Alarm Configuration

Log/Trap

Indicates whether or not each alarm has been configured to create a silent log of event occurrences and the alarms that triggered them, and whether or not each alarm has been configured to issue a trap in response to a rising or falling alarm condition. Possible values are log, trap, log&trap, or none.

Polling Interval

Displays the amount of time, in days, hours, minutes, and seconds, over which the selected alarm variable will be sampled. At the end of the interval, the sample value will be compared to both the rising and falling thresholds (described below). You can set any interval up to 24,855 days.

Rising Threshold

Displays the high threshold value set for the selected alarm variable. Values used to compare to the thresholds are relative, or delta values (the difference between the value counted at the end of the current interval and the value counted at the end of the previous interval); be sure to set your thresholds accordingly.

Rising Action

Indicates whether or not a rising alarm occurrence will initiate any actions in response to the alarm condition: Enable if bridging will be enabled at the selected interface in response to a rising alarm, Disable if bridging will be disabled at the selected interface in response to a rising alarm, and None if no actions have been configured for the selected alarm. Note that the Action fields will be unavailable for devices configured to operate in SecureFast switching mode.

Falling Threshold

Displays the low threshold value set for the selected alarm variable. Values used to compare to the thresholds are relative, or delta values (the difference between the value counted at the end of the current interval and the value counted at the end of the previous interval); be sure to set your thresholds accordingly.

Falling Action

Indicates whether or not a falling alarm occurrence will initiate any actions in response to the alarm condition: Enable if bridging will be enabled at the selected interface in response to a falling alarm, Disable if bridging will be disabled in response to a falling alarm, and None if no actions have been configured for the selected alarm. Note that the Action fields will be unavailable for devices configured to operate in SecureFast switching mode.

Before you decide whether or not to assign an action to a rising or falling alarm, it is

TIP important to understand something about the hysteresis function built in to the RMON alarm functionality. See How Rising and Falling Thresholds Work, on page 3-27, for more information.

Basic Alarm Configuration

3-5

Page 97
Image 97
Enterasys Networks 2000 Log/Trap, Polling Interval, Rising Threshold, Rising Action, Falling Threshold, Falling Action

2000 specifications

Enterasys Networks, a key player in the networking space in 2000, was renowned for its innovative solutions that combined high-performance networking with robust security features. Founded with the vision of providing enterprise-level networking infrastructure, Enterasys positioned itself to cater to the growing demands of business networks during the dot-com boom.

One of the main features of Enterasys Networks was its focus on delivering secure, scalable networking solutions that could seamlessly integrate with existing enterprise systems. The company developed a range of products including switches, routers, and wireless solutions that were designed to optimize performance while ensuring security at every layer. Their core offerings provided businesses with the reliability required to handle increasing volumes of data traffic.

A standout technology of Enterasys was its identity and access management solutions. These technologies allowed organizations to control who could access network resources and under what conditions. This was particularly crucial in a time when cyber threats were on the rise, and businesses were becoming more aware of the need for strict network security protocols. The features included role-based access control and authentication measures, which were fundamental in safeguarding sensitive information.

Enterasys also introduced intelligent networking features, which enabled dynamic traffic management and prioritization. This technology helped organizations optimize their network performance by automatically adjusting to changing workload demands. Such capabilities were essential for businesses relying on bandwidth-intensive applications and services.

The company also embraced the rising trend of wireless networking, providing solutions that combined wired and wireless technologies for a unified experience. Enterasys Wireless LAN solutions were groundbreaking at the time, offering seamless connectivity and security to mobile devices, thereby enhancing productivity and flexibility within enterprise environments.

In addition to hardware, Enterasys developed network management software that simplified the administration of complex networks. This software enabled IT professionals to monitor performance, troubleshoot issues, and implement security policies efficiently.

Overall, Enterasys Networks in 2000 was characterized by its commitment to delivering secure, intelligent networking solutions that catered to the needs of modern enterprises. With its innovative technologies and features, Enterasys played a significant role in shaping the networking landscape, laying the groundwork for future advancements in network security and management.