Cabletron Systems CyberSWITCH CSX400 User Manual

Enterasys cyberswitch csx400: user guide
Hide thumbs Also See for CyberSWITCH CSX400:
Table of Contents

Advertisement

CyberMONITOR
User's Guide
9032331-05

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CyberSWITCH CSX400 and is the answer not in the manual?

Questions and answers

Summary of Contents for Cabletron Systems CyberSWITCH CSX400

  • Page 1 CyberMONITOR User’s Guide 9032331-05...
  • Page 3 Only qualified personnel should perform installation procedures. Cabletron Systems reserves the right to make changes in specifications and other information contained in this document without prior notice. The reader should in all cases consult Cabletron Systems to determine whether any such changes have been made. The hardware, firmware, or software described in this manual is subject to change without notice.
  • Page 4: Industry Canada Notice

    Notice FCC NOTICE This device complies with Part 15 of the FCC rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. NOTE: This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC rules.
  • Page 5: Program License Agreement

    CABLETRON SYSTEMS, INC. PROGRAM LICENSE AGREEMENT IMPORTANT: THIS LICENSE APPLIES FOR USE OF PRODUCT IN THE UNITED STATES OF AMERICA AND BY UNITED STATES OF AMERICA GOVERNMENT END USERS. BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT, CAREFULLY READ THIS LICENSE AGREEMENT. This document is an agreement (“Agreement”) between You, the end user, and Cabletron Systems, Inc.
  • Page 6 Notice component of a plant, export to Country Groups D:1 or E:2 the direct product of the plant or a major component thereof, if such foreign produced direct product is subject to national security controls as identified on the U.S. Commerce Control List or is subject to State Department controls under the U.S.
  • Page 7 CABLETRON SYSTEMS SALES AND SERVICE, INC. PROGRAM LICENSE AGREEMENT IMPORTANT: THIS LICENSE APPLIES FOR USE OF PRODUCT IN THE UNITED STATES OF AMERICA AND BY UNITED STATES OF AMERICA GOVERNMENT END USERS. BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT, CAREFULLY READ THIS LICENSE AGREEMENT. This document is an agreement (“Agreement”) between You, the end user, and Cabletron Systems Sales and Service, Inc.
  • Page 8 Notice component of a plant, export to Country Groups D:1 or E:2 the direct product of the plant or a major component thereof, if such foreign produced direct product is subject to national security controls as identified on the U.S. Commerce Control List or is subject to State Department controls under the U.S.
  • Page 9 CABLETRON SYSTEMS LIMITED PROGRAM LICENSE AGREEMENT IMPORTANT: THIS LICENSE APPLIES FOR USE OF PRODUCT IN THE UNITED STATES OF AMERICA AND BY UNITED STATES OF AMERICA GOVERNMENT END USERS. BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT, CAREFULLY READ THIS LICENSE AGREEMENT. This document is an agreement (“Agreement”) between You, the end user, and Cabletron Systems Limited (“Cabletron”) that sets forth your rights and obligations with respect to the Cabletron software program (“Program”) in the package.
  • Page 10 Notice component of a plant, export to Country Groups D:1 or E:2 the direct product of the plant or a major component thereof, if such foreign produced direct product is subject to national security controls as identified on the U.S. Commerce Control List or is subject to State Department controls under the U.S.
  • Page 11: Declaration Of Conformity

    DECLARATION OF CONFORMITY Application of Council Directive(s): Manufacturer’s Name: Manufacturer’s Address: European Representative Name: European Representative Address: Conformance to Directive(s)/Product Standards: Equipment Type/Environment: We the undersigned, hereby declare, under our sole responsibility, that the equipment packaged with this notice conforms to the above directives. Manufacturer Mr.
  • Page 12 Notice CyberMONITOR User’s Guide...
  • Page 13: Table Of Contents

