Port Utilization Alarm FSOS
|
|
- Adrian Milton Tucker
- 5 years ago
- Views:
Transcription
1 FSOS Port Utilization Alarm
2 Contents 1. Utilization Alarm Overview for Utilization Alarm Utilization Alarm Configuration Configure the Port Utilization Alarm Configure the CPU Utilization Alarm Configuration Example for Utilization Alarm Mail Alarm Overview for Mail Alarm Function Configure the Alarm Configuration Example for Mail Alarm System Log System Log Overview System Log Configuration...5
3 1. Utilization Alarm 1.1 Overview for Utilization Alarm The device utilization alarm function is used to monitor the bandwidth of the device, CPU resource consumption, and generate alarm notification in the event of congestion, so that the administrator can keep abreast of the network and equipment running. The port utilization alarm function can set two trigger alarm thresholds. The detailed description is as follows: exceed:when the port bandwidth utilization equals or exceeds the "exceed" value, a congestion alarm is triggered. normal: When the port bandwidth utilization falls below the "normal" value, the recovered alarm is triggered. CPU utilization alarm function can also set two trigger alarm thresholds, described in detail as follows: busy: When the CPU utilization equals or exceeds the "busy" value, an alarm is triggered, indicating that the CPU is busy. unbusy:when the CPU utilization is equal to or lower than the "unbusy" value, an alarm is triggered, indicating that the CPU is idle. The alarm information is output to Syslog by default. If you want to output to the terminal, you need to enable the command. 1.2 Utilization Alarm Configuration Configure the Port Utilization Alarm Configure the Port Utilization Alarm Enter global configure terminal mode Enable/disable [no] alarm all-packets alarms on all ports 1
4 Enter the port mode Enable/disable port alarm Configure threshold information View the alarm information interface ethernet port-num [no] alarm all-packets alarm all-packets threshold exceed value normal value show alarm all-packets interface [ ethernet port-num ] Configure the CPU Utilization Alarm Configure the CPU Utilization Alarm Enter mode Enable/disable CPU alarm Configure threshold information View the alarm information global configure terminal [no] alarm cpu alarm cpu threshold {[busy value] [unbusy value]} show alarm cpu Configuration Example for Utilization Alarm 1.Network requirements When the utilization of the port 0/2 is up to 50M, alarm information is sent. When the CPU utilization reaches 90%, alarm information is sent. 2.Configuration steps # Configure the port alarm function Switch(config)#alarm all-packets Switch(config)#interface ethernet 0/0/2 Switch(config-if-ethernet-0/0/2)#alarm all-packets Switch(config-if-ethernet-0/0/2)#alarm all-packets threshold exceed 50 normal 40 # Configure the cpu alarm Switch(config)#alarm cpu Switch(config)#alarm cpu threshold busy 90 unbusy 85 2
5 3.Result validation # Enable the serial output log Switch(config)# logging monitor 0 # When the CPU reaches the configured threshold, the following alarm information is printed 02:44:02: Switch: %OAM-5-CPU_BUSY: cpu is busy. Switch(config)#show alarm cpu CPU status alarm : enable CPU busy threshold(%) : 90 CPU unbusy threshold(%) : 85 CPU status : busy # When the cpu utilization returned to normal, print as follows: 02:47:05: Switch: %OAM-5-CPU_UNBUSY: cpu is not busy. Switch(config)#show alarm cpu CPU status alarm : enable CPU busy threshold(%) : 90 CPU unbusy threshold(%) : 85 CPU status : unbusy 1.3 Mail Alarm Overview for Mail Alarm Function The DUT sends the system log to the specified mailbox by mail Configure the Alarm Enter Configure Mail Alarm mode Enable/disable mail alarm Configure the global configure terminal [no] mailalarm [no] mailalarm server ip-address smtp server Configure smtp mailalarm smtp authentication username name passwd identity password Configure the mail [no] mailalarm sender sender@co.com 3
6 sender Configure the mail recipient Configure the mail cc Configure the alarm log level View the [no] mailalarm receiver [no] mailalarm ccaddr [no] mailalarm logging level value show mailalarm Port Utilization Alarm 1.Mailalarm is disabled by default 2 The default log level uses 0, and when configured to n, logs of level 0-n are sent to the specified by mailalarm Configuration Example for Mail Alarm 1. Network description Let the DUT send 0-3 level logs to receive@126.com.the sender is test/test and mailbox is test@126.com, mail server is Configuration steps # Configuration Switch(config)#mailalarm Switch(config)#mailalarm server Switch(config)#mailalarm smtp authentication username test passwd test Switch(config)#mailalarm sender test@126.com Switch(config)#mailalarm receiver receive@126.com Switch(config)#mailalarm ccaddr cc@126.com Switch(config)#mailalarm logging level 3 # View the information Switch(config)#show mailalarm mailalarm state : on smtp authentication : on smtp server address : mailalarm logging level : 3 sender address : test@126.com receiver address : receive@126.com ccaddr : cc@126.com 4
