User manual
Table Of Contents
- NMS300 Network Management System Application
- Contents
- 1 Introduction
- 2 Get Started
- 3 Discover and Manage Resources
- Discovery concepts
- Use quick discovery to discover devices on your network
- Use a discovery profile to discover devices on your network
- View and manage the wired and wireless devices on your network
- View device information
- View wireless device information only
- Modify the name, location information, and contact information
- Remove device information
- Synchronize a network device
- Log in to a device
- Ping, perform a traceroute, or reboot a device
- Use the SNMP MIB browser
- View and export the Inventory table and Interface List table
- Manage device groups
- Search for the switch to which a host is connected
- 4 Monitor Devices and the Network
- Monitor the network
- Monitor the top 10 widgets for all devices
- Customize the top 10 page
- View the wireless summary and monitor the top 10 widgets for wireless devices
- View device details and interface details
- Monitor wireless clients and view client details
- Manage the configuration monitors
- Customize the optional network dashboard
- View and export audit logs
- View firmware version information
- View the NMS300 server information
- View application notifications
- 5 Manage Configurations and Firmware
- 6 Manage Alarms and Logs
- 7 Manage Maps and Topologies
- 8 Manage sFlow
- 9 Generate and View Reports
- 10 Manage Jobs
- 11 Manage Users and Security Profiles
- 12 Manage Global Settings and Backups
- 13 Manage Licenses
- 14 Register Devices
- A Technical Specifications
- B Device Details
- 1 Index
NMS300 Network Management System Application
Manage Alarms and Logs User Manual183
8. Click the Add button.
9. Enter the following threshold information:
• General Info:
- Alarm Name. Enter a name for the alarm.
- Description. Enter a description for the alarm.
- Parameter. Select a parameter
.
The parameters that are displayed in the menu
depend on the monitor that you select in
Step 6.
- Enable. Select whether to enable the threshold.
- Calculation Type. Select a consecutive or average calculation.
- Count. Select the number of times that a particular event must occur before the
threshold is met.
• Threshold Alarm Info:
- Upper/Lower. Select an upper or lower threshold.
- Threshold. Enter the threshold. If this threshold is exceeded, the application
triggers an alarm.
- Severity. Select whether the alarm is considered critical, major
, minor
, or
informational.
10. Click the Submit button.
The Add Threshold pop-up window for the selected monitor pop-up window closes and
the alarm configuration is added to the Threshold List table.
1
1. To add another alarm configuration, repeat Step 8 through Step 10.
Before you add a new alarm configuration to the Alarm Configuration table, you can still
modify or remove the alarm configuration.
12. To close the general Add Threshold pop-up window
, click the Close button.
All new alarm configurations are added to the Alarm Configuration table.