Warning: mysql_fetch_array() expects parameter 1 to be resource, boolean given in /home/newdedyk/domains/bkmanuals.com/public_html/includes/pages/manual_inc.php on line 26
IMC Networks Giga-AcessEtherLinx-II manuale d’uso - BKManuals

IMC Networks Giga-AcessEtherLinx-II manuale d’uso

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40

Vai alla pagina of

Un buon manuale d’uso

Le regole impongono al rivenditore l'obbligo di fornire all'acquirente, insieme alle merci, il manuale d’uso IMC Networks Giga-AcessEtherLinx-II. La mancanza del manuale d’uso o le informazioni errate fornite al consumatore sono la base di una denuncia in caso di inosservanza del dispositivo con il contratto. Secondo la legge, l’inclusione del manuale d’uso in una forma diversa da quella cartacea è permessa, che viene spesso utilizzato recentemente, includendo una forma grafica o elettronica IMC Networks Giga-AcessEtherLinx-II o video didattici per gli utenti. La condizione è il suo carattere leggibile e comprensibile.

Che cosa è il manuale d’uso?

La parola deriva dal latino "instructio", cioè organizzare. Così, il manuale d’uso IMC Networks Giga-AcessEtherLinx-II descrive le fasi del procedimento. Lo scopo del manuale d’uso è istruire, facilitare lo avviamento, l'uso di attrezzature o l’esecuzione di determinate azioni. Il manuale è una raccolta di informazioni sull'oggetto/servizio, un suggerimento.

Purtroppo, pochi utenti prendono il tempo di leggere il manuale d’uso, e un buono manuale non solo permette di conoscere una serie di funzionalità aggiuntive del dispositivo acquistato, ma anche evitare la maggioranza dei guasti.

Quindi cosa dovrebbe contenere il manuale perfetto?

Innanzitutto, il manuale d’uso IMC Networks Giga-AcessEtherLinx-II dovrebbe contenere:
- informazioni sui dati tecnici del dispositivo IMC Networks Giga-AcessEtherLinx-II
- nome del fabbricante e anno di fabbricazione IMC Networks Giga-AcessEtherLinx-II
- istruzioni per l'uso, la regolazione e la manutenzione delle attrezzature IMC Networks Giga-AcessEtherLinx-II
- segnaletica di sicurezza e certificati che confermano la conformità con le norme pertinenti

Perché non leggiamo i manuali d’uso?

Generalmente questo è dovuto alla mancanza di tempo e certezza per quanto riguarda la funzionalità specifica delle attrezzature acquistate. Purtroppo, la connessione e l’avvio IMC Networks Giga-AcessEtherLinx-II non sono sufficienti. Questo manuale contiene una serie di linee guida per funzionalità specifiche, la sicurezza, metodi di manutenzione (anche i mezzi che dovrebbero essere usati), eventuali difetti IMC Networks Giga-AcessEtherLinx-II e modi per risolvere i problemi più comuni durante l'uso. Infine, il manuale contiene le coordinate del servizio IMC Networks in assenza dell'efficacia delle soluzioni proposte. Attualmente, i manuali d’uso sotto forma di animazioni interessanti e video didattici che sono migliori che la brochure suscitano un interesse considerevole. Questo tipo di manuale permette all'utente di visualizzare tutto il video didattico senza saltare le specifiche e complicate descrizioni tecniche IMC Networks Giga-AcessEtherLinx-II, come nel caso della versione cartacea.

Perché leggere il manuale d’uso?

Prima di tutto, contiene la risposta sulla struttura, le possibilità del dispositivo IMC Networks Giga-AcessEtherLinx-II, l'uso di vari accessori ed una serie di informazioni per sfruttare totalmente tutte le caratteristiche e servizi.

Dopo l'acquisto di successo di attrezzature/dispositivo, prendere un momento per familiarizzare con tutte le parti del manuale d'uso IMC Networks Giga-AcessEtherLinx-II. Attualmente, sono preparati con cura e tradotti per essere comprensibili non solo per gli utenti, ma per svolgere la loro funzione di base di informazioni e di aiuto.

Sommario del manuale d’uso

  • Pagina 1

    Giga-AccessEtherLinX-II Operation Manual The above illustrat ion is representati ve; some mi nor differences may be present in actu al product[...]