7 1.4 System Log System Log Overview Syslog is the system information center, to complete the unified processing and output of information. The other modules in the system will send the output information to Syslog. Syslog determines the output format of the information according to the of the user and outputs the information to the specified display device according to the information switching and filtering rules of each output direction configured by the user. With the Syslog information producer, which is each module of output information, you do not need to export information to the console, Telnet terminal, or log host (Syslog server). You only need to output the information to Syslog. By configuring the appropriate filtering rules, information consumers, which are console, Telnet terminal, history buffer, log host and SNMP agent, can choose whatever they want to receive the information they need and discard unwanted information System Log Configuration 1) Enable/disable Syslog Enable/disable Syslog Enter global configure terminal mode Enable/disable log [no] logging function View the information Show logging 5
8 The logging function is enabled by default and stored in the buffer. 2) Configure the Log Serial Number Configure the Log Serial Number Enable/disable [no] logging sequence-numbers the log serial number The logging function is enabled by default. 3) Configure the Timestamp Configure Syslog Timestamp Configure the logging timestamps { notime uptime datetime } timestamp type Recover the no logging timestamps default There is no separate timestamp switch. There are three timestamp types: notime: do not show the time; uptime: show the boot time; Datetime: show the date and time. The default is uptime. 4) Output to the Terminal In privileged mode, configure the log to output to the terminal switch. In global mode, you 6
9 can configure information display and filtering rules. By default, the device logs are not output to the terminal, but output to the buffer. There is a slight difference between the command for the serial terminal and the Telnet or ssh terminal. Output to the Terminal User end mode Enable/disable [no] terminal monitor output to the terminal Global configure terminal mode Enable/disable log [no] logging monitor { all monitor-num } display logging monitor { all monitor-num } { level-value none Configure the level-list { start-level to end-level value } } [ module filtering rules module-name ] View the filtering show logging filter monitor monitor-num rules Delete the filtering rule no logging monitor { all monitor-num } filter 1. Log output to the terminal: In the serial console, the default is terminal monitor; in other terminal console, the default is no terminal monitor; 2. Log information display: In the non-console terminal, only affect this landing of the current terminal, the other terminals, the next landing of the current terminal is invalid; 3.monitor-num is 0 for the console, and 1 to 5 for Telnet and ssh terminals. 4. Output log default rule: all modules, log level 0-5,7. Deleting the filtering rule restores the default rule. 5) Output to Buffer Output Syslog to Buffer Enter global configure terminal mode Enable/disable [no] logging buffered 7
10 output to buffer Configure the filtering rules View the filtering rules Delete the filtering rule View the log information in the buffer logging buffered { level-value none level-list { start-level to end-level value } } [ module module-name ] show logging filter buffered no logging buffered filter Show logging buffered [ level-value level-list { start-level to end-level value } ] [ module module-name ] The default is log output to buffer. The default rule is to output all modules and logs at the level 0-6. Deleting the filtering rule restores the default rule. 6) Output to Flash In global mode, you can configure Syslog to save to Flash, which is not saved in flash memory by default. Output Syslog to Flash Enter global configure terminal mode Enable/disable output [no] logging flash to flash Configure the filtering logging flash { level-value none level-list { start-level rules to end-level value } } [ module module-name ] View the filtering rules show logging filter flash Delete the filtering rule no logging flash filter Configure the save [no] logging flash interval value period Configure the log size [no] logg flash msg-number value to be saved each time Check the log Show logging flash [ level-value level-list { start-level to information in the flash end-level value } ] [ module module-name ] 8
11 1. When the log is output to flash, the default rule is to output all modules and the log level is 0-5. Deleting the filtering rule restores the default rules. 2. When the log output to flash, the default cycle is 30M. By default, 100 logs are saved at one time. 7) Output to External Server Configure the specified server address for log output, information output switch, filtering rule, and logging tool and source address in global mode. Output Syslog to External Server Enter global configure terminal mode 必先 Configure the log server [no] logging ip-address Enable/disable the log server [no] logging host { all ip-address } Configure the filtering rules Recover the default filtering rules Configure the logging tool name Configure the sip for log packet logging host { all ip-address } { level-value none level-list { start-level to end-level value } } [ module module-name ] no logging host { all ip-address } filter [no] logging facility { clock1 clock2 ftp kernel lineprinter localuse0 localuse1 localuse2 localuse3 localuse4 localuse5 localuse6 localuse6 localuse7 logalert logaudit mail networkknews ntp security1 security2 syslogd system userlevel uucp } [no] logging source { ip-address loopback-interface if-id } 1. The sip of log messages must be the interface of the device. The Layer 3 device uses the IP address of the corresponding interface of the log server by default. The Layer 2 device automatically uses the system IP and does not need to be configured. 2. The default logging tool name uses localuse7. 9
