|
|
This appendix provides reference information for the following IPM windows:
The Add Collector window (Figure A-1) allows you to create a new collector. Creating a collector includes selecting a source router, selecting a target, selecting an operation, defining a start date and time, and specifying the duration for data collection. To display the Add Collector window, select Edit > Add from the IPM Main window.
The Add Collector window is composed of the following sections:
The buttons in the Add Operation window provide the following functions:
| Button | Description |
|---|---|
Apply | Implements the changes and close the window. |
Close | Closes the window without implementing any of the changes. |
Help | Displays information about the window. |
From the Select a Source section (Figure A-2) of the Add Collector window, you select the router to use as the source for the collector that you are defining. You can select the source router from a list of available source routers or you can type part or all of the source router name to quickly scroll to the source router name.
The Select a Source section of the Add Collector window contains the following fields:
| Field | Description |
|---|---|
Search | Allows you to specify the name or part of the name of a source router or group of source routers. The list of routers displayed in the Source Routers field scrolls to match the criteria that you specified. |
Source Routers | Displays a list of configured source routers. Click on a router to select it as the source router for the collector that you are defining. |
From the Select Targets section (Figure A-3) of the Add Collector window, you select one or more devices to use as targets for the collector that you are defining. You can select targets from a list of available targets or you can type part or all of the target name to quickly scroll to the target name.
The Select Targets section of the Add Collector window contains the following fields:
| Field | Description |
|---|---|
Search | Allows you to specify the name or part of the name of a target or group of targets. The list of targets displayed in the Targets field scrolls to match the criteria that you specified. |
Target | Displays a list of configured targets. Click on a target to select it as the target for the collector that you are defining. |
Type | The protocol type used with this target. The following values are possible: ICMP_ECHO---IP/ICMP Echo. Requires a destination IP address or host name. SNA_ECHO_LU0---SNA LU Type 0 connection to Cisco's NSPECHO host application. Requires the host name defined for the SNA PU connection to VTAM. SNA_ECHO_LU2---SNA LU Type 2 connection to Cisco's NSPECHO host application. Requires the host name defined for the SNA PU connection to VTAM. SSCP_ECHO---SNA SSCP-LU Native Echo. Requires the host name defined for the SNA PU connection to VTAM. |
From the Select an Operation section (Figure A-4) of the Add Collector window, you select the defined operation and type for the collector that you are defining. You can select the operation and type from a list of available operations and their corresponding types or you can type part or all of the operation name to quickly scroll to the operation name.
The Select an Operation section of the Add Collector window contains the following fields:
| Field | Description |
|---|---|
Search | Allows you to specify the name or part of the name of an operation or group of operations. The list of operations displayed in the Operation field scrolls to match the criteria that you specified. |
Operation | Displays a list of operations. Click on an operation to select it as the operation for the collector that you are defining. |
Type | Indicates whether the selected operation is defined to collect statistics (Statistical) or to monitor data without collecting statistics (Monitored). |
From the Schedule section (Figure A-5) of the Add Collector window, you specify the start time and duration for the collector that you are defining. Instead of specifying a start time and duration, you can use the OnDemand option to delay setting those options until you start the collector.
The Schedule section of the Add Collector window contains the following fields:
| Field | Description |
|---|---|
OnDemand | Configures the collector without a specific start time or duration. This field allows you to start the collector at a later time by selecting it from the IPM Main window and then selecting Edit > Start/Restart to start the collector. |
Start Time | Defines the date and time at which the collector starts collecting data. The following options are available: Now---Starts the collector immediately after it is configured. Date & Time---Starts the collector at the date and time that you specify. |
Duration | Define the length of time that the collector will run. The following options are available: Forever---Starts the collector and allows it to run continuously until you stop it by selecting Edit > Stop from the IPM Main menu. Day(s)/Hour(s)/Min(s)---Stops the collector after the specified length of time has elapsed. |
The Collector Name field allows you to specify a name for the collector that you are defining.
The Add Operation window (Figure A-6) allows you to configure a new operation. To display the Add Operation window, select Edit > Add from the Operation window.
The Add Operation window is composed of the following sections:
The Protocol tab (Figure A-6) of the Add Operation window allows you to specify an operation name and description and to set the sampling interval, type, protocol, request size, and response size of the operation. It also provides an option for enabling data verification. The Protocol tab is automatically displayed when you access the Add Operation window.
