Alarm Configuration

the creator of the alarm. Since any workstation can access and change the alarms you are setting in your SmartSwitch 2000, some owner identification can prevent alarms from being altered or deleted accidentally. The default value provided is — <IP address> <(hostname)> <date> <time>, where <IP address> and <(hostname)> refer to the workstation that created the alarm and <date> and <time> reflect the date and time of the alarm’s creation.

3.If you are creating a new alarm, use the Index field to assign a unique, currently unused index number to identify the alarm. Clicking on the Index button will automatically assign the lowest available number; you can also click directly in the text box and assign any value you want between 1 and 1,999 and 4,000 and 9,999 (indices 2000 to 3999 are reserved and unavailable).

NOTE

Clicking on the Index button to select the next available index number will replace the current Owner string with the default value described above; if the default value is already in place, the date and time will be updated.

If you wish to modify an existing alarm, enter the appropriate index value, or double-click on the alarm of interest in the Alarms Watch list (in the main Alarm/Event window).

The only thing that determines whether you are modifying an existing alarm or creating a

TIP new one is the assignment of the index number; be sure to assign this value appropriately.

4.To select the Variable to be used for your alarm, use the MIBTree panel provided on the right side of the window. (For more information about how to use the MIB Tree panel, see the MIB Tools chapter in the Tools Guide.) The display will default to the top of the tree (labeled Internet); there are three ways to locate and/or assign the correct variable:

a.If you know the exact name of the OID whose value you wish to track, simply enter the name in the Alarm Variable field; to verify that you have entered the name correctly, click on the Find->button to move the MIB Tree display to that OID. (If the MIB Tree display does not adjust to show the OID you’ve entered, you’ve entered the name incorrectly.)

b.Use the Radar View panel located just left of the MIB Tree panel to adjust the MIB Tree display to the part of the tree that contains the variable you are interested in, then click to open the appropriate folders. (Again, see the Tools Guide for more details on using the Radar View.)

c.Use the scroll bars and click to open the appropriate folders in the MIB Tree panel to locate the object you wish to use; click to select it in the panel, and its name will automatically be entered in the Alarm Variable field.

Advanced Alarm Configuration

3-15

Page 107
Image 107
Enterasys Networks 2000 manual Alarm Configuration

2000 specifications

Enterasys Networks, a key player in the networking space in 2000, was renowned for its innovative solutions that combined high-performance networking with robust security features. Founded with the vision of providing enterprise-level networking infrastructure, Enterasys positioned itself to cater to the growing demands of business networks during the dot-com boom.

One of the main features of Enterasys Networks was its focus on delivering secure, scalable networking solutions that could seamlessly integrate with existing enterprise systems. The company developed a range of products including switches, routers, and wireless solutions that were designed to optimize performance while ensuring security at every layer. Their core offerings provided businesses with the reliability required to handle increasing volumes of data traffic.

A standout technology of Enterasys was its identity and access management solutions. These technologies allowed organizations to control who could access network resources and under what conditions. This was particularly crucial in a time when cyber threats were on the rise, and businesses were becoming more aware of the need for strict network security protocols. The features included role-based access control and authentication measures, which were fundamental in safeguarding sensitive information.

Enterasys also introduced intelligent networking features, which enabled dynamic traffic management and prioritization. This technology helped organizations optimize their network performance by automatically adjusting to changing workload demands. Such capabilities were essential for businesses relying on bandwidth-intensive applications and services.

The company also embraced the rising trend of wireless networking, providing solutions that combined wired and wireless technologies for a unified experience. Enterasys Wireless LAN solutions were groundbreaking at the time, offering seamless connectivity and security to mobile devices, thereby enhancing productivity and flexibility within enterprise environments.

In addition to hardware, Enterasys developed network management software that simplified the administration of complex networks. This software enabled IT professionals to monitor performance, troubleshoot issues, and implement security policies efficiently.

Overall, Enterasys Networks in 2000 was characterized by its commitment to delivering secure, intelligent networking solutions that catered to the needs of modern enterprises. With its innovative technologies and features, Enterasys played a significant role in shaping the networking landscape, laying the groundwork for future advancements in network security and management.