SMC Networks 8606SX - annexe 2 User manual

User Guide
EliteView 6.10
EliteView
™
SNMP-Based
Network Management Software
for Windows™


EliteView™
User Guide
SNMP-Based Network Management Software for Windows™
6 Hughes
Irvine, CA 92618
Phone: (949) 679-8000 June 2003 R02

Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and
reliable. However, no responsibility is assumed by SMC for its use, nor for any infringements
of patents or other rights of third parties which may result from its use. No license is granted
by implication or otherwise under any patent or patent rights of SMC. SMC reserves the right
to change specifications at any time without notice.
Copyright © 2003 by
SMC Networks, Inc.
6 Hughes
Irvine, CA 92618
All rights reserved.
Trademarks:
SMC is a registered trademark; EliteView, EZ Stack, TigerSwitch and TigerStack are trademarks of SMC Networks, Inc. Other
product and company names are trademarks or registered trademarks of their respective holders.

Licence Agreement
The Purchaser MUST read this agreement before using the software provided in this package. As used in this Agreement the
terms “You”, “Your”, “LICENSEE”, and “Purchaser” refer to the licensee of the SOFTWARE and accompanying written
materials in this package, as described below. If you do not agree to the terms of this License Agreement, return the
package, unused, to the point of purchase for a refund of any license fee which you paid.
1. Grant of license
SMC Networks, Inc. (SMC) grants to you a non-exclusive right to use one copy of the program (hereinafter the
“SOFTWARE”). The SOFTWARE is provided by SMC on CD-ROM. SMC also grants to you a non-exclusive right to use
the programs on the enclosed CD-ROM (hereinafter the “SOFTWARE”) on one local area network. SMC reserves all rights
not expressly granted to the LICENSEE.
2. Ownership of license
All SOFTWARE, and each copy thereof, remains the property of SMC and/or one or more of its licensors. This license is
not a sale of any SOFTWARE, or of any copy. You disclaim forever any rights of ownership in any SOFTWARE, or in any
copy. The only rights that you obtain with respect to any SOFTWARE are those expressly set forth in this License
Agreement.
3. Copy restriction
You acknowledge that the SOFTWARE and accompanying written materials are copyrighted and entitled to protection
under the copyright laws of nations where the SOFTWARE is installed, and under international conventions. Except for
the copying of SOFTWARE as expressly permitted in the next sentence, you may not copy any SOFTWARE or
accompanying written materials, or any portion of any of them, or remove any copyright or proprietary notice from any
of them; and you agree not to allow any other person or entity to do so. Subject to these restrictions, you may make
copies of the SOFTWARE solely for backup purposes.
4. Use restriction
As the LICENSEE, you may physically transfer the SOFTWARE from one computer to another within a licensed local area
network. You may not distribute copies of the SOFTWARE or accompanying written materials to others. Furthermore,
the LICENSEE is not permitted to modify, disassemble, reverse or de-engineer, or create any derivative works based on
the SOFTWARE.
5. Transfer restrictions
This SOFTWARE is licensed only to you, the LICENSEE, and may not be transferred to anyone without prior written
consent of SMC. Any authorized transferee of the SOFTWARE shall be bound by the terms and conditions of this
Agreement. In no event may you transfer, assign, rent, lease, sell or otherwise dispose of the SOFTWARE on a temporary
or permanent basis except as expressly provided herein.
6. Termination
This license agreement is effective until terminated by SMC. This license may be terminated without notice by SMC if the
LICENSEE fails to comply with any provision of this license. Upon termination, it is the LICENSEE’s obligation to destroy
the written materials and all copies of the SOFTWARE. Further use of the SOFTWARE components will be in violation of
this license.
Limited Warranty
The Warranty Period for the media on which the SOFTWARE is recorded is for 5 years from the date of its delivery to the
original user as evidenced by a receipt.
You must give SMC prompt written notice within the Warranty Period of any warranty claim. Conditioned on your
providing prompt written notice to SMC within the Warranty Period, SMC shall, as your sole and exclusive remedy, repair
or replace media not conforming to this warranty, or accept return of any such nonconforming media. The election of
whether to repair, replace, or refund shall be SMC’s, in its sole discretion.
EXCEPT FOR THE EXPRESS WARRANTY SET FORTH ABOVE IN THIS LIMITED WARRANTY SECTION, THERE ARE NO
WARRANTIES, EITHER EXPRESS OR IMPLIED. THE SOFTWARE IS PROVIDED AS IS, WITH ALL FAULTS. SMC
DISCLAIMS AND EXCLUDES ANY AND ALL WARRANTIES, INCLUDING WITHOUT LIMITATION ANY AND ALL IMPLIED
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AGAINST INFRINGEMENT AND THE
LIKE, AND ANY AND ALL WARRANTIES ARISING FROM ANY COURSE OF DEALING OR USAGE OF TRADE.