    CHAPTER 1 INTRODUCTION Related Documentation ...1-1 How to Use This Guide ...1-1 Document Conventions ...1-2 Technical Support ...1-2 CHAPTER 2 CYBERMONITOR OVERVIEW About The CyberMONITOR...2-1 Graphical User Interface ...2-1 Port Interface Icons ...2-2 Port Interface Stats Panels ...2-3 Primary Monitor Window Function Menu...2-3 Statistical Data Tables ...2-6 Data Table Function Buttons...2-6 Statistics Charts ...2-6...
  • Page 14 Contents Statistical Data Tables ...3-8 Statistic Table Menu Items ...3-8 Statistical Table Scroll Bar...3-8 Secondary IP Addresses ...3-9 Statistical Data Charts ...3-10 Autosizing...3-11 Movable Cursor ...3-11 Zooming ...3-11 Data Statistics ...3-11 Interpreting Statistical Data Tables ...3-12 Ethernet Statistical Data...3-13 Ethernet Packet Statistics ...3-14 Ethernet Data Table Function Menu...3-14 Wide Area Statistical Data Table...3-15 Wide Area Statistical Data...3-16...
  • Page 15 Inverse Multiplex Table Data...3-30 Frame Relay Statistics Table ...3-31 Frame Relay Statistical Data ...3-31 Traps...3-32 ISDN Call History/Backup...3-38 ISDN Call History Panel ...3-38 ISDN/Backup Panel ...3-41 ISDN/Backup File Menu ...3-41 CHAPTER 4 TROUBLESHOOTING SNMP Errors ...4-1 Connection Errors ...4-1 User Cannot Communicate with Remote Network Station ...4-1 APPENDIX A GLOSSARY CyberMONITOR User’s Guide...
  • Page 16 Contents CyberMONITOR User’s Guide...
  • Page 17: Chapter 1 Introduction

    Introduction Welcome to the Cabletron Systems CyberMONITOR User’s Guide. This guide provides information on how to use this utility, plus software specifications and troubleshooting tips. This guide also provides background information about Ethernet Port Interfaces, and Wide Area Port Interfaces, and a discussion of routing and bridging over Wide Area Networks (WANs). Related Documentation Read the Advanced User Information for the various Cabletron WAN products to gain a better understanding of the underlying technology and functionality.
  • Page 18: Document Conventions

    Chapter 1: Introduction Document Conventions The following conventions are used throughout this guide: Note symbol. Calls the reader’s attention to any item of information that may be NOTE of special importance. Tip symbol. Conveys helpful hint concerning procedures or actions. Caution symbol.
  • Page 19 Before calling Cabletron Systems, have the following information ready: • Your Cabletron Systems service contract number • A description of the problem • A description of any action(s) already taken to resolve the problem. • The serial and revision numbers of all involved Cabletron Systems products in the network •...
  • Page 20 Chapter 1: Introduction CyberMONITOR User’s Guide...
  • Page 21: Chapter 2 Cybermonitor Overview

    CyberMONITOR Overview This chapter provides an overview of the functionality of the Cabletron Systems CyberMONITOR. About The CyberMONITOR The Cabletron Systems CyberMONITOR is a Wide Area Network Monitoring system. The CyberMONITOR polls status conditions, and monitors network traffic and bandwidth utilization of WAN (Wide Area Network) devices.
  • Page 22: Port Interface Icons

    Chapter 2: CyberMONITOR Overview Figure 2-1 Primary Monitor Window Port Interface Icons Figure 1 shows the Primary Monitor Window representing a CSX400 CyberSWITCH. The Primary Monitor Window displays two Ethernet Port icons, and two Wide Area port icons under the title bar. These icons represent Ethernet port 1, Ethernet port 2, and two Wide Area Port Interfaces - designated Wide Area 1 ISDN, and Wide Area 2 DI.
  • Page 23: Port Interface Stats Panels

    Port Interface Stats Panels The Ethernet Ports are represented by the Ethernet 1, and Ethernet 2 Port panels. The Wide Area 1, and Wide Area 2 panels show ISDN transmission mode, and Drop and Insert (DI) mode, no protocol set. Inside each panel are the statistics for Bandwidth Utilization for Transmit (Tx) and Receive (Rx), and error statistics for these ports.
  • Page 24 Chapter 2: CyberMONITOR Overview Figure 2-2 Primary Monitor Window and Device Properties Window CyberMONITOR User’s Guide...
  • Page 25 CyberMONITOR Overview Figure 2-3 Statistical Data Table for Wide Area 1 CyberMONITOR User’s Guide...
  • Page 26: Statistical Data Tables