The Protocol tab of the Add Operation window contains the following fields:
| Field | Description |
|---|---|
Name | Symbolic name (up to 32 characters) that to assign to the operation. This name appears in the Operation field on lists and in drop-down boxes. Do not include special characters such as \Q ! @ # $ % ^ * ' '' & |. |
Description | Description (up to 255 characters) of the operation. Do not include special characters such as \Q ! @ # $ % ^ * ' '' & |. |
Sample Interval | Interval, in seconds, that data is collected at the router. Information is accumulated and stored in the database by the network management system every hour. Valid values are 10 to 3600 (1 hour). The default is 60 seconds. For normal operation, do not set the interval value to less than 60 seconds. An interval of less than 60 seconds may slow down the network performance. Intervals of less than 60 seconds should only be used for short periods of time. |
Type | Collector type: Echo---Performs end-to-end IPM operations. PathEcho---Performs IPM operations using a route discovery algorithm to find a path to the target and each device in the path. (PathEcho is available only for the IP protocol.) |
Protocol | Protocol used by the collector: IP Echo---IP/ICMP Echo that requires a destination IP address or host name. SNA SSCP Echo---SNA's SSCP Native Echo. Requires the host name defined for the PU connection to VTAM. SNA Echo LU0---SNA LU type 0 connection to Cisco's NSPECHO host application. Requires the host name defined for the PU connection to VTAM. SNA Echo LU2---SNA LU type 2 connection to Cisco's NSPECHO host application. Requires the host name defined for the PU connection to VTAM. |
Request Size | Size, in bytes, of the protocol data in the payload of the collector's request packet. Valid values are 1 to 16384. The default is 1 byte. This option is valid only for LU0 and LU2 protocols. |
Response Size | Size, in bytes, of the protocol data in the payload in the collector's response packet. Valid values are 1 to 16384. For SNA LU0 and LU2 protocols the default is 1 byte. For all others, the default is the same value as the request size. This option is valid only for LU0 and LU2 protocols. |
Verify Data | Indicates whether the echo response will be examined for unexpected data. If the response contains unexpected data, then the Verify Data counter is incremented. This option is valid on for SNA protocols. |
The buttons in the Add Operation window provide the following functions:
| Button | Description |
|---|---|
OK | Implements the changes and close the window. |
Cancel | Closes the window without implementing any of the changes. |
Help | Displays information about the window. |
From the Statistics tab (Figure A-7) of the Add Operation window, you enable the collection of statistics and specify the number of paths and hops. The Protocol tab is automatically displayed when you access the Add Operation window. To access the Statistics tab, click Statistics in the tab bar.
The Statistics tab of the Add Operation window contains the following fields:
| Field | Description |
|---|---|
Collect Statistics? | Enable the Collect Statistics option to collect statistics on an hourly basis from the source router. The statistics are stored in the IPM database and are used for trend analysis. If the Collect Statistics option is not enabled, IPM runs in monitor mode only. In monitor mode, you view response time data in real time or set thresholds for notification of violations as they occur. Data is not saved in the IPM database when the collector is running in monitor mode. |
Max Number of Paths | If the Collect Statistics option is enabled, you specify the number of paths for which to collect statistics. To ensure that you do not miss collecting statistics for relevant paths, set this value to a number slightly higher than the expected number of paths. The default value is 5. |
Max Number of Hops | If the Collect Statistics option is enabled, you specify the number of hops for which to collect statistics. To ensure that you do not miss collecting statistics for relevant hops, set this value to a number slightly higher than the expected number of hops. The default value is 15. |
The buttons in the Add Operation window provide the following functions:
| Button | Description |
|---|---|
OK | Implements the changes and close the window. |
Cancel | Closes the window without implementing any of the changes. |
Help | Displays information about the window. |
From the Threshold tab (Figure A-8) of the Add Operation window, you define thresholds and event notification at the source router. The Protocol tab is automatically displayed when you access the Add Operation window. To access the Threshold tab, click Threshold in the tab bar.
