Alarm Configuration

13.Click Apply to set your changes. If you have made any errors in configuring alarm parameters (using an invalid value in any field, leaving a field blank, or selecting an alarm variable which is not resident on the device), an error window with the appropriate message displays. Correct the noted problem(s), and click Apply again.

The window remains open so that you may configure additional new alarms or modify existing ones; remember, you can double-click on any alarm in the Alarms Watch list in the main Alarm/Event window to display its parameters in the Create/Edit Alarm window. When you have finished configuring your alarms, click Cancel to close the window.

Creating and Editing an Event

The Create/Edit Events window (Figure 3-5on page 3-21) — like the Create/Edit Alarms window — allows you to both create new events and edit existing ones. When you click on the Create/Edit button in the Events Watch list, the Create/Edit Events window will display the parameters of the event which is currently highlighted in the list. (If no events have yet been configured, a set of default parameters will be displayed.) All of these parameters are editable: to change an existing event, edit any parameter except the Index value; to create an entirely new event, simply assign a new Index number. The ability to assign index numbers allows you to quickly and easily create a number of similar events without having to close, then re-open the window or re-assign every parameter.

The main Alarm/Event window remains active while the Create/Edit Event window is open; to edit a different event (or use its settings as the basis of a new event), simply double-click on the event you want to use in the main Events Watch list, and the Create/Edit Event window will update accordingly.

If the Create/Edit Actions window is also open, it too will update to display the actions

TIP associated with the event currently selected in the main Alarm/Event window. See Adding Actions to an Event, on page 3-23, for more information on the actions feature.

To configure an event:

1.If you wish to modify an existing event or create a new event based on the parameters of an existing one, be sure the event of interest is highlighted in the Events Watch list, then click on the Create/Edit button at the top of the Events Watch portion of the RMON Advanced Alarm/Event List. The Create/Edit Events window, Figure 3-5, opens.

If you wish to create an entirely new event, it doesn’t matter which existing event (if any) is highlighted when you open the Create/Edit Events window; although the window will, by default, display the parameters of whichever event is currently selected, all parameters are editable and can be configured as desired.

3-20

Advanced Alarm Configuration

Page 112
Image 112
Enterasys Networks 2000 manual Creating and Editing an Event

2000 specifications

Enterasys Networks, a key player in the networking space in 2000, was renowned for its innovative solutions that combined high-performance networking with robust security features. Founded with the vision of providing enterprise-level networking infrastructure, Enterasys positioned itself to cater to the growing demands of business networks during the dot-com boom.

One of the main features of Enterasys Networks was its focus on delivering secure, scalable networking solutions that could seamlessly integrate with existing enterprise systems. The company developed a range of products including switches, routers, and wireless solutions that were designed to optimize performance while ensuring security at every layer. Their core offerings provided businesses with the reliability required to handle increasing volumes of data traffic.

A standout technology of Enterasys was its identity and access management solutions. These technologies allowed organizations to control who could access network resources and under what conditions. This was particularly crucial in a time when cyber threats were on the rise, and businesses were becoming more aware of the need for strict network security protocols. The features included role-based access control and authentication measures, which were fundamental in safeguarding sensitive information.

Enterasys also introduced intelligent networking features, which enabled dynamic traffic management and prioritization. This technology helped organizations optimize their network performance by automatically adjusting to changing workload demands. Such capabilities were essential for businesses relying on bandwidth-intensive applications and services.

The company also embraced the rising trend of wireless networking, providing solutions that combined wired and wireless technologies for a unified experience. Enterasys Wireless LAN solutions were groundbreaking at the time, offering seamless connectivity and security to mobile devices, thereby enhancing productivity and flexibility within enterprise environments.

In addition to hardware, Enterasys developed network management software that simplified the administration of complex networks. This software enabled IT professionals to monitor performance, troubleshoot issues, and implement security policies efficiently.

Overall, Enterasys Networks in 2000 was characterized by its commitment to delivering secure, intelligent networking solutions that catered to the needs of modern enterprises. With its innovative technologies and features, Enterasys played a significant role in shaping the networking landscape, laying the groundwork for future advancements in network security and management.