Table of Contents
INDEX
- advanced queries, in User Tracking, creating and saving 3-5
- ANI Server, and Topology Services 2-15
- applications
- setting up 1-2
- starting 1-2
- assigning ports to VLANS, in Topology Services 2-9
- ATM
- domains
- concepts, in Topology Services 2-35
- configuration, displaying in Topology Services 2-5
- interface configuration, setting in Topology Services 2-14
- LANE configuration guidelines 2-30
- VLANs, supported in Topology Services 2-22
- audience for this document xi
- broadcast server, description 2-27
- Call Detail Records (CDRs)
- and VoIP tracing in Path Analysis 4-14
- logging 4-11
- called number filter, in Path Analysis 4-14
- called time filter, in Path Analysis 4-14
- calling number filter, in Path Analysis 4-15
- call in progress, type of VoIP telephone call 4-13
- CAM (Client Application Manager), explanation and use 1-2
- Campus Manager
- applications
- description of 1-2
- setting up 1-2
- starting 1-2
- overview 1-1
- part of CiscoWorks2000 1-1
- troubleshooting A-1
- Path Analysis A-11
- Topology Services A-1
- User Tracking A-5
- cautions, significance of xiii
- CCO (Cisco Connection Online)
- accessing xiv
- FAQ on, accessing xiv
- on the world-wide web xiv
- services xiii
- CDRs (Call Detail Records)
- and VoIP tracing in Path Analysis 4-14
- logging 4-11
- Cisco CallManager
- in Path Analysis 4-11
- in Topology Services 2-35
- in User Tracking 3-8
- servers, and VoIP tracing in Path Analysis 4-11
- Cisco Connection Online (see CCO) xiii
- CiscoView, launching from
- Path Analysis 4-6
- User Tracking 3-7
- CiscoWorks2000
- relationship to Campus Manager 1-1
- security 1-4
- Server components used by Campus Manager 1-3
- Client Application Manager (CAM), explanation and use 1-2
- completed call, type of VoIP telephone call 4-13
- configuring
- ATM LANE 2-30
- LANE services, in Topology Services 2-10
- LE Config Server, in Topology Services 2-10
- trunk ports, in Topology Services 2-10
- contacting Cisco
- maintenance customers and partners only (CCO) xiii
- network administrators only (TAC) xiv
- conventions, typographic, in this document xii
- creating
- advanced queries in User Tracking 3-5
- SPVCs or SPVPs, in Topology Services 2-11
- VLANS, in Topology Services 2-8
- customizing the User Tracking table format 3-5
- deleting old entries from the User Tracking table 3-6
- device name information in User Tracking, importing 3-6
- discovering
- all users and hosts, in User Tracking 3-3
- hosts on a specific switch device, in User Tracking 3-4
- IP phones in your network, in User Tracking 3-8
- network, in Path Analysis 4-5
- network Layer 2 configuration (see Layer 2 discovery of your network) 5-1
- subnets, in User Tracking 3-4
- displaying
- ATM domain configuration, in Topology Services 2-5
- detail on a device in CiscoView, from User Tracking 3-7
- IP phones in your network, in User Tracking 3-8
- LAN edge view, in Topology Services 2-5
- Layer 2 view, in Topology Services 2-5
- network view, in Topology Services 2-8
- summary information in Topology Services 2-8
- trace reports for VPI/VCI
- graphical form 2-13
- unconnected device view, in Topology Services 2-5
- users and hosts, in User Tracking
- all 3-4
- selected 3-4
- VTP
- domain configuration, in Topology Services 2-5
- views, in Topology Services 2-5
- documentation
- in CD-ROM package xi
- on the world-wide web xi
- related xiii
- typographical conventions in xii
- duplicate
- IP addresses, reporting in User Tracking 3-7
- MAC addresses, reporting in User Tracking 3-7
- MAC addresses and VLAN names, reporting in User Tracking 3-8
- Ethernet VLANs, supported in Topology Services 2-22
- exporting User Tracking data to a file 3-6
- finding specific entries in the User Tracking table 3-6
- help
- (see also troubleshooting)
- for Path Analysis A-11
- for Topology Services A-1
- for User Tracking A-5
- maintenance customers and partners (CCO) xiii
- network administrators only (TAC) xiv
- online, using xii
- highlighting a device on the Layer 2 map, from User Tracking 3-7
- hosts, discovering in User Tracking 3-3
- IEEE 802.1Q, supported in Topology Services 2-17
- importing information in User Tracking 3-6
- Inter-Switch Link (ISL) Protocol, supported in Topology Services 2-17
- IP telephones
- discovering, in User Tracking 3-8
- displaying, in User Tracking 3-8
- performing a trace to or from, in Path Analysis 4-8
