cc/td/doc/product/lan/cat6000
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Catalyst 6000 Network Analysis Module Installation and Configuration Note

Catalyst 6000 Network Analysis Module Installation and Configuration Note

WS-X6380-NAM

This publication describes the Catalyst 6000 Network Analysis Module and includes installation and configuration procedures.

Contents

This publication consists of these sections:

Introduction

This publication describes how to install and configure the Catalyst 6000 Network Analysis Module (NAM).


Note This publication describes how to configure the NAM from the command line interface (CLI) of the Catalyst 6000 family switch. Refer to the TrafficDirector portion of the CiscoWorks 2000 documentation for more information about TrafficDirector.

Understanding How the Network Analysis Module Works

The NAM monitors and analyzes network traffic for the Catalyst 6000 family switches using RMON, RMON2, and other MIBs. The RMON support that the NAM provides for Ethernet VLANs is an extension of the RMON support provided by the Catalyst 6000 family supervisor engine. The switched port analyzer (SPAN) selects network traffic and directs it to the NAM. TrafficDirector, or any other IETF-compliant RMON application, can analyze link characteristics, packet layers for capacity planning or departmental accounting, differentiated service deployment and policies, and filter/capture packets for debugging.

The NAM supports the following RMON groups:

The NAM can analyze Ethernet VLAN traffic up to 140 Kpps from either or both:

The NAM is managed and controlled from a Simple Network Management Protocol (SNMP) management application, such as CiscoWorks 2000.

Front Panel Description

The NAM (see Figure 1) has a status LED, a hard drive LED, a Shutdown button, and a PCMCIA slot.


Figure 1: Network Analysis Module


Status LED

Table 1 describes the NAM states as indicated by the Status LED.


Table 1: Network Analysis Module Status LED Descriptions
Color Description

Green

All diagnostics test pass--- NAM is operational.

Red

A diagnostic other than an individual port test failed.

Amber

The NAM is running through its boot and self-test diagnostics sequence.

---or---

The NAM is disabled.

Off

The NAM power is off.

Shutdown Button

To prevent corruption of the NAM, it is critical that the NAM run through the shutdown procedure before shutting off. If the NAM fails to respond to CLI or NAM shutdown commands, press the Shutdown button to shut down the NAM.


Caution Do not remove the NAM from the switch until after the NA M has shut down completely, and the Status LED is not green. Removing the NAM without going through a shutdown procedure can damage your NAM.

Use a small pointed object, such as a paper clip, to access the Shutdown button and turn off the NAM. Upon shutdown, the Status LED turns off. The shutdown procedure may require several minutes.

Hard Drive Activity LED

The Hard Drive (HD) Activity LED indicates when the hard drive is in use.

PCMCIA Slot

The PCMCIA slot provides access for up to two standard PCMCIA cards and is reserved for future use.

Specifications

Table 2 lists the specifications for the NAM.


Table 2: Network Analysis Module Specifications
Specification Description

Dimensions (H x W x D)

1.18 x 15.51 x 16.34 in. (30 x 394 x 415 mm)

Weight

Minimum: 3 lb (1.36 kg)

Maximum: 5 lb (2.27 kg)

Environmental Conditions:

Operating temperature
Nonoperating temperature
Humidity

32 to 104° F (0 to 40° C)

-40 to 167° F (-40 to 75° C)

10 to 90%, noncondensing

Safety Overview

Safety warnings appear throughout this configuration note in procedures that, if performed incorrectly, might harm you. A warning symbol precedes each warning statement.


Warning This warning symbol means danger. You are in a situation that could cause bodily injury. Before you work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar with standard practices for preventing accidents. (To see translations of the warnings that appear in this publication, refer to the appendix, "Translated Safety Warnings.")


Warning Before you install, operate, or service the system, read the Site Preparation and Safety Guide. This guide contains important safety information you should know before working with the system.

Installation and Removal Instructions


Warning Only trained and qualified personnel should be allowed to install or replace this equipment

All Catalyst 6000 family switches support hot swapping, which lets you install, remove, replace, and rearrange modules without turning off the system power (for more information on removing the NAM from a switch, see the "Removing the Network Analysis Module" section). When the system detects that a module has been installed or removed, it automatically runs diagnostic and discovery routines, acknowledges the presence or absence of the module, and resumes system operation with no operator intervention.

This section describes how to install and verify the operation of the NAM in the Catalyst 6000 family switches and is divided into the following sections:

Required Tools

This section describes the tools and requirements you need to install the NAM.


Note Before installing the NAM, you must install the Catalyst 6000 family switch chassis and at least one supervisor engine. For information on installing the switch chassis, refer to the Catalyst 6000 Family Installation Guide.

These tools are required to install the NAM in the Catalyst 6000 family switches:

Whenever you handle the NAM, always use a wrist strap or other grounding device to prevent electrostatic discharge (ESD).

Installing the Network Analysis Module

This section describes how to install the NAM in the Catalyst 6000 family switches.

Both the Catalyst 6009 and 6509 switch chassis have nine slots (see Figure 2). The Catalyst 6006 and 6506 switch chassis have six slots.


Note The Catalyst 6509-NEB switch has vertically oriented slots numbered 1 to 9, from right to left. Install the modules with the component side facing to the right.

Slot 1 is reserved for the supervisor engine. Slot 2 can contain an additional redundant supervisor engine in case the supervisor engine in slot 1 fails. If a redundant supervisor engine is not required, slots 2 through 9 (slots 2 through 6 on the 6-slot chassis) are available for switching modules, such as the NAM. You should install switching-module filler plates, which are blank switching-module carriers, in empty slots to maintain consistent airflow through the switch chassis.


Figure 2:
Slot Numbers on Catalyst 6000 Family Switches


To install the NAM in the Catalyst 6000 family switch, perform these steps:


Step 1 Make sure you take the necessary precautions to prevent ESD damage.


Warning During this procedure, wear grounding wrist straps to avoid ESD damage to the card. Do not directly touch the backplane with your hand or any metal tool, or you could shock yourself.

Step 2 Choose a slot for the NAM.


Note The supervisor engine must be installed in slot 1; a redundant supervisor engine can be installed in slot 2. If a redundant supervisor engine is not required, slots 2 through 9 (slots 2 through 6 on the 6-slot chassis) are available for switching modules.

Step 3 Loosen the captive installation screws (use a screwdriver, if necessary) securing the switching-module filler plate (or the existing switching module) from the desired slot, if present.

Step 4 Remove the switching-module filler plate (or the existing switching module), if present.


Warning Blank faceplates and cover panels serve three important functions: they prevent exposure to hazardous voltages and currents inside the chassis; they contain electromagnetic interference (EMI) that might disrupt other equipment; and they direct the flow of cooling air through the chassis. Do not operate the system unless all cards, faceplates, front covers, and rear covers are in place.

