys. 2.
CHAPTER 9: SNMP TOOLS SCREEN If you have previously entered an OID, press F9 to recall that entry. You can use the arrow keys to modify the recalled OID, or if you have not previously entered the OID, save yourself some keystrokes by typing the OID minus the OID’s prepend.
Page 120
To walk through the MIB: 1. Highlight WALK, using the arrow keys. 2. Press the Return key. “<INITIAL> OID (=|F9)” appears. 3. Enter the OID. 4. Press the Return key. LM begins walking through the sublayers of the MIB available from the specified OID. Each OID in the list displays the specified OID, its size, its data type, and the data value.
Page 121
CHAPTER 9: SNMP TOOLS SCREEN To step through: 1. Highlight GETNEXT, using the arrow keys. 2. Press the Return key. “<GETNEXT> OID (=|F9)” appears. 3. Enter the OID (only the suffix is necessary). 4. Press the Return key. The initial OID details, including its size, data type, and data value, appear.
ROUTER SETUP SCREEN This chapter shows the Router Setup Screen, Figure 10-1, below. Using this screen the user can select the protocol to be used by any Routing Services previously installed in the EMM-E6. The user should use the Routing Services Manual to make the correct selections from the Router Setup Screen.
DEVICE STATISTICS SCREEN This chapter describes the features of the Device Statistics screen. Using this screen, you can view error, collision, and traffic statistics for the entire network, a selected slot, or a selected port. This screen also provides the option of enabling and disabling ports. To access the Statistics screen: 1.
CHAPTER 11: DEVICE STATISTICS SCREEN 11.1 DEVICE STATISTICS This section describes Device Statistics screen data fields. BYTES RECEIVED Displays the number of bytes received. FRAMES RECEIVED Displays the number of frames received. FRAMES FILTERED Displays the total number of frames filtered. FRAMES TRANSMITTED Displays the total number of frames transmitted.
RUNT PACKETS Displays the number of runt packets received from the network. A runt packet is less than the minimum Ethernet frame size of 64 bytes, not including preamble. GIANT PACKETS Displays the number of giant packets receivedfrom the network. A giant packet is greater than the maximum Ethernet frame size of 1518 bytes, not including preamble.
CHAPTER 11: DEVICE STATISTICS SCREEN NETWORK This command lets you select the network you want to monitor. The choices range from A to F, depending on the configuration of your network and the options available from this configuration. For example, if you do not have a Media Interface Module running on the A Channel, the EMM-E6 automatically disallows Channel A as a network selection.
11.2.2 Selecting a Network/Slot/Port When the Device Statistics screen first appears, statistics are displayed for Network 1, Slot 1, and Port 1. To view statistics for another Network, Slot, and Port, use the NETWORK X, SLOT X, or PORT X commands at the bottom of the screen.
CHAPTER 11: DEVICE STATISTICS SCREEN 11.2.4 Disabling Ports The DISABLE PORT command lets you disable the port selected in the PORT command. You must first use the PORT command to select the desired port. To set the PORT DISABLE command: 1.
CHAPTER 12 COMMAND LINE INTERFACE SCREEN The Command Line Interface (CLI) Screen, Figure 12-1, will function in future releases of the EMM-E6. EMM-E6-960 LOCAL MANAGEMENT Cabletron EMM-E6 Revision 0.00.00 CLI INFORMATION THIS SCREEN RESERVED FOR THE CABLETRON COMMAND LINE INTERFACE C O M M U N I T Y N A M E S I P TA B L E T R A P TA B L E...
This chapter describes the procedures required to access the MIB Navigator residing on the EMM-E6. The MIB Navigator Command Set is described and examples of each command are provided. 13.1 MANAGING DEVICE MIBs The MIB Navigator allows access to a command set from which you can configure and manage your device.
CHAPTER 13: MIB NAVIGATOR 13.2 ACCESSING THE MIB NAVIGATOR The MIB Navigator function resides on your Cabletron device (EMM-E6, ETWMIM, ESXMIM, etc.). Access the MIB Navigator in-band, through a device (i.e., workstation) connected to the same network or internetwork, using a Telnet connection. To access the MIB Navigator, perform the following actions from a PC or workstation: 1.
13.3 MIB NAVIGATOR COMMAND SET OVERVIEW There are three categories of commands in the command set. • Navigation Commands - Allows the user to access and manage the MIB for the device running the MIB Navigator. Some of commands also provide user community-string information. The commands are as follows: branch tree...
