Alarm Configuration

The fields in the Alarms Watch display include:

Index

The index is a number that uniquely identifies each

 

alarm. Index numbers are user-defined; you can use any

 

indexing scheme that works for you. These numbers are

 

permanently assigned to their associated alarms;

 

however, index numbers made available by the deletion

 

of existing alarms can be assigned to new alarms, as

 

needed. Indices 2000 to 3999 are reserved and

 

unavailable.

Interval

Indicates the amount of time, in seconds, over which the

 

selected variable will be sampled. At the end of the

 

interval, the sample value is compared to both the rising

 

and falling thresholds configured for the alarm.

Sample

Indicates whether the sample value to be compared to

 

the thresholds is an absolute, or total value — that is, the

 

total value counted for the selected variable — or a

 

relative, or delta value — the difference between the

 

value counted at the end of the current interval and the

 

value counted at the end of the previous interval.

LoThrshld

Indicates the set value for the low, or falling threshold.

Event #

Indicates the event index number that the falling

 

threshold points to: this is the event that will be triggered

 

if the falling threshold is met or crossed. If the value for

 

this field is zero, no event will be triggered.

HiThrshld

Indicates the set value for the high, or rising threshold.

Event #

Indicates the event index number that the rising

 

threshold points to: the event that will be triggered if the

 

rising threshold is met or crossed. If the value for this

 

field is zero, no event will be triggered.

Status

Indicates the status of the alarm: valid, invalid, or

 

underCreation. An alarm that is invalid is not functional;

 

it may be referring to a MIB component that is inactive

 

(such as the Hosts component), not present, or

 

unreachable, or it may have been deleted by software but

 

not yet removed from memory at the device. An alarm

 

that is underCreation is in the process of being

 

configured (possibly by another management station),

 

and should not be modified until its status is valid; if it

 

never reaches valid status, it will eventually be removed.

Alarm Variable

Indicates the variable that is being watched. You can use

 

the scroll bar, if necessary, to view the complete name.

3-12

Advanced Alarm Configuration

Page 104
Image 104
Enterasys Networks 2000 manual Alarm Configuration

2000 specifications

Enterasys Networks, a key player in the networking space in 2000, was renowned for its innovative solutions that combined high-performance networking with robust security features. Founded with the vision of providing enterprise-level networking infrastructure, Enterasys positioned itself to cater to the growing demands of business networks during the dot-com boom.

One of the main features of Enterasys Networks was its focus on delivering secure, scalable networking solutions that could seamlessly integrate with existing enterprise systems. The company developed a range of products including switches, routers, and wireless solutions that were designed to optimize performance while ensuring security at every layer. Their core offerings provided businesses with the reliability required to handle increasing volumes of data traffic.

A standout technology of Enterasys was its identity and access management solutions. These technologies allowed organizations to control who could access network resources and under what conditions. This was particularly crucial in a time when cyber threats were on the rise, and businesses were becoming more aware of the need for strict network security protocols. The features included role-based access control and authentication measures, which were fundamental in safeguarding sensitive information.

Enterasys also introduced intelligent networking features, which enabled dynamic traffic management and prioritization. This technology helped organizations optimize their network performance by automatically adjusting to changing workload demands. Such capabilities were essential for businesses relying on bandwidth-intensive applications and services.

The company also embraced the rising trend of wireless networking, providing solutions that combined wired and wireless technologies for a unified experience. Enterasys Wireless LAN solutions were groundbreaking at the time, offering seamless connectivity and security to mobile devices, thereby enhancing productivity and flexibility within enterprise environments.

In addition to hardware, Enterasys developed network management software that simplified the administration of complex networks. This software enabled IT professionals to monitor performance, troubleshoot issues, and implement security policies efficiently.

Overall, Enterasys Networks in 2000 was characterized by its commitment to delivering secure, intelligent networking solutions that catered to the needs of modern enterprises. With its innovative technologies and features, Enterasys played a significant role in shaping the networking landscape, laying the groundwork for future advancements in network security and management.