  • Pagina 2

    FCC Radio Frequency Inter ference Statem ent T h i s e q u i p m e n t h a s b e e n t e s t e d a n d f o u n d t o c o m p l y w i t h t h e l i m i t s f o r a C l a s s A c o m p u t i n g d e v i c e , p u r s u a n t t o P a r t 1 5 o f t h e F CC Rules. These limits are designed to pr ovide reasonable protection against harmful interference [...]

  • Pagina 3

    ii Table of Cont ents FCC Radio Fre quency Interfe rence Statement ....................................................... .. i Warranty ............................. ................................................................. ................... i About the Giga-AccessE therLinX-II ............................................................[...]

  • Pagina 4

    1 Abou t the Gig a-Acces sEther LinX-I I Th e Giga-Acc essEth erLinX- I I Ser ies enab les ser vice providers to offer diffe rentia ted data networking o r VPN service s to mult i-tenan t buildin g and busine ss customers. Residing at the customer premises or at the service provider POP , Giga- AccessEt herLinX-II pr ovides a VLAN-base d Layer 2 en[...]

  • Pagina 5

    2 Rackmount In stallation Th e Rackmount kit s for the G iga-Acc es sEtherLinX-II are sold separately: Description Part Number Access ories Installation 19" Rackmou nt brackets 895- 392 26 Includes two brackets that screw onto either side of the Giga - AccessEtherLinX-II . The bracket s are attached to the unit and then the Giga - AccessE ther[...]

  • Pagina 6

    3 IP-Less Management in HO ST/REMOTE configurations A proprietary, secure management c ommun ica tion channel is supported whe never the Giga-Access EtherLinX -II unit is connec ted directly t o an iMcV -GigaFiberLin X-II unit over the Fib er Uplink. This secur e communica tion channel do es not r equire any pre-configur ation or IP addre ss assign[...]

  • Pagina 7

    4 About iView² Unit Ma nagement iView² is a network manageme nt application for IMC Networks’ intelligent networking devices. It feature s a GUI, which provides network managers the ability to monitor an d control IM C Networks’ pr oducts. The ap plication is available in several ver sions in cluding Web -Server ve rsion 3.0 an d can also fun[...]

  • Pagina 8

    5 SNMP, Telnet and Con sole Management SNMP, Te lnet, and iConfig management ch annels are always support ed through the Giga-AccessEtherLinX-II Uplink Port. This provides a higher level of secur ity so end users cannot access mana gement, alter settings, etc. Management through other ports can be supported t hrough unit c onfiguration. In order fo[...]

  • Pagina 9

    6 Main Con figuration Screen After running through an initial self test, the scre en will display: Press Enter for Device Configuration. Press Enter to be taken to the ma in configuration screen. Th e Main Conf iguratio n scr een contains the following: Saved V alues — displays cha nges made duri ng current session. • IP Address (Shoul d be ass[...]

  • Pagina 10

    7 NOTE Reboot after maki ng any modifi cation s to the Saved Value s or the chan ges will not take effect. To rebo ot, type Reboot at the prom pt on the main config uration scre en, or turn the chassis pow er OFF, then ON again. Because a Delete key is not available on VT-1 00 termina l emulators, use the F2 key instead. I Assigning IP Information [...]

  • Pagina 11

    8 default public string. To create a new comm unity string, go to t h e main configuration screen and press C . Enter the na me of the new com munity (up to 16 characters, no spac es) and press Enter . Then type one of the foll owing to assign t he community string’s a ccess ri ghts: R = read -only acce ss W = read/write access Enter = abort Pres[...]

  • Pagina 12

    9 E Ending a S ession Be sure to press E befor e disconnect ing the cab le in orde r to stop th e continuo us str eam of data to th e conso le port . Space Bar Device-Spe cific Configuration Options The Giga-Acce ssEtherLinX-II also in cludes several device -specific options. To a ccess these options, press the Spaceb ar from the Command List secti[...]

  • Pagina 13

    10 cleandb Reboots the Giga-AccessEtherLi nX-II with a clean databa se. This removes all of the information in the database with an option to change the IP address of device. download Opens th e Download dialog fr om which you download firmware i n the Main Con figuration screen using TFTP pr otocol. version Displays the Giga-Acce ssEtherLinX-II se[...]

  • Pagina 14

    11 *A reboot may be requir ed for some configuration ch anges to take effect. Downloading Files Firmware and confi guration fil es for t he Giga-A ccessEt herLinX-I I can be downl oade d from a cent ral serve r via TFTP protocol . Initia te this downloa d via con sole configuration or Telnet session. T o download a file, ty pe download and press En[...]