CHAPTER 13: MIB NAVIGATOR • To abort the output or interrupt a process the escape character is ^C (where ^ equals the Control key). • A slash (/) proceeding an OID issues that command from the root directory regardless of where you are in the MIB. If no slash precedes the OID the command issues from your current MIB location.
Page 134
Navigation Commands Use this command to change directories within a MIB subtree. The path specified must be valid. This command has two special subtree options: - Moves you to one subtree above the current one. - Moves you to the root. Format: cd [PATH] Example The ctron command enables you to change directories...
Page 135
CHAPTER 13: MIB NAVIGATOR Navigation Commands Each of these commands displays the contents of a dir, specified sub-tree (the current directory displays if you do not specify a sub-tree). Options can be used separately or combined. When no option is used the ASCII name of the leaf object displays. The three options available with these commands are: Displays all instances of the object’s OID value (/1/3/ 6/) and ASCII leaf object name (internet).
Navigation Commands The help command provides a list of available MIB Navigator help commands. The command also provides help for individual MIB Navigator commands. Format: Example The mib2 command enables you to change directories mib2 directly to MIB II (1.3.6.1.2.1) without keying in the entire path.
Page 137
CHAPTER 13: MIB NAVIGATOR Navigation Commands The pwd command displays the full path name for the directory in which you are currently working. Format: Example # /iso/org/dod/internet/mgmt/mib-2 The set command enables you to set the value of a managed object. This command is valid only for leaf entries in the current MIB tree, or for managed objects in the MIB.
Page 138
Navigation Commands The su command enables you to change your community name to allow for different access to the MIB. The community name that you enter allows you either Basic Read, Read Only, Read/Write, or Super-User access to that device’s MIBs, depending on the level of security access assigned the password through the Local Management Community Table.
Page 139
CHAPTER 13: MIB NAVIGATOR Navigation Commands The whoami command displays your community string and whoami access privileges to the MIB. When using the whoami command one of these four access levels will display: Basic Read, Read Only, Read/Write, and Super User. Format: Example # Community Name...
13.3.3 Built-In Commands The following provides a brief description, the proper format, and an example of each Built-In command. The arp command provides access to the ARP (Address Resolution Protocol) cache, enabling you to view cache data, delete entries, or add a static route. Superuser access is required to delete an entry or add a static route.
Page 141
CHAPTER 13: MIB NAVIGATOR Built-In Commands The netstat provides a display of general network statistics netstat for the managed device. The netstat command must be used with one of the following two display options: Displays status and capability information for each interface.
Page 142
Built-In Commands The snmpbranch command enables you to query another snmp- SNMP device. The command provides a display of objects branch that match the specified OBJECT-ID. If no match is made, no object will display. Format: Example MIBNav> # /1/3/6/1/2/1/1/1 sysDescr # /1/3/6/1/2/1/1/2 sysObjectID OBJECT ID 1.3.6.1.4.1.52 # /1/3/6/1/2/1/1/3 sysUpTime TIME TICKS 8098654 # /1/3/6/1/2/1/1/4 sysContact...
Page 143
CHAPTER 13: MIB NAVIGATOR Built-In Commands The snmpset command enables you to set the value of an snmpset object in other SNMP devices. This command requires the appropriate community string and OID. When defining a new leaf, the set command prompts you for a value type.
Page 144
Built-In Commands The traceroute command generates a TRACEROUTE traceroute request to a specified IP address and provides a display of all next-hop routers in the path to the device. If the device is not reached, the command displays all next-hop routers to the point of failure.
CHAPTER 13: MIB NAVIGATOR 13.3.4 Special Commands The following provides a brief description, the proper format, and an example applicable to each Special command. These commands enable you to exit from the MIB Navigator done, and return to the operating system. quit, exit Format:...
LANVIEW LEDs, provide a troubleshooting checklist, and explain how and when to reset the EMM-E6. 14.1 USING LANVIEW The EMM-E6 uses the Cabletron Systems built-in visual diagnostic and status monitoring system called LANVIEW. With LANVIEW, you can quickly scan the EMM-E6 LEDs to observe network status or diagnose network problems.
