cc/td/doc/product/rtrmgmt/cw2000/camp_mgr/camp_3x/cmgr_3_0/voicepch
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

INDEX

INDEX

A


advanced queries, in User Tracking, creating and saving   3-5

ANI Server, and Topology Services   2-15

applications
setting up   1-2
starting   1-2

assigning ports to VLANS, in Topology Services   2-9

ATM
domains
concepts, in Topology Services   2-35
configuration, displaying in Topology Services   2-5
interface configuration, setting in Topology Services   2-14
LANE configuration guidelines   2-30
VLANs, supported in Topology Services   2-22

audience for this document   xi

B


broadcast server, description   2-27

C


Call Detail Records (CDRs)
and VoIP tracing in Path Analysis   4-14
logging   4-11

called number filter, in Path Analysis   4-14

called time filter, in Path Analysis   4-14

calling number filter, in Path Analysis   4-15

call in progress, type of VoIP telephone call   4-13

CAM (Client Application Manager), explanation and use   1-2

Campus Manager
applications
description of   1-2
setting up   1-2
starting   1-2
overview   1-1
part of CiscoWorks2000   1-1
troubleshooting   A-1
Path Analysis   A-11
Topology Services   A-1
User Tracking   A-5

cautions, significance of   xiii

CCO (Cisco Connection Online)
accessing   xiv
FAQ on, accessing   xiv
on the world-wide web   xiv
services   xiii

CDRs (Call Detail Records)
and VoIP tracing in Path Analysis   4-14
logging   4-11

Cisco CallManager
in Path Analysis   4-11
in Topology Services   2-35
in User Tracking   3-8
servers, and VoIP tracing in Path Analysis   4-11

Cisco Connection Online (see CCO)   xiii

CiscoView, launching from
Path Analysis   4-6
User Tracking   3-7

CiscoWorks2000
relationship to Campus Manager   1-1
security   1-4
Server components used by Campus Manager   1-3

Client Application Manager (CAM), explanation and use   1-2

completed call, type of VoIP telephone call   4-13

configuring
ATM LANE   2-30
LANE services, in Topology Services   2-10
LE Config Server, in Topology Services   2-10
trunk ports, in Topology Services   2-10

contacting Cisco
maintenance customers and partners only (CCO)   xiii
network administrators only (TAC)   xiv

conventions, typographic, in this document   xii

creating
advanced queries in User Tracking   3-5
SPVCs or SPVPs, in Topology Services   2-11
VLANS, in Topology Services   2-8

customizing the User Tracking table format   3-5

D


deleting old entries from the User Tracking table   3-6

device name information in User Tracking, importing   3-6

discovering
all users and hosts, in User Tracking   3-3
hosts on a specific switch device, in User Tracking   3-4
IP phones in your network, in User Tracking   3-8
network, in Path Analysis   4-5
network Layer 2 configuration (see Layer 2 discovery of your network)   5-1
subnets, in User Tracking   3-4

displaying
ATM domain configuration, in Topology Services   2-5
detail on a device in CiscoView, from User Tracking   3-7
IP phones in your network, in User Tracking   3-8
LAN edge view, in Topology Services   2-5
Layer 2 view, in Topology Services   2-5
network view, in Topology Services   2-8
summary information in Topology Services   2-8
trace reports for VPI/VCI
graphical form   2-13
unconnected device view, in Topology Services   2-5
users and hosts, in User Tracking
all   3-4
selected   3-4
VTP
domain configuration, in Topology Services   2-5
views, in Topology Services   2-5

documentation
in CD-ROM package   xi
on the world-wide web   xi
related   xiii
typographical conventions in   xii

duplicate
IP addresses, reporting in User Tracking   3-7
MAC addresses, reporting in User Tracking   3-7
MAC addresses and VLAN names, reporting in User Tracking   3-8

E


Ethernet VLANs, supported in Topology Services   2-22

exporting User Tracking data to a file   3-6

F


finding specific entries in the User Tracking table   3-6

H


help
(see also troubleshooting)
for Path Analysis   A-11
for Topology Services   A-1
for User Tracking   A-5
maintenance customers and partners (CCO)   xiii
network administrators only (TAC)   xiv
online, using   xii

highlighting a device on the Layer 2 map, from User Tracking   3-7

hosts, discovering in User Tracking   3-3

I


IEEE 802.1Q, supported in Topology Services   2-17

importing information in User Tracking   3-6

Inter-Switch Link (ISL) Protocol, supported in Topology Services   2-17

IP telephones
discovering, in User Tracking   3-8
displaying, in User Tracking   3-8
performing a trace to or from, in Path Analysis   4-8