  • Pagina 15

    12 connection be tween ports includes management. Managem ent can be assigned a VLAN. Mode 5 Only accepts un tagged traffic a t the Down link Ports. All Uplink traf fic is tagged. Ea ch Downlink Por t adds a Qualifie d or Not Qualified VLAN tag to all ingress tr affic. Management only accepted from Uplink Port and can be assi gned a VLAN. Mode 6 Ac[...]

  • Pagina 16

    13 Mode 1—Untagge d Frames Only In thi s mode, the unit func tions as a managed MAC layer switch with ma nagement only accepte d on the fiber Uplin k and no VL AN support. Mode 2—M ixed Tagged and Untagg ed Frames (D efault ) When Management can be VLAN tagged, the following screen is given for configuration.[...]

  • Pagina 17

    14 Mode 3— Mixed Tagged and Untagged, Block MGMT Domain[...]

  • Pagina 18

    15 Mode 4— Port Ba sed Forwarding Port Ba sed Forwar ding se lecti on is d one on t he foll owing screen : Mode 5— Port Base d VLANs Only untagged fram es are delivered t o the Downlinks.[...]

  • Pagina 19

    16 Each port can assign two different VLA Ns based on the ingress frame classification. For u ntagged frame s, the Di ffServ pr iority va lue of th e IP frame can be used for classification. This screen allows the user to select an y of the 64 va lues. In addi tion th e user mus t ident ify wh ether no n-IP frames are also classified.[...]

  • Pagina 20

    17 Mode 6— Port Bas ed E xtr a Tag In this mode both unta gged and tagged frame s can enter the drop p orts. Two VLANs per port can be assigned based on ingress frames clas sification.[...]

  • Pagina 21

    18 In this mode both tagge d and untagged frames can e nter the drop por t. Tagged frames can now be classified based on the PR I valu e with in the inco ming VLAN t ag. Any PRI value c an be used to cl assify the frame.[...]

  • Pagina 22

    19 Mode 7— P ort Ba sed E xtra Tag, Infr astruc ture[...]

  • Pagina 23

    20 Mode 7 all ows the user to define whethe r a port is a Tr unk (pas ses everyt hing, including m anageme nt), or a D rop (can a d d/remove VLAN ta gs). Unit mana gement is also enabled through any Tru nk port. Once a port is defined as a D rop Port, addition al screens are p rovided t o assign VLAN values based on the classifi cation of the inco [...]

  • Pagina 24

    21 Mode 7 also allows the user to define wh ether PRI or DiffS erv values a re use d to cl as sif y i nco ming fr ame s and wh eth er no n-IP frames are classified. Class ification is done o n a port-b y-port ba sis.[...]

  • Pagina 25

    22 Mode 8— VLAN As signed Mode 8 all ows up to 64 VLAN IDs to be de fined. Eac h port ca n be a ta gs or No-ta gs member of a de fined VLAN. A ta gs member p ort will allow these tagge d frames to enter/exit the po rt. A No-tags member port will add this frame at egress. Only one No-tag VLA N can be assigned to a given port, b ut any or all defin[...]

  • Pagina 26

    23 Only one No -tags can be assigned to a por t; this ind icates that al l frames entering the port that do not mat ch the as signed members VLAN- ID list ar e given this indic ated tag. All frames leaving the port with this tag will ha ve it remove d. Assigne d tag fra mes (tags) w ill pass through this por t witho ut changes . Unit Contro l Setti[...]

  • Pagina 27

    24 Bandwi dth Limiti ng Bandwidth Limiting can be set per port in both transmit an d receive directions. The limiting function provides a Leaky Bucket tr affi c shap ing func tion wh en pl aced on th e TX side of a port. When the transm it limit is reached on a port, it will stop transmitting until the bucket level falls belo w the set level. W hen[...]

  • Pagina 28

    25 Port Configura tion Th e Giga-Acc essEth erLinX- I I Down link Ports can be configured via console configurati on. Type ports and press Enter to be taken to the Po rt Configuration scre en. From this screen, use rs can enabl e/disabl e ports and set Auto Ne gotiatio n and Fl ow Contr ol functi ons, etc . (This can also be performe d vi a iView²[...]

  • Pagina 29

    26 System Descr iptio ns This screen allows the user to define unit and port names that are incorporated by the unit into all SNMP traps. These are extremely useful in troubleshooting the sy stem. Firmware and Unit Version In formation To help main tain So ftware re vision contr ol, these refe rence numbe rs are alwa ys updated whene ver unit softw[...]

