Brocade Communications Systems Brocade 8/12c User Manual page 935

Brocade network advisor san user manual v11.1x (53-1002167-01, may 2011)
Hide thumbs Also See for Brocade 8/12c:
Table of Contents

Advertisement

5. Select the Pseudo Events event type from the Show list.
6. Select the pseudo event you created in
7.
8. Click Next to advance to the Policy pane of the Add Event Action dialog box.
9. Click the Act on all occurrences button if you want the action to be triggered each time the
10. Click Next to advance to the Action Group-Actions pane of the Edit Event Action dialog box.
11. Select the Deploy CLI Configuration check box and click the Configure button if you want to
12. You can either select an existing CLI configuration or create a new one and select that
13. Select the Deploy Product Configuration check box if you want to deploy a payload from the
Brocade Network Advisor SAN User Manual
53-1002167-01
The available pseudo events display.
The Sources pane of the Add Event Action dialog box displays.
Select the source that you will use to monitor this event from the Selected Sources list.
The Policy pane of the Add Event Action dialog box displays.
selected events occur.
The Action Group-Actions pane of the Edit Event Action dialog box displays.
deploy a configuration from CLI Configuration Manager to products if the policy criteria have
been met.
NOTE
If the CLI configuration you chose from CLI Configuration Manager contains a non-Brocade as a
target, the configuration will not be deployed to the non-Brocade product.
configuration. After selecting a CLI configuration, the name of the CLI configuration is
displayed in the Selected Configuration field.
Has Parameters - Displays Yes if the CLI configuration has parameters that require values
to be entered before it can be deployed, and displays No if no parameter needs to be
defined.
The Parameters list lists the parameters that need to be defined in the configuration.
The Parameter column displays the parameter and its variables in the CLI
configuration.
The Source column lists the appropriate SNMP attributes for the parameters. Each
attribute contains a specific parameter value, such as an IP address. Select the
attribute you want from the list.
The Transformation column uses the product IP addresses and MAC addresses listed
in the Address Finder. If the Address Finder list is empty, the product or port will not be
found. From this column, specify what you want Event Processor to do with the value
in the attribute:
Find Device: Find the product with the IP address in the attribute and deploy the CLI
configuration to that product.
Find Port: Find the port on a product with the IP address in the attribute and deploy
the CLI configuration to that port.
Find Intruder MAC: Find the product with the IP address in the attribute that matches
the intruder MAC address and deploy the CLI configuration to that product.
None: The Event Processor only reports occurrence of the products.
Configuration dialog box to the products if the policy criteria have been met.
step 1
through
step
10, and click Next.
30
Pseudo events
891

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network advisor 11.1.xBrocade bladesystem 4/24

Table of Contents