Page 147
CHAPTER 14: TROUBLESHOOTING Table 14-1. LANVIEW LEDs Color Multicolor Green STBY Yellow A,B,C,D (Standby) Yellow A,B,C,D (Receive) 14-2 Description Recommended Action Flashing Green If OFF, or Red, the board has a indicates that the problem. board is operating Press the reset switch on the EMM-E6 front panel to re- properly.
Page 148
Table 14-1. LANVIEW LEDs (Continued) Color Green A,B,C,D (Transmit) (Collision) EMM-E6 User’s Guide Description Recommended Action LED flashes to If none of the transmit LEDs is flashing, the EMM-E6 is not indicate that a segment is transmitting frames on any of transmitting a the segments.
CHAPTER 14: TROUBLESHOOTING 14.2 TROUBLESHOOTING CHECKLIST If your EMM-E6 is not operating properly, the following checklist describes some of the problems that may occur with the EMM-E6 installed in an MMAC, possible causes for the problem, and suggestions for resolving the problem. 14-4 EMM-E6 User’s Guide...
Page 150
Table 14-2. Troubleshooting Checklist Problem Possible Causes No LEDs on. Loss of Power to the MMAC. EMM-E6 not properly installed. No Local Terminal setup is not Management correct. Password screen. Improper console cable/UPS cable pinouts. Cannot Improper Community contact the Names Table.
Page 151
CHAPTER 14: TROUBLESHOOTING Table 14-2. Troubleshooting Checklist (Continued) Problem Possible Causes A port on a The port is either off or segmented. managed by the EMM-E6 Port cable is cannot defective. access the network, while other ports on the same MIM are able to access.
USING THE RESET SWITCH 14.3 USING THE RESET SWITCH The EMM-E6 incorporates a recessed reset switch, located above the LEDs (see Figure 14-1). This reset switch initializes the EMM-E6 processor. This switch does NOT initialize Non-Volatile Random Access Memory (NVRAM), the non-volatile random access memory where the EMM-E6 stores network management parameters.
IMAGE FILE DOWNLOAD This chapter provides instructions for downloading an image file to the EMM-E6 using three different methods; altering hardware switch settings to force the module to accept new firmware, through UNIX operating System commands, and by setting specific MIB OID strings. To set OID strings, you can use the SNMP Tools screen described in Chapter 9 of this User’s Guide or any MIB walking tool.
UNIX workstation as a rarp server, and you do not have a decompression utility that recognizes the PKZIP format, you can obtain a copy of a UNIX decompression utility or the image file from the Cabletron Systems FTP server. Contact Cabletron Technical Support for details. 15-2...
15.2 FORCED DOWNLOAD WITH UNIX Downloading an EMM-E6 image file with a UNIX workstation requires setting up a management station, and forcing the download. To force a download, you can use mode switch 6 on the EMM-E6 or set specific MIB OIDs.
Page 156
CHAPTER 15: IMAGE FILE DOWNLOAD 2. Edit the /etc/hosts file by adding the EMM-E6 MAC address and follow it with the same unique name you used in step one above. (e.g., 00:00:1d:32:0c:1b EMME6). 3. If you already have a /tftpboot directory, confirm the rarp setup of your workstation as follows: Request a process status and grep for rarpd (e.g., unix% ps -aux | grep rarpd).
Page 157
7. Edit the /etc/inetd.conf file by removing anything prior to the tftpboot daemon (e.g., the # sign) that comments-out the line. 8. Kill the inetd process (e.g., unix% kill -HUP ‘process ID number’), and then restart the process (e.g., unix% inetd), to enable the revised inetd.conf file.
Page 158
CHAPTER 15: IMAGE FILE DOWNLOAD To force a download using the EMM-E6 download switch: 1. Remove the safety bars from the MMAC chassis. 2. Unscrew the knurled knobs at the top and bottom of the EMM-E6 front panel. 3. Slide the MIM out of the chassis until you can easily access the EMM-E6 switch panel located at the bottom of the board.
15.3 STANDARD LOCAL DOWNLOAD Table 15-1 provides a step by step procedure for downloading the firmware image file. This section provides specific MIB OIDs, their names, and the required setting for proper image file download. Refer to your specific MIB walking tool documentation for instructions on how to set MIB OID strings.
