IMC Networks Giga-AcessEtherLinx-II manuel d'utilisation

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40

Aller à la page of

Un bon manuel d’utilisation

Les règles imposent au revendeur l'obligation de fournir à l'acheteur, avec des marchandises, le manuel d’utilisation IMC Networks Giga-AcessEtherLinx-II. Le manque du manuel d’utilisation ou les informations incorrectes fournies au consommateur sont à la base d'une plainte pour non-conformité du dispositif avec le contrat. Conformément à la loi, l’inclusion du manuel d’utilisation sous une forme autre que le papier est autorisée, ce qui est souvent utilisé récemment, en incluant la forme graphique ou électronique du manuel IMC Networks Giga-AcessEtherLinx-II ou les vidéos d'instruction pour les utilisateurs. La condition est son caractère lisible et compréhensible.

Qu'est ce que le manuel d’utilisation?

Le mot vient du latin "Instructio", à savoir organiser. Ainsi, le manuel d’utilisation IMC Networks Giga-AcessEtherLinx-II décrit les étapes de la procédure. Le but du manuel d’utilisation est d’instruire, de faciliter le démarrage, l'utilisation de l'équipement ou l'exécution des actions spécifiques. Le manuel d’utilisation est une collection d'informations sur l'objet/service, une indice.

Malheureusement, peu d'utilisateurs prennent le temps de lire le manuel d’utilisation, et un bon manuel permet non seulement d’apprendre à connaître un certain nombre de fonctionnalités supplémentaires du dispositif acheté, mais aussi éviter la majorité des défaillances.

Donc, ce qui devrait contenir le manuel parfait?

Tout d'abord, le manuel d’utilisation IMC Networks Giga-AcessEtherLinx-II devrait contenir:
- informations sur les caractéristiques techniques du dispositif IMC Networks Giga-AcessEtherLinx-II
- nom du fabricant et année de fabrication IMC Networks Giga-AcessEtherLinx-II
- instructions d'utilisation, de réglage et d’entretien de l'équipement IMC Networks Giga-AcessEtherLinx-II
- signes de sécurité et attestations confirmant la conformité avec les normes pertinentes

Pourquoi nous ne lisons pas les manuels d’utilisation?

Habituellement, cela est dû au manque de temps et de certitude quant à la fonctionnalité spécifique de l'équipement acheté. Malheureusement, la connexion et le démarrage IMC Networks Giga-AcessEtherLinx-II ne suffisent pas. Le manuel d’utilisation contient un certain nombre de lignes directrices concernant les fonctionnalités spécifiques, la sécurité, les méthodes d'entretien (même les moyens qui doivent être utilisés), les défauts possibles IMC Networks Giga-AcessEtherLinx-II et les moyens de résoudre des problèmes communs lors de l'utilisation. Enfin, le manuel contient les coordonnées du service IMC Networks en l'absence de l'efficacité des solutions proposées. Actuellement, les manuels d’utilisation sous la forme d'animations intéressantes et de vidéos pédagogiques qui sont meilleurs que la brochure, sont très populaires. Ce type de manuel permet à l'utilisateur de voir toute la vidéo d'instruction sans sauter les spécifications et les descriptions techniques compliquées IMC Networks Giga-AcessEtherLinx-II, comme c’est le cas pour la version papier.

Pourquoi lire le manuel d’utilisation?

Tout d'abord, il contient la réponse sur la structure, les possibilités du dispositif IMC Networks Giga-AcessEtherLinx-II, l'utilisation de divers accessoires et une gamme d'informations pour profiter pleinement de toutes les fonctionnalités et commodités.

Après un achat réussi de l’équipement/dispositif, prenez un moment pour vous familiariser avec toutes les parties du manuel d'utilisation IMC Networks Giga-AcessEtherLinx-II. À l'heure actuelle, ils sont soigneusement préparés et traduits pour qu'ils soient non seulement compréhensibles pour les utilisateurs, mais pour qu’ils remplissent leur fonction de base de l'information et d’aide.

Table des matières du manuel d’utilisation

  • Page 1

    Giga-AccessEtherLinX-II Operation Manual The above illustrat ion is representati ve; some mi nor differences may be present in actu al product[...]

