Chapter 10 Alarm Monitoring and Management

Alarm Profiles

CTC can store up to ten active alarm profiles at any time to apply to the node. Custom profiles can take eight of these active profile positions. Two other profiles, Default profile and Inherited profile, are reserved by the NE, and cannot be edited. The reserved Inherited profile allows port alarm severities to be governed by the card-level severities, or card alarm severities to be determined by the node-level severities.

If one or more alarm profiles is stored as files from elsewhere in the network onto the local PC or server hard drive where CTC resides, you can use as many profiles as you can physically store by deleting and replacing them locally in CTC so that only eight are active at any given time.

10.4.1 Creating and Modifying Alarm Profiles

Alarm profiles are created in the network view using the Provisioning > Alarm Profiles tabs. After loading the default profile or another profile on the node, you can use the Clone feature to create custom profiles. After the new profile is created, the Alarm Profiles window shows the original profile—frequently Default—and the new profile.

Tip To see the full list of profiles including those available for loading or cloning, click the Available button. You must load a profile before you can clone it.

In the Inherited profile, alarms inherit, or copy severity from the next-highest level. For example, a card with an Inherited alarm profile copies the severities used by the node housing the card. If you choose the Inherited profile from the network view, the severities at the lower levels (node and card) are copied from this selection.

You do not have to apply a single severity profile to the node, card, and port level alarms. Different profiles can be applied at different levels. For example, you could use the inherited or default profile on a node and on all cards and ports, but apply a custom profile that downgrades an alarm on one particular card. Or you might choose to downgrade an STMN unequipped path alarm (UNEQ-P) from Critical (CR) to Not Alarmed (NA) on an optical card because this alarm is raised and then clears every time you create a circuit. UNEQ-P alarms for the card with the custom profile would not display on the Alarms tab (but they would still be recorded on the Conditions and History tabs).

When you modify severities in an alarm profile:

All Critical (CR) or Major (MJ) default or user-defined severity settings are demoted.

Default severities are used for all alarms and conditions until you create a new profile and apply it.

10.4.2Alarm Profile Buttons

The Alarm Profiles window displays six buttons at the bottom. Table 10-8lists and describes each of the alarm profile buttons and their functions.

 

 

 

 

Table 10-8

Alarm Profile Buttons

 

 

 

 

 

 

 

 

 

 

 

 

Button

 

Description

 

 

 

 

 

 

 

 

 

 

 

 

New

 

Adds a new alarm profile.

 

 

 

 

 

 

 

 

 

 

 

 

Load

 

Loads a profile from a node or a file.

 

 

 

 

 

 

 

 

 

 

 

 

Store

 

Saves profiles on a node (or nodes) or in a file.

 

 

 

 

 

 

 

 

 

 

 

 

Delete

 

Deletes profiles from a node.

 

 

 

 

 

 

 

 

 

 

Cisco ONS 15310-MA SDH Reference Manual, Release 9.1 and Release 9.2

 

 

 

 

 

 

 

 

 

 

 

 

 

10-10

 

 

 

78-19417-01

 

 

 

 

 

 

 

Page 208
Image 208
Cisco Systems 15310-MA manual Creating and Modifying Alarm Profiles, Alarm Profile Buttons, Button Description, 10-10

15310-MA specifications

Cisco Systems has established itself as a leader in the networking domain, offering a wide array of solutions to meet the needs of modern businesses. Among its impressive product lineup are the Cisco 15310-CL and 15310-MA routers, designed to provide advanced network performance and reliability.

The Cisco 15310-CL is a versatile platform that primarily serves as a carrier-class router aimed at supporting high-speed data and voice services. It is built to handle the demands of large enterprises and service providers, offering a robust design that ensures maximum uptime and performance. One of its standout features is its modular architecture, which enables users to customize their configurations based on specific application needs. This scalability allows for future expansion without the need for a complete hardware overhaul.

Key technologies integrated into the Cisco 15310-CL include high-density Ethernet interfaces and a comprehensive suite of Layer 2 and Layer 3 protocol support. The device is capable of supporting multiple types of connections, including TDM, ATM, and Ethernet. This flexibility makes it an ideal choice for organizations that require seamless migration between various service types. Moreover, with features such as MPLS (Multiprotocol Label Switching) support and advanced Quality of Service (QoS) mechanisms, the router ensures that critical applications receive the necessary bandwidth and low latency required for optimal performance.

In contrast, the Cisco 15310-MA focuses on access solutions, providing a cost-effective entry point for businesses looking to enhance their network capabilities. It is well-suited for smaller offices or branch locations that need reliable connectivity without the expense and complexity associated with larger systems. The device supports a range of access methods and provides essential features like firewall capabilities, VPN support, and comprehensive security measures to protect sensitive data.

Both models benefit from Cisco's commitment to security and manageability, offering features like enhanced encryption protocols and user authentication mechanisms that help safeguard networks against threats. Additionally, they can be managed through Cisco’s intuitive software tools, simplifying configuration and monitoring tasks for IT administrators.

The Cisco 15310-CL and 15310-MA are ideal solutions for businesses seeking to enhance their network infrastructure, ensuring firms can keep pace with evolving technology demands while maintaining a focus on security and performance. Their combination of advanced features, modular capabilities, and robust support makes them valuable assets in the networking landscape.