CHAPTER 15: IMAGE FILE DOWNLOAD 15.4 REMOTE RUNTIME DOWNLOAD If the Runtime Download is interrupted, the Firmware Image NOTE in Flash memory will be erased. The EMM-E6 will continue to operate until it is either Reset or Powered OFF and ON. After either of these events, the EMM-E6 can download a Firmware Image from a BootP server ONLY! The process of configuring a BootP Server is discussed at length in...
Page 161
Table 15-2. Runtime Download Procedure Step OID Name (1). ctDLTFTPRequestHost (2). ctDLTFTPRequest (3). ctDLOnLineDownload ctDLOperStatus (This OID monitors the progress of the Runtime Download.) EMM-E6 User's Guide REMOTE RUNTIME DOWNLOAD OID Number 1.3.6.1.4.1.52.4.1.5.8.1.18.0 1.3.6.1.4.1.52.4.1.5.8.1.19.0 1.3.6.1.4.1.52.4.1.5.8.1.16.0 1.3.6.4.1.52.4.1.5.8.1.17.0 Data SNMP OID Data Type Enter the IP address address...
Page 162
CHAPTER 15: IMAGE FILE DOWNLOAD Table 15-2. Runtime Download Procedure (Continued) Step OID Name NOTE: If you selected forceDownLoadReset at Step 3, then DO NOT CONTINUE, you have completed all necessary settings. NOTE: If you selected forceDownLoad at Step 3, then you can reset the EMM-E6 at a later time.
EMM-E6 SPECIFICATIONS This appendix provides the operating specifications for the Cabletron Systems EMM-E6. Cabletron Systems reserves the right to change these specifications at any time without notice. A.1 BRIDGING FUNCTIONALITY FLASH Memory: Shared Sonic Memory: Internal Processor: Read Only Memory:...
APPENDIX A: EMM-E6 SPECIFICATIONS A.2 REPEATER FUNCTIONALITY Delay Times (port x in to port x out) Start of Packet: Collision to JAM: Preamble Input: Output: JAM Output: Minimum Packet Repeated: 96 bits including preamble. (Packet FAULT Protection: 1,450 ns max. 1,550 ns max.
A.3 COM 1 PORT Type: Standard RJ45 port Pin 1 Transmit Data (XMT) Data Set Ready (DSR) Not used Receive Data (RCV) Signal Ground (GND) Data Terminal Ready (DTR) From COM 1 port Not used Not used A.4 COM 2 PORT Type: Standard RJ45 port Pin 1 Transmit Data (XMT)
APPENDIX A: EMM-E6 SPECIFICATIONS A.6 SAFETY This unit meets the safety requirements of UL 1950 (without D3 deviations), CSA C22.2 No. 950, and EN 60950; the EMI requirements of FCC Part 15 Class A, EN 55022 Class A, and VCCI Class I; and the EMC requirements of EN 50082-1, including IEC 801-2 (ESD) levels 1 through 4, IEC 801-3 (Radiated Susceptibility) levels 1 through 4, and IEC 801-4 (EFT/B) levels 1 through 4.
Max Receive Power: Transmitter Power Into - 50/125 m fiber: 62.5/125 m fiber: 100/140 m fiber: Bit Error Rate: Cabletron Systems FOT-F Fiber Optic Transceiver SMA fiber optic ports (Figure A-3) ST fiber optic ports (Figure A-3) -29.5 dBm -8.2 dBm -13.0 dBm...
(-0.15 dBm) by four, and add the result to the typical output power (4 x -0.15 dBm + -16.4 dBm = -17.0 dBm). EMM-E6 User’s Guide Cabletron Systems FOT-F3 Fiber Optic Transceiver ST fiber optic ports (Figure A-4) Figure A-4. EPIM-F3...
Page 170
APPENDIX A: EMM-E6 SPECIFICATIONS Table A-2. EPIM-F3 Statistics Parameter Transmitter Peak Wave Length: Spectral Width: Rise Time: Fall Time: Duty Cycle: TX Power: TX Budget: RX Sensitivity: MAX Receive Power: Bit Error Rate: The above transmitter power levels and receive sensitivity NOTE levels represent Peak Power Levels after optical overshoot.
Grounding: Connecting a thin coaxial cable segment to earth ground at more than one point can produce dangerous ground currents. EMM-E6 User’s Guide Cabletron Systems TMS-3 Transceiver BNC receptacle, with gold center contact, for use with BNC type T-connectors and RG-58 thin-net cable (Figure A-5).
