Alarm Configuration

Using the Advanced Alarms feature, you can define custom alarms for almost any MIB-II or RMON object, as long as it is present in the device firmware and its value is defined as an integer (including counters, timeticks, and gauges). All aspects of these alarms are user-selectable: thresholds can be established on either the absolute or delta value for a variable; events can be configured to create a log, generate a trap, or both; and for Enterasys devices that support the Actions MIB, events can also be configured to perform any defined SNMP SET or series of SETs on device objects. The Advanced Alarms feature also allows you to configure any events you wish to use in conjunction with the Packet Capture functionality. (For more information on using the Packet Capture feature, see the RMON User’s Guide included with your software.)

The Basic Alarms feature allows you to assign alarms to any interface type; using the Advanced Alarms feature, you need only be sure to select variables appropriate to the interface — Ethernet for Ethernet, Token Ring for Token Ring, etc. — when defining your alarms.

You can use the RMON Alarms feature to configure alarms for MIB objects on FDDI,

TIP ATM, and other interfaces that don’t specifically support RMON: the Basic Alarms window provides MIB II objects as alarm variables; Advanced Alarm configuration allows you to select any object as an alarm variable, as long as its value is defined as an integer and you assign the correct instance value. See step 5 on page 3-18and the Note which follows it for more information on assigning the correct instance value to an advanced alarm.

Basic Alarm Configuration

Using the Basic Alarm Configuration application, you can define both rising and falling alarm thresholds for three selected MIB-II objects: ifInOctets, ifInNUcast, and ifInErrors. Because these pre-selected objects are not RMON-specific, you can configure alarms for all interfaces installed in your SmartSwitch 2000 — including those, like FDDI, for which no specific RMON statistics currently exist.

In addition to configuring separate rising and falling thresholds, you can also configure your device’s response to an alarm condition: when a threshold is crossed, the RMON device can create a log of alarm events, send a trap notifying your management workstation that an alarm condition has occurred, or both; you can even configure an alarm to enable or disable bridging on the offending port in response to a rising or falling alarm condition.

The Basic Alarm Configuration window combines the three parts of creating a working

TIP alarm — configuring the alarm itself, configuring an event that will announce the occurrence of an alarm (including assigning any actions), and linking the two — into a single step, and handles the details transparently. For more information about the individual steps involved in creating an alarm, see Advanced Alarm Configuration, on page 3-10.

3-2

Basic Alarm Configuration

Page 94
Image 94
Enterasys Networks 2000 manual Basic Alarm Configuration

2000 specifications

Enterasys Networks, a key player in the networking space in 2000, was renowned for its innovative solutions that combined high-performance networking with robust security features. Founded with the vision of providing enterprise-level networking infrastructure, Enterasys positioned itself to cater to the growing demands of business networks during the dot-com boom.

One of the main features of Enterasys Networks was its focus on delivering secure, scalable networking solutions that could seamlessly integrate with existing enterprise systems. The company developed a range of products including switches, routers, and wireless solutions that were designed to optimize performance while ensuring security at every layer. Their core offerings provided businesses with the reliability required to handle increasing volumes of data traffic.

A standout technology of Enterasys was its identity and access management solutions. These technologies allowed organizations to control who could access network resources and under what conditions. This was particularly crucial in a time when cyber threats were on the rise, and businesses were becoming more aware of the need for strict network security protocols. The features included role-based access control and authentication measures, which were fundamental in safeguarding sensitive information.

Enterasys also introduced intelligent networking features, which enabled dynamic traffic management and prioritization. This technology helped organizations optimize their network performance by automatically adjusting to changing workload demands. Such capabilities were essential for businesses relying on bandwidth-intensive applications and services.

The company also embraced the rising trend of wireless networking, providing solutions that combined wired and wireless technologies for a unified experience. Enterasys Wireless LAN solutions were groundbreaking at the time, offering seamless connectivity and security to mobile devices, thereby enhancing productivity and flexibility within enterprise environments.

In addition to hardware, Enterasys developed network management software that simplified the administration of complex networks. This software enabled IT professionals to monitor performance, troubleshoot issues, and implement security policies efficiently.

Overall, Enterasys Networks in 2000 was characterized by its commitment to delivering secure, intelligent networking solutions that catered to the needs of modern enterprises. With its innovative technologies and features, Enterasys played a significant role in shaping the networking landscape, laying the groundwork for future advancements in network security and management.