- ISL (Inter-Switch Link) Protocol, supported in Topology Services 2-17
- LAN edge view, displaying in Topology Services 2-5
- LAN Emulation (LANE)
- component descriptions 2-25
- broadcast server 2-27
- client 2-27
- LANE Configuration Server (LECS) 2-26
- LEE Server (LES) 2-26
- configuration, definition 2-25
- how it works 2-28
- services, configuring in Topology Services 2-10
- supported in Topology Services 2-18
- LANE services, configuring and monitoring (scenario)
- displaying LANE components in your network 7-11
- prerequisites 7-2
- preparing ATM devices 7-3
- understanding required LANE components 7-2
- procedures
- creating a LE/Broadcast server 7-7
- creating LAN Emulation Clients (LECs) 7-10
- rediscovering the network 7-10
- verifying correct configuration of LANE components 7-11
- Layer 2
- map, highlighting a device on, from User Tracking 3-7
- paths, in Path Analysis 4-16
- tracing, and VLAN/ELAN subnet mapping table 4-19
- view, displaying, in Topology Services 2-5
- Layer 2 discovery of your network (scenario) 5-1
- prerequisites 5-1
- procedures 5-2
- print Layer 2 view 5-4
- print list of end stations 5-6
- print list of Layer 2 devices 5-2
- setting up ANI discovery 5-2
- verification 5-7
- Layer 3
- paths, in Path Analysis 4-15
- tracing, and VLAN/ELAN subnet mapping table 4-20
- LE Config Server, configuring in Topology Services 2-10
- LECS (LANE Configuration Server), description 2-26
- LES (LANE Server), description 2-26
- loss of connectivity (scenario) 8-1
- prerequisites 8-2
- procedures 8-2
- locate user and printer on network 8-3
- verification 8-7
- mapping a subnet to VLAN/ELAN, in Path Analysis 4-17
- multiple MAC addresses, ports with, reporting in User Tracking 3-8
- network
- topology windows
- components (table) 2-6
- using 2-5
- view, displaying in Topology Services 2-8
- notes information in User Tracking, importing 3-6
- online help, using xii
- opening a network view, in Topology Services 2-8
- Path Analysis 4-1
- concepts 4-8
- Layer 2 paths 4-16
- Layer 3 paths 4-15
- mapping a subnet to VLAN/ELAN (see VLAN/ELAN subnet mapping table) 4-17
- shortcuts 4-17
- filters in the Voice Trace Query window
- called number 4-14
- called time 4-14
- calling number 4-15
- main window elements (table) 4-4
- navigating in 4-2
- requirements 4-9
- starting 4-2
- tasks (table) 4-4
- discovering the network 4-5
- launching CiscoView 4-6
- modifying the subnet mapping table 4-5
- performing a trace (see performing a trace in Path Analysis) 4-8
- traces (see traces, in Path Analysis) 4-5
- viewing the path 4-6
- troubleshooting A-11
- types of VoIP telephone calls
- call in process 4-13
- completed call 4-13
- potential call 4-14
- VoIP
- calls in process 4-13
- completed calls 4-13
- potential calls 4-14
- tracing, and Cisco CallManager 4-11
- performing a trace in Path Analysis
- to or from
- a gateway and a Cisco CallManager server 4-8
- an IP telephone and a Cisco CallManager 4-8
- two endpoints for a call in progress 4-8
- two endpoints for a potential call 4-8
- VoIP trace on a completed call 4-7
- and CDR logging 4-11
- Ping Sweeps option, in User Tracking 3-3
- potential call, type of VoIP telephone call 4-14
- protocols supported in Topology Services 2-16
- IEEE 802.1Q 2-17
- Inter-Switch Link (ISL) Protocol 2-17
- LAN Emulation (LANE) 2-18
- Source-Route Bridging (SRB) 2-18
- Source-Route Transparent Bridging (SRT) 2-18
- Spanning-Tree 2-16
- VLAN Trunk 2-16
- reports in User Tracking
- duplicate IP addresses 3-7
- duplicate MAC addresses 3-7
- duplicate MAC addresses and VLAN names 3-8
- ports with multiple MAC addresses 3-8
- saving changes to the User Tracking table 3-6
- scenarios
- Layer 2 discovery of your network 5-1
- security
- in CiscoWorks2000 1-4
- workgroup and network, and VLANs 2-20
- setting up applications 1-2
- shortcuts, in Path Analysis 4-17
- Source-Route Bridging (SRB) protocol, supported in Topology Services 2-18
- Source-Route Transparent Bridging (SRT) protocol, supported in Topology Services 2-18
- Spanning-Tree protocol, supported in Topology Services 2-16
- SPVCs or SPVPs, creating in Topology Services 2-11
- SRB (Source-Route Bridging) protocol, supported in Topology Services 2-18
- SRT (Source-Route Transparent Bridging) protocol, supported in Topology Services 2-18
- starting applications 1-2
- subnet
- discovering, in User Tracking 3-4
- mapping table, modifying in Path Analysis 4-5
