U
SING
THE
L
OG
AND
E
VENT
M
ANAGERS
TO
M
ONITOR
THE
N
ETWORK
A-3
Let’s say that you want to set a variable called hubNMS in a third-party device.
To set a variable in a third party device:
1. Compile the third-party MIB into the EliteView MIB database. Refer to the section on “Adding a New MIB
Using the MIB Compiler” for more information. If you have completed this operation, then skip to the next
step.
2. Create a map that includes the third-party SNMP device (i.e., a device labeled as “SNMP node”) you wish to
monitor. You can use Discovery to find it; then simply drag and drop the corresponding SNMP node onto any
submap.
3. Double-click on the SNMP node (third-party device) to bring up the MIB Browser.
4. Locate t he required MIB variable, “hubNMS.”
5. Click the Set Request button.
6. An “Input Value” dialog box will appear on-screen, prompting you for the value you wish to set. Type in the IP
address of your EliteView network management station. Press <Enter> or click <OK> to confirm your choice,
or click <Cancel> to abort this operation.
7. View the result in the Status window.
Using the Log and Event Managers to Monito r the Network
The Log Manager and the Event Manager are two powerful ne twork monitoring modules. Regardless of whether
you are managing SMC or other third-party manageable systems, these two modules work in conjuction with each
other to allow flexible network management.
To use the Log Manager and Event Manager:
1. Fill in the table on the next page. It contains information you should know in order to use the Log Manager
and Event Manager effectively.
2. Bring up the Event Manager and add an event according to the Event Name and actions you have specified.
Refer to Chapter 8, “Managing Events” for more information.
3. Bring up the Log Manager and add a log request. Refer to Chapter 7, “Collecting Data with the Log Manager”
for more information on using the Log Manager and for setting filters and threshold formulas.
The Log Manager will continuously monitor the target SNMP device after you have set the log request.
Tip: Delete or pause unnecessary log requests to prevent wasting system resources (i.e., disk space, CPU time,
and network traffic). You can use the Log Manag er to back up or delete logged data frequently and save
precious disk space.