YOU ACKNOWLEDGE THAT YOU ARE NOT RELYING ON SMC’S SKILL OR JUDGEMENT TO SELECT OR
FURNISH SUITABLE GOODS.
PRODUCTS AND SERVICES PROVIDED BY SMC ARE NOT DESIGNED, INTENDED OR AUTHORIZED FOR USE IN
ANY LIFE SUPPORT OR OTHER APPLICATION WHERE PRODUCT FAILURE COULD CAUSE OR CONTRIBUTE TO
PERSONAL INJURY OR SUBSTANTIAL PROPERTY DAMAGE. IF YOU APPLY ANY PRODUCT OR SERVICE
PURCHASED OR LICENSED FROM SMC TO ANY SUCH UNINTENDED OR UNAUTHORIZED USE, YOU SHALL
INDEMNIFY AND HOLD SMC, ITS AFFILIATES AND THEIR RESPECTIVE SUPPLIERS, HARMLESS AGAINST ALL
CLAIMS, COSTS, DAMAGES AND EXPENSES ARISING, DIRECTLY OR INDIRECTLY, OUT OF ANY SUCH
UNINTENDED OR UNAUTHORIZED USE, EVEN IF SUCH CLAIM ALLEGES THAT SMC OR ANY OTHER PERSON
OR ENTITY WAS NEGLIGENT IN DESIGNING OR MANUFACTURING THE PRODUCT.
Limitation of Liability and Damages
IN NO EVENT SHALL SMC BE LIABLE FOR INCIDENTAL, INDIRECT, SPECIAL, PUNITIVE, OR CONSEQUENTIAL
DAMAGES; OR FOR LOST PROFITS, SAVINGS OR REVENUES OF ANY KIND; OR FOR ANY ACTUAL DAMAGES IN
EXCESS OF $100,000; REGARDLESS OF THE FORM OF ACTION, WHETHER BASED ON CONTRACT; TORT;
NEGLIGENCE OF SMC OR OTHERS; STRICT LIABILITY; BREACH OF WARRANTY; OR OTHERWISE; WHETHER OR NOT
ANY REMEDY IS HELD TO HAVE FAILED OF ITS ESSENTIAL PURPOSE, AND WHETHER OR NOT SMC HAS BEEN
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SMC Networks, Inc.
6 Hughes
Irvine, CA 92618
L
IMITED
W
ARRANTY

i
ABOUT THIS GUIDE
About This Guide
Welcome to EliteView network management software (version 6.10). This guide describes the procedures for
installing and using this program. Detailed instructions on how to use every module and practical examples
make it easy for you optimize the performance and efficiency of your network.
General Manual Coverage
This manual is your guide to using EliteView to manage all your network resources. It covers the following
topics:
Introduction to EliteView Chapter 1
Software Installation Chapter 2
Getting Started Chapter 3
Mapping Out Your Network Chapter 4
Basic Management Tools Chapter 5
SNMP MIB Management Chapter 6
Logging Network Statistics Chapter 7
Managing Events Chapter 8
Using RMON Chapter 9
Conventions Used in this Manual
This manual uses a variety of editorial and typographical conventions to help you locate and
interpret information easily. These conventions are:
italics Italicized words refer to keyboard keys you have to press, menu options you
have to select to invoke an action, or a section in this manual or another
manual you can consult for reference.
For example: <Enter>, Reboot
Courier New Words shown in Courier New typeface are used to represent screen displays,
filenames, or commands you must enter to initiate an action.
Additional References
System Help
Help files may be accessed directly from EliteView via on-line help. To get help, select Help
from the menu bar and then click on Index. Last-minute information regarding EliteView has been
recorded in the README.TXT file.