Step 5 Hold the NAM with one hand, and place your other hand under the carrier to support the module. Do not touch the printed circuit boards or connector pins.

Step 6 Place the module in the slot. Align the notch on the sides of the switching-module carrier with the groove in the slot (see Figure 3).


Figure 3: Installing Modules in the Catalyst 6000 Family Switch


Step 7 Keep the NAM at a 90-degree orientation to the backplane. Carefully slide the module into the slot until the notches on both ejector levers engage the chassis sides.

Step 8 Using the thumb and forefinger of each hand, simultaneously pivot in both ejector levers to fully seat the module in the backplane connector (see Figure 4 ).


Figure 4: Ejector Levers and Captive Installation Screws



Caution Always use the ejector levers when installing or removing the NAM. A module that is partially seated in the backplane will cause the system to halt and subsequently crash.


Note If you perform a hot swap, the console displays the message "Module n has been inserted." This message does not appear, however, if you are connected to the Catalyst 6000 family switch through a Telnet session.

Step 9 Use a screwdriver to tighten the captive installation screws on the left and right ends of the NAM.

Verifying the Installation

Enter the show module or show port [mod_num/port_num] command while logged into the supervisor engine or console to verify that the switch acknowledges the new modules and has brought them online.

This example shows the output of the show module command:

Console> (enable) show module
Mod Slot Ports Module-Type               Model               Sub Status
--- ---- ----- ------------------------- ------------------- --- --------
1   1    2     1000BaseX Supervisor      WS-X6K-SUP1A-2GE    yes ok
15  1    1     Multilayer Switch Feature WS-F6K-MSFC         no  ok
3   3    2     Network Analysis Module   WS-X6380-NAM        no  ok
5   5    48    10/100BaseTX Ethernet     WS-X6248-RJ-45      no  ok
.
.
.
Console> (enable) 

Removing the Network Analysis Module

This section describes how to remove the NAM from the Catalyst 6000 family switch.


Caution Before removing the NAM, be sure to follow the shutdown procedure and verify the Status LED is not green. If the NAM is not shut down correctly, you could corrupt the network analysis software.

To remove the NAM, perform these steps:


Warning During this procedure, wear grounding wrist straps to avoid ESD damage to the card. Do not directly touch the backplane with your hand or any metal tool, or you could shock yourself.


Step 1 Shut down the NAM by one of these methods:


Note Shut down may require several minutes.


Caution Do not use set module power down mod_num to cut the power to NAM. This command does not shut down the NAM correctly and could corrupt your network analysis software

Step 2 Verify that the NAM is shut down. Do not remove the NAM from the switch until the Status LED is off.

Step 3 Use a screwdriver to loosen the captive installation screws at the left and right sides of the NAM.

Step 4 Grasp the left and right ejector levers. Simultaneously pull the left lever to the left and the right lever to the right to release the NAM from the backplane connector.

Step 5 As you pull the module out of the slot, place one hand under the carrier to support it. Avoid touching the module itself.

Step 6 Carefully pull the NAM straight out of the slot, keeping one hand under the carrier to guide it. Keep the module at a 90-degree orientation to the backplane (horizontal to the floor).

Step 7 Place the removed module on an antistatic mat or antistatic foam.

Step 8 If the slot is to remain empty, install a module filler plate to keep dust out of the chassis and to maintain proper airflow through the module compartment.


Note When you reinstall the NAM into a switch, you must log into the NAM root account and complete the initial configuration as specified in the"Initial Configuration" section.

Configuring the Network Analysis Module

These sections describe how to configure the NAM from the CLI:

Initial Configuration

Before you can use the NAM for network analysis, you must log into the NAM root account and configure the IP address, subnet mask, IP broadcast address, default gateway, DNS name and DNS name server, and SNMP agent's access control and the settings for the system group on the NAM.

To configure the NAM, perform these steps in privileged mode:


Step 1 Verify that the NAM is installed and the power is on.

Console> show module mod_num
 

Step 2 Enter this command to session to the NAM:

Console> (enable) session mod_num
 

Step 3 At the login prompt, type root to log into the root account.

Step 4 At the password prompt, type root as the root password.


Note If you have not changed the password from the factory-set default, a warning message displays. Should you choose to change the password from the default, see the "Changing and Recovering the Network Analysis Password" section for more information.

Step 5 Enter this command to configure the IP address:

root@localhost# ip address ip-address subnet-mask
 

Step 6 Enter this command to configure the IP broadcast address:

root@localhost# ip broadcast broadcast-address
 

Step 7 Enter this command to configure the IP host name used in the CLI prompt, show commands, log messages, and so forth:

root@localhost# ip host name
 

Step 8 Enter this command to configure the default gateway:

root@localhost# ip gateway default-gateway
 

Step 9 Enter this command to configure the DNS host name for the NAM:

root@localhost# ip domain domain-name
 

Step 10 Enter this command to configure one or more IP addresses as DNS name servers:

root@localhost# ip nameserver ip-address [ip-address]
 

Step 11 Enter this command to verify the NAM configuration:

root@localhost# show ip
 

Step 12 Enter this command to configure the SNMP syslocation MIB variable:

root@localhost# snmp location location-string

Note The following MIB variables must be a valid DisplayString text, with a maximum length of 64 characters.

Step 13 Enter this command to set the SNMP sysContact MIB variable:

root@localhost# snmp contact contact-string
 

Step 14 Enter this command to set the SNMP sysName MIB variable:

root@localhost# snmp name name-string

Note You can delete the SNMP name, SNMP location or SNMP contact by entering the command without any parameters.

Step 15 Enter this command to set the SNMP agent community string parameter password for read-write access:

root@localhost# snmp community community-string rw
 

Note If you are using TrafficDirector, you need to input the community-strings in TrafficDirector, exactly as you enter them in the NAM.

Step 16 Enter this command to set the SNMP agent community string parameter password for read-only access:

root@localhost# snmp community community-string ro

Note You can clear the SNMP community string with the snmp delete community community-string command

Step 17 Enter this command to verify the SNMP access controls and settings:

root@localhost# show snmp
 

After completing this configuration, the NAM is ready to use with a network monitoring application such as TrafficDirector or any other IETF-compliant RMON application.

This example shows how to configure the NAM:

Console> (enable) session 2
Trying NAM-2...
Connected to NAM-2.
Escape character is '^]'.
 
Network Analysis Module (WS-X6380-NAM)
 
login: root
Password: 
 
Network Analysis Module (WS-X6380-NAM) Console, 1.1(1)
Copyright (C) 1999, 2000, Cisco Systems, Inc.
 