    Chapter 2: CyberMONITOR Overview Statistical Data Tables Statistical Data Tables (see Figure interface, or function within the device you are monitoring. Various status conditions and data throughput are shown in each row in the table. The color of a row indicates the interval of time that the data was derived from (gray indicates time since start up of the CyberMONITOR Utility), (green indicates the elapsed time since boot up of the monitored device).
  • Page 27 CyberMONITOR Overview Figure 2-5 Chart by Protocols Drop Down Menu A statistic chart for Wide Area network interface port number 1, is shown in Figure 2-6, on the following page. The IP Address of the device being monitored is displayed in the upper border of the chart.
  • Page 28 Chapter 2: CyberMONITOR Overview Figure 2-6 Interface Statistic Chart for Wide Area 1 There are two menu items at the top of the statistic chart; File, and Help. The File menu lets you access either Print (which prints the chart), or Close, (which closes the window). The Help button accesses the help page for this window.
  • Page 29: Alarm Settings

    CyberMONITOR Overview Alarm Settings Click the Custom Button in the menu bar of the Primary Monitor Window to access the drop down menu shown in Figure 2-7, below. This menu lets you select either the Bandwidth Thresholds panel, or the Errors Threshold panel. (see Figure 2-8, andFigure...
  • Page 30 Chapter 2: CyberMONITOR Overview Figure 2-8 Alarm Panel for Bandwidth Parameter 2-10 CyberMONITOR User’s Guide...
  • Page 31 CyberMONITOR Overview Figure 2-9 Alarm Panel for Errors Parameter Figure 2-9, above, shows Tx and Rx error levels preset to 5% for Warning and 10% for Critical on the Ethernet 1, and Ethernet 2 ports, and Wide Area 1, and Wide Area 2 ports. Error thresholds have also been set for the functions IP Routing and IPX Routing.
  • Page 32: Cybermonitor Help System

    Chapter 2: CyberMONITOR Overview CyberMONITOR Help System The CyberMONITOR employs an interactive help system with links to related topics. There are four ways to access the help system from within the CyberMONITOR: • Click on the HELP button on any window to access the Help Contents page. •...
  • Page 33: Getting Help

    Getting Help For additional support related to this device or document, contact Cabletron Systems using one of the following methods: World Wide Web Phone Internet mail Login Password To send comments or suggestions concerning this document, contact the Cabletron Systems Technical Writing Department via the following email address: TechWriting@cabletron.com Make sure to include the document Part Number in the email message.
  • Page 34 Chapter 2: CyberMONITOR Overview 2-14 CyberMONITOR User’s Guide...
  • Page 35: Chapter 3 Using Cybermonitor

    Using CyberMONITOR Prerequisites The following is a list of prerequisites to using the CyberMONITOR utility: Virtual Memory Enabled (Windows 95) You must have Virtual Memory enabled to run CyberMONITOR. To check if you have Virtual Memory enabled for a Windows 95 Operating System, right click on the My Computer icon on your desktop.
  • Page 36: Local User Networks

    Chapter 3: Using CyberMONITOR Local User Networks If your system is connected to more than one network, you will see the Local User Networks window shown below in Figure 3-1. Use the scroll button to select the network connection that your CyberMONITOR-capable device is attached to.
  • Page 37 Using CyberMONITOR Figure 3-3 Primary Monitor Window and File Menu CyberMONITOR User’s Guide...
  • Page 38: Custom Interval

    Chapter 3: Using CyberMONITOR Custom Interval The Custom (polling) Interval window shown in Figure 3-4, below displays when you click on Polling Interval from Preferences in the File submenu (see Figure 3-3, on the previous page). The Custom Interval window is used to change the polling interval for the device being monitored. Use the scroll button to select a polling interval from the list.
  • Page 39: Long-Term Monitoring Sessions

