Page 3
Only qualified personnel should perform installation procedures. Cabletron Systems reserves the right to make changes in specifications and other information contained in this document without prior notice. The reader should in all cases consult Cabletron Systems to determine whether any such changes have been made. The hardware, firmware, or software described in this manual is subject to change without notice.
Notice FCC NOTICE This device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. NOTE: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC rules.
CABLETRON SYSTEMS, INC. PROGRAM LICENSE AGREEMENT IMPORTANT: THIS LICENSE APPLIES FOR USE OF PRODUCT IN THE UNITED STATES OF AMERICA AND BY UNITED STATES OF AMERICA GOVERNMENT END USERS. BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT, CAREFULLY READ THIS LICENSE AGREEMENT. This document is an agreement (“Agreement”) between You, the end user, and Cabletron Systems, Inc.
Page 6
Notice component of a plant, export to Country Groups D:1 or E:2 the direct product of the plant or a major component thereof, if such foreign produced direct product is subject to national security controls as identified on the U.S. Commerce Control List or is subject to State Department controls under the U.S.
Page 7
CABLETRON SYSTEMS SALES AND SERVICE, INC. PROGRAM LICENSE AGREEMENT IMPORTANT: THIS LICENSE APPLIES FOR USE OF PRODUCT IN THE UNITED STATES OF AMERICA AND BY UNITED STATES OF AMERICA GOVERNMENT END USERS. BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT, CAREFULLY READ THIS LICENSE AGREEMENT. This document is an agreement (“Agreement”) between You, the end user, and Cabletron Systems Sales and Service, Inc.
Page 8
Notice component of a plant, export to Country Groups D:1 or E:2 the direct product of the plant or a major component thereof, if such foreign produced direct product is subject to national security controls as identified on the U.S. Commerce Control List or is subject to State Department controls under the U.S.
Page 9
CABLETRON SYSTEMS LIMITED PROGRAM LICENSE AGREEMENT IMPORTANT: THIS LICENSE APPLIES FOR USE OF PRODUCT IN THE UNITED STATES OF AMERICA AND BY UNITED STATES OF AMERICA GOVERNMENT END USERS. BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT, CAREFULLY READ THIS LICENSE AGREEMENT. This document is an agreement (“Agreement”) between You, the end user, and Cabletron Systems Limited (“Cabletron”) that sets forth your rights and obligations with respect to the Cabletron software program (“Program”) in the package.
Page 10
Notice component of a plant, export to Country Groups D:1 or E:2 the direct product of the plant or a major component thereof, if such foreign produced direct product is subject to national security controls as identified on the U.S. Commerce Control List or is subject to State Department controls under the U.S.
DECLARATION OF CONFORMITY Application of Council Directive(s): Manufacturer’s Name: Manufacturer’s Address: European Representative Name: European Representative Address: Conformance to Directive(s)/Product Standards: Equipment Type/Environment: We the undersigned, hereby declare, under our sole responsibility, that the equipment packaged with this notice conforms to the above directives. Manufacturer Mr.
CHAPTER 1 INTRODUCTION Related Documentation ...1-1 How to Use This Guide ...1-1 Document Conventions ...1-2 Technical Support ...1-2 CHAPTER 2 CYBERMONITOR OVERVIEW About The CyberMONITOR...2-1 Graphical User Interface ...2-1 Port Interface Icons ...2-2 Port Interface Stats Panels ...2-3 Primary Monitor Window Function Menu...2-3 Statistical Data Tables ...2-6 Data Table Function Buttons...2-6 Statistics Charts ...2-6...
Page 14
Contents Statistical Data Tables ...3-8 Statistic Table Menu Items ...3-8 Statistical Table Scroll Bar...3-8 Secondary IP Addresses ...3-9 Statistical Data Charts ...3-10 Autosizing...3-11 Movable Cursor ...3-11 Zooming ...3-11 Data Statistics ...3-11 Interpreting Statistical Data Tables ...3-12 Ethernet Statistical Data...3-13 Ethernet Packet Statistics ...3-14 Ethernet Data Table Function Menu...3-14 Wide Area Statistical Data Table...3-15 Wide Area Statistical Data...3-16...
