Enterasys Networks 2000 manual Viewing the Basic Alarm Log

Page 101

Alarm Configuration

Viewing the Basic Alarm Log

If you have selected the “log” response for an alarm, and that alarm’s rising and/or falling threshold has been crossed, the Basic Alarms application will create a log of alarm occurrences. If a threshold has been crossed, it will be preceded in the interface list box display by a double greater-than sign (>>). Clicking to select an interface which is so marked will activate the View Log button; selecting the View Log button will launch the appropriate Basic Alarm Log, Figure 3-2. (Note that selecting more than one interface — even if all selected interfaces have experienced alarm conditions — will deactivate the View Log button; you can only view a single alarm log at a time.)

Figure 3-2. Basic Alarm Log

The top portion of the Basic Alarm Log window contains the device information boxes, as well as the Port Number assigned to the interface that experienced the alarm condition and the type of alarm that was triggered; the remainder of the window contains the following information about each alarm occurrence:

Index

This index number uniquely identifies each occurrence of

 

a rising or falling event. Note that, since the alarm whose

 

log is displayed in Figure 3-2experienced both rising and

 

falling alarms, there are two sets of event indices: one

 

which identifies each instance of the rising alarm, and

 

one which identifies each instance of the falling alarm.

For more information about the relationship between rising and falling alarms and the

TIP hysteresis function that controls the generation of alarm events, see How Rising and Falling Thresholds Work, on page 3-27.

Time

Indicates the date and time of each event occurrence.