    Using CyberMONITOR Enter the Start and Stop times for your monitoring session. Note the AM, and PM buttons. The maximum interval that can be set for a monitoring session is twenty-four hours, minus one minute. This interval is for a monitoring session that is automatically started, and automatically stopped. For example, setting the Start Time for 10:00 AM, and the Stop Time for 9:59 AM will produce the maximum twenty-four hour (minus one minute) monitoring interval.
  • Page 40 Chapter 3: Using CyberMONITOR Figure 3-6 Monitor Window for HSIM-W6 Device Inside each panel are the statistics for bandwidth utilization for Transmit (Tx) and Receive (Rx), and error statistics for these ports. The panels will always represent the type of network modules installed in the device being monitored, and the protocol or transmission mode being employed.
  • Page 41: Function Menus

    Function Menus There are four function menu items at the top of the primary monitor window. A brief description of the function of each menu item follows: File Menu • File menu item lets you access the four menus shown in Use the New Device menu item to select a new device to monitor by presenting the IP Address window to enter the new device’s IP Address and Community Name.
  • Page 42: Statistical Data Tables

    Chapter 3: Using CyberMONITOR Statistical Data Tables Double clicking on any panel in the primary monitor window will produce a statistical data table for that module, or function. module 1- logical interface number 3 (Wide Area 1-3). At the end of this chapter there is an in-depth discussion of the data displayed in each type of table.
  • Page 43: Secondary Ip Addresses

    Using CyberMONITOR Secondary IP Addresses Beneath the Primary IP Address row in the Ethernet statistical data table is the Secondary IP Address row. If an interface has more than one IP Address associated with it, the first Secondary IP Address will appear in this row of the table. The click button at the end of the Secondary IP Address row lets you access a table of Secondary IP Addresses if more than one exists.
  • Page 44: Statistical Data Charts

    Chapter 3: Using CyberMONITOR Statistical Data Charts Clicking Charts at the top of the statistical data table will produce a chart (see Figure 3-8 below) of the data in one of the charting modes mentioned previously (in this case bandwidth vs. time). Figure 3-8 Statistical Data Chart for Wide Area 1 In the upper left corner of the chart is a File button that lets you access a menu for Print (printing the chart), or Close (closing the chart window).
  • Page 45: Autosizing

    Using CyberMONITOR Autosizing The statistical data chart uses “autosizing”. If a sudden peak exceeds the current scale, the chart will adjust the scale factor to include the peak. All events are always visible on this chart - nothing will ever be off-scale.The scale at the left of the chart reflects the units of measurement (Kilobits per second, in this case).
  • Page 46: Interpreting Statistical Data Tables

    Chapter 3: Using CyberMONITOR Interpreting Statistical Data Tables The following figures and corresponding data will explain the entries within the statistical data tables, and tables of functions such as IPX Routing, and Inverse Multiplexing. Figure 3-9, Ethernet Network Interface Statistical Data Table, shown below, and Ethernet Statistical Data, explain the interpretation of data displayed in Ethernet statistical data tables.
  • Page 47: Ethernet Statistical Data

    Proxy ARP - When Proxy ARP is enabled, and an ARP request is received, for an IP Host whose network address is listed in the IP Route Table, the IP Routing Services sends a Proxy ARP response, with the physical address of the receiving router port in place of the requested host's physical address.
  • Page 48: Ethernet Packet Statistics

    Chapter 3: Using CyberMONITOR Ethernet Packet Statistics The packet statistics for an Ethernet network interface port are shown below. These statistics appear below the horizontal scroll bar in the Ethernet statistical data table. Total Packets In - The total packets input to the interface (Interface Number displayed) since the device was started.
  • Page 49: Wide Area Statistical Data Table

    Using CyberMONITOR Wide Area Statistical Data Table Figure 3-10, shown below, and Wide Area Statistical Data, explain the interpretation of the statistical data displayed in the Wide Area Statistical Data Table. Figure 3-10 Wide Area Statistical Data Table CyberMONITOR User’s Guide 3-15...
  • Page 50: Wide Area Statistical Data