  • Page 2

    FCC Radio Frequency Inter ference Statem ent T h i s e q u i p m e n t h a s b e e n t e s t e d a n d f o u n d t o c o m p l y w i t h t h e l i m i t s f o r a C l a s s A c o m p u t i n g d e v i c e , p u r s u a n t t o P a r t 1 5 o f t h e F CC Rules. These limits are designed to pr ovide reasonable protection against harmful interference [...]

  • Page 3

    ii Table of Cont ents FCC Radio Fre quency Interfe rence Statement ....................................................... .. i Warranty ............................. ................................................................. ................... i About the Giga-AccessE therLinX-II ............................................................[...]

  • Page 4

    1 Abou t the Gig a-Acces sEther LinX-I I Th e Giga-Acc essEth erLinX- I I Ser ies enab les ser vice providers to offer diffe rentia ted data networking o r VPN service s to mult i-tenan t buildin g and busine ss customers. Residing at the customer premises or at the service provider POP , Giga- AccessEt herLinX-II pr ovides a VLAN-base d Layer 2 en[...]

  • Page 5

    2 Rackmount In stallation Th e Rackmount kit s for the G iga-Acc es sEtherLinX-II are sold separately: Description Part Number Access ories Installation 19" Rackmou nt brackets 895- 392 26 Includes two brackets that screw onto either side of the Giga - AccessEtherLinX-II . The bracket s are attached to the unit and then the Giga - AccessE ther[...]

  • Page 6

    3 IP-Less Management in HO ST/REMOTE configurations A proprietary, secure management c ommun ica tion channel is supported whe never the Giga-Access EtherLinX -II unit is connec ted directly t o an iMcV -GigaFiberLin X-II unit over the Fib er Uplink. This secur e communica tion channel do es not r equire any pre-configur ation or IP addre ss assign[...]

  • Page 7

    4 About iView² Unit Ma nagement iView² is a network manageme nt application for IMC Networks’ intelligent networking devices. It feature s a GUI, which provides network managers the ability to monitor an d control IM C Networks’ pr oducts. The ap plication is available in several ver sions in cluding Web -Server ve rsion 3.0 an d can also fun[...]

  • Page 8

    5 SNMP, Telnet and Con sole Management SNMP, Te lnet, and iConfig management ch annels are always support ed through the Giga-AccessEtherLinX-II Uplink Port. This provides a higher level of secur ity so end users cannot access mana gement, alter settings, etc. Management through other ports can be supported t hrough unit c onfiguration. In order fo[...]

  • Page 9

    6 Main Con figuration Screen After running through an initial self test, the scre en will display: Press Enter for Device Configuration. Press Enter to be taken to the ma in configuration screen. Th e Main Conf iguratio n scr een contains the following: Saved V alues — displays cha nges made duri ng current session. • IP Address (Shoul d be ass[...]

  • Page 10

    7 NOTE Reboot after maki ng any modifi cation s to the Saved Value s or the chan ges will not take effect. To rebo ot, type Reboot at the prom pt on the main config uration scre en, or turn the chassis pow er OFF, then ON again. Because a Delete key is not available on VT-1 00 termina l emulators, use the F2 key instead. I Assigning IP Information [...]

  • Page 11

    8 default public string. To create a new comm unity string, go to t h e main configuration screen and press C . Enter the na me of the new com munity (up to 16 characters, no spac es) and press Enter . Then type one of the foll owing to assign t he community string’s a ccess ri ghts: R = read -only acce ss W = read/write access Enter = abort Pres[...]

  • Page 12

    9 E Ending a S ession Be sure to press E befor e disconnect ing the cab le in orde r to stop th e continuo us str eam of data to th e conso le port . Space Bar Device-Spe cific Configuration Options The Giga-Acce ssEtherLinX-II also in cludes several device -specific options. To a ccess these options, press the Spaceb ar from the Command List secti[...]

  • Page 13

    10 cleandb Reboots the Giga-AccessEtherLi nX-II with a clean databa se. This removes all of the information in the database with an option to change the IP address of device. download Opens th e Download dialog fr om which you download firmware i n the Main Con figuration screen using TFTP pr otocol. version Displays the Giga-Acce ssEtherLinX-II se[...]

  • Page 14

    11 *A reboot may be requir ed for some configuration ch anges to take effect. Downloading Files Firmware and confi guration fil es for t he Giga-A ccessEt herLinX-I I can be downl oade d from a cent ral serve r via TFTP protocol . Initia te this downloa d via con sole configuration or Telnet session. T o download a file, ty pe download and press En[...]