ii
ABOUT THIS GUIDE

iii
TABLE OF CONTENTS
CHAPTER 1 INTRODUCTION ............................................................................................ 1-1
General Description ...............................................................................................................1-1
Management Functions ..........................................................................................................1-2
Application Interface .............................................................................................................1-2
Features of EliteView ............................................................................................................1-3
CHAPTER 2 INSTALLATION .............................................................................................. 2-1
Installation for EliteView .......................................................................................................2-1
System Requirements ......................................................................................................2-1
Using SETUP to Install EliteView ...................................................................................2-2
Software Installation ........................................................................................................2-2
CHAPTER 3 GETTING STARTED ....................................................................................... 3-1
Overview................................................................................................................................3-1
Network Interface ...........................................................................................................3-1
Event-Driven, Modular Architecture ..............................................................................3-1
EliteView Modules .................................................................................................................3-2
Data Logging and Event Management .................................................................................3-4
Starting EliteView ...................................................................................................................3-6
CHAPTER 4 DEFINING THE NETWORK CONFIGURATION ........................................................ 4-1
Quick Guide to Map Building ..............................................................................................4-1
Discovery ................................................................................................................................4-2
Name Database Manager ......................................................................................................4-5
Creating Network Maps.........................................................................................................4-7
CHAPTER 5 NETWORK TOOLS ........................................................................................ 5-1
Setting Addresses with the BOOTP Server .........................................................................5-1
Probing Devices with the Alive Test ...................................................................................5-5
Downloading Files with the TFTP Server ...........................................................................5-7
Telneting to Other Computers on the Network ..................................................................5-8
CHAPTER 6 SNMP MIB MANAGEMENT .......................................................................... 6-1
MIB Compiler .........................................................................................................................6-1
Starting the MIB Compiler ..............................................................................................6-2
MIB-2 Viewer.........................................................................................................................6-5
MIB-2 Directory ...............................................................................................................6-6
System Information ..........................................................................................................6-6
Interface Administration ..................................................................................................6-7
Interface Statistics ............................................................................................................6-8
MIB Browser ..........................................................................................................................6-9
Basic Functions of MIB Browser....................................................................................6-9

iv
T
ABLE
OF
C
ONTENTS
Menu Description ......................................................................................................... 6-10
Accessing Device Values ............................................................................................. 6-11
CHAPTER 7 COLLECTING DATA WITH LOG MANAGER ........................................................... 7-1
Overview................................................................................................................................7-1
Editing a Log Process .............................................................................................................7-2
Modifying a Log Process .................................................................................................7-3
Log Controls ............................................................................................................................7-4
Viewing Log Data ..................................................................................................................7-4
Using the Log Database Manager ..................................................................................7-4
Using the Graphic Display Dialog Box .........................................................................7-5
Defining Filter Formulas........................................................................................................7-6
Filter Formula ...................................................................................................................7-6
Filter Formula Syntax ......................................................................................................7-7
Defining Threshold Formulas ...............................................................................................7-9
Threshold vs. Filter Formula...........................................................................................7-9
Accuracy ...........................................................................................................................7-9
Threshold Formula ...........................................................................................................7-9
Threshold Formula Syntax ........................................................................................... 7-10
CHAPTER 8 MANAGING EVENTS ...................................................................................... 8-1
Understanding the Event Manager .......................................................................................8-1
Starting the Event Manager .............................................................................................8-1
Defining Events ......................................................................................................................8-2
Pre-Defined “System” Events .........................................................................................8-2
Defining “User” Events ...................................................................................................8-2
Defining Event Actions..........................................................................................................8-2
Using Special Text ...........................................................................................................8-4
Event Data ........................................................................................................................8-4
Receiving SNMP Traps with the Trap Manager..................................................................8-5
Limitations of Trap Messages .........................................................................................8-5
Trap Types .......................................................................................................................8-5
Trap Manager ...................................................................................................................8-6
Posting Messages to the Report Window ............................................................................8-6
CHAPTER 9 USING RMON ........................................................................................... 9-1
Introduction.............................................................................................................................9-1
A Brief Description of RMON ........................................................................................9-1
Starting the RMON Manager ...........................................................................................9-2
RMON Utilities .......................................................................................................................9-3
Statistics Group ................................................................................................................9-3
History Group ..................................................................................................................9-8
Alarm and Event Groups .............................................................................................. 9-10