    Chapter 3: Using CyberMONITOR Wide Area Statistical Data The Wide Area Data Tables contain all the pertinent information about the Wide Area network interface port that you are monitoring. The following is a breakdown of these statistics: Alias - This is an alias name that you give to the interface, for convenience. Protocol - Protocol of the interface being monitored (Frame Relay, PPP, etc.).
  • Page 51: Wide Area Packet Statistics

    Proxy ARP - When Proxy ARP is enabled, and an ARP request is received, IP Routing Services sends a Proxy ARP response, with the physical address of the receiving router port in place of the requested host's physical address. Horizontal Scroll Bar - The horizontal scroll bar in the center of the table is used to scroll the data table horizontally, to view data for other Interface Numbers.
  • Page 52: Other Tables

    Chapter 3: Using CyberMONITOR Other Tables There is another class of data tables discussed in the following sections, that are displayed by the CyberMONITOR utility. These are the data tables for the following functions; Bridging, IP Routing, IP Event Log, RIP Table, IPX Routing, IPX Event Log, Inverse Multiplexing, Frame Relay, Traps, and ISDN/Backup.
  • Page 53: Bridging Statistical Data

    Bridging Statistical Data The Bridging Data Table shows the state of the Bridging interface. The text in the outer border indicates the status of Spanning Tree (STP). The Time frame shows the state of the following Spanning Tree parameters: Hello Time - Time interval between generation of Bridge Protocol Data Units (BPDUs) by the root bridge (bridge with the lowest bridge ID becomes the root of the Spanning Tree).
  • Page 54: Bridging Per Interface Table

    Chapter 3: Using CyberMONITOR Bridging Per Interface Table Figure 3-12, below, shows the Bridging Per Interface Table. To access the Bridging Per Interface table, click on the Bridging panel on the Primary Monitor Window (see Bridging Per Interface Data The Bridging Per Interface table shows the following information: Interface Numbers - logical interface number.
  • Page 55: Ip Per Interface

    IP Per Interface Figure 3-13, below shows the IP Per Interface Table. To access the IP Per Interface Table, click on the IP Routing panel on the Monitor Window for HSIM-W6 (see IP Per Interface Data The IP Per Interface Table shows IP Routing statistics sorted by Interface Number. The data displayed is described below: Interface Number - logical interface number.
  • Page 56: Ip Routing Tables

    Chapter 3: Using CyberMONITOR IP Routing Tables Figure 3-14, below, shows the IP Routing Statistics Table. To access the IP Routing Statistics Table, click on the Table menu item on the IP Per Interface table menu bar (see Figure 3-13). Figure 3-14 IP Routing Statistics Table 3-22 CyberMONITOR User’s Guide...
  • Page 57: Ip Routing Statistics

    IP Routing Statistics The IP Routing Statistics Table Destination - IP Address of the route destination. Interface - logical interface number of the route. Alias - an alias name that you assign to the Interface Number. Mask - The Subnet Mask of the destination IP Address. Protocol - This window shows the method used to set the Protocol.
  • Page 58 Chapter 3: Using CyberMONITOR When IP Events are sorted by event type, similar events will be grouped together. When IP Events are sorted by severity, there are three levels: low, medium, and high, with high having the highest priority. Sorting by Interface Numbers will be done lowest number first. Clicking the Refresh Button refreshes the window with a new set of data.
  • Page 59: Rip Table

    Using CyberMONITOR RIP Table The RIP (Routing Information Protocol) Table, shown in Figure 3-17, below, displays the IP Address, and Send and Receive RIP Protocols in use for the interface being monitored. To access the RIP Table, click on the Tables menu on the primary monitor window, then click IP, and then RIP Table.
  • Page 60: Ipx Routing Table

    Chapter 3: Using CyberMONITOR IPX Routing Table The IPX RIP/SAP Routing Table is a RIP Table (Routing Information Protocol) and a SAP Table (Service Advertising Protocol) combined in one window. Figure 3-18, below, shows the IPX RIP/SAP Routing Table. To access the IPX Routing Table, click on the IPX Routing menu item in the Tables menu on the Primary Monitor Window (see Figure 3-3).
  • Page 61: Ipx Per Interface Table