WARNING! Default password has not been changed!
 
root@localhost# ip address 172.20.52.29 255.255.255.224
root@localhost# ip broadcast 172.20.52.31
root@localhost# ip host nam1
root@localhost# ip gateway 172.69.2.132
root@localhost# ip domain nam1
root@localhost# ip nameserver 171.62.2.132
root@localhost# show ip
IP address:         172.20.52.29
Subnet mask:        255.255.255.224
IP Broadcast:       172.20.52.31
DNS Name:           nam1.cisco.com
Default Gateway:    172.20.52.1
Nameserver(s):      171.69.2.132 
root@localhost# 
root@localhost# snmp location "Cisco Lab, Building X, Floor 1"
 
root@localhost# snmp contact "Jane Doe, Cisco Systems, (408) 111-1111"
root@localhost# snmp name "6k-NAM - Slot 2"
root@localhost# snmp community public rw
root@localhost# snmp community private ro
 
root@localhost# show snmp
 
SNMP Agent:   nam1.cisco.com   172.20.52.29
 
SNMPv1:  Enabled
SNMPv2C: Enabled
SNMPv3:  Disabled
 
community   public   write
community   private  read
 
sysDescr         "Catalyst 6000 Network Management Module (WS-X6380-NAM)"
sysObjectID      1.3.6.1.4.1.9.5.1.3.1.1.2.223
sysContact       "Jane Doe, Cisco Systems, (408) 111-1111"
sysName          "6k-NAM - Slot 2"
sysLocation      "Cisco Lab, Building X, Floor 1"
root@localhost# 

VLANs and the NAM

You do not need to configure the VLAN for the NAM management port. The NAM management port automatically synchronizes to the VLAN assigned to interface sc0 on the supervisor engine. You cannot set the NAM management port VLAN with the set vlan mod/port command.

Using NetFlow Data Export as a Traffic Source

To use NetFlow Data Export (NDE) as a traffic source for the NAM, enable the NetFlow Monitor option to allow the NAM to receive the NDE stream from a NetFlow Feature Card (NFFC) or NetFlow Feature Card II (NFCC II) installed in the switch. The statistics are presented on reserved ifIndex.3000.


Note For information on configuring NDE, refer to the Catalyst 6000 Family Multilayer Switch Feature Card and Policy Feature Card Configuration Guide.

To enable the NetFlow Monitor option, perform these steps:


Step 1 Enter this command in privileged mode to enable the NetFlow Monitor option:

Console> (enable) set snmp extendedrmon netflow enable mod_num
 

This example shows how to enable the NetFlow Monitor option and how to verify that it is enabled:

Console> (enable) set snmp extendedrmon netflow enable 2
Snmp extended RMON netflow enabled
Console> (enable) show snmp 
RMON:                       Disabled
Extended RMON Netflow Enabled : Module 2
Traps Enabled:
None
Port Traps Enabled: None
 
Community-Access     Community-String
----------------     --------------------
read-only            public
read-write           private
read-write-all       secret
 
Trap-Rec-Address                           Trap-Rec-Community
----------------------------------------   -------------------- 
<...output truncated...>
 
Console> (enable)
 

Step 2 Enter this command in privileged mode to enable NDE:

Console> (enable) set mls nde enable

Note With a NAM installed, you do not need to specify an external data collector with a set mls nde collector_ip [udp_port_number] command as described in the Catalyst 6000 Family Multilayer Switch Feature Card and Policy Feature Card Configuration Guide. Ignore messages that the host and port are not set.

Using SPAN as a Traffic Source

To use the SPAN source port as a traffic source for the NAM, set port 1 on the NAM as the SPAN destination port. You cannot set port 1 on the NAM as a SPAN source port.

The NAM can analyze Ethernet traffic from Ethernet, Fast Ethernet, Gigabit Ethernet, Trunk Port, or Fast EtherChannel SPAN source ports, or you can specify an Ethernet VLAN as the SPAN source.

You can use RSPAN traffic as a SPAN source. Verify that the SPAN source is set as the RSPAN VLAN and NAM is set as the SPAN destination.

For more information on configuring SPAN and RSPAN, refer to the Catalyst 6000 Family Software Configuration Guide.

To set the NAM as a SPAN destination port, perform this task in privileged mode:

Task Command

Set the NAM as a SPAN destination port.

set span {src_mod/src_ports | src_vlans | sc0} {dest_mod/1} [rx | tx | both] [inpkts {enable | disable}] [learning {enable | disable}] [multicast {enable | disable}] [filter vlans...] [create]

Configuring Set Collection Types

You can use the autostart command to configure preset collection types on all possible data sources automatically. After enabled, the agent will start the collection on each data source during the NAM initialization. You must reboot the NAM before the configuration takes effect. Use this feature to configure the collection types on a global basis, rather than one collection at a time. The NAM supports the following collection types:

If the NMS never sets the addressMapMaxDesiredEntries scalar, then the agent uses the value -1 (for no limit).

For example, after you issur the autostart etherstat enable command and reboot the NAM, each dataSource (interface or VLAN) will be configured with an etherStatsEntry (from RMON-1). The etherStatsOwner field will be set to the string monitor. If an NMS creates an etherStatsEntry on a particular dataSource, and then that entry is saved in NVRAM (in rmon.cnf), and on the next reboot, the agent will skip that dataSource during the autostart etherstat enable processing, for example, SNMPconfigured rows have precedence over the autostart rows. Only one or the other will be created for a given collection-type/dataSource pair.

Autostart processing is done after the NVRAM control entries (set via SNMP) is done. This way, the agent can tell if SNMP has already set up a particular collection, and the agent can also pick control table index values that do not conflict with the index values picked by the NMS for any SNMP-configured collections.

Enter this command from the root account of the NAM to enable the etherStat collection type:

root@localhost# autostart etherstat enable
 

Enter this command from the root account of the NAM to enable the addressMap collection type:

root@localhost# autostart addressmap enable
 

Enter this command from the root account of the NAM to enable the prioStats collection type:

root@localhost# autostart priostats enable
 

Enter this command from the root account of the NAM to enable the vlanStats collection type:

root@localhost# autostart vlanstats enable
 

Enter this command from the root account of the NAM to disable the vlanStats collection type:

root@localhost# autostart vlanstats disable
 

After enabling or disabling one or more collection type, you must reboot the NAM before the configuration takes effect.

Network Analysis Module Administration

These sections contain the various administrative tasks you can perform on the NAM:

Logging into the Network Analysis Module

The NAM has two user levels with different access privileges:

To log into the NAM, perform these steps:


Step 1 Log into the Catalyst 6000 family switch using Telnet or the console port connection.

Step 2 At the CLI prompt, session into the NAM using the session mod_num CLI command, as follows:

Console> (enable) session 2
Trying NAM-2...
Connected to NAM-2.
Escape character is '^]'.
 
Network Analysis Module (WS-X6380-NAM)
 

Step 3 At the NAM login prompt, type root to log in as the root user or guest to log in as a guest user.

login: root
 

Step 4 At the password prompt, enter the password for the account. The default password for the root account is "root" and the default password for the guest account is "guest."