Page 15
Inverse Multiplex Table Data...3-30 Frame Relay Statistics Table ...3-31 Frame Relay Statistical Data ...3-31 Traps...3-32 ISDN Call History/Backup...3-38 ISDN Call History Panel ...3-38 ISDN/Backup Panel ...3-41 ISDN/Backup File Menu ...3-41 CHAPTER 4 TROUBLESHOOTING SNMP Errors ...4-1 Connection Errors ...4-1 User Cannot Communicate with Remote Network Station ...4-1 APPENDIX A GLOSSARY CyberMONITOR User’s Guide...
Introduction Welcome to the Cabletron Systems CyberMONITOR User’s Guide. This guide provides information on how to use this utility, plus software specifications and troubleshooting tips. This guide also provides background information about Ethernet Port Interfaces, and Wide Area Port Interfaces, and a discussion of routing and bridging over Wide Area Networks (WANs). Related Documentation Read the Advanced User Information for the various Cabletron WAN products to gain a better understanding of the underlying technology and functionality.
Chapter 1: Introduction Document Conventions The following conventions are used throughout this guide: Note symbol. Calls the reader’s attention to any item of information that may be NOTE of special importance. Tip symbol. Conveys helpful hint concerning procedures or actions. Caution symbol.
Page 19
Before calling Cabletron Systems, have the following information ready: • Your Cabletron Systems service contract number • A description of the problem • A description of any action(s) already taken to resolve the problem. • The serial and revision numbers of all involved Cabletron Systems products in the network •...
CyberMONITOR Overview This chapter provides an overview of the functionality of the Cabletron Systems CyberMONITOR. About The CyberMONITOR The Cabletron Systems CyberMONITOR is a Wide Area Network Monitoring system. The CyberMONITOR polls status conditions, and monitors network traffic and bandwidth utilization of WAN (Wide Area Network) devices.
Chapter 2: CyberMONITOR Overview Figure 2-1 Primary Monitor Window Port Interface Icons Figure 1 shows the Primary Monitor Window representing a CSX400 CyberSWITCH. The Primary Monitor Window displays two Ethernet Port icons, and two Wide Area port icons under the title bar. These icons represent Ethernet port 1, Ethernet port 2, and two Wide Area Port Interfaces - designated Wide Area 1 ISDN, and Wide Area 2 DI.
Port Interface Stats Panels The Ethernet Ports are represented by the Ethernet 1, and Ethernet 2 Port panels. The Wide Area 1, and Wide Area 2 panels show ISDN transmission mode, and Drop and Insert (DI) mode, no protocol set. Inside each panel are the statistics for Bandwidth Utilization for Transmit (Tx) and Receive (Rx), and error statistics for these ports.
Chapter 2: CyberMONITOR Overview Statistical Data Tables Statistical Data Tables (see Figure interface, or function within the device you are monitoring. Various status conditions and data throughput are shown in each row in the table. The color of a row indicates the interval of time that the data was derived from (gray indicates time since start up of the CyberMONITOR Utility), (green indicates the elapsed time since boot up of the monitored device).
Page 27
CyberMONITOR Overview Figure 2-5 Chart by Protocols Drop Down Menu A statistic chart for Wide Area network interface port number 1, is shown in Figure 2-6, on the following page. The IP Address of the device being monitored is displayed in the upper border of the chart.
Page 28
Chapter 2: CyberMONITOR Overview Figure 2-6 Interface Statistic Chart for Wide Area 1 There are two menu items at the top of the statistic chart; File, and Help. The File menu lets you access either Print (which prints the chart), or Close, (which closes the window). The Help button accesses the help page for this window.
CyberMONITOR Overview Alarm Settings Click the Custom Button in the menu bar of the Primary Monitor Window to access the drop down menu shown in Figure 2-7, below. This menu lets you select either the Bandwidth Thresholds panel, or the Errors Threshold panel. (see Figure 2-8, andFigure...