    The Find Server button will access the RIP Table information for a server that you select in the SAP Table. Show All, in the IPX Service Types drop down list will display all of the servers in the SAP Table with options allowing you to display only file servers, job servers, print servers, etc. The File menu item lets you access either Print (prints the table), or Close, (closes window).
  • Page 62: Ipx Event Log

    Chapter 3: Using CyberMONITOR IPX Event Log The IPX Event Log Window (Figure 3-21 on the following page) is a record of IPX Routing events, or device status changes. The events are listed in tabular form, and can be sorted by Interface Number, Event Type, or Severity.
  • Page 63: Inverse Mux Data Table

    Using CyberMONITOR Figure 3-21 IPX Event Log Window Inverse MUX Data Table Figure 3-22, on the following page, shows the Inverse MUX (Multiplexing) Data Table. To access the Inverse MUX Data Table, click on the Inverse MUX menu item in the Tables menu on the Primary Monitor Window (see Figure 3-3).
  • Page 64: Inverse Multiplex Table Data

    Chapter 3: Using CyberMONITOR Figure 3-22 Inverse MUX Data Table Inverse Multiplex Table Data The Inverse Multiplex Table shows the interfaces selected to perform the inverse multiplex function. Inverse Multiplexing combines two channels to share the bandwidth utilization load. The BW Available column shows the available bandwidth of each interface. Ideally, each interface should have the same available bandwidth, but this is not always the case.
  • Page 65: Frame Relay Statistics Table

    Frame Relay Statistics Table Figure 3-23, below, shows the Frame Relay Statistics Table. The Frame Relay statistics table shows Frame Relay statistics sorted by DLCIs (Data Link Connection Identifiers). DLCIs are the indentifying numbers for switched virtual connections. To access the Frame Relay Statistics Table, click on the Frame Relay menu item in the Tables menu of the Primary Monitor Window (See Figure 3-3).
  • Page 66: Traps

    Chapter 3: Using CyberMONITOR Committed Burst - The maximum amount of data on the network during a time interval, without the network discarding any data. Excess Burst - The maximum amount of data allowed to exceed the Committed Burst (there is no guarantee that this data will be passed by the network - it may be discarded).
  • Page 67 Using CyberMONITOR Figure 3-25 Trap Destination Configuration Window Figure 3-26 Add Trap and Modify Trap Windows CyberMONITOR User’s Guide 3-33...
  • Page 68 Chapter 3: Using CyberMONITOR The Modify button (see Figure 3-25) lets you modify the IP Address or state (enabled, or disabled) of the item highlighted in the Trap Destination Configuration window. The Modify button displays the Modify Trap Destination window shown in Figure 3-26 on the previous page.
  • Page 69 Using CyberMONITOR Figure 3-28 Add Agent Window CyberMONITOR User’s Guide 3-35...
  • Page 70 Chapter 3: Using CyberMONITOR Figure 3-29 Trap Events Window (left side) 3-36 CyberMONITOR User’s Guide...
  • Page 71 Figure 3-30 Trap Events Window (right side) The Trap Events Window shown in displays when you click OK on the Trap Agent Window. Traps received are displayed in chronological sequence (most recent at the top) in the Trap Events Window. Traps are also uniquely identified by a trap number, shown at the far right of the Trap Events Window.
  • Page 72: Isdn Call History/Backup