  • Pagina 30

    27 Using Management iView² i s a networ k management ap pl ication for IMC Networks intellig ent networki ng devices. It features a GU I and gives network ma nager s the ab ility to monitor and contro l products from a va riety of platforms. Using iV iew² w ith HP Ope nVie w During the installation, the iView² appl ication will ask if HP OpenVie[...]

  • Pagina 31

    28 IP address assigned to the chassis manage ment card. Users ma y still assign IP addresses to each iMcV-Gi ga-FiberLinX-II and Giga-A ccessEtherLinX-II, and manage them independ ently over the n etwork being transp orted but t his may not provide t he same leve l of se curity as the UMA sy stem. With the Unified Manag ement Agent When an SNMP req[...]

  • Pagina 32

    29 Using Telnet Assign the Giga-Ac cessEtherLinX-II an IP Address or use the default IP Address 10.10.10.10, subnet ma sk 255. 0.0.0 before usi ng a Telnet se ssion. All configura tions done via the console port can a lso be perf ormed using Telnet. The user should only open one Telne t or RS232 c onsole session at a time . Do not u se an RS232 c o[...]

  • Pagina 33

    30 Uplink Ports FLT Glows yellow w hen a fault is detecte d with the fiber Uplink . Faults include loss of link and hal f-duple x operation. Half-duplex is not defined for a f iber line running at gigabi t rates. LNK Glows g reen when link is es tablish ed. Blinks green dur ing data activi ty. Passw ords If the username an d password are availa ble[...]

  • Pagina 34

    31 Strongly recommended: • 128 MB RAM • Pentium III 6 50Mhz or Faster • 17” Monit or @ 1024 x 768 Resoluti on or higher Ins talli ng and Using iV iew² iView² i s available to in stall as a downloa d at www.imcnetworks.com /Products/iView.cfm. When us ing iView² w ith HP OpenV iew During the inst allation, the iView² ap plicatio n will a[...]

  • Pagina 35

    32 This equipment is designed to permit the connection of the groun ded conductor of the DC s upply circ uit to the g rounded condu ctor at the equ ipment. If this connection is made, all of the foll owing conditions m ust be me t: 1. This equipment shall be conne cted di rect ly to the DC supply system grou nded el ectrod e conduc tor or to a bond[...]

  • Pagina 36

    33 DC Power Su pply Precauti ons The following precautions mus t be observe d when ins talling the chassis model with an internal DC power su pply. 1. Check nameplate ratings to ensure there is no overlo ading of su pply circui ts tha t could affect over curre nt protection an d supply wiring. 2. In additi on, the foll owing m ust be ob serve d: a.[...]

  • Pagina 37

    34 Spec if icat io ns Standards IEEE 802.3x Ethernet IEEE 802.3u Auto Negotiation IEEE 802.1q VLAN IEEE 802.1p Packet Prioritization Operatin g Temp erature +32° F to +1 22° F (0° C to +50° C) Storage T empe rature -40° F to 185° F (-40°C to 85° C) Humidity 10 to 95 % (non-condens ing) Maximum heat generated 81 BTU/hr Power Requirements (ty[...]

  • Pagina 38

    35 Fiber Op tic Cleaning Guidelines Fiber Optic tran smitters an d receivers are e xtremely susce ptible to contamination by particles of d irt or dust, which can obst ruct the optic path and cause performance degradation. Good system performan ce requires clean optics and connector f errules. 1. Use fiber patch cord s (or connectors, if you ter mi[...]

  • Pagina 39

    36 Safety Certificat ions UL/CUL: Listed to Safety of Informati on Technology Equipm ent, including Electrical Business Equipment. CE: The products described herein comply with the Council Directive on Electromagne tic Compatibili ty (2004/ 108/EC) a nd the Cou ncil Directiv e on Electrical Equip ment Design ed for use within Certain Voltage Limits[...]

  • Pagina 40

    19772 Paulin g y Foothill Ranc h, CA 926 10-26 11 USA TEL: (949) 465 -3000 y FAX: (94 9) 465-3 020 www.imcnetworks.com © 2011 I MC Networks. Al l rights r eserved. The info rmation in this docum ent is subject to change with out no tice. IMC Networks assumes no responsibi lity for any errors that may appear in this docume nt. Giga-AccessEth erLinX[...]