Password: 
 
After a successful login, the command line prompt appears as follows:
    Network Analysis Module (WS-X6380-NAM) Console, 1.1
    Copyright (C) 1999, Cisco Systems, Inc.
    WARNING! Default password has not been changed!
     
    root@localhost# 
    


Note The root account uses the # prompt; the guest account uses the > prompt.

Changing and Recovering the Network Analysis Password

If you have not changed the password from the factory-set default, a warning message displays upon logging into the NAM. To change the password, perform these steps while you are logged into the root account on the NAM:


Step 1 Change the password as follows:

root@localhost# password [username]
 

Step 2 Enter the new password as directed:

Changing password for user root
New UNIX password:
 

Step 3 Reenter the new password as directed:

Retype new UNIX password:
passwd: all authentication tokens updated successfully


Note New passwords must be at least six characters in length, and may include uppercase and lowercase letters, numbers, and punctuation marks.

This example shows how to set the password for the root account:

    root@localhost# password root
    Changing password for user root
    New UNIX password:
    Retype new UNIX password:
    passwd: all authentication tokens updated successfully
     
    

If you forget or loss the password, you can enter the clear module password from the CLI to restore the password for the root account to root and the guest account to guest.

To restore the NAM password to the factory-set defaults, enter this command in privileged mode:

Console> (enable) clear module password mod

Resetting the Network Analysis Module

If you cannot reach the NAM through the CLI or an external Telnet session, enter the reset command to reset and reboot the NAM. The reset process requires several minutes.

To reset the NAM from the CLI, perform this task in privileged mode:

Task Command

Reset the NAM.

reset NAM_mod_num

This example shows how to reset the NAM, installed in slot 2, from the CLI:

Console> (enable) reset 2
Module 2 shut down in progress, please don't remove module until shutdown completed 
Resetting module 2....
2000 Feb 15 15:39:42 %SYS-5-MOD_OK:Module 2 is online 
Console> (enable)
 

To reboot the NAM from the network analysis software, perform this task while you are logged into the root account on the NAM:

Task Command

Reset the NAM.

reboot

This example shows how to reboot the NAM:

root@localhost# reboot
	Reboot the NAM? [Y/N]:y
System reboot in progress..

Upgrading the Network Analysis Module Software

To upgrade the NAM software, perform these steps:


Step 1 Copy the NAM software image to a directory accessible via FTP.

Step 2 Log into the switch through the console port or through a Telnet session.

Step 3 To upgrade the software, you must boot the NAM into the maintenance partition. Enter this command in privileged mode:

Console> (enable) reset mod_num hdd:2 
 

Step 4 Reboot the NAM into the maintenance partition by entering this command:

Console> (enable) reset mod_num 
 

Step 5 After the NAM is back online, session into the NAM, and log into the root account.

Step 6 Enter this command to upgrade the NAM software:

root@localhost# upgrade ftp-url 
 

ftp-url is the FTP location and name of the NAM software image file.


Note If the FTP server does not allow anonymous users, use the following syntax for the ftp-url: ftp://user@host/absolute-path/filename. Enter your password when prompted.

Step 7 Follow the screen prompts during the upgrade.

Step 8 Once the upgrade has completed, log out of the NAM.

Step 9 Enter this command to reset the NAM:

Console> (enable) reset mod_num
 

Step 10 After the NAM has come back online, log into the NAM root account and enter these commands to verify the initial configuration:

root@localhost# show ip
root@localhost# show snmp

This example shows how to upgrade the NAM software:

Console> (enable) reset 3 hdd:2
Module 3 shut down in progress, please don't remove module until shutdown completed.
2000 May 25 09:07:46 %SYS-5-MOD_RESET:Module 3 reset from Software
2000 May 25 09:09:38 %SYS-5-MOD_OK:Module 3 is online
 
Console> (enable) session 3
Trying NAM-3...
Connected to NAM-3.
Escape character is '^]'.
 
Cisco Network Analysis Module (WS-X6380-NAM)
 
Maintenance Partition
 
login: root
Password: 
 
Network Analysis Module (WS-X6380-NAM) Console, 1.1(1)m
Copyright (C) 1999, 2000, Cisco Systems, Inc.
 
WARNING! Default password has not been changed!
root@nam5.cisco.com# upgrade ftp://mcwillis@172.20.52.3/c6nam.1-1-0-20.gz
Password for mcwillis@172.20.52.3: 
 
500 'SIZE c6nam.1-1-0-20.gz': command not understood.
ftp://mcwillis@172.20.52.3/tftpboot/c6nam.1-1-0-20.gz (unknown size)
-                         [-]   67759K
69386107 bytes transferred in 80.53 sec (841.43k/sec)
 
Upgrade file ftp://mcwillis@172.20.52.3/tftpboot/c6nam.1-1-0-20.gz
is downloaded. Upgrading will wipe out the
contents of the application partition on the hard disk.
Do you want to proceed installing it [y|N]: y
 
Proceeding with installation. Please do not interrupt.
If installation is interrupted or fails, boot the maintenance
partition again and restart upgrade.
/usr/local/nam/bin/netinstall /dev/hda1 -inf=/tmp/upgrade.bin
 
Upgrade complete. You can boot the new application partition.
root@nam5.cisco.com# exit
Console> (enable) reset 3
Module 3 shut down in progress, please don't remove module until shutdown completed.
2000 May 25 09:30:59 %SYS-5-MOD_RESET:Module 3 reset from Software
2000 May 25 09:32:56 %SYS-5-MOD_OK:Module 3 is online
Console> (enable) 

Additional NAM Software Administrative Commands

The NAM supports these additional administrative commands:

Displays list of top-level commands or additional information for an individual command.
Controls whether external Telnet sessions will be accepted by the NAM from outside the switch. The default is set to off. If exsession is set to off, you can only Telnet to the NAM from the supervisor engine on the switch. If exsession is set to on, new Telnet requests from any valid IP address will be accepted. This command does not cause any currently open sessions to be dropped. This command can be used by the root account only.
Sends a core file to an anonymous FTP server after the RMON agent crashes. Copy and save the information to a file before calling the Technical Assistance Center (TAC). TAC will use this file to analyze and troubleshoot the NAM. Only one core dump file is maintained: an newly created core dump file overwrites an existing core dump file. This command can be used by the root account only.

Note If the FTP server does not allow anonymous users, use the following syntax: coredump ftp://user:password@host/absolute-path/filename.

Displays system information that a technical support engineer may request if you have to call TAC. Copy and save the information to a file before calling TAC. This command can be used by the root account only.
Displays the current processor load on the NAM CPU for all combined functions. This command can be used by both root and guest accounts.
Displays the current time-of-day information maintained by the NAM. This command can be used by both root and guest accounts.
Displays the system memory statistics. Memory sizes are rounded to the nearest MB. This command can be used by both root and guest accounts.
Displays system information on the BIOS and module, including the NAM serial number, which a technical support engineer may request if you have to call TAC. Copy and save the information to a file before calling TAC. This command can be used by both root and guest accounts.
Clears the NVRAM configuration to the factory-set default condition, including:
No IP host configuration data are deleted
You must reset the NAM after entering the config clear command for the change to take effect.
This command can be used by the root account only.