12 8) Output to the SNMP Agent Configure Syslog output to the SNMP agent in global mode. To send Syslog messages to SNMP Workstation in trap messages, you must also configure the Trap host address. Refer to the SNMP instructions. By default, logs are not output to the SNMP agent. Output Syslog to SNMP Agent Enable/disable log output to the snmp agent [no] logging snmp-agent Configure the logging snmp-agent { level-value none level-list filtering rules { start-level to end-level value } } [ module module-name ] View the filtering show logging filter snmp-agent rules Recover the default filtering rules no logging snmp-agent filter 1. Log output to the snmp agent, the default rule: output all modules, the log level is ) Debugging Function In the global mode, you can configure the debugging function to print the debugging information of the corresponding module. By default, debugging information of all modules is disabled. Configure the Debugging Function Enable/disable [no] debug { all module-name } debugging function View the information show debug 10
13 10) Syslog Configuration Example 1.Network requirements Output the logs of the stp module and the device module at levels 0-4 to the console terminal; turns on the serial number display; timestamp use datetime; the log is output to the flash memory; the log information of level 3 and 4 is output to buffer; output logs to external server: ; open arp debugging information. 2.Configuration steps # Enable the terminal output function Switch#terminal monitor Switch#configure terminal # Enable the logging function Switch(config)#logging # Enable the terminal display function Switch(config)#logging monitor all # Output the logs of the stp module and the device module at levels 0-4 to the console terminal Switch(config)#logging monitor all level-list 0 to 4 module stp device # Enable the serial number display Switch(config)#logging sequence-numbers # Configure the timestamp to use datetime Switch(config)#logging timestamps datetime # Enable log output to flash Switch(config)#logging flash # Configure the buffer log filtering rule Switch(config)#logging buffered level-list 3 4 # Configure the log server Switch(config)#logging # Enable the log server Switch(config)#logging host # Configure the facility 11
14 Switch(config)#logging facility ftp # Enable the debugging function of the arp module Switch(config)#debug ARP # View the information Switch(config)#show logging state: on; logging sequence-numbers: on; logging timestamps: datetime; logging language: english logging monitor: Console: state: on; display: off; 96 logged; 0 lost; 0 overflow. logging buffered: state: on; 249 logged; 0 lost; 0 overflow. logging flash: state: on; 37 logged; 0 lost; 0 overflow. logging loghost: logging facility: ftp;logging source: off : state: on; 23 logged; 0 lost; 0 overflow. logging SNMP Agent: state: off; 0 logged; 0 lost; 0 overflow. 12
Syslog Function Configuration
Syslog Function Configuration Page 1 of 11 Contents Contents... 2 Chapter 1 Syslog Function Configuration...3 1.1 Syslog Introduction...3 1.1 Syslog Function Configuration...3 1.1.1 Syslog Function Configuration
More informationConfiguring System Logs
CHAPTERS 1. Overview 2. 3. Configuration Example 4. Appendix: Default Parameters Overview This guide applies to: T1500G-10PS v2 or above, T1500G-8T v2 or above, T1500G-10MPS v2 or above, T1500-28PCT v3
More informationShutdown-Control FSOS. Shutdown-Control Configuration
FSOS Shutdown-Control Configuration Contents 1. Shutdown-Control...1 1.1 Overview... 1 1.1.1 Enable/disable Shutdown-Control... 1 1.1.2 Configure Recovery Mode...1 1.1.3 Manually Restore Shutdown Port...
More informationFSOS. Switch Management and Maintenance
FSOS Switch Management and Maintenance Contents Chapter 1 Configuration File Management... 3 1.1 Introduction to Configuration File... 3 1.2 Configuration File-Related Operations... 3 Chapter 2 BootROM
More informationConfiguring System Message Logging
58 CHAPTER This chapter describes how to configure system message logging on the Catalyst 4500 series switch. This chapter consists of these sections: About System Message Logging, page 58-1, page 58-2
More informationConfiguring System Message Logging
CHAPTER 31 This chapter describes how to configure system message logging on the Catalyst 3560 switch. Note For complete syntax and usage information for the commands used in this chapter, see the Cisco
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year
PASS4TEST \ http://www.pass4test.com We offer free update service for one year Exam : HP2-Z30 Title : Fast Track - Applying HP FlexNetwork Fundamentals Vendor : HP Version : DEMO Get Latest & Valid HP2-Z30
More informationNote that you can also use the password command but the secret command gives you a better encryption algorithm.