  • Page 15

    12 connection be tween ports includes management. Managem ent can be assigned a VLAN. Mode 5 Only accepts un tagged traffic a t the Down link Ports. All Uplink traf fic is tagged. Ea ch Downlink Por t adds a Qualifie d or Not Qualified VLAN tag to all ingress tr affic. Management only accepted from Uplink Port and can be assi gned a VLAN. Mode 6 Ac[...]

  • Page 16

    13 Mode 1—Untagge d Frames Only In thi s mode, the unit func tions as a managed MAC layer switch with ma nagement only accepte d on the fiber Uplin k and no VL AN support. Mode 2—M ixed Tagged and Untagg ed Frames (D efault ) When Management can be VLAN tagged, the following screen is given for configuration.[...]

  • Page 17

    14 Mode 3— Mixed Tagged and Untagged, Block MGMT Domain[...]

  • Page 18

    15 Mode 4— Port Ba sed Forwarding Port Ba sed Forwar ding se lecti on is d one on t he foll owing screen : Mode 5— Port Base d VLANs Only untagged fram es are delivered t o the Downlinks.[...]

  • Page 19

    16 Each port can assign two different VLA Ns based on the ingress frame classification. For u ntagged frame s, the Di ffServ pr iority va lue of th e IP frame can be used for classification. This screen allows the user to select an y of the 64 va lues. In addi tion th e user mus t ident ify wh ether no n-IP frames are also classified.[...]

  • Page 20

    17 Mode 6— Port Bas ed E xtr a Tag In this mode both unta gged and tagged frame s can enter the drop p orts. Two VLANs per port can be assigned based on ingress frames clas sification.[...]

  • Page 21

    18 In this mode both tagge d and untagged frames can e nter the drop por t. Tagged frames can now be classified based on the PR I valu e with in the inco ming VLAN t ag. Any PRI value c an be used to cl assify the frame.[...]

  • Page 22

    19 Mode 7— P ort Ba sed E xtra Tag, Infr astruc ture[...]

  • Page 23

    20 Mode 7 all ows the user to define whethe r a port is a Tr unk (pas ses everyt hing, including m anageme nt), or a D rop (can a d d/remove VLAN ta gs). Unit mana gement is also enabled through any Tru nk port. Once a port is defined as a D rop Port, addition al screens are p rovided t o assign VLAN values based on the classifi cation of the inco [...]

  • Page 24

    21 Mode 7 also allows the user to define wh ether PRI or DiffS erv values a re use d to cl as sif y i nco ming fr ame s and wh eth er no n-IP frames are classified. Class ification is done o n a port-b y-port ba sis.[...]

  • Page 25

    22 Mode 8— VLAN As signed Mode 8 all ows up to 64 VLAN IDs to be de fined. Eac h port ca n be a ta gs or No-ta gs member of a de fined VLAN. A ta gs member p ort will allow these tagge d frames to enter/exit the po rt. A No-tags member port will add this frame at egress. Only one No-tag VLA N can be assigned to a given port, b ut any or all defin[...]

  • Page 26

    23 Only one No -tags can be assigned to a por t; this ind icates that al l frames entering the port that do not mat ch the as signed members VLAN- ID list ar e given this indic ated tag. All frames leaving the port with this tag will ha ve it remove d. Assigne d tag fra mes (tags) w ill pass through this por t witho ut changes . Unit Contro l Setti[...]

  • Page 27

    24 Bandwi dth Limiti ng Bandwidth Limiting can be set per port in both transmit an d receive directions. The limiting function provides a Leaky Bucket tr affi c shap ing func tion wh en pl aced on th e TX side of a port. When the transm it limit is reached on a port, it will stop transmitting until the bucket level falls belo w the set level. W hen[...]

  • Page 28

    25 Port Configura tion Th e Giga-Acc essEth erLinX- I I Down link Ports can be configured via console configurati on. Type ports and press Enter to be taken to the Po rt Configuration scre en. From this screen, use rs can enabl e/disabl e ports and set Auto Ne gotiatio n and Fl ow Contr ol functi ons, etc . (This can also be performe d vi a iView²[...]

  • Page 29

    26 System Descr iptio ns This screen allows the user to define unit and port names that are incorporated by the unit into all SNMP traps. These are extremely useful in troubleshooting the sy stem. Firmware and Unit Version In formation To help main tain So ftware re vision contr ol, these refe rence numbe rs are alwa ys updated whene ver unit softw[...]