Additional Supervisor Engine Commands

The NAM also supports these CLI commands, which are described in more detail in the Catalyst 6000 Family Command Reference publication.

Clears the configuration on the supervisor engine associated with the specified NAM.
With a NAM installed, displays "Network Analysis Module" under "Module-Type."
Displays the error logs for the specified NAM.
Deletes all entries in the error log for the specified NAM.
Displays the supervisor engine NVRAM configurations.
Displays the errors reported from the diagnostic rests for both the SPAN port (port 1) and the management port (port 2) and the BIOS and CMOS boot results.
Configures port 1 as a SPAN destination port. Port 1 on the NAM cannot be configured as a SPAN source port.
Configures the name for the specified NAM port.
Displays the port status for the specified NAM.
Displays the MAC counters for the specified NAM.
Displays the hardware counters for the specified NAM.
Displays the capabilities of the module and ports.

Unsupported Supervisor Engine CLI Commands

These CLI commands are not supported by the NAM:

Supported RMON and RMON2 MIB Objects

Table 3 lists the RMON and RMON2 MIB objects supported by the supervisor engine and the NAM. The supervisor engine implements some objects from the RMON MIBs as specified in Table 3. The supervisor RMON implementation is completely independent of the NAM implementation, and no MIB objects are shared.

To collect etherStats from a physical interface on the switch, configure the etherStatTable on the supervisor rather than on the NAM, so that the etherStats can be accurately collected on multiple physical interfaces simultaneously.

If you are interested in the etherStats fro a specific VLAN, configure the etherStatsTable on the NAM using a ifIndex as a data source corresponding to the VLAN of interest.

Any alarmVariable configured on the supervisor engine must reference a MIB object on the supervisor engine. An alarmVariable configured on the NAM must reference a MIB object on the NAM. You can not configure an alarmVariable on the NAM which references a MIB object on the supervisor or configure an alarmVariable on the supervisor engine which references a MIB object on the NAM.


Table 3: Supervisor Engine Module and NAM RMON Support
Module Object Identifier (OID) and Description Source

Supervisor
Engine

....mib-2(1).rmon(16).statistics(1).etherStatsTable(1) ....mib-2(1).rmon(16).statistics(1).tokenRingMLStatsTable(2)
...mib-2(1).rmon(16).statistics(1).tokenRingPStatsTable(3)

RFC 1757 (RMON-MIB)
RFC 1513 (TOKEN-RING-RMON MIB)
RFC 1513 (TOKEN-RING-RMON MIB)

Counters for packets, octets, broadcasts, errors, etc.

Supervisor
Engine

...mib-2(1).rmon(16).history(2).historyControlTable(1)
...mib-2(1).rmon(16).history(2).etherHistoryTable(2)
...mib-2(1).rmon(16).history(2).tokenRingMLHistoryTable(3)
...mib-2(1).rmon(16).history(2).tokenRingPHistoryTable(4)

RFC 1757 (RMON-MIB)
RFC 1757 (RMON-MIB)
RFC 1513 (TOKEN-RING-RMON MIB)
RFC 1513 (TOKEN-RING-RMON MIB)

Periodically samples and saves statistics group counters for later retrieval.

Supervisor
Engine

...mib-2(1).rmon(16).alarm(3)

RFC 1757 (RMON-MIB)

A threshold that can be set on critical RMON variables for network management.

Network
Analysis

...mib-2(1).rmon(16).alarm(3)

RFC 1757 (RMON-MIB)

A threshold that can be set on critical RMON variables for network management.

Network
Analysis

...mib-2(1).rmon(16).hosts(4)

RFC 1757 (RMON-MIB)

Maintains statistics on each host device on the segment or port.

Network
Analysis

...mib-2(1).rmon(16).hostTopN(5)

RFC 1757 (RMON-MIB)

A user-defined subset report of the Hosts group, sorted by a statistical counter.

Network Analysis

......mib-2(1).rmon(16).statistics(1).etherStatsTable(1)

RFC 1757 (RMON-MIB)

Network
Analysis

...mib-2(1).rmon(16).matrix(6)

RFC 1757 (RMON-MIB)

Maintains conversation statistics between hosts on a network.

Network
Analysis

...mib-2(1).rmon(16).filter(7)

RFC 1757 (RMON-MIB)

A filter engine that generates a packet stream from frames that match a specified pattern.

Network
Analysis

...mib-2(1).rmon(16).capture(8)

RFC 1757 (RMON-MIB)

Manages buffers for packets captured by the Filter group for uploading to the management console.

Supervisor
Engine

...mib-2(1).rmon(16).event(9)

RFC 1757 (RMON-MIB)

Generates SNMP traps when an Alarms group threshold is exceeded and logs the events.

Network Analysis

...mib-2(1).rmon(16).event(9)

RFC 1757 (RMON-MIB)

Generates SNMP traps when an Alarms group threshold is exceeded and logs the events.

Supervisor
Engine

...mib-2(1).rmon(16).tokenRing(10).ringStationControlTable(1)
...mib-2(1).rmon(16).tokenRing(10).ringStationTable(2)
...mib-2(1).rmon(16).tokenRing(10).ringStationOrderTable(3)
...mib-2(1).rmon(16).tokenRing(10).ringStationConfigControlTable(4)
...mib-2(1).rmon(16).tokenRing(10).ringStationConfigTable(5)
...mib-2(1).rmon(16).tokenRing(10).sourceRoutingStatsTable(6)

RFC 1513 (TOKEN-RING-RMON MIB)
RFC 1513 (TOKEN-RING-RMON MIB)
RFC 1513 (TOKEN-RING-RMON MIB)
RFC 1513 (TOKEN-RING-RMON MIB)
RFC 1513 (TOKEN-RING-RMON MIB)
RFC 1513 (TOKEN-RING-RMON MIB)

Aggregates detailed Token-Ring statistics.

Network
Analysis

...mib-2(1).rmon(16).protocolDir(11)

RFC 2021 (RMON2-MIB)

A table of protocols for which the Network Analysis Module monitors and maintains statistics.

Network
Analysis

...mib-2(1).rmon(16).protocolDist(12)

RFC 2021 (RMON2-MIB)

A table of statistics for each protocol in protocolDir(11).

Network
Analysis

...mib-2(1).rmon(16).addressMap(13)

RFC 2021 (RMON2-MIB)

List of MAC-to-network-layer address bindings.

Network
Analysis

...mib-2(1).rmon(16).nlHost(14)

RFC 2021 (RMON2-MIB)

Statistics for each network layer address.

Network
Analysis

...mib-2(1).rmon(16).nlMatrix(15)

RFC 2021 (RMON2-MIB)

Traffic statistics for pairs of network layer addresses.