The Threshold tab of the Add Operation window contains the following fields:
| Field | Description |
|---|---|
Threshold Type | Algorithm to be used by the IPM to calculate rising and falling threshold violations. The following values are possible: Never---Do not calculate threshold violations. This is the default. Immediate---When the response time exceeds the rising threshold or drops below the falling threshold, immediately perform the action defined by Event Type. Consecutive---When the response time exceeds the rising threshold consecutively Count1 times or drops below the falling threshold consecutively Count1 times, perform the action defined by Event Type. Optionally, you can specify the number of consecutive occurrences. The default is 5. X of Y---When the response time exceeds the rising threshold Count1 out of the last Count2 times or drops below the falling threshold Count1 out of the last Count2 times, perform the action defined by Event Type. Optionally, specify the number of violations that must occur within a specified number. Valid values for both the x-value (Count1) and y-value (count2) are 1 through 16. The default is 5 for both values. Average---When the average of the last Count1 response times exceeds the rising threshold or when the average of the last Count1 response times drops below the falling threshold, perform the action defined by Event Type. Optionally, specify the number of operations to average. The default is the average of the last 5 response-time operations. For example, if the collector's threshold is 5000 ms and the results of the collector's last 3 attempts are 6000, 6000, and 5000 ms, the average would be 6000 + 6000 + 5000 = 17000/3 > 5000. The average of these values violates the 5000-ms threshold. |
Rising | If the Set Threshold option is enabled, specify a rising threshold (standard RMON-type hysteresis mechanism), in milliseconds. Valid values are between 1 and 2147483647. The default is 5000 ms. When the actual response time exceeds the rising threshold, the collector uses the algorithm specified in Threshold Type to calculate whether a threshold violation has occurred. If a violation occurs, the action defined in the Event Type field is taken. |
Falling | If the Set Threshold option is enabled, specify a falling threshold (standard RMON-type hysteresis mechanism), in milliseconds. Valid values are between 0 and 2147483647. The default value is 3000 ms. When the actual response time falls below the falling threshold, the collector uses the algorithm specified in Threshold Type to calculate whether a threshold violation has occurred. If a violation occurs, the action defined in the Event Type field is taken. |
Count1 | Value to be used in calculating the threshold type. This field is used for threshold types of Consecutive, X of Y, and Average. Valid values are 1 to 16. The default is 5. |
Count2 | Value to be used in calculating the X of Y threshold type. Valid values are 1 to 16. The default is 5. |
Response Timeout | Amount of time, in milliseconds, that the collector waits for a response to its echo operation. When a timeout occurs, the Timeout counter is incremented. The timeout value must be less than the specified interval. Valid values are between 0 and 60480000. The default value is 4000 ms. |
Timeout | Indicates whether to enable checking for response-time reporting operation timeouts based on the timeout value configured for the collector. If you select TimeOut, the action defined in the Event Type field is taken when a timeout occurs or is cleared on this collector. |
Connection Lost | Indicates whether to enable checking for IPM connection loss in connection-oriented protocols. If you select Disconnect, the action specified in the Event Type field is taken when a loss of connection or a reconnection after a loss occurs on this collector. |
Event Type | Action or combination of actions that the collector performs when you select Disconnect or TimeOut or when a threshold is violated. For the action type to occur for threshold events, the threshold type must be defined to anything other than Never. The following actions are possible: Trap---Send an SNMP trap. Send a trap when a rising threshold is violated, a timeout occurs, or a connection loss occurs. Send a second trap when falling threshold clears, reconnection occurs, or is no longer timing out. Alert---Send an SNA NMVT Alert on a rising threshold violation and an SNA NMVT Resolution on a falling threshold violation. Trap & Alert---Send both a trap and NMVT. None---No action is taken. |
The buttons in the Add Operation window provide the following functions:
| Button | Description |
|---|---|
OK | Implements the changes and close the window. |
Cancel | Closes the window without implementing any of the changes. |
Help | Displays information about the window. |
The Add Source Router window (Figure A-9) allows you to configure a new source router. To display the Add Source Router window, select Edit > Add from the Source Router window.
The Add Source Router window contains the following fields:
| Field | Description |
|---|---|
Source Router | Enter the IP address or host name of the router on which the source resides. The host name can be from 1 to 64 characters. |
Read Community | Enter the community name (or password) for read access to the information maintained by the SNMP agent. This value can be from 1 to 32 characters. The default value is public. |
Write Community | Enter the community name (or password) for write access to the information maintained by the SNMP agent. This value can be from 1 to 32 characters. |
The buttons in the Add Source Router window provide the following functions:
| Button | Description |
|---|---|
OK | Implements the changes and close the window. |
Cancel | Closes the window without implementing any of the changes. |
Help | Displays information about the window. |
The Add Target window (Figure A-10) allows you to configure a device as a new target. To display the Add Target window, select Edit > Add from the Target window.
