HP Intelligent Management Center Extended API User Guide

Returned Result................................................................................................................266
Example.........................................................................................................................267
Add IP-to-MAC Address Binding.............................................................................................268
Interface URI...................................................................................................................268
Access Method................................................................................................................268
Returned Result................................................................................................................268
Example.........................................................................................................................269
Delete IP-to-MAC Address Binding..........................................................................................270
Interface URI...................................................................................................................270
Access Method................................................................................................................270
Returned Result................................................................................................................270
Example.........................................................................................................................270
Query Conflict and Unauthorized Access Policy........................................................................271
Interface URI...................................................................................................................271
Access Method................................................................................................................271
Returned Result................................................................................................................271
Example.........................................................................................................................272
Query Unknown Access Policy...............................................................................................273
Interface URI...................................................................................................................273
Access Method................................................................................................................273
Returned Result................................................................................................................273
Example.........................................................................................................................274
Modify Conflict and Unauthorized Access Policy.......................................................................275
Interface URI...................................................................................................................275
Access Method................................................................................................................275
Returned Result................................................................................................................275
Example.........................................................................................................................276
Modify Unknown Access Policy..............................................................................................277
Interface URI...................................................................................................................277
Access Method................................................................................................................277
Returned Result................................................................................................................278
Example.........................................................................................................................278
8 Network Alarm Management...................................................................279
Query Alarms......................................................................................................................280
Interface URI...................................................................................................................280
Access Method................................................................................................................280
Returned Result................................................................................................................281
Example.........................................................................................................................282
Query Alarm Information.......................................................................................................283
Interface URI...................................................................................................................283
Access Method................................................................................................................283
Returned Result................................................................................................................283
Example.........................................................................................................................286
Query Root Alarm Information................................................................................................287
Interface URI...................................................................................................................287
Access Method................................................................................................................287
Returned Result................................................................................................................287
Example.........................................................................................................................288
Query Child Alarms..............................................................................................................289
Interface URI...................................................................................................................289
Access Method................................................................................................................289
Returned Result................................................................................................................289
Example.........................................................................................................................290
Query Top N Alarming Devices..............................................................................................291
14 Contents