Router Device Security Lab Configuring Secure Passwords 1. Configure the enable secret and password enable password TRUSTME enable secret letmein Look at the configuration: show config terminal Note the
More informationTroubleshooting Tools. Tools for Gathering Information
Internetwork Expert s CCNP Bootcamp Troubleshooting Tools http:// Tools for Gathering Information Before implementing a fix, information must be gathered about a problem to eliminate as many variables
More informationConfiguring System Message Logs
Restrictions for, page 1 Information About, page 1 How to Configure System Message Logs, page 4 Monitoring and Maintaining System Message Logs, page 13 Configuration Examples for System Message Logs, page
More informationConfiguring System Message Logs
Finding Feature Information, on page 1 Restrictions for, on page 1 Information About, on page 2 How to Configure System Message Logs, on page 4 Monitoring and Maintaining System Message Logs, on page 12
More informationAttack Protection. FSOS Attack Protection Configuration
FSOS Attack Protection Configuration Contents 2. Attack Protection... 1 1.1 Anti-DDOS Attack Function... 1 1.1.1 Anti-TTL Attack... 1 1.1.2 Configure Anti-IP Fragment Attack...1 1.1.3 Configuration Example...
More informationExternal Alerting for Intrusion Events
The following topics describe how to configure external alerting for intrusion events: About, page 1 Configuring SNMP Alerting for Intrusion Events, page 2 Configuring Syslog Alerting for Intrusion Events,
More informationTable Of Contents. 1. Introduction... 1
User Manual Table of Content Table Of Contents 1. Introduction... 1 1.1 Brief Introduction to Web Interfaces... 1 1.2 How to Log In... 1 1.3 General Setting... 2 1.3.1 Date and Time Setting... 2 1.3.2
More informationConfiguring System Message Logs
Finding Feature Information, page 1 Restrictions for, page 1 Information About, page 2 How to Configure System Message Logs, page 5 Monitoring and Maintaining System Message Logs, page 13 Configuration
More informationInformation in this document is subject to change without notice. Reproduction of this document in any manner, without the written permission of the
Information in this document is subject to change without notice. Reproduction of this document in any manner, without the written permission of the D-Link Corporation, is strictly forbidden. Trademarks
More informationConfiguring System Message Logs
Information About, on page 1 How to Configure System Message Logs, on page 4 Monitoring and Maintaining System Message Logs, on page 12 Configuration Examples for System Message Logs, on page 12 Additional
More informationCisco.Actualtests v New Questions.by.Nev.32q.vce
Cisco.Actualtests.200-120.v2014-01-10.New Questions.by.Nev.32q.vce Number: 200-120 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Exam A QUESTION 1 1 Which three are
More informationViewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418
This chapter describes how to maintain the configuration and firmware, reboot or reset the security appliance, manage the security license and digital certificates, and configure other features to help
More informationBasic Port Configuration
Basic Port Configuration Page 1 of 8 Contents Contents...2 Chapter 1 Port Security... 3 1.1 Port Security Description...3 1.1 Port Security Configuration...4 1.2 Configuration example...5 Page 2 of 8 Chapter
More informationEtherWAN Managed Switch Firmware Release Notes Copyright 2018 EtherWAN Systems, Inc. RELEASE SUMMARY Version: Release Date: 2018/May/15
EtherWAN Managed Switch Firmware Release Notes Copyright 2018 EtherWAN Systems, Inc. RELEASE SUMMARY Version: 1.94.6.3 Release Date: 2018/May/15 EX89000 Series EX87000 Series EX83000 Series EX78162 Series
More informationSkills Assessment Student Training Exam
Skills Assessment Student Training Exam Topology Assessment Objectives Part 1: Initialize Devices (2 points, 5 minutes) Part 2: Configure Device Basic Settings (18 points, 20 minutes) Part 3: Configure
More informationTable of Contents 1 Information Center 1-1
Table of Contents 1 Information Center 1-1 Information Center Overview 1-1 Introduction to Information Center 1-1 System Information Format 1-4 Information Center Configuration 1-6 Introduction to the
More informationUser and System Administration
CHAPTER 2 This chapter provides information about performing user and system administration tasks and generating diagnostic information for obtaining technical assistance. The top-level Admin window displays
More informationNetwork Management Card. User Manual
User Manual 1 Contents Contents 2 Chapter 1 Overview 3 1.1 NMC package contents 4 1.2 NMC CD Resources 4 1.3 Features 4 1.4 NMC Applications 5 Chapter 2 NMC parameters setting via serial COM port 6 2.1
More informationConfiguring RMON. Understanding RMON CHAPTER
22 CHAPTER This chapter describes how to configure Remote Network Monitoring (RMON) on your switch. RMON is a standard monitoring specification that defines a set of statistics and functions that can be
More informationCLI COMMAND SUMMARY BY MODE
CLI COMMAND SUMMARY BY MODE DDoS Module Configuration Mode Commands 267 (config-ddos) disable-as 269 (config-ddos) dproxy 271 (config-ddos) enable 273 (config-ddos) global-domain 275 (config-ddos) max-database-entries
More information!! Last configuration change at 16:04:19 UTC Tue Feb by zdrillin! NVRAM config last updated at 21:07:18 UTC Thu Feb ! version 12.