Basic Alarm Configuration

3-9

Image 101
Contents SmartSwitch 2000 User’s Guide Page Virus Disclaimer Restricted Rights Notice Contents Alarm Configuration Chapter Statistics Chapter Managing Ethernet MicroLAN SwitchesIndex Chapter HSIM-W87 ConfigurationChapter Fddi Applications Introduction Introduction Introduction Introduction Using the SmartSwitch 2000 User’s Guide Software Conventions Using the MouseRelated Manuals Left Mouse Button Right Mouse Button Device Name Common SmartSwitch 2000 Window FieldsIP Address LocationGetting Help Using Window ButtonsUsing On-line Help Getting Help from the Global Technical Assistance Center Accessing On-line DocumentationLogin Introduction Getting Help SmartSwitch 2000 Chassis View Connection Status Viewing Chassis InformationFront Panel Information Port Status Boot PromFirmware TimeMenu Structure SmartSwitch 2000 Chassis View Menu StructureDevice Menu Port Status Menu Fddi Menu Repeater MenuModule Menu Utilities MenuHelp Menu Port Menus Status Port Status DisplaysSelecting a Port Status View Load Mapping ErrorsSpeed TypeSmartSwitch 2000 Chassis View Port Assignment Errors or Frame SizePort Status Color Codes Chassis Manager WindowDevice Type Viewing Hardware TypesConnection Type Module TypeInterface Description Viewing I/F Summary InformationDescription IndexPhysical Status Logical StatusRaw Counts Viewing Interface Detail RateAddress ErrorUnicast Non-UnicastPackets Received Received only Unknown Protocol Received onlyTransmit Queue Size Transmit only Packets Transmitted Transmit onlyComponent Using Device Find Source AddressPort Instance Component Managing the Hub Configuring Ports12. The Port Configuration Window Configuring Standard Ethernet and Fddi PortsFull Duplex Standard ModeConfiguring Fast Ethernet Ports on First Generation Devices 13. The Fast Ethernet Port Configuration Window Desired Operational Mode Current Operational ModePort Type Link StateRemote Capabilities Advertised AbilitiesFor 100Base-FX ports, options are Setting the Desired Operational ModeConfiguring Ethernet Ports on Second Generation Devices 14. The Ethernet Configuration Window Auto Negotiate Config Remote Auto SignalAuto Negotiate Mode Operational Mode FieldsFlow Control DuplexAuto Negotiation Technologies Configuring the COM Port Setting Advertised Abilities for Auto NegotiationCom Port Function Com Port AdminSpeed Selection Using an Uninterruptable Power Supply UPSAccessing the UPS Window UPS ID Setting the UPS ID Using the Disconnect Option Redirecting Traffic on the SmartSwitchUsing the Test Option To access the Port Redirect window Priority Configuration Configuring Priority Queuing Based on Receive Port 18. The Port Priority Configuration Window 19. The MAC Based Priority Configuration Window Configuring Priority Queuing Based on MAC-layer InformationAddress Type Current Priority EntriesFrame Type PriorityTo assign a transmit priority based on MAC-layer information Configuring Priority Queuing Based on Packet Type System Resources Window Dram Installed Flash Memory InstalledSram Installed Nvram InstalledReserving CPU Bandwidth 802.1Q VLANs What is a VLAN?About 802.1Q Vlan Configuration and Operation What is an 802.1Q Port-Based VLAN?Egress List Operation Ingress List Operation802.1Q Port Types 1Q TrunkHybrid Configuring Your 802.1Q VlansSetting Vlan Parameters and Operational Modes Vlan Name Admin StatusDeleting VLANs Creating and Modifying VLANsEnabling and Disabling VLANs Updating Vlan Config Window InformationPerforming Ingress List Configuration Mode Slot/PortDiscard Port Operational ModePort Discard Assigning Vlan Membership to PortsSetting Port Frame Discard Formats Setting Port Operational ModesUpdating Vlan Port Config Window Information Performing Egress List ConfigurationName Slot NumberEgress Ports Broadcast SuppressionEgress Untagged List Building an Egress ListTotal RX Port #Peak Rate Time Since PeakThreshold 26. The Edit Time Window Setting the Device Date and TimeEnabling and Disabling Ports SmartSwitch 2000 Chassis View Managing the Hub About Rmon Alarms and Events Alarm ConfigurationAlarm Configuration Basic Alarm ConfigurationRmon Basic Alarm Configuration Window Accessing the Basic Alarm Configuration WindowKilobits Total Errors Broadcasts/Multicasts Viewing Alarm StatusIf Number If TypePolling Interval Log/TrapRising Threshold Rising ActionCreating and Editing a Basic Alarm Alarm Configuration Disabling a Basic Alarm Viewing the Basic Alarm Log Accessing the Rmon Advanced Alarm/Event List Advanced Alarm ConfigurationRmon Advanced Alarm/Event List Window Alarm Configuration Creating and Editing an Advanced Alarm Rmon Create/Edit Alarms Window Alarm Configuration Alarm Configuration Alarm Configuration Table index.lengthin bytes.instancein decimal format Alarm Configuration Creating and Editing an Event Rmon Create/Edit Events Window Alarm Configuration Adding Actions to an Event Rmon Create/Edit Actions Window Viewing an Advanced Alarm Event Log Deleting an Alarm, Event, or ActionAlarm Configuration How Rising and Falling Thresholds Work Alarm Configuration How Rising and Falling Thresholds Work Statistics Accessing the Statistics WindowsStatistics Rmon StatisticsBytes ProblemsPackets Drop EventsFrame Size Bytes Packets Viewing Total, Delta, and Accumulated Statistics Printing Statistics If StatisticsIf Statistics Discarded Repeater Statistics Managing Ethernet MicroLAN SwitchesStatistics Windows Accessing the Statistics WindowsTo access the port-level Statistics window Statistics Defined Hard ErrorsActive Users BroadcastsUsing the Total and Delta Option Buttons Soft ErrorsAccessing the Timer Statistics Windows Timer StatisticsTo access the port-level Timer Statistics window Repeater Performance Graphs Setting the Timer Statistics IntervalAccessing the Performance Graph Windows Frames Blue Total Errors RedPercent Load Green Detail Button Configuring the Performance GraphsFrame Status Breakdown Error BreakdownAccessing the Alarm Limits Windows Alarm LimitsManaging Ethernet MicroLAN Switches Managing Ethernet MicroLAN Switches Collisions Broadcast Packets Errors of TypeWithin Configuring AlarmsSetting the Alarm Limits Time Interval Trap Selection Setting Alarm LimitsAccessing the Trap Selection Windows Link State Traps Trap DefinitionsSource Address Traps Segmentation TrapsConfiguring Traps Managing Ethernet MicroLAN Switches Fddi Applications Click on Fddi Statistics Concentrator ConfigurationMAC State Concentrator Configuration WindowSMT Version Neg. Negotiated Req. Requested Target Token Rotation TimeConcentrator M Ports Concentrator Non-M PortsConnection Policy Window Ring ConfigurationFddi Applications Number of Nodes Station ListStations Panel Address ModeNode Class Fddi PerformanceTopology Upstream NeighborTransmit Frames Frame ErrorsReceive Frames Lost FramesFrames/sec Fddi StatisticsKBytes/sec Peak KBytes/secSetting the Fddi Statistics Poll Rate Configuring Fddi Frame Translation SettingsUtil Click on Frame TranslationFrame Translation Window Information about Ethernet and Fddi Frame TypesEthernet Ethernet FramesEthernet Snap Ethernet 802.3 Ethernet RawFddi Frames FddiIP Fragmentation Fddi Frame Translation OptionsTranslate all Non-Novell Fddi Snap frames to Translate all Ethernet Raw frames toTranslate all Novell Fddi 802.2 frames to Translate all Novell Fddi Snap frames toTranslate all Novell Fddi MAC frames to Auto Learn Novell Frame TranslationAccessing the ATM Connections Window ATM ConfigurationConnection Data SettingsRefresh AddDelete Deleting a Connection Configuring ConnectionsAdding a New Connection T3 Configuration Window HSIM-W87 ConfigurationValid Intervals Time ElapsedLine Status T1 Configuration WindowT3 Line Type T3 Loop BackT1 Line Number T1 Line BuildOut T1 Frame TypeT1 Loop Back Max Entries Configuring IP PriorityIP Priority Queue Status Number of EntriesHSIM-W87 Configuration Configuring IP Priority Numerics SymbolsIndex-2 Index-3 Index-4 Index-5 Index Index-6
Related manuals
Manual 86 pages 11.98 Kb