v
T
ABLE
OF
C
ONTENTS
Host Group .................................................................................................................... 9-12
Host Top N Group ........................................................................................................ 9-14
Matrix Group ................................................................................................................. 9-16
Filter and Capture Groups ........................................................................................... 9-19
APPENDIX A TYPICAL ELITEVIEW APPLICATIONS ................................................................ A-1
Adding a New MIB Using the MIB Compiler .................................................................... A-1
Managing a Third-Party Device Using the MIB Browser ................................................. A-2
Using the Log and Event Managers to Monitor the Network ........................................... A-3
Customizing EliteView to Receive Third-Party Traps ....................................................... A-6
Exporting Logged Data to Other Software ......................................................................... A-7
APPENDIX B CUSTOMIZING ELITEVIEW ............................................................................ B-1
EliteView’s Initialization Files .............................................................................................. B-1
Inside the NETMGR.INI File ................................................................................................ B-1
Changing Parameters in NETMGR.INI .......................................................................... B-2
The [system] Section....................................................................................................... B-3
The [device] Section ....................................................................................................... B-3
The [tools] Section .......................................................................................................... B-4
The [bitmaps] Section ..................................................................................................... B-6
The [util] Section ............................................................................................................. B-8
The [tftp] Section ............................................................................................................ B-9
The [startup] Section ..................................................................................................... B-10
The [discover] Section .................................................................................................. B-11
Inside the TRAP.INI File..................................................................................................... B-11
The [generic] Section ................................................................................................... B-12
The [enterprise] Section ............................................................................................... B-13
Specific Trap Sections .................................................................................................. B-13
APPENDIX C SNMP ENVIRONMENT ................................................................................ C-1
SNMP Roles ........................................................................................................................... C-1
Managing Data ......................................................................................................................... C-1
Objects .................................................................................................................................... C-2
table.index notation ............................................................................................................ C-2
iso origin ............................................................................................................................ C-3
Branches ............................................................................................................................ C-3
APPENDIX D TECHNICAL REFERENCES ............................................................................. D-1
RFC Reports ........................................................................................................................... D-1
Industry-Related Documentation ......................................................................................... D-2
APPENDIX E PERFORMANCE TIPS ..................................................................................E-1
Optimize Your Computer System .........................................................................................E-1
Minimize Unnecessary Resources ........................................................................................E-1
Other Tips ..............................................................................................................................E-1
APPENDIX F SPECIFICATIONS .......................................................................................... F-1