Last configuration change at 16:04:19 UTC Tue Feb 15 2011 by zdrillin NVRAM config last updated at 21:07:18 UTC Thu Feb 10 2011 version 12.2 no service pad service timestamps debug datetime msec service
More informationExternal Alerting with Alert Responses
The following topics describe how to send external event alerts from the Firepower Management Center using alert responses: Firepower Management Center Alert Responses, page 1 Creating an SNMP Alert Response,
More informationOperation Manual System Management. Table of Contents
Table of Contents Table of Contents Chapter 1 File System Management... 1-1 1.1 File System Configuration... 1-1 1.1.1 File System Overview... 1-1 1.1.2 Directory... 1-1 1.1.3 File... 1-2 1.1.4 Storage
More informationConfiguring NTP. Information About NTP NTP. This chapter describes how to configure the Network Time Protocol (NTP) on Cisco MDS 9000 Series switches.
This chapter describes how to configure the Network Time Protocol (NTP) on Cisco MDS 9000 Series switches. Information About NTP Information About NTP, on page 1 Prerequisites for NTP, on page 2 Guidelines
More informationConfiguring VRF-lite CHAPTER
CHAPTER 36 Virtual Private Networks (VPNs) provide a secure way for customers to share bandwidth over an ISP backbone network. A VPN is a collection of sites sharing a common routing table. A customer
More informationThis document is intended to give guidance on how to read log entries from a Cisco PIX / ASA. The specific model in this case was a PIX 501.
1.0 Overview This document is intended to give guidance on how to read log entries from a Cisco PIX / ASA. The specific model in this case was a PIX 501. 2.0 PIX Config The following is the PIX config
More informationLogging. About Logging. This chapter describes how to log system messages and use them for troubleshooting.
This chapter describes how to log system messages and use them for troubleshooting. About, page 1 Guidelines for, page 7 Configure, page 8 Monitoring the Logs, page 26 History for, page 29 About System
More informationDGS-3000 Series Layer 2 Managed Gigabit Ethernet Switch Web UI Reference Guide
Information in this document is subject to change without notice. 2013 D-Link Corporation. All rights reserved. Reproduction of this document in any manner whatsoever without the written permission of
More informationHP 830 Series PoE+ Unified Wired-WLAN Switch Switching Engine
HP 830 Series PoE+ Unified Wired-WLAN Switch Switching Engine Network Management and Monitoring Configuration Guide Part number: 5998-3936 Software version: 3308P26 Document version: 6W101-20130628 Legal
More informationUser and System Administration
CHAPTER 5 This chapter provides information about performing user and system administration tasks in Cisco Prime Network Analysis Module 5.1and generating diagnostic information for obtaining technical
More informationxstack DES-3200 Series Layer 2 Managed Fast Ethernet Switch
Information in this document is subject to change without notice. 2014 D-Link Corporation. All rights reserved. Reproduction of this document in any manner whatsoever without the written permission of
More informationNetwork security session 9-2 Router Security. Network II
Network security session 9-2 Router Security Network II Router security First line of defense of the network Compromise of a router can lead to many issues: Denial of network services Degrading of network
More informationConfiguring Logging. Information About Logging CHAPTER
74 CHAPTER This chapter describes how to configure and manage logs for the ASA, and includes the following sections: Information About Logging, page 74-1 Licensing Requirements for Logging, page 74-5 Prerequisites
More informationConfiguration Commands. Generic Commands. description. shutdown SR OS System Management Guide Page 399. Event and Accounting Logs
Event and Accounting Logs Configuration Commands Generic Commands description description string no description config>log>filter config>log>filte>entry config>log>log-id config>log>accounting-policy config>log>file-id
More informationSNMP Commands CHAPTER
CHAPTER 7 This chapter contains the Cisco ONS 15540 ESP-specific SNMP commands. For the complete list of SNMP commands supported on the Cisco ONS 15540 ESP, and their descriptions, refer to Cisco IOS Configuration
More informationNumerics INDEX. 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC g 3-6, x authentication 4-13
INDEX Numerics 2.4-GHz WMIC, contrasted with 4.9-GHz WMIC 1-8 802.11g 3-6, 3-9 802.1x authentication 4-13 A AAA server group 4-25 aaa authentication login command 4-24 aaa authorization command 4-27 aaa
More informationAppendix A Remote Network Monitoring
Appendix A Remote Network Monitoring This appendix describes the remote monitoring features available on HP products: Viewing System Information You can access software and hardware specifics for an HP
More informationSKYWAY-XM SERIES PTP Microwave Radio System User Interface Guide
SKYWAY-XM SERIES PTP Microwave Radio System User Interface Guide April 2010 Rev 1.2 PN: 1563102 Contents 1. Introduction... 5 1.1 Overview... 5 1.2 Modes of User Interfaces... 5 1.3 Features Overview...