- mapping to VLAN/ELAN, in Path Analysis 4-17
- support
- (see also troubleshooting)
- for Path Analysis A-11
- for Topology Services A-1
- for User Tracking A-5
- maintenance customers and partners (CCO) xiii
- network administrators only (TAC) xiv
- online help, using xii
- switch device, discovering hosts on a specific, in User Tracking 3-4
- table format, in User Tracking, customizing 3-5
- TAC (Technical Assistance Center), contacting (network administrators only) xiv
- Technical Assistance Center (see TAC) xiv
- Token Ring
- protocols supported in Topology Services
- Source-Route Bridging (SRB) 2-18
- Source-Route Transparent Bridging (SRT) 2-18
- VLANs, supported in Topology Services 2-24
- Topology Services 2-1
- concepts 2-15
- ANI Server 2-15
- ATM domains 2-35
- CiscoCallManager 2-35
- LAN Emulation (LANE) configuration 2-25
- supported protocols 2-16
- VTP domains 2-32
- highlighting a device on the Layer 2 map, with User Tracking 3-7
- main window
- components (table) 2-3
- using 2-2
- navigating in 2-2
- network topology windows, using 2-5
- protocols supported 2-16
- IEEE 802.1Q 2-17
- Inter-Switch Link (ISL) 2-17
- LAN Emulation (LANE) 2-18
- Source-Route Bridging (SRB) 2-18
- Source-Route Transparent Bridging (SRT) 2-18
- Spanning-Tree 2-16
- VLAN Trunk 2-16
- starting 2-2
- tasks (table) 2-8
- troubleshooting A-1
- VLANs supported 2-22
- ATM VLANs 2-22
- Ethernet VLANs 2-22
- Token Ring VLANs 2-24
- trace reports for VPI/VCI, displaying in graphical form 2-13
- traces, in Path Analysis
- performing 4-5
- reversing 4-5
- saving 4-6
- viewing
- in command line output format 4-5
- in graphical map format 4-5
- in table format 4-5
- troubleshooting Campus Manager A-1
- Path Analysis A-11
- Topology Services A-1
- User Tracking A-5
- trunk ports, configuring in Topology Services 2-10
- unconnected device view, displaying in Topology Services 2-5
- users and hosts
- discovering in User Tracking 3-3
- displaying in User Tracking
- all 3-4
- selected 3-4
- finding specific, with User Tracking 3-6
- User Tracking 3-1
- concepts 3-8
- navigating in 3-2
- starting 3-2
- tasks (table) 3-3
- creating and saving advanced queries 3-5
- customizing the display table format 3-5
- deleting old entries from the table 3-6
- device detail, displaying in CiscoView 3-7
- discovering IP phones in your network 3-8
- displaying IP phones in your network 3-8
- duplicate IP addresses, finding 3-7
- duplicate MAC addresses, finding 3-7
- duplicate MAC addresses and VLAN names, finding 3-8
- enabling ping sweeps 3-3
- exporting data to a file 3-6
- highlighting a device on the Layer 2 map in Topology Services 3-7
- hosts on a specific switch device, discovering 3-4
- importing device name and notes data 3-6
- ports with multiple MAC addresses, finding 3-8
- saving changes 3-6
- subnets, discovering 3-4
- users and hosts, discovering 3-3
- users and hosts, displaying all 3-4
- users and hosts, displaying selected 3-4
- users and hosts, finding specific 3-6
- troubleshooting A-5
- viewing
- paths, in Path Analysis 4-6
- summary information in Topology Services 2-8
- traces, in Path Analysis
- in command line output format 4-5
- in graphical map format 4-5
- in table format 4-5
- VLAN/ELAN
- mapping a subnet to, in Path Analysis 4-17
- subnet mapping table
- and Layer 2 tracing, in Path Analysis 4-19
- and Layer 3 tracing, in Path Analysis 4-20
- VLANs
- advantages of 2-19
- controlled broadcast activity 2-20
- simplifying moves, adds, changes 2-20
- workgroup and network security 2-20
- assigning ports to, in Topology Services 2-9
- components 2-21
- creating in Topology Services 2-8
- definition 2-19
- implementing in your network 6-3
- verifying correct configuration of 6-9
- security workgroup and network, and 2-20
- supported in Topology Services 2-22
- ATM VLANs 2-22
- Ethernet VLANs 2-22
- Token Ring VLANs 2-24
- traditional and virtual, comparison between 2-19
- VLAN Trunk Protocol (VTP)
- domains
- components 2-33
- configuration, displaying in Topology Services 2-5
- supported in Topology Services 2-16
- views, displaying in Topology Services 2-5
- VoIP (Voice over IP)
- tracing in Path Analysis 4-11
- types of calls
- call in process 4-13
- completed call 4-13
- potential call 4-14
- VTP (see VLAN Trunk Protocol) 2-16
- world-wide web
- CCO on xiv
- Cisco documentation on xi







Posted: Thu Aug 10 13:14:22 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.