vi
T
ABLE
OF
C
ONTENTS
Product Overview ..................................................................................................................F-1
Features and Specifications ...................................................................................................F-1
APPENDIX G CODEBASE 6.0 DLL SUB-LICENSE AGREEMENT ............................................... G-1
APPENDIX H TROUBLESHOOTING .................................................................................... H-1
EliteView Map: Icon Stays Red ........................................................................................... H-1
Discovery: No Nodes Found ............................................................................................... H-2
Trap Manager: MIB Variable Not Found ............................................................................ H-2
APPENDIX I ERROR MESSAGES ........................................................................................ I-1
EliteView................................................................................................................................. I-1
BOOTP Server ....................................................................................................................... I-3
BOOTP.DLL ............................................................................................................................ I-4
Discovery ................................................................................................................................ I-6
Event Manager...................................................................................................................... I-10
ICMP.DLL ............................................................................................................................... I-10
IPX.DLL ................................................................................................................................. I-13
Log Manager ......................................................................................................................... I-13
MESSAGE.DLL....................................................................................................................... I-13
MIB Browser ........................................................................................................................ I-14
MIB Compiler ....................................................................................................................... I-16
MIB.DLL ................................................................................................................................ I-19
MIB-2 Viewer....................................................................................................................... I-20
Report.................................................................................................................................... I-21
TFTP Server .......................................................................................................................... I-21
TFTP.DLL ............................................................................................................................... I-23
Trap Manager ....................................................................................................................... I-25
APPENDIX J PRODUCT SUPPORT SERVICES .......................................................................... J-1
Technical Support Questions ................................................................................................ J-1
GLOSSARY
INDEX

1-1
CHAPTER 1
INTRODUCTION
EliteView provides a user-friendly interface for managing SMC brand and third-party network
devices. This software is specifically designed to support the efforts of the MIS manager, system
administrator(s), technical staff responsible for network management and maintenance, and
network operators who use the system on a daily basis.
EliteView provides all the tools you need to manage nearly any kind of network. You can readily
monitor the traffic load throughout the network and make the changes required to avoid major
crises ahead of time. This software is designed around an event-driven architecture, which allows
you to define event-handling routines that can automatically manage a wide variety of common
network tasks.
General Description
EliteView is based on the industry standard Simple Network Management Protocol (SNMP); and
provides protocol support for UDP/IP and IPX. EliteView is a Windows-based application used to
manage nearly every component in your network, from internetworking devices down to end-node
computer resources.
EliteView manages network devices using the comprehensive Management Information Base. This
MIB consists of various MIB modules which define basic system parameters for both general and
specific device types.
EliteView is based on a broad conceptual interface that permits it to manage any network device
that supports SNMP. By opening your network map and clicking on various objects, specific
management interfaces and system information can be readily accessed.
Interface statistics and traffic load can be illustrated by line charts. This information can be
automatically recorded by the Log Manager to maintain historical records. A powerful reporting
feature is also provided for recording significant information from any management window. Reports
can be edited, saved and retrieved again during a later session for subsequent analysis or
comparison.
Event management is a key feature of EliteView. By defining specific data filters and thresholds, you
can activate event-handling routines that help you keep the network functioning. You can easily
shut down malfunctioning ports, switch to backup systems, or reconfigure network connections; and
then restore system parameters back to normal values after component problems have been
resolved or the traffic falls off.

1-2
INTRODUCTION
Management Functions
EliteView is a Windows-based software package. It provides state-of-the-art utilities which allow you
to perform the following network management tasks:
• Generate a detailed hierarchial map of your entire network configuration. These maps display the
current status of network nodes, and provide a hot link to the management module for each
device.
• Maintain centralized boot services that provide network addresses and information on system files
to download. Boot services are used to quickly reassign network addresses, and fetch filenames
required for downloading frequently modified system software for test devices.
• Monitor and log significant events and statistics. EliteView provides access to common MIB
variables, as well as specific parameters for SMC devices. Network statistics can then be displayed
in tabular or graphic form.
• Automatically respond to network problems with a variety of actions. By defining thresholds for
parameters based on device-specific criteria or traffic loading, you can invoke event handling
routines designed to warn the network manager of potential system problems or automatically
take corrective action.
• Quickly fetch or set MIB variables for network devices. Data in the Management Information Base
(e.g., RFC 1213 for generic internetworking devices) can be managed on an item-by-item basis or
with a user-defined profile that fetches or sets a group of related variables in a single action.
• Remotely manage or reconfigure network devices. SMC provides a wide variety of intelligent
networking devices which can be remotely managed via an SNMP agent. Software modules based
on an advanced graphic user interface are provided to manage every aspect of these devices
including hubs and switches. Extensive management functions are also provided for third-party
devices using the MIB Browser.
Application Interface
EliteView runs on a personal computer attached to the network you want to manage. Management
actions normally occur via the network map, through which you can activate the appropriate
software module simply by double-clicking on the concerned device or by selecting a target device
and then invoking the appropriate module from the menus. By sending commands across the
network, EliteView can directly manage a wide variety of SNMP-based devices.
Using this powerful management tool, you can generate a device map for a complete view of the
network, where each device is represented as an icon. Network devices can be added or deleted
manually, or located using Discovery. Device icons can be placed anywhere within a map using
simple drag and drop. Object attributes can also be easily changed.