Page 31
CyberMONITOR Overview Figure 2-9 Alarm Panel for Errors Parameter Figure 2-9, above, shows Tx and Rx error levels preset to 5% for Warning and 10% for Critical on the Ethernet 1, and Ethernet 2 ports, and Wide Area 1, and Wide Area 2 ports. Error thresholds have also been set for the functions IP Routing and IPX Routing.
Chapter 2: CyberMONITOR Overview CyberMONITOR Help System The CyberMONITOR employs an interactive help system with links to related topics. There are four ways to access the help system from within the CyberMONITOR: • Click on the HELP button on any window to access the Help Contents page. •...
Getting Help For additional support related to this device or document, contact Cabletron Systems using one of the following methods: World Wide Web Phone Internet mail Login Password To send comments or suggestions concerning this document, contact the Cabletron Systems Technical Writing Department via the following email address: TechWriting@cabletron.com Make sure to include the document Part Number in the email message.
Using CyberMONITOR Prerequisites The following is a list of prerequisites to using the CyberMONITOR utility: Virtual Memory Enabled (Windows 95) You must have Virtual Memory enabled to run CyberMONITOR. To check if you have Virtual Memory enabled for a Windows 95 Operating System, right click on the My Computer icon on your desktop.
Chapter 3: Using CyberMONITOR Local User Networks If your system is connected to more than one network, you will see the Local User Networks window shown below in Figure 3-1. Use the scroll button to select the network connection that your CyberMONITOR-capable device is attached to.
Page 37
Using CyberMONITOR Figure 3-3 Primary Monitor Window and File Menu CyberMONITOR User’s Guide...
Chapter 3: Using CyberMONITOR Custom Interval The Custom (polling) Interval window shown in Figure 3-4, below displays when you click on Polling Interval from Preferences in the File submenu (see Figure 3-3, on the previous page). The Custom Interval window is used to change the polling interval for the device being monitored. Use the scroll button to select a polling interval from the list.
Using CyberMONITOR Enter the Start and Stop times for your monitoring session. Note the AM, and PM buttons. The maximum interval that can be set for a monitoring session is twenty-four hours, minus one minute. This interval is for a monitoring session that is automatically started, and automatically stopped. For example, setting the Start Time for 10:00 AM, and the Stop Time for 9:59 AM will produce the maximum twenty-four hour (minus one minute) monitoring interval.
Page 40
Chapter 3: Using CyberMONITOR Figure 3-6 Monitor Window for HSIM-W6 Device Inside each panel are the statistics for bandwidth utilization for Transmit (Tx) and Receive (Rx), and error statistics for these ports. The panels will always represent the type of network modules installed in the device being monitored, and the protocol or transmission mode being employed.
Function Menus There are four function menu items at the top of the primary monitor window. A brief description of the function of each menu item follows: File Menu • File menu item lets you access the four menus shown in Use the New Device menu item to select a new device to monitor by presenting the IP Address window to enter the new device’s IP Address and Community Name.
Chapter 3: Using CyberMONITOR Statistical Data Tables Double clicking on any panel in the primary monitor window will produce a statistical data table for that module, or function. module 1- logical interface number 3 (Wide Area 1-3). At the end of this chapter there is an in-depth discussion of the data displayed in each type of table.
Using CyberMONITOR Secondary IP Addresses Beneath the Primary IP Address row in the Ethernet statistical data table is the Secondary IP Address row. If an interface has more than one IP Address associated with it, the first Secondary IP Address will appear in this row of the table. The click button at the end of the Secondary IP Address row lets you access a table of Secondary IP Addresses if more than one exists.
Chapter 3: Using CyberMONITOR Statistical Data Charts Clicking Charts at the top of the statistical data table will produce a chart (see Figure 3-8 below) of the data in one of the charting modes mentioned previously (in this case bandwidth vs. time). Figure 3-8 Statistical Data Chart for Wide Area 1 In the upper left corner of the chart is a File button that lets you access a menu for Print (printing the chart), or Close (closing the chart window).
Using CyberMONITOR Autosizing The statistical data chart uses “autosizing”. If a sudden peak exceeds the current scale, the chart will adjust the scale factor to include the peak. All events are always visible on this chart - nothing will ever be off-scale.The scale at the left of the chart reflects the units of measurement (Kilobits per second, in this case).
