White Papers
3 Monitoring Dell Force10 Ethernet Switches Using Dell SupportAssist | Version 1.1 | February 2014
Table of contents
Introduction ........................................................................................................................................................................................... 4
1
Discovery and inventory ............................................................................................................................................................... 5
1.1
Prerequisites ......................................................................................................................................................................... 5
1.2
Discovery range configuration ......................................................................................................................................... 5
2
Discovering Force10 Ethernet switches ................................................................................................................................... 8
2.1
Setting up SNMP on the switch for successful discovery ....................................................................................... 10
2.2
Setting the trap destination on the Switch ................................................................................................................. 10
3
Configuring SupportAssist .......................................................................................................................................................... 11
3.1
Default Credentials ........................................................................................................................................................... 11
3.2
Custom Credentials .......................................................................................................................................................... 12
4
Alerts in OpenManage Essentials ..............................................................................................................................................14
4.1
Alert threshold ....................................................................................................................................................................14
5
Case creation and execution of the collection tool ............................................................................................................. 17
6
Configuring periodic collection ............................................................................................................................................... 18
7
Sending system logs manually (collection on demand) ......................................................................................................19
7.1
Troubleshooting Send System Logs failure .................................................................................................................19
Conclusion ........................................................................................................................................................................................... 20