Alarm Configuration

5.Once you have selected the object you wish to set, you must assign the appropriate instance value in the Instance field. If you’re not sure how the object you wish to set is instanced, you can use the MIB Tree utility (described in the Tools Guide) to query it; all available instances for the object will be displayed.

6.In the Value field, enter the value you wish to set for the selected object. Again, if you’re not sure what the valid values are for the variable you wish to set, locate the object in the MIBTree utility and use the Details button to obtain more information.

7.Once you’ve configured your action, click Add ; the action will be added to the Action Table list in the lower left corner of the window. Note that the window remains open so that you may configure additional new actions or modify existing ones; selecting on any action in the Action Table will display that action’s parameters in the window and make them available for editing. When you have finished configuring your actions, click Cancel to close the window.

The Action Table will update automatically each time an action is added or deleted; use Refresh to update the table at any time.

Deleting an Alarm, Event, or Action

To delete an alarm, event, or action:

1.In the appropriate window, highlight the alarm, event, or action you wish to remove.

2.Click Delete. A window opens asking you to confirm your selection; click OK to delete, or Cancel to cancel.

When you delete an event, be sure you edit all alarms that were pointing to that event, and assign a new valid event to those thresholds; note, too, that deleting an event automatically deletes its associated actions, as actions cannot exist in the absence of an association with an event. As a general rule, we recommend that you do not delete an alarm or event of which you are not the owner.

Viewing an Advanced Alarm Event Log

To view the log of occurrences for any event:

1.Highlight the event for which you wish to view the log, then click on the Event Log button at the bottom of the Advanced Alarm/Event List window; the Event Log window, Figure 3-7, opens.

Advanced Alarm Configuration

3-25

Page 117
Image 117
Enterasys Networks 2000 manual Deleting an Alarm, Event, or Action, Viewing an Advanced Alarm Event Log

2000 specifications

Enterasys Networks, a key player in the networking space in 2000, was renowned for its innovative solutions that combined high-performance networking with robust security features. Founded with the vision of providing enterprise-level networking infrastructure, Enterasys positioned itself to cater to the growing demands of business networks during the dot-com boom.

One of the main features of Enterasys Networks was its focus on delivering secure, scalable networking solutions that could seamlessly integrate with existing enterprise systems. The company developed a range of products including switches, routers, and wireless solutions that were designed to optimize performance while ensuring security at every layer. Their core offerings provided businesses with the reliability required to handle increasing volumes of data traffic.

A standout technology of Enterasys was its identity and access management solutions. These technologies allowed organizations to control who could access network resources and under what conditions. This was particularly crucial in a time when cyber threats were on the rise, and businesses were becoming more aware of the need for strict network security protocols. The features included role-based access control and authentication measures, which were fundamental in safeguarding sensitive information.

Enterasys also introduced intelligent networking features, which enabled dynamic traffic management and prioritization. This technology helped organizations optimize their network performance by automatically adjusting to changing workload demands. Such capabilities were essential for businesses relying on bandwidth-intensive applications and services.

The company also embraced the rising trend of wireless networking, providing solutions that combined wired and wireless technologies for a unified experience. Enterasys Wireless LAN solutions were groundbreaking at the time, offering seamless connectivity and security to mobile devices, thereby enhancing productivity and flexibility within enterprise environments.

In addition to hardware, Enterasys developed network management software that simplified the administration of complex networks. This software enabled IT professionals to monitor performance, troubleshoot issues, and implement security policies efficiently.

Overall, Enterasys Networks in 2000 was characterized by its commitment to delivering secure, intelligent networking solutions that catered to the needs of modern enterprises. With its innovative technologies and features, Enterasys played a significant role in shaping the networking landscape, laying the groundwork for future advancements in network security and management.