Installation guide
Contents
vi
Introduction............................................................................................................6-1
SNMP Reporting Is Not Consistent with the Access Server...................................6-2
Solution....................................................................................................................6-2
SNMP Reporting Is Not Consistent with the MIB ...................................................6-3
Solution....................................................................................................................6-3
Problems Accessing the Access Server ......................................................................6-4
Introduction............................................................................................................6-4
Verify SNMP Enabled............................................................................................6-4
Verify Community Name Access Information..................................................6-5
Verify Operations Enabled for the Community Name.....................................6-5
Verify Network Configuration.............................................................................6-6
Verify Communication to Remote NMS.............................................................6-6
Access Server Not Responding with the Requested MIB Information.................6-7
Solution....................................................................................................................6-7
Access Server Not Sending TRAP Messages.....................................................6-9
Authentication Failure TRAP Messages Reported.................................................6-10
Solution..................................................................................................................6-10
Authentication Failure TRAP Messages Not Reported.........................................6-11
Solution..................................................................................................................6-11
Chapter 7 3270 Terminal Emulation (TN3270) Access Problems
Overview........................................................................................................................7-1
Introduction............................................................................................................7-1
TN3270 Connection Problems.....................................................................................7-2
Introduction............................................................................................................7-2
Verify Display Station Model Configuration.....................................................7-2
Verify ASCII Terminal Configuration.................................................................7-3
Verify the TN3270 Session Using the Status Line Function.............................7-3
Table: Messages Appearing in the Status Line Indicator.................................7-4
Verify TN3270 Keyboard Maps............................................................................7-4
Default Keyboard Maps Unsuitable...........................................................................7-6
Solution....................................................................................................................7-6
Telnet Negotiations Problems......................................................................................7-7
Solution....................................................................................................................7-7
Chapter 8 User Authentication Configuration Problems
Overview........................................................................................................................8-1
Introduction............................................................................................................8-1
Verify That Devices Are Connected Properly...........................................................8-3
Procedure ................................................................................................................8-3
Verify That the Device Is Using the Correct Authentication Protocol...................8-4
Procedure ................................................................................................................8-4
Verify That Authentication Is Enabled.......................................................................8-5
Procedure ................................................................................................................8-5
Verify That Port and Devices Characteristics Match................................................8-7
Procedure ................................................................................................................8-7