More informationAppendix A Command Index
Appendix A Command Index The command index includes all the commands in the Command Manual, which are arranged alphabetically. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A aaa nas-id profile 21-AAA
More informationSSG Configuration Example
APPENDIX A Example A-1 is a sample SSG configuration for the Cisco 10000 series router based on the topology in Figure A-1. The configuration includes AAA, PPP, SSG, and RADIUS. The SSG configuration enables
More informationManaging Broadband Access Center
CHAPTER 9 This chapter describes the various subcomponents within Cisco Broadband Access Center (BAC) that you can use to manage the system. These include: BAC Process Watchdog, page 9-1 Administrator
More informationDGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide. Figure 3-1 Device Information window
3. System DGS-1510 Series Gigabit Ethernet SmartPro Switch Web UI Reference Guide Device Information System Information Settings Peripheral Settings Port Configuration PoE (DGS-1510-28P Only) System Log
More informationRelease Note of RMCARD 202/203 Ver (Release Date: 06/09/2017):
Release Note of RMCARD 202/203 Ver. 2.29 (Release Date: 06/09/2017): Unexpected reboot when E-mail notification was executed via Office365 SMTP Server. Fixed the system not sending the login fail event
More informationXIPLED Software User s Manual. For Firmware release V3.5.0.*
XIPLED1080-36 Software User s Manual For Firmware release V3.5.0.* Product name: XIPLED1080-36 Release Date: 2014/10/02 Manual Revision: V02 Feature XIPLED1080-36 Live View All Series Camera/Video/Audio
More informationHP 5820X & 5800 Switch Series Network Management and Monitoring. Configuration Guide. Abstract
HP 5820X & 5800 Switch Series Network Management and Monitoring Configuration Guide Abstract This document describes the software features for the HP 5820X & 5800 Series products and guides you through
More informationAppendix A Command Index A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
The command index includes all the commands in the Comware Command Manual, which are arranged alphabetically. A B C D E F G H I J K L M N O P Q R S T U V W X Y Z A access-limit accounting accounting optional
More informationCisco Small Business SF200E Series Advanced Smart Switches
ADMINISTRATION GUIDE Cisco Small Business SF200E Series Advanced Smart Switches Contents Chapter 1: Getting Started 9 Starting the Web-Based Switch Configuration Utility 9 Launching the Utility 10 Logging
More informationISCOM 2126 Series Switch Command Notebook
ISCOM 2126 Series Switch Notebook Software Version ISCOMOS 1.2 Beijing Raisecom Science & Technology Co., Ltd CONTENTS CHAPTER 1. PREFACE... 1 1.1 AUDIENCE... 1 1.2 ABBREVIATION... 1 1.3 REFERENCE... 1
More informationPerformance Monitor Administrative Options
CHAPTER 12 Effective network management requires the fastest possible identification and resolution of events that occur on mission-critical systems. Performance Monitor administrative options enable you
More informationConfiguring the Cisco NAM 2220 Appliance
CHAPTER 5 This section describes how to configure the Cisco NAM 2220 appliance to establish network connectivity, configure IP parameters, and how to perform other required administrative tasks using the
More informationHP 5120 SI Switch Series
HP 5120 SI Switch Series Network Management and Monitoring Configuration Guide Part number: 5998-1813 Software version: Release 1505 Document version: 6W102-20121111 Legal and notice information Copyright
More informationSymbols INDEX > 12-14
INDEX Symbols > 12-14 A AAA accounting configuring 6-32 AAA-based management systems 2-25, 6-2 acceleration about 1-6, 12-1 features 1-6 TCP settings 12-17 accounts creating 7-3 creation process 7-2 deleting
More informationIntroduction to Change and Configuration Management
CHAPTER 1 Introduction to Change and Configuration Management Cisco Prime Network Change and Configuration Management provides tools that allow you to manage the software and device configuration changes
More informationAutoSecure. Finding Feature Information. Last Updated: January 18, 2012
AutoSecure Last Updated: January 18, 2012 The AutoSecure feature secures a router by using a single CLI command to disable common IP services that can be exploited for network attacks, enable IP services
More informationThree interface Router without NAT Cisco IOS Firewall Configuration
Three interface Router without NAT Cisco IOS Firewall Configuration Document ID: 13893 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations
More informationZyXEL ES-3124 V3.80(TP.3)C0 Release Note/Manual Supplement
ZyXEL ES-3124 V3.80(TP.3)C0 Release Note/Manual Supplement Date: June 17, 2011 This document describes the features in the ES-3124 product for its 3.80(TP.3)C0 release. Support Platforms: ZyXEL ES-3124
