Alarm Configuration

7.Since the first sample taken can be misleading, you can use the selections in the Startup Alarm box to disable either the rising or the falling threshold for that sample only. If you would like to exclude the falling alarm, select the Rising option; the first sample taken will only generate a rising alarm, even if the sample value is at or below the falling threshold. To exclude the rising alarm, select the Falling option; the first sample will then only generate a falling alarm, even if the sample value is at or above the rising threshold. If you wish to receive both alarms as appropriate, select the Both option.

8.Use the selections in the Sample Type box to indicate whether you want your threshold values compared to the total count for the variable (Absolute), or to the difference between the count at the end of the current interval and the count at the end of the previous interval (Delta). Make sure you have set your thresholds accordingly.

9.Click in the Rising Threshold field; enter the high threshold value for this alarm.

10.There are two ways to assign an event to your rising threshold: click in the Rising Event Index text box and enter the number of the event you would like to see triggered if the rising threshold is crossed; or use the Events Watch list in the main Alarm/Event window to highlight the desired event, then click on the Rising Event Index button. Be sure you assign the number of a valid event or there will be no response if the selected variable meets or crosses this threshold; assigning an index of zero effectively disables the threshold, as there will be no indication that it has been crossed.

For more information on how events are triggered, see How Rising and Falling Thresholds Work, on page 3-27.

11.Click in the Falling Threshold field; enter the low threshold value for this alarm.

12.There are two ways to assign an event to your falling threshold: click in the Falling Event Index text box and enter the number of the event you would like to see triggered if the falling threshold is crossed; or use the Events Watch list in the main Alarm/Event window to highlight the desired event, then click on the Falling Event Index button. Again, be sure you assign the number of a valid event or there will be no response if the selected variable meets or crosses this threshold; assigning an index of zero effectively disables the threshold, as there will be no indication that it has been crossed.

For more information on how events are triggered, see How Rising and Falling Thresholds Work, on page 3-27.

NOTE

There is no limit to the number of alarms that may be assigned to the same event.

Advanced Alarm Configuration

3-19

Page 111
Image 111
Enterasys Networks 2000 manual Alarm Configuration

2000 specifications

Enterasys Networks, a key player in the networking space in 2000, was renowned for its innovative solutions that combined high-performance networking with robust security features. Founded with the vision of providing enterprise-level networking infrastructure, Enterasys positioned itself to cater to the growing demands of business networks during the dot-com boom.

One of the main features of Enterasys Networks was its focus on delivering secure, scalable networking solutions that could seamlessly integrate with existing enterprise systems. The company developed a range of products including switches, routers, and wireless solutions that were designed to optimize performance while ensuring security at every layer. Their core offerings provided businesses with the reliability required to handle increasing volumes of data traffic.

A standout technology of Enterasys was its identity and access management solutions. These technologies allowed organizations to control who could access network resources and under what conditions. This was particularly crucial in a time when cyber threats were on the rise, and businesses were becoming more aware of the need for strict network security protocols. The features included role-based access control and authentication measures, which were fundamental in safeguarding sensitive information.

Enterasys also introduced intelligent networking features, which enabled dynamic traffic management and prioritization. This technology helped organizations optimize their network performance by automatically adjusting to changing workload demands. Such capabilities were essential for businesses relying on bandwidth-intensive applications and services.

The company also embraced the rising trend of wireless networking, providing solutions that combined wired and wireless technologies for a unified experience. Enterasys Wireless LAN solutions were groundbreaking at the time, offering seamless connectivity and security to mobile devices, thereby enhancing productivity and flexibility within enterprise environments.

In addition to hardware, Enterasys developed network management software that simplified the administration of complex networks. This software enabled IT professionals to monitor performance, troubleshoot issues, and implement security policies efficiently.

Overall, Enterasys Networks in 2000 was characterized by its commitment to delivering secure, intelligent networking solutions that catered to the needs of modern enterprises. With its innovative technologies and features, Enterasys played a significant role in shaping the networking landscape, laying the groundwork for future advancements in network security and management.