Cisco Cisco Prime Network 4.0 Betriebsanweisung
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
Cisco Prime Network 4.0 Supported Technologies and Topologies
20
OL-29352-01
Entity Association Information
Note: All supported discovery techniques are enabled by default. Only MAC discovery
can be disabled using the registry. See the Cisco Prime Network Administrator
Guide for more information.
Guide for more information.
6.2.1 ATM VC Counters
6.2.1.1 Same Active VCs
In this technique, each side identifies a set of active ATM Virtual Connections (VCs) and
looks for a match on another port in the network. An active VC is a VC that has a
configured level of traffic.
This technique supports configurations that have either the same VCs or the same VPs on
both sides. It does not support a mixture of VCs on one side and VPs on the other side.
looks for a match on another port in the network. An active VC is a VC that has a
configured level of traffic.
This technique supports configurations that have either the same VCs or the same VPs on
both sides. It does not support a mixture of VCs on one side and VPs on the other side.
6.2.1.2 VC Traffic Signature
Traffic signature is based on traffic pattern analysis. The underlying assumption of traffic
pattern analysis is that network traffic variety ensures that every active link or active ATM
VC in the network maintains a differential traffic “fingerprint”.
Consequently, any two connected ports or VCs will have similar trend functions, which can
be matched within reliable statistical significance.
pattern analysis is that network traffic variety ensures that every active link or active ATM
VC in the network maintains a differential traffic “fingerprint”.
Consequently, any two connected ports or VCs will have similar trend functions, which can
be matched within reliable statistical significance.
6.2.2 CDP (Cisco Discovery Protocol)
For Cisco devices, if CDP is enabled, its information will be used for discovery and
verification. This includes any upper layer techniques, such as VC-related techniques in
ATM or MAC in Ethernet. In this technique, the matching criterion is the CDP neighbor
information.
Please note the following limitations:
verification. This includes any upper layer techniques, such as VC-related techniques in
ATM or MAC in Ethernet. In this technique, the matching criterion is the CDP neighbor
information.
Please note the following limitations:
If a port has more than one CDP neighbor, no links will be created.
Ports in a multi chassis device will not be connected by CDP if there is no entry for
them in the CDP neighbors table.
them in the CDP neighbors table.
6.2.3 LLDP (Link Layer Discovery Protocol)
If LLDP is enabled, its information will be used for discovery and verification. In this
technique, the matching criterion is the LLDP neighbor information.
technique, the matching criterion is the LLDP neighbor information.