1-3
INTRODUCTION
A full hierarchical representation can be generated by creating
submaps that expand to a more detailed view when selected.
Moreover, multiple submaps can be opened simultaneously. Each
device included in the map can be checked periodically to verify
that it is still attached to the network. When any device loses its
network connection, its icon will change to indicate device state,
and an alarm may be generated.
The standard method of starting EliteView is to double-click
on the EliteView icon, open your network map, select a target
device, and then invoke the required management module.
However, you can directly invoke any of the modules displayed
below.
The EliteView program group includes over twenty different
modules. The main program, labeled EliteView Platform, serves
as the platform through which you display the network map,
manage the network, and access any of the other management
modules.
Features of EliteView
EliteView includes the following features:
• Windows-based SNMP network management.
• Manages unlimited number of network devices running SNMP
agent software.
• Provides detailed information on device parameters, such as statistics for the overall SNMP agent,
device component status, and network interface configuration/statistics.
• Management controls are displayed with graphic and text-oriented windows, which can be
accessed via the network map, or from a pull-down menu, for better functional grouping and a
more intuitive user interface.
• Hierarchical, interactive network management map with unlimited devices and network levels.
• Displays real-time graphical statistics for various counters including network traffic. Monitors the
status and traffic load of each attached device, e.g., displaying the number of incoming, outgoing
and discarded frames.
• Flexible event management allows you to log relevant factors on device status and traffic.

1-4
INTRODUCTION

2-1
CHAPTER 2
INSTALLATION
This chapter describes setup procedures for EliteView network management software (version 6.10).
EliteView can manage any of SMC’s network devices via standard and private MIB definitions; and also
manage any third-party device that has a resident SNMP agent via standard MIB definitions. Installation of
EliteView software designed to manage specific devices is covered in the corresponding manuals.
(Refer to “Additional References.”)
Installation for EliteView
EliteView can be readily installed on most Windows-compatible personal computers. The EliteView setup
program will guide you through this step-by-step procedure.
System Requirements
Before installing EliteView, please review these minimum computer and network system
requirements for a “dedicated” network management system (NMS).
Hardware:
•PC with an 80486DX2-66 CPU and 16MB memory
•3.5-inch floppy drive and hard drive
•VGA adapter and display
•Mouse
•Network adapter
Software:
• Microsoft Windows 95
• Microsoft Windows 98
• Microsoft Windows NT 4.0
• Microsoft Windows 2000
• Microsoft Windows XP

2-2
INSTALLATION
If you frequently use multiple Windows-based applications, you may need a more powerful environment to
run EliteView along with other applications. Otherwise, you may not be able to take advantage of EliteView’s
full range of management capabilities. Advanced system requirements include:
• Personal computer with a Pentium-133 processor (or higher)
• Local hard disk with a minimum of 40 MB free disk space
• SVGA color monitor with accelerated video adapter
• Minimum 32 MB of memory (RAM)
Note: Although EliteView uses about 20 MB of disk space, additional disk space is required for
user files.
Using SETUP to Install EliteView
The SETUP program will install EliteView from the distribution CD-ROM. This program decompresses
files and copies them to a location you specify on your hard disk.
To Start SETUP:
1. Start Windows.
2. Insert the EliteView installation CD-ROM in your drive.
3. From the Program Manager, choose File menu and select Run.
4. Type D:SETUP in the dialog box.
5. Click on OK to start SETUP.
6. Follow the on-screen instructions to install the software.
7. Follow the instructions to setup the network interface.