Network
Analysis

...mib-2(1).rmon(16).alHost(16)

RFC 2021 (RMON2-MIB)

Statistics by application layer protocol for each network address.

Network
Analysis

...mib-2(1).rmon(16).alMatrix(17)

RFC 2021 (RMON2-MIB)

Traffic statistics by application layer protocol for pairs of network layer addresses.

Network
Analysis

...mib-2(1).rmon(16).usrHistory(18)

RFC 2021 (RMON2-MIB)

Extends history beyond RMON1 link-layer statistics to include any RMON, RMON2, MIB-I, or MIB-II statistic.

Supervisor
Engine

...mib-2(1).rmon(16).probeConfig(19)

RFC 2021 (RMON2-MIB)

Displays a list of agent capabilities and configurations.

Standards Compliance

The Catalyst 6000 family NAM, when installed in a Catalyst 6000 family switch, complies with the standards listed in Table 4.


Table 4: Standards Compliance
Specification Description

Compliance:

CE Marking

Safety

UL1 1950, CSA2-C22.2 No. 950, EN3 60950, IEC4 950

EMI5

FCC6

EN 55022 Class B; CISPR22 Class B, AS/NZS 3590 Class B, and VCCI Class B with STP7 cables

1UL = Underwriters Laboratories
2CSA = Canadian Standards Association
3EN = Europäische Norm
4IEC = International Electrotechnical Commission
5EMI = electromagnetic interference
6FCC = Federal Communications Commission
7STP = shielded twisted-pair

Translated Safety Warnings


Warning This warning symbol means danger. You are in a situation that could cause bodily injury. Before you work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar with standard practices for preventing accidents. (To see translations of the warnings that appear in this publication, refer to the appendix, "Translated Safety Warnings.")

Waarschuwing

Dit waarschuwingssymbool betekent gevaar. U verkeert in een situatie die lichamelijk letsel kan veroorzaken. Voordat u aan enige apparatuur gaat werken, dient u zich bewust te zijn van de bij elektrische schakelingen betrokken risico's en dient u op de hoogte te zijn van standaard maatregelen om ongelukken te voorkomen. (Voor vertalingen van de waarschuwingen die in deze publicatie verschijnen, kunt u het aanhangsel "Translated Safety Warnings" (Vertalingen van veiligheidsvoorschriften) raadplegen.)

Varoitus

Tämä varoitusmerkki merkitsee vaaraa. Olet tilanteessa, joka voi johtaa ruumiinvammaan. Ennen kuin työskentelet minkään laitteiston parissa, ota selvää sähkökytkentöihin liittyvistä vaaroista ja tavanomaisista onnettomuuksien ehkäisykeinoista. (Tässä julkaisussa esiintyvien varoitusten käännökset löydät liitteestä "Translated Safety Warnings" (käännetyt turvallisuutta koskevat varoitukset).)

Attention

Ce symbole d'avertissement indique un danger. Vous vous trouvez dans une situation pouvant entraîner des blessures. Avant d'accéder à cet équipement, soyez conscient des dangers posés par les circuits électriques et familiarisez-vous avec les procédures courantes de prévention des accidents. Pour obtenir les traductions des mises en garde figurant dans cette publication, veuillez consulter l'annexe intitulée « Translated Safety Warnings » (Traduction des avis de sécurité).

Warnung

Dieses Warnsymbol bedeutet Gefahr. Sie befinden sich in einer Situation, die zu einer Körperverletzung führen könnte. Bevor Sie mit der Arbeit an irgendeinem Gerät beginnen, seien Sie sich der mit elektrischen Stromkreisen verbundenen Gefahren und der Standardpraktiken zur Vermeidung von Unfällen bewußt. (Übersetzungen der in dieser Veröffentlichung enthaltenen Warnhinweise finden Sie im Anhang mit dem Titel "Translated Safety Warnings" (Übersetzung der Warnhinweise).)

Avvertenza

Questo simbolo di avvertenza indica un pericolo. Si è in una situazione che può causare infortuni. Prima di lavorare su qualsiasi apparecchiatura, occorre conoscere i pericoli relativi ai circuiti elettrici ed essere al corrente delle pratiche standard per la prevenzione di incidenti. La traduzione delle avvertenze riportate in questa pubblicazione si trova nell'appendice, "Translated Safety Warnings" (Traduzione delle avvertenze di sicurezza).

Advarsel

Dette varselsymbolet betyr fare. Du befinner deg i en situasjon som kan føre til personskade. Før du utfører arbeid på utstyr, må du være oppmerksom på de faremomentene som elektriske kretser innebærer, samt gjøre deg kjent med vanlig praksis når det gjelder å unngå ulykker. (Hvis du vil se oversettelser av de advarslene som finnes i denne publikasjonen, kan du se i vedlegget "Translated Safety Warnings" [Oversatte sikkerhetsadvarsler].)

Aviso

Este símbolo de aviso indica perigo. Encontra-se numa situação que lhe poderá causar danos fisicos. Antes de começar a trabalhar com qualquer equipamento, familiarize-se com os perigos relacionados com circuitos eléctricos, e com quaisquer práticas comuns que possam prevenir possíveis acidentes. (Para ver as traduções dos avisos que constam desta publicação, consulte o apêndice "Translated Safety Warnings" - "Traduções dos Avisos de Segurança").

Advertencia

Este símbolo de aviso significa peligro. Existe riesgo para su integridad física. Antes de manipular cualquier equipo, considerar los riesgos que entraña la corriente eléctrica y familiarizarse con los procedimientos estándar de prevención de accidentes. (Para ver traducciones de las advertencias que aparecen en esta publicación, consultar el apéndice titulado "Translated Safety Warnings.")

Varning!

Denna varningssymbol signalerar fara. Du befinner dig i en situation som kan leda till personskada. Innan du utför arbete på någon utrustning måste du vara medveten om farorna med elkretsar och känna till vanligt förfarande för att förebygga skador. (Se förklaringar av de varningar som förekommer i denna publikation i appendix "Translated Safety Warnings" [Översatta säkerhetsvarningar].)


Warning Before you install, operate, or service the system, read the Site Preparation and Safety Guide. This guide contains important safety information you should know before working with the system.

Waarschuwing

Lees de handleiding Voorbereiding en veiligheid van de locatie Handleiding voordat u het systeem installeert of gebruikt of voordat u onderhoud aan het systeem uitvoert. Deze handleiding bevat belangrijke beveiligingsvoorschriften waarvan u op de hoogte moet zijn voordat u met het systeem gaat werken.

Varoitus

Ennen kuin asennat järjestelmän tai käytät tai huollat sitä, lue Asennuspaikan valmistelu-jaturvaopas -opasta. Tässä oppaassa on tärkeitä turvallisuustietoja, jotka tulisi tietää ennen järjestelmän käyttämistä.