Chapter 3: Using CyberMONITOR Interpreting Statistical Data Tables The following figures and corresponding data will explain the entries within the statistical data tables, and tables of functions such as IPX Routing, and Inverse Multiplexing. Figure 3-9, Ethernet Network Interface Statistical Data Table, shown below, and Ethernet Statistical Data, explain the interpretation of data displayed in Ethernet statistical data tables.
Proxy ARP - When Proxy ARP is enabled, and an ARP request is received, for an IP Host whose network address is listed in the IP Route Table, the IP Routing Services sends a Proxy ARP response, with the physical address of the receiving router port in place of the requested host's physical address.
Chapter 3: Using CyberMONITOR Ethernet Packet Statistics The packet statistics for an Ethernet network interface port are shown below. These statistics appear below the horizontal scroll bar in the Ethernet statistical data table. Total Packets In - The total packets input to the interface (Interface Number displayed) since the device was started.
Using CyberMONITOR Wide Area Statistical Data Table Figure 3-10, shown below, and Wide Area Statistical Data, explain the interpretation of the statistical data displayed in the Wide Area Statistical Data Table. Figure 3-10 Wide Area Statistical Data Table CyberMONITOR User’s Guide 3-15...
Chapter 3: Using CyberMONITOR Wide Area Statistical Data The Wide Area Data Tables contain all the pertinent information about the Wide Area network interface port that you are monitoring. The following is a breakdown of these statistics: Alias - This is an alias name that you give to the interface, for convenience. Protocol - Protocol of the interface being monitored (Frame Relay, PPP, etc.).
Proxy ARP - When Proxy ARP is enabled, and an ARP request is received, IP Routing Services sends a Proxy ARP response, with the physical address of the receiving router port in place of the requested host's physical address. Horizontal Scroll Bar - The horizontal scroll bar in the center of the table is used to scroll the data table horizontally, to view data for other Interface Numbers.
Chapter 3: Using CyberMONITOR Other Tables There is another class of data tables discussed in the following sections, that are displayed by the CyberMONITOR utility. These are the data tables for the following functions; Bridging, IP Routing, IP Event Log, RIP Table, IPX Routing, IPX Event Log, Inverse Multiplexing, Frame Relay, Traps, and ISDN/Backup.
Bridging Statistical Data The Bridging Data Table shows the state of the Bridging interface. The text in the outer border indicates the status of Spanning Tree (STP). The Time frame shows the state of the following Spanning Tree parameters: Hello Time - Time interval between generation of Bridge Protocol Data Units (BPDUs) by the root bridge (bridge with the lowest bridge ID becomes the root of the Spanning Tree).
Chapter 3: Using CyberMONITOR Bridging Per Interface Table Figure 3-12, below, shows the Bridging Per Interface Table. To access the Bridging Per Interface table, click on the Bridging panel on the Primary Monitor Window (see Bridging Per Interface Data The Bridging Per Interface table shows the following information: Interface Numbers - logical interface number.
IP Per Interface Figure 3-13, below shows the IP Per Interface Table. To access the IP Per Interface Table, click on the IP Routing panel on the Monitor Window for HSIM-W6 (see IP Per Interface Data The IP Per Interface Table shows IP Routing statistics sorted by Interface Number. The data displayed is described below: Interface Number - logical interface number.
Chapter 3: Using CyberMONITOR IP Routing Tables Figure 3-14, below, shows the IP Routing Statistics Table. To access the IP Routing Statistics Table, click on the Table menu item on the IP Per Interface table menu bar (see Figure 3-13). Figure 3-14 IP Routing Statistics Table 3-22 CyberMONITOR User’s Guide...
IP Routing Statistics The IP Routing Statistics Table Destination - IP Address of the route destination. Interface - logical interface number of the route. Alias - an alias name that you assign to the Interface Number. Mask - The Subnet Mask of the destination IP Address. Protocol - This window shows the method used to set the Protocol.