    Chapter 3: Using CyberMONITOR ISDN Call History/Backup The ISDN Call History/Backup Window calls and corresponding device status. To access the ISDN Call History/Backup Window, click the ISDN/Backup menu item, in the Tables menu as shown in Figure 3-31 ISDN/Backup Tables Menu Item The ISDN Call History/Backup window is comprised of two panels: an ISDN Call History panel, and the Current Interface Backups panel (see ISDN Call History Panel...
  • Page 73 Using CyberMONITOR The time that the connection was established, stated as; hour, Connect Time hh.mm.ss — minute, and second. Disconnect Time hh.mm.ss — The time that the connection was taken down, or disconnected stated as; hour, minute, and second. Figure 3-32 ISDN Call History/Backup Window (left side) The duration of the connection stated as;...
  • Page 74 Chapter 3: Using CyberMONITOR Originate, Call Back, or Answer. Call Origin — Info Type — Call data type; other, speech, digital, audio, video, etc. The amount of data transmitted by your interface in bytes, kilobytes, or Transmitted Bytes — megabytes over the duration of the call. (from connect time to disconnect time). The amount of data received by your interface in bytes, kilobytes, or Received Bytes —...
  • Page 75: Isdn/Backup Panel

    Using CyberMONITOR ISDN/Backup Panel The ISDN/Backup panel (see Figure 3-33 on the previous page) is a list of ISDN interface numbers, and aliases and whether they are used as backup ISDN interfaces. ISDN can be used as a backup medium for any WAN WPIM interface. ISDN is the preferred medium for the purpose of backup because of its comparatively low cost.
  • Page 76 Chapter 3: Using CyberMONITOR 3-42 CyberMONITOR User’s Guide...
  • Page 77: Chapter 4 Troubleshooting

    If Bridging, • Check that the Bridging Default Destination is set. • Check that bridging to/from the remote router is set on. • Be sure to reboot if you have made any bridging destination or control changes. CyberMONITOR User’s Guide...
  • Page 78 • Check that TCP/IP Routing is set on and is enabled at the remote end. • Check that the IP address of the LAN beyond the remote router is correct, as well as the associated Subnet Mask. • If the remote router WAN IP address and Subnet Mask are required, check that they have been specified correctly.
  • Page 79 Attachment Unit Interface. An IEEE 802.3 transceiver cable connecting the network AUI — device (such as a router) to the MAU (media access unit). Bandwidth on Demand — Feature providing the capability of adjusting the bandwidth (opening or closing multiple B channels) when the load in traffic increases or decreases.
  • Page 80 Appendix A: Glossary Challenge Handshake Authentication Protocol. A security protocol supported under CHAP — point-to-point protocol (PPP) used to prevent unauthorized access to devices and remote networks. Uses encryption of password, device names and random number generation. CSSs — Controlled Slip Seconds - a DS-1 Line Status Error condition. A one second interval containing one or more Controlled Slips (replication or deletion of the payload bits of a DS-1 frame).
  • Page 81 A combination of techniques used to protect one network from unknown networks Firewall — and users on the outside. Firewalls can filter or block traffic and act as a management and network security point where all traffic can be scrutinized. DTE —...
  • Page 82 Appendix A: Glossary A telecommunications line between two service points leased from a Leased Line — communications carrier for private use, usually incurring a monthly service rate. LEDs (Light Emitting Diodes) — Line Errored Seconds - a DS-1 Line Status Error condition. Line Errored Seconds are LESs —...
  • Page 83 multi-vendor interoperability. The OSI Reference Model defines seven layers, each providing specific network functions. A group of data that includes a header and usually user data for transmission through a Packet — network. PCVs — Path Coding Violations - a DS-1 Line Status Error condition. Path Coding Violations are caused by a Frame Synchronization Bit Error in the D4, and E1-no CRC formats, or a CRC error in the ESF, and E1-CRC formats.
  • Page 84 Appendix A: Glossary Frames sent out by servers under IPX to check whether illegal copies of Serialization Frames — NetWare are in use on the network. Service Advertising Protocol — Protocol used in IPX for broadcasting information about services available on the network, such as file servers, CD-ROM drives and modem pools. Severely Errored Seconds - A DS-1 Line Status Error condition.
  • Page 85 Glossary Internet standard protocol for remote terminal emulation that allows a user to TELNET — remotely log in to another device and appear as if directly connected. TFTP — Trivial File Transfer Protocol. A simplified version of the File Transfer Protocol (FTP) allowing for file transfer between computers over a network.
  • Page 86 Appendix A: Glossary CyberMONITOR User’s Guide...

This manual is also suitable for:

Cybermonitor

Table of Contents