More informationNW Switch Configuration Guide DX2000. NEC Scalable Modular Server. 1. Introduction. 2. System Configuration. 3. Layer1 Configuration
NW Switch Configuration Guide NEC Scalable Modular Server DX2000 1. Introduction 2. System Configuration 3. Layer1 Configuration 4. Layer2 Configuration Second edition November 2017 NEC Corporation 2017
More informationSecurity Hardening Checklist for Cisco Routers/Switches in 10 Steps
Security Hardening Checklist for Cisco Routers/Switches in 10 Steps Network infrastructure devices (routers, switches, load balancers, firewalls etc) are among the assets of an enterprise that play an
More informationCisco WAAS Software Command Summary
2 CHAPTER This chapter summarizes the Cisco WAAS 4.0.7 software commands. lists the WAAS commands (alphabetically) and indicates the command mode for each command. The commands used to access modes are
More informationOverview of the Cisco NCS Command-Line Interface
CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,
More informationTable of Contents 1 Information Center Configuration Guide 1-1
Table of Contents 1 Information Center Configuration Guide 1-1 Outputting Log Information to a Unix Log Host 1-1 Network Diagram 1-1 Networking and Configuration Requirements 1-1 Applicable Product Matrix
More informationco Configuring PIX to Router Dynamic to Static IPSec with
co Configuring PIX to Router Dynamic to Static IPSec with Table of Contents Configuring PIX to Router Dynamic to Static IPSec with NAT...1 Introduction...1 Configure...1 Components Used...1 Network Diagram...1
More informationSystem Management Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9400 Switches)
System Management Configuration Guide, Cisco IOS XE Everest 16.6.x (Catalyst 9400 Switches) First Published: 2017-07-31 Last Modified: 2017-11-03 Americas Headquarters Cisco Systems, Inc. 170 West Tasman
More informationInformation about Network Security with ACLs
This chapter describes how to configure network security on the switch by using access control lists (ACLs), which in commands and tables are also referred to as access lists. Finding Feature Information,
More informationCounterACT Syslog Plugin
Version 3.2.0 Table of Contents About the Syslog Plugin... 3 Multiple Destination Syslog Server Support... 3 Receiving Event Messages... 3 Sending Syslog Messages... 4 Sending CounterACT Event Messages...
More informationINDEX. Cisco Unity Express CLI Administrator Guide for Cisco CallManage, Release Cisco Unity Express Release 1.1
INDEX A active calls backup 105 restore 107 administration CLI 28 differences 29 GU and CLI 39 GUI 27 administrative privileges 84 administrator Cisco CallManager 29 Cisco Unity Express 29 password 35
More informationOER uses the following default value if this command is not configured or if the no form of this command is entered: timer: 300
holddown holddown To configure the Optimized Edge Routing (OER) prefix route dampening timer to set the minimum period of time that a new exit must be used before an alternate exit can be selected, use
More informationConfiguring Embedded Event Manager
CHAPTER 34 Unless otherwise noted, the term switch refers to a standalone switch or a switch stack. For complete syntax and usage information for the commands used in this chapter, see the Catalyst 3750
More informationPN5212/PN5320/PN7212/PN7320
PN522/PN520/PN722/PN720 Power Over the NET Power Distribution Units ALTUSEN Power Over the NET products are Power Distribution Units that offer outlet level control combined with remote access to give
More informationSymbols INDEX. ? command 120
INDEX Symbols? command 120 A abbreviation command 12 Administration via Telephone 1137 administrative privilege 1137 application (ccn trigger http) command 13 AvT 1137 B backup category command 110 backup
More informationFS S5800-8TF12S Switch
FS S5800-8TF12S Switch Release Note Issue R1.1 Date 2018-08-14 Content 1 Introduction... 5 2 Version Information... 6 2.1 Basic Information...6 2.2 Release History... 6 2.3 Hardware Supported...8 2.4 Version
More informationUser s Guide. SNMPWEBCARD Firmware Version Revision 3
WARRANTY REGISTRATION: register online today for a chance to win a FREE Tripp Lite product www.tripplite.com/warranty User s Guide SNMPWEBCARD Firmware Version 12.06.0062 Revision 3 Table of Contents 1.
More informationConfiguring Port-Based Traffic Control
Overview of Port-Based Traffic Control, page 1 Finding Feature Information, page 2 Information About Storm Control, page 2 How to Configure Storm Control, page 4 Information About Protected Ports, page
More informationThis article explains how to configure NSRP-Lite for a NS50 firewall to a single WAN.