Page 58
Chapter 3: Using CyberMONITOR When IP Events are sorted by event type, similar events will be grouped together. When IP Events are sorted by severity, there are three levels: low, medium, and high, with high having the highest priority. Sorting by Interface Numbers will be done lowest number first. Clicking the Refresh Button refreshes the window with a new set of data.
Using CyberMONITOR RIP Table The RIP (Routing Information Protocol) Table, shown in Figure 3-17, below, displays the IP Address, and Send and Receive RIP Protocols in use for the interface being monitored. To access the RIP Table, click on the Tables menu on the primary monitor window, then click IP, and then RIP Table.
Chapter 3: Using CyberMONITOR IPX Routing Table The IPX RIP/SAP Routing Table is a RIP Table (Routing Information Protocol) and a SAP Table (Service Advertising Protocol) combined in one window. Figure 3-18, below, shows the IPX RIP/SAP Routing Table. To access the IPX Routing Table, click on the IPX Routing menu item in the Tables menu on the Primary Monitor Window (see Figure 3-3).
The Find Server button will access the RIP Table information for a server that you select in the SAP Table. Show All, in the IPX Service Types drop down list will display all of the servers in the SAP Table with options allowing you to display only file servers, job servers, print servers, etc. The File menu item lets you access either Print (prints the table), or Close, (closes window).
Chapter 3: Using CyberMONITOR IPX Event Log The IPX Event Log Window (Figure 3-21 on the following page) is a record of IPX Routing events, or device status changes. The events are listed in tabular form, and can be sorted by Interface Number, Event Type, or Severity.
Using CyberMONITOR Figure 3-21 IPX Event Log Window Inverse MUX Data Table Figure 3-22, on the following page, shows the Inverse MUX (Multiplexing) Data Table. To access the Inverse MUX Data Table, click on the Inverse MUX menu item in the Tables menu on the Primary Monitor Window (see Figure 3-3).
Chapter 3: Using CyberMONITOR Figure 3-22 Inverse MUX Data Table Inverse Multiplex Table Data The Inverse Multiplex Table shows the interfaces selected to perform the inverse multiplex function. Inverse Multiplexing combines two channels to share the bandwidth utilization load. The BW Available column shows the available bandwidth of each interface. Ideally, each interface should have the same available bandwidth, but this is not always the case.
Frame Relay Statistics Table Figure 3-23, below, shows the Frame Relay Statistics Table. The Frame Relay statistics table shows Frame Relay statistics sorted by DLCIs (Data Link Connection Identifiers). DLCIs are the indentifying numbers for switched virtual connections. To access the Frame Relay Statistics Table, click on the Frame Relay menu item in the Tables menu of the Primary Monitor Window (See Figure 3-3).
Chapter 3: Using CyberMONITOR Committed Burst - The maximum amount of data on the network during a time interval, without the network discarding any data. Excess Burst - The maximum amount of data allowed to exceed the Committed Burst (there is no guarantee that this data will be passed by the network - it may be discarded).
Page 67
Using CyberMONITOR Figure 3-25 Trap Destination Configuration Window Figure 3-26 Add Trap and Modify Trap Windows CyberMONITOR User’s Guide 3-33...
Page 68
Chapter 3: Using CyberMONITOR The Modify button (see Figure 3-25) lets you modify the IP Address or state (enabled, or disabled) of the item highlighted in the Trap Destination Configuration window. The Modify button displays the Modify Trap Destination window shown in Figure 3-26 on the previous page.
Page 71
Figure 3-30 Trap Events Window (right side) The Trap Events Window shown in displays when you click OK on the Trap Agent Window. Traps received are displayed in chronological sequence (most recent at the top) in the Trap Events Window. Traps are also uniquely identified by a trap number, shown at the far right of the Trap Events Window.
Chapter 3: Using CyberMONITOR ISDN Call History/Backup The ISDN Call History/Backup Window calls and corresponding device status. To access the ISDN Call History/Backup Window, click the ISDN/Backup menu item, in the Tables menu as shown in Figure 3-31 ISDN/Backup Tables Menu Item The ISDN Call History/Backup window is comprised of two panels: an ISDN Call History panel, and the Current Interface Backups panel (see ISDN Call History Panel...