ISL (Inter-Switch Link) Protocol, supported in Topology Services   2-17

L


LAN edge view, displaying in Topology Services   2-5

LAN Emulation (LANE)
component descriptions   2-25
broadcast server   2-27
client   2-27
LANE Configuration Server (LECS)   2-26
LEE Server (LES)   2-26
configuration, definition   2-25
how it works   2-28
services, configuring in Topology Services   2-10
supported in Topology Services   2-18

LANE services, configuring and monitoring (scenario)
displaying LANE components in your network   7-11
prerequisites   7-2
preparing ATM devices   7-3
understanding required LANE components   7-2
procedures
creating a LE/Broadcast server   7-7
creating LAN Emulation Clients (LECs)   7-10
rediscovering the network   7-10
verifying correct configuration of LANE components   7-11

Layer 2
map, highlighting a device on, from User Tracking   3-7
paths, in Path Analysis   4-16
tracing, and VLAN/ELAN subnet mapping table   4-19
view, displaying, in Topology Services   2-5

Layer 2 discovery of your network (scenario)   5-1
prerequisites   5-1
procedures   5-2
print Layer 2 view   5-4
print list of end stations   5-6
print list of Layer 2 devices   5-2
setting up ANI discovery   5-2
verification   5-7

Layer 3
paths, in Path Analysis   4-15
tracing, and VLAN/ELAN subnet mapping table   4-20

LE Config Server, configuring in Topology Services   2-10

LECS (LANE Configuration Server), description   2-26

LES (LANE Server), description   2-26

loss of connectivity (scenario)   8-1
prerequisites   8-2
procedures   8-2
locate user and printer on network   8-3
verification   8-7

M


mapping a subnet to VLAN/ELAN, in Path Analysis   4-17

multiple MAC addresses, ports with, reporting in User Tracking   3-8

N


network
topology windows
components (table)   2-6
using   2-5
view, displaying in Topology Services   2-8

notes information in User Tracking, importing   3-6

O


online help, using   xii

opening a network view, in Topology Services   2-8

P


Path Analysis   4-1
concepts   4-8
Layer 2 paths   4-16
Layer 3 paths   4-15
mapping a subnet to VLAN/ELAN (see VLAN/ELAN subnet mapping table)   4-17
shortcuts   4-17
filters in the Voice Trace Query window
called number   4-14
called time   4-14
calling number   4-15
main window elements (table)   4-4
navigating in   4-2
requirements   4-9
starting   4-2
tasks (table)   4-4
discovering the network   4-5
launching CiscoView   4-6
modifying the subnet mapping table   4-5
performing a trace (see performing a trace in Path Analysis)   4-8
traces (see traces, in Path Analysis)   4-5
viewing the path   4-6
troubleshooting   A-11
types of VoIP telephone calls
call in process   4-13
completed call   4-13
potential call   4-14
VoIP
calls in process   4-13
completed calls   4-13
potential calls   4-14
tracing, and Cisco CallManager   4-11

performing a trace in Path Analysis
to or from
a gateway and a Cisco CallManager server   4-8
an IP telephone and a Cisco CallManager   4-8
two endpoints for a call in progress   4-8
two endpoints for a potential call   4-8
VoIP trace on a completed call   4-7
and CDR logging   4-11

Ping Sweeps option, in User Tracking   3-3

potential call, type of VoIP telephone call   4-14

protocols supported in Topology Services   2-16
IEEE 802.1Q   2-17
Inter-Switch Link (ISL) Protocol   2-17
LAN Emulation (LANE)   2-18
Source-Route Bridging (SRB)   2-18
Source-Route Transparent Bridging (SRT)   2-18
Spanning-Tree   2-16
VLAN Trunk   2-16

R


reports in User Tracking
duplicate IP addresses   3-7
duplicate MAC addresses   3-7
duplicate MAC addresses and VLAN names   3-8
ports with multiple MAC addresses   3-8

S


saving changes to the User Tracking table   3-6

scenarios
Layer 2 discovery of your network   5-1

security
in CiscoWorks2000   1-4
workgroup and network, and VLANs   2-20

setting up applications   1-2

shortcuts, in Path Analysis   4-17

Source-Route Bridging (SRB) protocol, supported in Topology Services   2-18

Source-Route Transparent Bridging (SRT) protocol, supported in Topology Services   2-18

Spanning-Tree protocol, supported in Topology Services   2-16

SPVCs or SPVPs, creating in Topology Services   2-11

SRB (Source-Route Bridging) protocol, supported in Topology Services   2-18

SRT (Source-Route Transparent Bridging) protocol, supported in Topology Services   2-18

starting applications   1-2

subnet
discovering, in User Tracking   3-4
mapping table, modifying in Path Analysis   4-5
mapping to VLAN/ELAN, in Path Analysis   4-17

support
(see also troubleshooting)
for Path Analysis   A-11
for Topology Services   A-1
for User Tracking   A-5
maintenance customers and partners (CCO)   xiii
network administrators only (TAC)   xiv
online help, using   xii

switch device, discovering hosts on a specific, in User Tracking   3-4

T


table format, in User Tracking, customizing   3-5

TAC (Technical Assistance Center), contacting (network administrators only)   xiv