3-1
CHAPTER 3
GETTING STARTED
Welcome to the EliteView network management program for Microsoft Windows. EliteView is a
powerful network management product that provides detailed device management functions,
along with a sophisticated graphic interface. The complete package is marketed as EliteView,
which includes the main EliteView program and over twenty core program modules. This chapter
provides an overview of the structure, and explains how the various EliteView modules are related.
Overview
EliteView is a flexible network management system based on international and industry standards.
It is a Windows-based program that runs on an inexpensive PC platform. This full-featured network
management software allows management of SMC or third-party network devices. In addition, it
supports an open platform for the development of any kind of management application.
EliteView can manage various SMC network devices
and examine the management information base in
third-party devices.
Network Interface
EliteView can function on various network protocol
stacks for greater flexibility and efficiency. In the
Windows environment, EliteView can be configured to run on a Windows TCP/IP package with a
standard WINSOCKET interface. At the application level, network devices are managed via SNMP
over IP or IPX.
Event-Driven, Modular Architecture
Designed around an event-driven, multi-tasking architecture, EliteView consists of the main
program and supplementary modules. Each module works independently or in conjunction with
other modules. Running any module is as easy as invoking it from the main EliteView program, or
by simply double-clicking on the corresponding icon from the EliteView program group.
EZ Stack 10
3rd Party
SNMP Node
3rd Party
IP/IPX/Ethernet Node
Network
Management Station
TigerSwitch 8
TigerSwitch 100
EliteView
TigerStack II

3-2
GETTING STARTED
EliteView Modules
EliteView includes support for many SMC products, including the EZ Stack, TigerStack, and
TigerSwitch, series. This section briefly describes the basic support modules included in EliteView.
The modules for specific SMC products are described in the on-line help files.
Alive Test
This module tests the connection to any network node with ICMP messages. It sends an echo
request to the specified network node and gathers replies to determine device existence, round
trip delay time, and the ratio of successfully returned packets.
BOOTP Server
The BOOTP Server maintains a database of network addresses and a list of corresponding boot
files. BOOTP protocol runs on the UDP/IP stack. It is used by network devices to find out their
own IP address and the device initialization file(s) to download.
Discovery
This module is used to automatically detect active devices on the network by polling within a
specified network address range or community. Discovery sends commands out to the network
and waits for responses. When a device responds, EliteView queries its functionality. If it
responds correctly, a corresponding bitmap icon is added to the Discovery window.
EliteView Main Program
The main EliteView program provides the primary interface to all EliteView modules. The Tools
and Utilities menus provide access to nearly every module under EliteView. The main program
also provides all the tools you need to generate a detailed map of your network via menus and
tool buttons. Moreover, it supports MDI (Multiple Document Interface) which allows you to
simultaneously manage several submaps. After locating the required device on your map, simply
double-click on it to invoke the relevant management application.
Event Manager
This module serves as the management center for all events generated under the main EliteView
program, Log Manager and Trap Manager. In response to input from these modules, the Event
Manager can define and dispatch responses in various forms. Actions may range from sounding
an audible signal, displaying an on-screen message, logging the event into the report window,
running a user-specified program such as a beeper, fax, pager, email, etc. or logging the event
into a database for later analysis.
Log Utilities
The Log Manager can collect the current value of SNMP MIB variables at a specified interval. A
wide range of parameters on device status and network traffic can be sampled for selected nodes
and stored in the database for long-term analysis. This information is displayed with the Log
Database Manager in numeric form (including date, time and data).
This manual suits for next models
3
Table of contents
Other SMC Networks Software manuals
Popular Software manuals by other brands

Orion
Orion OE392-10-GPCXP Technical guide

YOKOGAWA
YOKOGAWA vigilantplant EJXMVTool FSA120 user manual

F-SECURE
F-SECURE CLIENT SECURITY 9.00 - QUICK Quick installation guide

KAPERSKY
KAPERSKY ANTI-VIRUS 5.0 - FOR SAMBA SERVERS user guide

Mackie
Mackie C4 Commander user guide

Avaya
Avaya IP Office 4.0 installation manual