Figure 2-41 Snmp - Hardware Key Code Request; Figure 2-42 Snmp - Cpu Ip Address Request - NEC Univerge SV8100 Features And Specifications Manual

Hide thumbs Also See for Univerge SV8100:
Table of Contents

Advertisement

Issue 13.0
UNIVERGE SV8100
Operation
Using the MIB File Example:
When the MIB file has been loaded into an SNMP application, it can send requests to the SV8100 and
the SV8100 will send a response back. The request is made up from information available in the MIB
file. Refer to
Figure 2-41 SNMP – Hardware Key Code Request
and
Figure 2-42 SNMP – CPU IP
Address Request
for two examples of how these requests and responses are processed in regards to
the hardware key code and the CPU IP address.
First, the SNMP user can make a request in the application to retrieve the hardware key code. This
request is received by the SV8100 and in turn sends back the hardware key code via SNMP.
Figure 2-41 SNMP – Hardware Key Code Request
Similarly, the SNMP user can make a request for the CPU IP address. This is received and sent back
via SNMP.
Figure 2-42 SNMP – CPU IP Address Request
Using SNMP Traps Example:
SNMP Traps can be used to provide notifications to an SNMP application when an SV8100 alarm has
been triggered on the SV8100. For an alarm to be trapped, it has be set to Major or Minor in Program
90-10-01. Usually the SNMP application has to be configured to watch for a particular trap to be
triggered.
2 - 1388
Simple Network Management Protocol (SNMP)

Advertisement

Table of Contents
loading

Table of Contents