Attention

Avant d'installer le système, de l'utiliser ou d'assurer son entretien, veuillez lire le Guide de sécurité et de préparation du site. Celui-ci présente des informations importantes relatives à la sécurité, dont vous devriez prendre connaissance.

Warnung

Warnhinweis Bevor Sie das System installieren, in Betrieb setzen oder warten, lesen Sie die Anleitung zur Standortvorbereitung und Sicherheitshinweise. Dieses Handbuch enthält wichtige Informationen zur Sicherheit, mit denen Sie sich vor dem Verwenden des Systems vertraut machen sollten.

Avvertenza

Prima di installare, mettere in funzione o effettuare interventi di manutenzione sul sistema, leggere le informazioni contenute nella documentazione sulla Guida alla sicurezza. Tale guida contiene importanti informazioni che è necessario acquisire prima di iniziare qualsiasi intervento sul sistema.

Advarsel

Før du installerer, tar i bruk eller utfører vedlikehold på systemet, må du lese Veiledning for stedsklargjøring og sikkerhet. Denne håndboken inneholder viktig informasjon om sikkerhet som du bør være kjent med før du begynner å arbeide med systemet.

Aviso

Antes de instalar, funcionar com, ou prestar assistência ao sistema, leia o Guia de Preparação e Segurança do Local. Este guia contém informações de segurança importantes que deve conhecer antes de trabalhar com o sistema.

¡Advertencia!

Antes de instalar, manejar o arreglar el sistema, le aconsejamos que consulte la Guía de prevención y preparación de una instalación. Esta guía contiene importante información para su seguridad que debe saber antes de comenzar a trabajar con el sistema.

Varning!

Innan du installerar, använder eller utför service på systemet ska du läsa Förberedelser och säkerhet Handbok. Denna handbok innehåller viktig säkerhetsinformation som du bör känna till innan du arbetar med systemet.


Warning Only trained and qualified personnel should be allowed to install or replace this equipment

Waarschuwing

Installatie en reparaties mogen uitsluitend door getraind en bevoegd personeel uitgevoerd worden.

Varoitus

Ainoastaan koulutettu ja pätevä henkilökunta saa asentaa tai vaihtaa tämän laitteen.

Avertissement

Tout installation ou remplacement de l'appareil doit être réalisé par du personnel qualifié et compétent.

Achtung

Gerät nur von geschultem, qualifiziertem Personal installieren oder auswechseln lassen.

Avvertenza

Solo personale addestrato e qualificato deve essere autorizzato ad installare o sostituire questo apparecchio.

Advarsel

Kun kvalifisert personell med riktig opplæring bør montere eller bytte ut dette utstyret.

Aviso

Este equipamento deverá ser instalado ou substituído apenas por pessoal devidamente treinado e qualificado.

¡Atención!

Estos equipos deben ser instalados y reemplazados exclusivamente por personal técnico adecuadamente preparado y capacitado.

Varning

Denna utrustning ska endast installeras och bytas ut av utbildad och kvalificerad personal.


Warning During this procedure, wear grounding wrist straps to avoid ESD damage to the card. Do not directly touch the backplane with your hand or any metal tool, or you could shock yourself.

Waarschuwing

Draag tijdens deze procedure aardingspolsbanden om te vermijden dat de kaart beschadigd wordt door elektrostatische ontlading. Raak het achterbord niet rechtstreeks aan met uw hand of met een metalen werktuig, omdat u anders een elektrische schok zou kunnen oplopen.

Varoitus

Käytä tämän toimenpiteen aikana maadoitettuja rannesuojia estääksesi kortin vaurioitumisen sähköstaattisen purkauksen vuoksi. Älä kosketa taustalevyä suoraan kädelläsi tai metallisella työkalulla sähköiskuvaaran takia.

Attention

Lors de cette procédure, toujours porter des bracelets antistatiques pour éviter que des décharges électriques n'endommagent la carte. Pour éviter l'électrocution, ne pas toucher le fond de panier directement avec la main ni avec un outil métallique.

Warnung

Zur Vermeidung einer Beschädigung der Karte durch elektrostatische Entladung während dieses Verfahrens ein Erdungsband am Handgelenk tragen. Bei Berührung der Rückwand mit der Hand oder einem metallenen Werkzeug besteht Elektroschockgefahr.

Avvertenza

Durante questa procedura, indossare bracciali antistatici per evitare danni alla scheda causati da un'eventuale scarica elettrostatica. Non toccare direttamente il pannello delle connessioni, né con le mani né con un qualsiasi utensile metallico, perché esiste il pericolo di folgorazione.

Advarsel

Bruk jordingsarmbånd under prosedyren for å unngå ESD-skader på kortet. Unngå direkte berøring av bakplanet med hånden eller metallverktøy, slik at di ikke får elektrisk støt.

Aviso

Durante este procedimento e para evitar danos ESD causados à placa, use fitas de ligação à terra para os pulsos. Para evitar o risco de choque eléctrico, não toque directamente na parte posterior com a mão ou com qualquer ferramenta metálica.

Advertencia

Usartiras conectadas a tierra en las muñecas durante este procedimiento para evitar daños en la tarjeta causados por descargas electrostáticas. No tocar el plano posterior con las manos ni con ninguna herramienta metálica, ya que podría producir un choque eléctrico.

Varning!

Använd jordade armbandsremmar under denna procedur för att förhindra elektrostatisk skada på kortet. Rör inte vid baksidan med handen eller metallverktyg då detta kan orsaka elektrisk stöt.


Warning Blank faceplates and cover panels serve three important functions: they prevent exposure to hazardous voltages and currents inside the chassis; they contain electromagnetic interference (EMI) that might disrupt other equipment; and they direct the flow of cooling air through the chassis. Do not operate the system unless all cards, faceplates, front covers, and rear covers are in place.

Waarschuwing

Lege vlakplaten en afdekpanelen vervullen drie belangrijke functies: ze voorkomen blootstelling aan gevaarlijke voltages en stroom binnenin het frame, ze bevatten elektromagnetische storing (EMI) hetgeen andere apparaten kan verstoren en ze leiden de stroom van koellucht door het frame. Het systeem niet bedienen tenzij alle kaarten, vlakplaten en afdekkingen aan de voor- en achterkant zich op hun plaats bevinden.

Varoitus

Tyhjillä tasolaikoilla ja suojapaneeleilla on kolme tärkeää käyttötarkoitusta: Ne suojaavat asennuspohjan sisäisille vaarallisille jännitteille ja sähkövirralle altistumiselta; ne pitävät sisällään elektromagneettisen häiriön (EMI), joka voi häiritä muita laitteita; ja ne suuntaavat tuuletusilman asennuspohjan läpi. Järjestelmää ei saa käyttää, elleivät kaikki tasolaikat, etukannet ja takakannet ole kunnolla paikoillaan.