Technical Assistance Center (see TAC)   xiv

Token Ring
protocols supported in Topology Services
Source-Route Bridging (SRB)   2-18
Source-Route Transparent Bridging (SRT)   2-18
VLANs, supported in Topology Services   2-24

Topology Services   2-1
concepts   2-15
ANI Server   2-15
ATM domains   2-35
CiscoCallManager   2-35
LAN Emulation (LANE) configuration   2-25
supported protocols   2-16
VTP domains   2-32
highlighting a device on the Layer 2 map, with User Tracking   3-7
main window
components (table)   2-3
using   2-2
navigating in   2-2
network topology windows, using   2-5
protocols supported   2-16
IEEE 802.1Q   2-17
Inter-Switch Link (ISL)   2-17
LAN Emulation (LANE)   2-18
Source-Route Bridging (SRB)   2-18
Source-Route Transparent Bridging (SRT)   2-18
Spanning-Tree   2-16
VLAN Trunk   2-16
starting   2-2
tasks (table)   2-8
troubleshooting   A-1
VLANs supported   2-22
ATM VLANs   2-22
Ethernet VLANs   2-22
Token Ring VLANs   2-24

trace reports for VPI/VCI, displaying in graphical form   2-13

traces, in Path Analysis
performing   4-5
reversing   4-5
saving   4-6
viewing
in command line output format   4-5
in graphical map format   4-5
in table format   4-5

troubleshooting Campus Manager   A-1
Path Analysis   A-11
Topology Services   A-1
User Tracking   A-5

trunk ports, configuring in Topology Services   2-10

U


unconnected device view, displaying in Topology Services   2-5

users and hosts
discovering in User Tracking   3-3
displaying in User Tracking
all   3-4
selected   3-4
finding specific, with User Tracking   3-6

User Tracking   3-1
concepts   3-8
navigating in   3-2
starting   3-2
tasks (table)   3-3
creating and saving advanced queries   3-5
customizing the display table format   3-5
deleting old entries from the table   3-6
device detail, displaying in CiscoView   3-7
discovering IP phones in your network   3-8
displaying IP phones in your network   3-8
duplicate IP addresses, finding   3-7
duplicate MAC addresses, finding   3-7
duplicate MAC addresses and VLAN names, finding   3-8
enabling ping sweeps   3-3
exporting data to a file   3-6
highlighting a device on the Layer 2 map in Topology Services   3-7
hosts on a specific switch device, discovering   3-4
importing device name and notes data   3-6
ports with multiple MAC addresses, finding   3-8
saving changes   3-6
subnets, discovering   3-4
users and hosts, discovering   3-3
users and hosts, displaying all   3-4
users and hosts, displaying selected   3-4
users and hosts, finding specific   3-6
troubleshooting   A-5

V


viewing
paths, in Path Analysis   4-6
summary information in Topology Services   2-8
traces, in Path Analysis
in command line output format   4-5
in graphical map format   4-5
in table format   4-5

VLAN/ELAN
mapping a subnet to, in Path Analysis   4-17
subnet mapping table
and Layer 2 tracing, in Path Analysis   4-19
and Layer 3 tracing, in Path Analysis   4-20

VLANs
advantages of   2-19
controlled broadcast activity   2-20
simplifying moves, adds, changes   2-20
workgroup and network security   2-20
assigning ports to, in Topology Services   2-9
components   2-21
creating in Topology Services   2-8
definition   2-19
implementing in your network   6-3
verifying correct configuration of   6-9
security workgroup and network, and   2-20
supported in Topology Services   2-22
ATM VLANs   2-22
Ethernet VLANs   2-22
Token Ring VLANs   2-24
traditional and virtual, comparison between   2-19

VLAN Trunk Protocol (VTP)
domains
components   2-33
configuration, displaying in Topology Services   2-5
supported in Topology Services   2-16
views, displaying in Topology Services   2-5

VoIP (Voice over IP)
tracing in Path Analysis   4-11
types of calls
call in process   4-13
completed call   4-13
potential call   4-14

VTP (see VLAN Trunk Protocol)   2-16

W


world-wide web
CCO on   xiv
Cisco documentation on   xi

hometocprevnextglossaryfeedbacksearchhelp
Posted: Thu Aug 10 13:14:22 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.