This Appendix contains a selected number of OID strings that are among the most frequently needed. The OIDs are implemented by using either the SNMP Tools procedures detailed in Chapter 9 or the MIB Navigator procedures located in Chapter 13. Note that the OIDs can be accessed using LANVIEW, SPECTRUM, SPMA, or the SNMP element management packages of other vendors.
APPENDIX B: COMMONLY-USED OIDs B.2 CONFIGURING ARP REQUEST PACKETS The EMM-E6’s SNMP Tools Screen allows you to generate an Address Resolution Protocol (ARP) Request packet utilizing specific framing through local management. An ARP Request is used to send an SNMP Trap to a destination node that has not yet made or established contact with the EMM-E6.
B.3 PORT GROUP SECURITY The next seven OIDs are used for port group security features. rptrSrcAddrMgmtPortLock Description: Setting this object to lock activates the network port security lock. Setting a value of portMisMatch (3) is invalid. A read of PortMisMatch means that the lock status between the port group, port and repeater levels do not agree.
Page 176
APPENDIX B: COMMONLY-USED OIDs rptrPortSecurityLockStatus Description: Defines the lock status for this particular port entry. Object Identifier: Data Type: Values: Access Policy: rptrPortSecurityLockAddAddress Description: Setting a value to this object adds a new entry to the rptrPortSecurityListTable. When read, this object displays an Octet String of size 6 with each octet containing a 0.
Page 177
rptrPortSecurityDisableOnViolation Description: Designates whether port is disabled if source address is violated. A source address violation occurs when an address is detected which is not in the source address list for this port. If this port is disabled for this port address violation it can be enabled by setting rptrPortMgmtAdminState.
APPENDIX B: COMMONLY-USED OIDs B.4 ENABLING & DISABLING SNMP TRAPS The EMM-E6 supports the collection and reporting of SNMP Traps of several types and at several levels. SNMP Trap sending may be enabled or disabled for the following trap types: segmentation, link, and source addressing.
rptrSaTrapSetScraddr Description: Enables and disables source address traps for this network (i.e., Channel A, B, or C). Object Identifier: Data Type: Values: Access Policy: B.4.2 Enabling Module Level SNMP Traps The next three OIDs are for traps enable and disable at the board level. The <b#>...
APPENDIX B: COMMONLY-USED OIDs rptrPortGrpHwTrapSetSeg Description: Enables and disables segmentation traps for the specified port group at the board level. Object Identifier: Data Type: Values: Access Policy: rptrPortGrpSaTrapSetSrcaddr Description: Enables and disables segmentation traps for the specified port group at the board level. Object Identifier: Data Type: Values:...
Page 181
rptrPortHwTrapSetLink Description: Enables and disables link traps for this port. Object Identifier: Data Type: Values: Access Policy: rptrPortHwTrapSetSeg Description: Enables and disables segmentation traps for this port. Object Identifier: Data Type: Values: Access Policy: rptrPortGrpSaTrapSetSrcaddr Description: Enables and disables source address traps for the specified port group.
APPENDIX B: COMMONLY-USED OIDs B.5 ACTIVATING RMON GROUPS The initial configuration of the EMM-E6 at installation does not provide the activation of the RMON Default and Host Groups. These management groups may be activated or deactivated through local management using OID Sets.
B.6 BRIDGING The following OID is used to enable and disable the interface for the bridging function. dot1dstpPortEnable Description: The enabled/disabled status of the port. Object Identifier: Data Type: Values: Access Policy: B.7 TRUNK PORT SECURITY The following OID is required if security is not desired on a trunk port. The user must force the port to be a trunk port before locking the port via the module or channel.
APPENDIX B: COMMONLY-USED OIDs B.8 CHANNEL SELECTION The following two OIDs are needed to select channel assignments (A, B, or C) for all boards or individual ports. These OIDs are needed for products supporting multichannel connectivity. fnbconnect Description: Denotes the connection status of the CSMA/CD board to the inter-RIC bus.
B.9 OID HASHING ON SOURCE ADDRESES The following OID allows the enabling and disabling of DEC hashing, which may be necessary or desired in DECnet and mixed IEEE 802.3/ DECnet environments. rptrSrcAddrMgmtHashType Description: This enables and disables DECnet hashing on source addresses which is useful in DECnet environments.