This article explains how to configure NSRP-Lite for a NS50 firewall to a single WAN. Requirements: When configuring NSRP-Lite for the NS-50, confirm the following necessary requirements: The NS-25 or
More informationOverview. About the Cisco Context-Aware Mobility Solution CHAPTER
1 CHAPTER This chapter describes the role of the Cisco 3300 series mobility services engine (MSE), a component of the Cisco Context-Aware Mobility (CAM) solution, within the overall Cisco Unified Wireless
More informationNetwork Management Card. User Manual
User Manual 1 Contents Contents 2 Chapter 1 Overview 3 1.1 NMC package contents 4 1.2 NMC CD Resources 4 1.3 Features 4 1.4 NMC Applications 5 Chapter 2 NMC parameters setting via serial COM port 6 2.1
More informationEthernet / TCP-IP - Training Suite Application level protocols
Ethernet / TCP-IP - Training Suite 05 - Application level protocols Application layer protocols 2 World Wide Web HTTP I want HTTP this resource. Hypertext Transfer Protocol (HTTP) Used by the World Wide
More informationConfiguring System Message Logging
CHAPTER 14 This chapter describes how to configure system message logging on the Cisco MDS 9020 Fabric Switch. It includes the following sections: About System Message Logging, page 14-1 System Message
More informationWLM1200-RMTS User s Guide
WLM1200-RMTS User s Guide Copyright 2011, Juniper Networks, Inc. 1 WLM1200-RMTS User Guide Contents WLM1200-RMTS Publication Suite........................................ 2 WLM1200-RMTS Hardware Description....................................
More informationINDEX. Symbols. Cisco Routers for the Desperate, 2nd Edition (C) 2009 by Michael W. Lucas
INDEX Symbols * (asterisk), 45, 78 : (colon), 69! (exclamation point), 14, 53 > (greater-than sign), 8. (period), 44, 53 (pipe symbol), 93 # (pound sign), 8, 14, 69? (question mark), 8 9 A abbreviations
More informationConfiguring Embedded Event Manager
CHAPTER 30 This chapter describes how to use the embedded manager (EEM) to monitor and manage the Cisco ME 3400 Ethernet Access switch and how to configure it. The switch must be running the metro IP access
More informationConfiguring System Message Logging
CHAPTER 1 This chapter describes how to configure system message logging on the Cisco 4700 Series Application Control Engine (ACE) appliance. Each ACE contains a number of log files that retain records
More informationFS Network TAP Series Configuration Guide
FS Network TAP Series Configuration Guide Table of Contents 1. Brief Introduction... 9 1.1 TAP Group introduction...9 1.1.2 Port mode... 10 1.1.3 Port with flow mode...10 1.2 FLOW types...11 1.3 Precondition...
More informationConfiguring Ethernet OAM, CFM, and E-LMI
CHAPTER 15 Ethernet Operations, Administration, and Maintenance (OAM) is a protocol for installing, monitoring, and troubleshooting Ethernet networks to increase management capability within the context
More informationConfiguration Tasks. Configuring the System Using CLI Commands. Configuring the System Using the GUI
Last Update: June 28, 2007 This chapter lists the tasks for configuring and maintaining Cisco Unity Express and contains the following sections: Configuring the System Using CLI Commands, page 21 Configuring
More informationConfiguring SNMP. Finding Feature Information. Prerequisites for SNMP
Finding Feature Information, on page 1 Prerequisites for SNMP, on page 1 Restrictions for SNMP, on page 3 Information About SNMP, on page 4 How to Configure SNMP, on page 9 Monitoring SNMP Status, on page
More informationConfiguring and Managing the IP Camera
CHAPTER 3 The Cisco Video Surveillance IP Camera provides configuration windows that you use to configure and manage the IP camera. This chapter explains how to access the configuration windows, describes
More information802.1x Configuration. FSOS 802.1X Configuration
FSOS 802.1X Configuration Contents 1.1 802.1x Overview... 1 1.1.1 802.1x Authentication...1 1.1.2 802.1x Authentication Process...3 1.2 802.1X Configuration... 6 1.2.1 Configure EAP...6 1.2.2 Enable 802.1x...
More informationOperation Manual Login and User Interface. Table of Contents
Table of Contents Table of Contents Chapter 1 Switch Login... 1-1 1.1 Setting Up Configuration Environment Through the Console Port... 1-1 1.2 Setting Up Configuration Environment Through Telnet... 1-2
More informationFibre Channel Slow Drain Device Detection and Congestion Avoidance- An Overview
Fibre Channel Slow Drain Device Detection and Congestion Avoidance- An Overview All data traffic between end devices in the SAN fabric is carried by Fibre Channel Class 3, and in some cases, Class 2 services,
More informationThe C2C can send a power-loss alarm to an SNMP manager. To enable this feature, do the following:
USATUSATCORP.COM Contact USATCORP.COM for more information or quantity pricing 1-888-550-8728! encor e n etworks TM C2C Power-Loss Alarm his document provides guidelines for setting a C2C or another BANDIT
More informationLogging in to the CLI
Contents Logging in to the CLI 1 Login methods 1 Logging in through the console port 2 Introduction 2 Configuration procedure 2 Logging in through the AUX port 5 Configuration prerequisites 5 Configuration
More informationConfiguring Port-Based Traffic Control
CHAPTER 18 This chapter describes how to configure port-based traffic control features on the Catalyst 3750 Metro switch. For complete syntax and usage information for the commands used in this chapter,
More information