  • Page 30

    27 Using Management iView² i s a networ k management ap pl ication for IMC Networks intellig ent networki ng devices. It features a GU I and gives network ma nager s the ab ility to monitor and contro l products from a va riety of platforms. Using iV iew² w ith HP Ope nVie w During the installation, the iView² appl ication will ask if HP OpenVie[...]

  • Page 31

    28 IP address assigned to the chassis manage ment card. Users ma y still assign IP addresses to each iMcV-Gi ga-FiberLinX-II and Giga-A ccessEtherLinX-II, and manage them independ ently over the n etwork being transp orted but t his may not provide t he same leve l of se curity as the UMA sy stem. With the Unified Manag ement Agent When an SNMP req[...]

  • Page 32

    29 Using Telnet Assign the Giga-Ac cessEtherLinX-II an IP Address or use the default IP Address 10.10.10.10, subnet ma sk 255. 0.0.0 before usi ng a Telnet se ssion. All configura tions done via the console port can a lso be perf ormed using Telnet. The user should only open one Telne t or RS232 c onsole session at a time . Do not u se an RS232 c o[...]

  • Page 33

    30 Uplink Ports FLT Glows yellow w hen a fault is detecte d with the fiber Uplink . Faults include loss of link and hal f-duple x operation. Half-duplex is not defined for a f iber line running at gigabi t rates. LNK Glows g reen when link is es tablish ed. Blinks green dur ing data activi ty. Passw ords If the username an d password are availa ble[...]

  • Page 34

    31 Strongly recommended: • 128 MB RAM • Pentium III 6 50Mhz or Faster • 17” Monit or @ 1024 x 768 Resoluti on or higher Ins talli ng and Using iV iew² iView² i s available to in stall as a downloa d at www.imcnetworks.com /Products/iView.cfm. When us ing iView² w ith HP OpenV iew During the inst allation, the iView² ap plicatio n will a[...]

  • Page 35

    32 This equipment is designed to permit the connection of the groun ded conductor of the DC s upply circ uit to the g rounded condu ctor at the equ ipment. If this connection is made, all of the foll owing conditions m ust be me t: 1. This equipment shall be conne cted di rect ly to the DC supply system grou nded el ectrod e conduc tor or to a bond[...]

  • Page 36

    33 DC Power Su pply Precauti ons The following precautions mus t be observe d when ins talling the chassis model with an internal DC power su pply. 1. Check nameplate ratings to ensure there is no overlo ading of su pply circui ts tha t could affect over curre nt protection an d supply wiring. 2. In additi on, the foll owing m ust be ob serve d: a.[...]

  • Page 37

    34 Spec if icat io ns Standards IEEE 802.3x Ethernet IEEE 802.3u Auto Negotiation IEEE 802.1q VLAN IEEE 802.1p Packet Prioritization Operatin g Temp erature +32° F to +1 22° F (0° C to +50° C) Storage T empe rature -40° F to 185° F (-40°C to 85° C) Humidity 10 to 95 % (non-condens ing) Maximum heat generated 81 BTU/hr Power Requirements (ty[...]

  • Page 38

    35 Fiber Op tic Cleaning Guidelines Fiber Optic tran smitters an d receivers are e xtremely susce ptible to contamination by particles of d irt or dust, which can obst ruct the optic path and cause performance degradation. Good system performan ce requires clean optics and connector f errules. 1. Use fiber patch cord s (or connectors, if you ter mi[...]

  • Page 39

    36 Safety Certificat ions UL/CUL: Listed to Safety of Informati on Technology Equipm ent, including Electrical Business Equipment. CE: The products described herein comply with the Council Directive on Electromagne tic Compatibili ty (2004/ 108/EC) a nd the Cou ncil Directiv e on Electrical Equip ment Design ed for use within Certain Voltage Limits[...]

  • Page 40

    19772 Paulin g y Foothill Ranc h, CA 926 10-26 11 USA TEL: (949) 465 -3000 y FAX: (94 9) 465-3 020 www.imcnetworks.com © 2011 I MC Networks. Al l rights r eserved. The info rmation in this docum ent is subject to change with out no tice. IMC Networks assumes no responsibi lity for any errors that may appear in this docume nt. Giga-AccessEth erLinX[...]