Page 186
This glossary provides brief descriptions of some of the recurrent terms in the main text, as well as related terms used in discussions of the relevant networking discussions. These descriptions are not intended to be comprehensive discussions of the subject matter. For further clarification of these terms, you may wish to refer to the treatments of these terms in the main text.
Page 187
Attenuation to BRIM Attenuation Loss of signal power (measured in decibels) due to transmission through a cable. Attenuation is dependent on the type, manufacture and installation quality of cabling, and is expressed in units of loss per length, most often dB/m.
Page 188
Broadcast A type of network transmission; a broadcast transmission is one which is sent to every station on the network, regardless of location, identification, or address. Buses Physical portions of the backplane of a modular chassis which pass information between modules. Card See Module.
Page 189
Console to Decryption Console See Terminal. Cross-Over A length of multi-stranded cable in which the transmit wire(s) of one end is/are crossed over within the cable to connect to the receive wire(s) of the other end. Cross- Overs are used to connect devices to like devices, ensuring that transmit and receive connections are properly made.
Page 190
Dedicated Assigned to one purpose or function. Default the IP address of the network or host to which all packets Gateway addressed to unknown network or host are sent Device Any discrete electronic item connected to a network which (network) either transmits and receives information through it, facilitates that transmission and reception, or monitors the operation of the network directly.
Page 191
FDDI to Host FDDI Fiber Distributed Data Interface. A high-speed networking architecture. FDDI requires that stations only transmit data when they have been given permission by the operation of the network, and dictates that stations will receive information at pre-determined intervals. See also Token.
Page 192
Hot Swap Hot Swap capability indicates that a product is capable of being removed from an operating modular chassis and reinserted or replaced without requiring that the chassis and all associated modules be powered down. See Modular Chassis. IANA Internet Assigned Numbers Authority. An agency which assigns and distributes IP addresses.
Page 193
IP Address to Mbps IP Address Internet Protocol address. The IP address is associated, by the network manager or network designer, to a specific interface. The availability of IP addresses is controlled by the IANA. International Organization for Standardization. The ISO has developed a standard model on which network operation is based, called the OSI Model.
Page 194
Media Physical cabling or other method of interconnection through which network signals are transmitted and received. Management Information Base. A database of data related to a specific management or manageable network device, which may be viewed or modified through SNMP commands.
Page 195
Node to Port Assignment Node Any single end station on a network capable of receiving, processing, and transmitting packets. NVRAM Non-Volatile Random Access Memory. Memory which is protected from elimination during shutdown and between periods of activity, frequently through the use of batteries. Octet A numerical value made up of eight binary places (bits).
Page 196
Protocol A set of rules governing the flow of information within a communications infrastructure. Protocols control operations such as frame format, timing, and error correction. See also Architecture. Polyvinyl Chloride. A material commonly used in the fabrication of cable insulation. This term is used to describe a non-plenum rated insulating material.
Page 197
Segment to SQE Segment A portion of a network which is separated from other networks. A segment may be one portion of a bridged, switched, or routed network. Segments must be capable of operating as their own networks, without requiring the services of other portions of the network.
Page 198
Straight-Tip. A modular connector and port system used with both multimode and single mode fiber optic cabling. The ST connector utilizes an insert and twist-lock mechanism. Station See node. Shielded Twisted Pair. Refers to a type of cabling, most commonly used in Token Ring networks, which consists of several strands of cables surrounded by foil shielding, which are twisted together.
Page 199
Token to UTP Token A particular type of frame which informs a station in the Token Ring and FDDI network architectures that it may transmit data for a specified length of time. Once that time has expired, the station must stop transmitting and pass the token along to the next station in the network.
STBY SWITCH SETTINGS Switch Cabletron Systems Use Only. Must be in OFF position. Cabletron Systems Use Only. Must be in OFF position. Cabletron Systems Use Only. Must be in OFF position. MIMREV. Should be OFF unless THN-MIM s with part numbers below 9000043-05 are located in the MMAC.
EMM-E6 QUICK REFERENCE CARD • Slide the EMM-E6 into the first and second slots of the MMAC chassis (as shown below). • Secure the module by tightening the knurled knobs at the top and bottom of the module. • Power on the MMAC chassis. Monitor the state of the CPU LED. •...
Need help?
Do you have a question about the EMM-E6 Ethernet and is the answer not in the manual?
Questions and answers