Page 73
Using CyberMONITOR The time that the connection was established, stated as; hour, Connect Time hh.mm.ss — minute, and second. Disconnect Time hh.mm.ss — The time that the connection was taken down, or disconnected stated as; hour, minute, and second. Figure 3-32 ISDN Call History/Backup Window (left side) The duration of the connection stated as;...
Page 74
Chapter 3: Using CyberMONITOR Originate, Call Back, or Answer. Call Origin — Info Type — Call data type; other, speech, digital, audio, video, etc. The amount of data transmitted by your interface in bytes, kilobytes, or Transmitted Bytes — megabytes over the duration of the call. (from connect time to disconnect time). The amount of data received by your interface in bytes, kilobytes, or Received Bytes —...
Using CyberMONITOR ISDN/Backup Panel The ISDN/Backup panel (see Figure 3-33 on the previous page) is a list of ISDN interface numbers, and aliases and whether they are used as backup ISDN interfaces. ISDN can be used as a backup medium for any WAN WPIM interface. ISDN is the preferred medium for the purpose of backup because of its comparatively low cost.
Page 76
Chapter 3: Using CyberMONITOR 3-42 CyberMONITOR User’s Guide...
If Bridging, • Check that the Bridging Default Destination is set. • Check that bridging to/from the remote router is set on. • Be sure to reboot if you have made any bridging destination or control changes. CyberMONITOR User’s Guide...
Page 78
• Check that TCP/IP Routing is set on and is enabled at the remote end. • Check that the IP address of the LAN beyond the remote router is correct, as well as the associated Subnet Mask. • If the remote router WAN IP address and Subnet Mask are required, check that they have been specified correctly.
Page 79
Attachment Unit Interface. An IEEE 802.3 transceiver cable connecting the network AUI — device (such as a router) to the MAU (media access unit). Bandwidth on Demand — Feature providing the capability of adjusting the bandwidth (opening or closing multiple B channels) when the load in traffic increases or decreases.
Page 80
Appendix A: Glossary Challenge Handshake Authentication Protocol. A security protocol supported under CHAP — point-to-point protocol (PPP) used to prevent unauthorized access to devices and remote networks. Uses encryption of password, device names and random number generation. CSSs — Controlled Slip Seconds - a DS-1 Line Status Error condition. A one second interval containing one or more Controlled Slips (replication or deletion of the payload bits of a DS-1 frame).
Page 81
A combination of techniques used to protect one network from unknown networks Firewall — and users on the outside. Firewalls can filter or block traffic and act as a management and network security point where all traffic can be scrutinized. DTE —...
Page 82
Appendix A: Glossary A telecommunications line between two service points leased from a Leased Line — communications carrier for private use, usually incurring a monthly service rate. LEDs (Light Emitting Diodes) — Line Errored Seconds - a DS-1 Line Status Error condition. Line Errored Seconds are LESs —...
Page 83
multi-vendor interoperability. The OSI Reference Model defines seven layers, each providing specific network functions. A group of data that includes a header and usually user data for transmission through a Packet — network. PCVs — Path Coding Violations - a DS-1 Line Status Error condition. Path Coding Violations are caused by a Frame Synchronization Bit Error in the D4, and E1-no CRC formats, or a CRC error in the ESF, and E1-CRC formats.
Page 84
Appendix A: Glossary Frames sent out by servers under IPX to check whether illegal copies of Serialization Frames — NetWare are in use on the network. Service Advertising Protocol — Protocol used in IPX for broadcasting information about services available on the network, such as file servers, CD-ROM drives and modem pools. Severely Errored Seconds - A DS-1 Line Status Error condition.
Page 85
Glossary Internet standard protocol for remote terminal emulation that allows a user to TELNET — remotely log in to another device and appear as if directly connected. TFTP — Trivial File Transfer Protocol. A simplified version of the File Transfer Protocol (FTP) allowing for file transfer between computers over a network.
Need help?
Do you have a question about the CyberSWITCH CSX400 and is the answer not in the manual?
Questions and answers