Alarm Configuration

The remainder of the window fields provide the means for configuring alarms for each available interface. The information provided in this screen is static once it is displayed; for updated information, click on the Refresh button. Adding or modifying an alarm automatically updates the list.

Creating and Editing a Basic Alarm

The editable fields at the bottom of the Basic Alarm Configuration window allow you to configure alarm parameters for each available interface. These fields will display the parameters used for the most recently configured alarm (no matter which interfaces are selected in the list box); this allows you to set the same parameters on multiple interfaces with a single set. Hold down the Shift key while clicking to select a contiguous group of interfaces; use the Ctrl key to select any interfaces. To display the alarm parameters for a specific interface, double-click on that interface.

There is no specific “Enable” function; simply configuring thresholds and/or actions for an alarm and applying those changes enables the alarm. For more information on disabling an alarm, see Disabling a Basic Alarm, on page 3-8.

To configure an alarm:

1.At the top of the window, click to select the variable to be used for your alarm: Kilobits, Total Errors, or Broadcast/Multicast. The display in the list box will reflect the current status at each interface of the alarm type you have selected.

2.In the list box, click to highlight the interface (or use shift-clickor ctrl-clickto select multiple interfaces) for which you would like to configure an alarm for the selected variable. Note that the editable fields will display the parameters assigned to the most recently set alarm; however, any changes you make in these fields will be set to all selected interfaces.

3.In the Interval field, enter the amount of time, in days, hours, minutes, and seconds, over which the selected variable will be sampled. At the end of the interval, the sample value will be compared to both the rising and falling thresholds. You can assign any time interval up to 24,855 days. If you set an incorrect time value (e.g., you enter 75 minutes instead of 1 hour, 15 minutes) you will receive an error message. Click OK and enter the correct time value.

4.In the Alarm field, click to select one or both of the following options:

a.Select Log if you wish to create a silent log of alarm occurrences.

b.Select Trap if you want your device to issue a trap in response to each alarm occurrence.

3-6

Basic Alarm Configuration

Page 98
Image 98
Enterasys Networks 2000 manual Creating and Editing a Basic Alarm

2000 specifications

Enterasys Networks, a key player in the networking space in 2000, was renowned for its innovative solutions that combined high-performance networking with robust security features. Founded with the vision of providing enterprise-level networking infrastructure, Enterasys positioned itself to cater to the growing demands of business networks during the dot-com boom.

One of the main features of Enterasys Networks was its focus on delivering secure, scalable networking solutions that could seamlessly integrate with existing enterprise systems. The company developed a range of products including switches, routers, and wireless solutions that were designed to optimize performance while ensuring security at every layer. Their core offerings provided businesses with the reliability required to handle increasing volumes of data traffic.

A standout technology of Enterasys was its identity and access management solutions. These technologies allowed organizations to control who could access network resources and under what conditions. This was particularly crucial in a time when cyber threats were on the rise, and businesses were becoming more aware of the need for strict network security protocols. The features included role-based access control and authentication measures, which were fundamental in safeguarding sensitive information.

Enterasys also introduced intelligent networking features, which enabled dynamic traffic management and prioritization. This technology helped organizations optimize their network performance by automatically adjusting to changing workload demands. Such capabilities were essential for businesses relying on bandwidth-intensive applications and services.

The company also embraced the rising trend of wireless networking, providing solutions that combined wired and wireless technologies for a unified experience. Enterasys Wireless LAN solutions were groundbreaking at the time, offering seamless connectivity and security to mobile devices, thereby enhancing productivity and flexibility within enterprise environments.

In addition to hardware, Enterasys developed network management software that simplified the administration of complex networks. This software enabled IT professionals to monitor performance, troubleshoot issues, and implement security policies efficiently.

Overall, Enterasys Networks in 2000 was characterized by its commitment to delivering secure, intelligent networking solutions that catered to the needs of modern enterprises. With its innovative technologies and features, Enterasys played a significant role in shaping the networking landscape, laying the groundwork for future advancements in network security and management.