2

Chapter 1 Introducing.......................................................... 3

Introducing......................................................................................................................................................3
SNMP...................................................................................................................................................................3
Trademarks.......................................................................................................................................................3
Operating Environment...........................................................................................................................4

Chapter 2 Set up.................................................................... 5

PJ Network Manager installation........................................................................................................6
PJ Network Manager un-installation................................................................................................6

Chapter 3 Basic Operation...................................................7

Launching and quitting PJ Network Manager...........................................................................8
Name of status window...........................................................................................................................8
Quitting PJ Network Manager..............................................................................................................9
Menu tree.........................................................................................................................................................9
What's Target..................................................................................................................................................9
Name of the button on the tool bar.............................................................................................10
Icon display for the target....................................................................................................................10
Addition of the target............................................................................................................................11
Editing the target......................................................................................................................................11
Deletion of the target.............................................................................................................................11
Setting up the warning value...........................................................................................................12
Starting target monitoring..................................................................................................................12
When happens the alert on the target.......................................................................................13
When happens the trap event on the target..........................................................................13
What's Trap....................................................................................................................................................13
Stopping monitoring the target......................................................................................................14
Displaying all the status information of the target..............................................................14
Setting the target group......................................................................................................................14
Setting up the password of Telnet.................................................................................................15
Setting commands batch processing for multiple targets.............................................15
Setting timer for targets........................................................................................................................16
Setting up default setting....................................................................................................................17
Customizing the status list..................................................................................................................19
Viewing the alert information...........................................................................................................22
Viewing the event log............................................................................................................................23
Description of Event, Type, Warning column, Warning value ......................................24
About event treatment.........................................................................................................................26
Viewing the command history.........................................................................................................27
Storing the management file............................................................................................................28
Information saved to the registry ..................................................................................................28
Registering the target information from the defined file at once..............................29
Format of the defined file....................................................................................................................30
Example of the defined file.................................................................................................................30
Login to the target equipment........................................................................................................31
Contents