Attention

Ne jamais faire fonctionner le système sans que l'intégralité des cartes, des plaques métalliques et des panneaux avant et arrière ne soient fixés à leur emplacement. Ceux-ci remplissent trois fonctions essentielles : ils évitent tout risque de contact avec des tensions et des courants dangereux à l'intérieur du châssis, ils évitent toute diffusion d'interférences électromagnétiques qui pourraient perturber le fonctionnement des autres équipements, et ils canalisent le flux d'air de refroidissement dans le châssis.

Warnung

Blanke Faceplates und Abdeckungen haben drei wichtigen Funktionen: (1) Sie schützen vor gefährlichen Spannungen und Strom innerhalb des Chassis; (2) sie halten elektromagnetische Interferenzen (EMI) zurück, die andere Geräte stören könnten; (3) sie lenken den kühlenden Luftstrom durch das Chassis. Das System darf nur betrieben werden, wenn alle Karten, Faceplates, Voder- und Rückabdeckungen an Ort und Stelle sind.

Avvertenza

Le piattaforme bianche e i panelli di protezione hanno tre funzioni importanti: Evitano l'esposizione a voltaggi e correnti elettriche pericolose nello chassis, trattengono le interferenze elettromagnetiche (EMI) che potrebbero scombussolare altri apparati e dirigono il flusso di aria per il raffreddamento attraverso lo chassis. Non mettete in funzione il sistema se le schede, le piattaforme, i panelli frontali e posteriori non sono in posizione.

Advarsel

Blanke ytterplater og deksler sørger for tre viktige funksjoner: de forhindrer utsettelse for farlig spenning og strøm inni kabinettet; de inneholder elektromagnetisk forstyrrelse (EMI) som kan avbryte annet utstyr, og de dirigerer luftavkjølingsstrømmen gjennom kabinettet. Betjen ikke systemet med mindre alle kort, ytterplater, frontdeksler og bakdeksler sitter på plass.

Aviso

As faces furadas e os painéis de protecção desempenham três importantes funções: previnem contra uma exposição perigosa a voltagens e correntes existentes no interior do chassis; previnem contra interferência electromagnética (EMI) que poderá danificar outro equipamento; e canalizam o fluxo do ar de refrigeração através do chassis. Não deverá operar o sistema sem que todas as placas, faces, protecções anteriores e posteriores estejam nos seus lugares.

¡Advertencia!

Las placas frontales y los paneles de relleno cumplen tres funciones importantes: evitan la exposición a niveles peligrosos de voltaje y corriente dentro del chasis; reducen la interferencia electromagnética (EMI) que podría perturbar la operación de otros equipos y dirigen el flujo de aire de enfriamiento a través del chasis. No haga funcionar el sistema a menos que todas las tarjetas, placas frontales, cubiertas frontales y cubiertas traseras estén en su lugar.

Varning!

Tomma framplattor och skyddspaneler har tre viktiga funktioner: de förhindrar att personer utsätts för farlig spänning och ström som finns inuti chassit; de innehåller elektromagnetisk interferens (EMI) som kan störa annan utrustning; och de styr riktningen på kylluftsflödet genom chassit. Använd inte systemet om inte alla kort, framplattor, fram- och bakskydd är på plats.

Related Documentation

For additional information on TrafficDirector, refer to the Using the TrafficDirector Application manual and the Configuring the Catalyst 6000 Network Analysis Module with the TrafficDirector Application configuration note.

For additional information on Catalyst 6000 family switches and command-line interface (CLI) commands, refer to these publications:

For detailed hardware configuration and maintenance procedures, refer to the Catalyst 6000 Family Module Installation Guide.

Obtaining Documentation

World Wide Web

You can access the most current Cisco documentation on the World Wide Web at http://www.cisco.com, http://www-china.cisco.com, or http://www-europe.cisco.com.

Documentation CD-ROM

Cisco documentation and additional literature are available in a CD-ROM package, which ships with your product. The Documentation CD-ROM is updated monthly. Therefore, it is probably more current than printed documentation. The CD-ROM package is available as a single unit or as an annual subscription.

Ordering Documentation

Registered CCO users can order the Documentation CD-ROM and other Cisco Product documentation through our online Subscription Services at http://www.cisco.com/cgi-bin/subcat/kaojump.cgi.

Nonregistered CCO users can order documentation through a local account representative by calling Cisco's corporate headquarters (California, USA) at 408 526-4000 or, in North America, call 800 553-NETS (6387).

Obtaining Technical Assistance

Cisco provides Cisco Connection Online (CCO) as a starting point for all technical assistance. Warranty or maintenance contract customers can use the Technical Assistance Center. All customers can submit technical feedback on Cisco documentation using the web, e-mail, a self-addressed stamped response card included in many printed docs, or by sending mail to Cisco.

Cisco Connection Online

Cisco continues to revolutionize how business is done on the Internet. Cisco Connection Online is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information and resources at anytime, from anywhere in the world. This highly integrated Internet application is a powerful, easy-to-use tool for doing business with Cisco.

CCO's broad range of features and services helps customers and partners to streamline business processes and improve productivity. Through CCO, you will find information about Cisco and our networking solutions, services, and programs. In addition, you can resolve technical issues with online support services, download and test software packages, and order Cisco learning materials and merchandise. Valuable online skill assessment, training, and certification programs are also available.

Customers and partners can self-register on CCO to obtain additional personalized information and services. Registered users may order products, check on the status of an order and view benefits specific to their relationships with Cisco.

You can access CCO in the following ways:

You can e-mail questions about using CCO to cco-team@cisco.com.

Technical Assistance Center

The Cisco Technical Assistance Center (TAC) is available to warranty or maintenance contract customers who need technical assistance with a Cisco product that is under warranty or covered by a maintenance contract.

To display the TAC web site that includes links to technical support information and software upgrades and for requesting TAC support, use www.cisco.com/techsupport.

To contact by e-mail, use one of the following:

Language E-mail Address

English

tac@cisco.com

Hanzi (Chinese)

chinese-tac@cisco.com

Kanji (Japanese)

japan-tac@cisco.com

Hangul (Korean)

korea-tac@cisco.com

Spanish

tac@cisco.com

Thai

thai-tac@cisco.com

In North America, TAC can be reached at 800 553-2447 or 408 526-7209. For other telephone numbers and TAC e-mail addresses worldwide, consult the following web site: http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml.

Documentation Feedback

If you are reading Cisco product documentation on the World Wide Web, you can submit technical comments electronically. Click Feedback in the toolbar and select Documentation. After you complete the form, click Submit to send it to Cisco.

You can e-mail your comments to bug-doc@cisco.com.

To submit your comments by mail, for your convenience many documents contain a response card behind the front cover. Otherwise, you can mail your comments to the following address:

Cisco Systems, Inc.
Document Resource Connection
170 West Tasman Drive
San Jose, CA 95134-9883

We appreciate and value your comments.





hometocprevnextglossaryfeedbacksearchhelp
Posted: Tue Jun 13 15:00:36 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.