Alarm Configuration

NOTES

In order for the trap selection to work properly, your SmartSwitch 2000 must be configured to send traps to your network management station. This is accomplished via Local Management and the Trap Table; consult your device hardware manual for more information. If you are monitoring a variable you consider to be critical, we do not recommend that you select Trap as the only event response; if a trap is lost due to a collision or other transmission problem, it will not be re-sent.

5.Any value you enter in the Community field will be included in any trap messages issued by your SmartSwitch 2000 in response to the alarm(s) you are configuring; this value is also used to direct traps related to this alarm to the appropriate management workstation(s):

a.If you enter a value in this field, traps related to the associated alarms will only be sent to the network management stations in the device’s trap table which have been assigned the same community name (and for which traps have been enabled). Any IP addresses in the device’s trap table which have not been assigned the same community string, or which have been assigned no community string, will not receive traps related to the alarm(s) you are configuring.

b.If you leave this field blank, traps related to the associated alarms will be sent to any network management stations which have been added to the device’s trap table, and for which traps have been enabled — regardless of whether or not those IP addresses have been assigned a community name in the Trap Table.

6.Click in the Rising Threshold field; enter the high threshold value for this alarm. Compared values are always relative, or delta values (the difference between the value counted at the end of the current interval and the value counted at the end of the previous interval); be sure to set your thresholds accordingly.

When configuring a Kilobits alarm, NetSight Element Manager converts octets into kilobits (units of 125 bytes, or octets) for you; for example, to set a rising threshold of 1250 octets, enter a threshold value of 10.

7.In the Rising Action field, click to select the action you want your device to take in response to a rising alarm: Enable Port, Disable Port, or None. Note that this action enables and disables only bridging at the specified port, and not the interface itself.

For more information on how actions are triggered, see How Rising and Falling Thresholds Work, on page 3-27.

8.Click in the Falling Threshold field; enter the low threshold value for this alarm. Remember, compared values are always relative, or delta values (the difference between the value counted at the end of the current interval and the value counted at the end of the previous interval); be sure to set your thresholds accordingly.

Basic Alarm Configuration

3-7

Page 99
Image 99
Enterasys Networks 2000 manual Alarm Configuration

2000 specifications

Enterasys Networks, a key player in the networking space in 2000, was renowned for its innovative solutions that combined high-performance networking with robust security features. Founded with the vision of providing enterprise-level networking infrastructure, Enterasys positioned itself to cater to the growing demands of business networks during the dot-com boom.

One of the main features of Enterasys Networks was its focus on delivering secure, scalable networking solutions that could seamlessly integrate with existing enterprise systems. The company developed a range of products including switches, routers, and wireless solutions that were designed to optimize performance while ensuring security at every layer. Their core offerings provided businesses with the reliability required to handle increasing volumes of data traffic.

A standout technology of Enterasys was its identity and access management solutions. These technologies allowed organizations to control who could access network resources and under what conditions. This was particularly crucial in a time when cyber threats were on the rise, and businesses were becoming more aware of the need for strict network security protocols. The features included role-based access control and authentication measures, which were fundamental in safeguarding sensitive information.

Enterasys also introduced intelligent networking features, which enabled dynamic traffic management and prioritization. This technology helped organizations optimize their network performance by automatically adjusting to changing workload demands. Such capabilities were essential for businesses relying on bandwidth-intensive applications and services.

The company also embraced the rising trend of wireless networking, providing solutions that combined wired and wireless technologies for a unified experience. Enterasys Wireless LAN solutions were groundbreaking at the time, offering seamless connectivity and security to mobile devices, thereby enhancing productivity and flexibility within enterprise environments.

In addition to hardware, Enterasys developed network management software that simplified the administration of complex networks. This software enabled IT professionals to monitor performance, troubleshoot issues, and implement security policies efficiently.

Overall, Enterasys Networks in 2000 was characterized by its commitment to delivering secure, intelligent networking solutions that catered to the needs of modern enterprises. With its innovative technologies and features, Enterasys played a significant role in shaping the networking landscape, laying the groundwork for future advancements in network security and management.