Extreme Networks EPICenter Software Installation Manual page 140

Hide thumbs Also See for EPICenter:
Table of Contents

Advertisement

The EPICenter Alarm System
NOTE
Creating the rules that control trap (event) generation is only the first of the two steps required to create
EPICenter alarms for these events. Even though you have set up these rules, the trap events generated
as a result will be ignored by the Alarm System until you define alarms that take actions on those
events. See "Defining Alarms" on page 129 for more information.
To view the current threshold configuration rules, and to create new rules or modify existing rules, click
the Threshold Configuration tab at the top of the page. The Alarm System Configuration page is
displayed. Figure 56 shows the Alarm System Configuration page as it appears when displaying RMON
rules for a device.
Figure 56: The Threshold Configuration window showing RMON rules
The Configurations tree shows the existing RMON rule definitions as nodes in the tree, with the devices
to which they are applied shown as subnodes. The main panel shows the definition for the selected rule
on each target device.
CPU Utilization is a predefined node in the Configurations tree. Devices on which a CPU utilization
rule is configured are shown as subnodes of the CPU Utilization node. There can be only one CPU
utilization rule per device.
Click the small plus next to a rule node to display in the tree the devices associated with that rule.
To display the definition of a rule, click the rule node.
140
EPICenter Software Installation and User Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Epicenter 4.1

Table of Contents