User manual
Table Of Contents
- NMS300 Network Management System Application
- Contents
- 1 Introduction
- 2 Get Started
- 3 Discover and Manage Resources
- Discovery concepts
- Use quick discovery to discover devices on your network
- Use a discovery profile to discover devices on your network
- View and manage the wired and wireless devices on your network
- View device information
- View wireless device information only
- Modify the name, location information, and contact information
- Remove device information
- Synchronize a network device
- Log in to a device
- Ping, perform a traceroute, or reboot a device
- Use the SNMP MIB browser
- View and export the Inventory table and Interface List table
- Manage device groups
- Search for the switch to which a host is connected
- 4 Monitor Devices and the Network
- Monitor the network
- Monitor the top 10 widgets for all devices
- Customize the top 10 page
- View the wireless summary and monitor the top 10 widgets for wireless devices
- View device details and interface details
- Monitor wireless clients and view client details
- Manage the configuration monitors
- Customize the optional network dashboard
- View and export audit logs
- View firmware version information
- View the NMS300 server information
- View application notifications
- 5 Manage Configurations and Firmware
- 6 Manage Alarms and Logs
- 7 Manage Maps and Topologies
- 8 Manage sFlow
- 9 Generate and View Reports
- 10 Manage Jobs
- 11 Manage Users and Security Profiles
- 12 Manage Global Settings and Backups
- 13 Manage Licenses
- 14 Register Devices
- A Technical Specifications
- B Device Details
- 1 Index
NMS300 Network Management System Application
Manage Alarms and Logs User Manual185
8. Click the Edit button.
9. Modify the following threshold information as needed:
• General Info:
- Alarm Name. Modify the name for the alarm.
- Description. Modify the description for the alarm.
- Parameter.
Y
ou cannot modify the parameter.
- Enable. Select whether to enable the threshold.
- Calculation Type.
Y
ou cannot modify the type of calculation.
- Count. Select the number of times that a particular event must occur before the
threshold is met.
• Threshold Alarm Info:
- Upper/Lower.
Y
ou cannot modify the type of threshold.
- Threshold. Modify the threshold. If this threshold is exceeded, the application
triggers an alarm.
- Severity. Select whether the alarm is considered critical, major
, minor
, or
informational.
10. Click the Submit button.
The modified alarm configuration displays in the Alarm Configuration table.
View and manage alarm notification profiles
An alarm notification profile specifies criteria that enable the application to generate and send
a notification email message if an alarm occurs. By default, the application does not include
any alarm notification profiles.
Before the application can generate email and SMS messages, you must provide email
server settings and SMS server settings. For more information, see
Configure the email
server for alerts and alarm notifications on page 26 and Configure the SMS server for alerts
and alarm notifications on page 30.