User's Manual Part 1


 Draft5forRegulatoryReview
22.8 Filtering Management through Ethernet ....................................................... 385
22.9 Allowing Management from Only Specified IP Addresses ........................... 385
22.10 Configuring Management IP by DHCP ......................................................... 385
23 Managing Bandwidth and Authentication .......................................................... 387
23.1 Managing Bandwidth without BAM ............................................................... 387
23.2 Bandwidth and Authentication Manager (BAM) Services and Features ...... 387
23.2.1 Bandwidth Manager Capability .................................................................... 387
23.2.2 Authentication Manager Capability.............................................................. 389
24 Managing the Network From a Management Station (NMS) ............................. 391
24.1 Roles of Hardware and Software Elements ................................................. 391
24.1.1 Role of the Agent ......................................................................................... 391
24.1.2 Role of the Managed Device ....................................................................... 391
24.1.3 Role of the NMS .......................................................................................... 391
24.1.4 Dual Roles for the NMS ............................................................................... 391
24.1.5 Simple Network Management Protocol (SNMP) Commands ..................... 391
24.1.6 Traps from the Agent ................................................................................... 392
24.1.7 AP SNMP Proxy to SMs .............................................................................. 392
24.2 Management Information Base (MIB) .......................................................... 392
24.2.1 Cascading Path to the MIB .......................................................................... 392
24.2.2 Object Instances .......................................................................................... 393
24.2.3 Management Information Base Systems and Interface (MIB-II) ................. 393
24.2.4 Cyclone Enterprise MIB ............................................................................... 394
24.3 Configuring Modules for SNMP Access ....................................................... 395
24.4 Objects Defined in the Cyclone Enterprise MIB ........................................... 395
24.4.1 AP, SM, and BH Objects ............................................................................. 396
24.4.2 AP and BH Timing Master Objects.............................................................. 398
24.4.3 SM and BH Timing Slave Objects ............................................................... 402
24.4.4 CMMmicro Objects ...................................................................................... 405
24.5 Objects Defined in the PTP 400 and PTP 600 series Bridges MIB .............. 408
24.6 Objects Supported in the Cyclone 30/60-Mbps BH ...................................... 409
24.7 Objects Supported in the Cyclone 150/300-Mbps BH .................................. 409
24.8 Interface Designations in SNMP .................................................................. 409
24.9 Traps Provided in the Cyclone Enterprise MIB ............................................ 410
24.10 Traps Provided in the PTP 400 Series Bridge MIB ...................................... 410