Alarm Configuration

Viewing the Basic Alarm Log

If you have selected the “log” response for an alarm, and that alarm’s rising and/or falling threshold has been crossed, the Basic Alarms application will create a log of alarm occurrences. If a threshold has been crossed, it will be preceded in the interface list box display by a double greater-than sign (>>). Clicking to select an interface which is so marked will activate the View Log button; selecting the View Log button will launch the appropriate Basic Alarm Log, Figure 3-2. (Note that selecting more than one interface — even if all selected interfaces have experienced alarm conditions — will deactivate the View Log button; you can only view a single alarm log at a time.)

Figure 3-2. Basic Alarm Log

The top portion of the Basic Alarm Log window contains the device information boxes, as well as the Port Number assigned to the interface that experienced the alarm condition and the type of alarm that was triggered; the remainder of the window contains the following information about each alarm occurrence:

Index

This index number uniquely identifies each occurrence of

 

a rising or falling event. Note that, since the alarm whose

 

log is displayed in Figure 3-2experienced both rising and

 

falling alarms, there are two sets of event indices: one

 

which identifies each instance of the rising alarm, and

 

one which identifies each instance of the falling alarm.

For more information about the relationship between rising and falling alarms and the

TIP hysteresis function that controls the generation of alarm events, see How Rising and Falling Thresholds Work, on page 3-27.

Time

Indicates the date and time of each event occurrence.

Basic Alarm Configuration

3-9

Page 101
Image 101
Enterasys Networks 2000 manual Viewing the Basic Alarm Log

2000 specifications

Enterasys Networks, a key player in the networking space in 2000, was renowned for its innovative solutions that combined high-performance networking with robust security features. Founded with the vision of providing enterprise-level networking infrastructure, Enterasys positioned itself to cater to the growing demands of business networks during the dot-com boom.

One of the main features of Enterasys Networks was its focus on delivering secure, scalable networking solutions that could seamlessly integrate with existing enterprise systems. The company developed a range of products including switches, routers, and wireless solutions that were designed to optimize performance while ensuring security at every layer. Their core offerings provided businesses with the reliability required to handle increasing volumes of data traffic.

A standout technology of Enterasys was its identity and access management solutions. These technologies allowed organizations to control who could access network resources and under what conditions. This was particularly crucial in a time when cyber threats were on the rise, and businesses were becoming more aware of the need for strict network security protocols. The features included role-based access control and authentication measures, which were fundamental in safeguarding sensitive information.

Enterasys also introduced intelligent networking features, which enabled dynamic traffic management and prioritization. This technology helped organizations optimize their network performance by automatically adjusting to changing workload demands. Such capabilities were essential for businesses relying on bandwidth-intensive applications and services.

The company also embraced the rising trend of wireless networking, providing solutions that combined wired and wireless technologies for a unified experience. Enterasys Wireless LAN solutions were groundbreaking at the time, offering seamless connectivity and security to mobile devices, thereby enhancing productivity and flexibility within enterprise environments.

In addition to hardware, Enterasys developed network management software that simplified the administration of complex networks. This software enabled IT professionals to monitor performance, troubleshoot issues, and implement security policies efficiently.

Overall, Enterasys Networks in 2000 was characterized by its commitment to delivering secure, intelligent networking solutions that catered to the needs of modern enterprises. With its innovative technologies and features, Enterasys played a significant role in shaping the networking landscape, laying the groundwork for future advancements in network security and management.