2000 specifications

Enterasys Networks, a key player in the networking space in 2000, was renowned for its innovative solutions that combined high-performance networking with robust security features. Founded with the vision of providing enterprise-level networking infrastructure, Enterasys positioned itself to cater to the growing demands of business networks during the dot-com boom.

One of the main features of Enterasys Networks was its focus on delivering secure, scalable networking solutions that could seamlessly integrate with existing enterprise systems. The company developed a range of products including switches, routers, and wireless solutions that were designed to optimize performance while ensuring security at every layer. Their core offerings provided businesses with the reliability required to handle increasing volumes of data traffic.

A standout technology of Enterasys was its identity and access management solutions. These technologies allowed organizations to control who could access network resources and under what conditions. This was particularly crucial in a time when cyber threats were on the rise, and businesses were becoming more aware of the need for strict network security protocols. The features included role-based access control and authentication measures, which were fundamental in safeguarding sensitive information.

Enterasys also introduced intelligent networking features, which enabled dynamic traffic management and prioritization. This technology helped organizations optimize their network performance by automatically adjusting to changing workload demands. Such capabilities were essential for businesses relying on bandwidth-intensive applications and services.

The company also embraced the rising trend of wireless networking, providing solutions that combined wired and wireless technologies for a unified experience. Enterasys Wireless LAN solutions were groundbreaking at the time, offering seamless connectivity and security to mobile devices, thereby enhancing productivity and flexibility within enterprise environments.

In addition to hardware, Enterasys developed network management software that simplified the administration of complex networks. This software enabled IT professionals to monitor performance, troubleshoot issues, and implement security policies efficiently.

Overall, Enterasys Networks in 2000 was characterized by its commitment to delivering secure, intelligent networking solutions that catered to the needs of modern enterprises. With its innovative technologies and features, Enterasys played a significant role in shaping the networking landscape, laying the groundwork for future advancements in network security and management.