The Add Target window contains the following fields:
| Field | Description |
|---|---|
Target Type | The protocol type to be used with this target. Select from the following list: IP---IP/ICMP Echo. Requires a destination IP address or host name. SNA LU0---SNA LU Type 0 connection to Cisco's NSPECHO host application. Requires the host name defined for the SNA PU connection to VTAM. SNA LU2---SNA LU Type 2 connection to Cisco's NSPECHO host application. Requires the host name defined for the SNA PU connection to VTAM. SNA SSCP---SNA SSCP-LU Native Echo. Requires the host name defined for the SNA PU connection to VTAM. |
IP Address or Host Name | For IP, enter the IP address or host name of the target device. This is the name that appears in the Target field when you define a collector. |
VTAM PU Name | For SNA Echo LU0 or SNA SSCP Echo, enter the SNA host name of the target device. This is the name that appears in the Target field when you define a collector. |
SNA Log Mode Name | Eight-character SNA logon mode name used to access the SNA echo host application. If you omit the Mode value, default session parameters are used when in session with the host application. The Mode field is for SNA Echo LU0 and LU2 only. The default value for SNA Echo LU0 is INTERACT. The default value for SNA Echo LU2 is D4A32782. The SNA host uses this name to find the logon mode table entry that defines session parameters. If you omit this name, the SNMP agent sends a name of all blanks to the SNA host, which then uses a set of default session parameters for the echo session. |
The buttons in the Add Target window provide the following functions:
| Button | Description |
|---|---|
OK | Implements the changes and close the window. |
Cancel | Closes the window without implementing any of the changes. |
Help | Displays information about the window. |
The Collector Properties window (Figure A-11) allows you to view the properties of a collector. To display the Collector Properties window, select View > Collector Properties in the IPM Main window.
The Collector Properties window contains the following fields:
| Field | Description |
|---|---|
Collector | Displays the name of the collector. By default the name of the collector is composed of the source name, target name, and operation name. |
Source Router | Displays the name of the router that is selected as the source router for this collector. |
Target | Displays the name of the device that is selected as the target for this collector. |
Operation | Displays the defined operation that is selected for this collector. |
Instance Name | Name to uniquely identify a specific instance of a collector if the same collector is started multiple times simultaneously or sequentially. |
Start Time | Displays the date and time that the collector is scheduled to start collecting data. |
End Time | Displays the date and time that the collector is scheduled to stop collecting data. |
Index | Index number of the collector in the source router used to uniquely identify the collector. |
Running ID | Unique identifier. |
Number of Entries | Displays the number of times that sampling has been performed during the data collection period. |
The buttons in the Collector Properties window provide the following functions:
| Button | Description |
|---|---|
OK | Closes the window. |
Help | Displays information about the window. |
The IPM Main window (Figure A-12) is displayed automatically when you start the IPM application. This window provides access to the major features of the IPM application. The IPM Main window also provides information about all collectors that have been defined including their components, start time, duration, and current status.
The list of collectors is automatically sorted by start time, in ascending order. To change the way that the list of collectors is sorted, click any of the column headings to sort by that column. To sort in descending order, click on the column heading again.
The IPM Main window contains the following fields:
| Field | Description |
|---|---|
Source | Name assigned to the configured source. |
Target | Name assigned to the configured target. |
Operation | Name assigned to the configured operation. |
Start Time | Date and time when the collector started gathering response-time data. |
Duration (Hrs) | Length of time, in hours, that the collector has been running. If the collector is scheduled to run continuously, the value for this field is Forever. |
Type | Mode in which the collector is running (Statistics or Monitor). In Monitor (M) mode, IPM gathers response-time data to display in the statistical and graphic display only. In Statistics (S) mode, IPM also stores the hourly response time data in the IPM database for later use. |
Status | Current status of the collector. The possible values are: Running---collector is currently running. Expired---stop time for the collector has been reached and the collector has stopped running. Canceled---collector has stopped running due to user intervention. Schedule Pending---collector is configured to start at running at a date and time in the future. |
Instance | Name to uniquely identify a specific instance of a collector if the same collector is started multiple times simultaneously or sequentially. |
The menus on the IPM Main window provide the following options:
| Menu Command | Description |
|---|---|
File > Open Seed File | Displays the Seed File window for loading collectors that you previously defined in a collector seed file to collect response time data in your network. |
File > Exit | Exits the IPM application. |
Edit > Add | Displays the Add Collector window for defining a new collector for collecting response time data. |
Edit > Stop | Stops the currently selected collector after confirmation. |
Edit > Delete | Deletes the currently selected collector. |
Edit > Start/Restart | Displays the Start Collector window or the Restart Collector window for starting or restarting the selected collector. |
View > Source Properties | Displays the source properties for the source router associated with the currently selected collector. |
View > Collector Properties | Displays the collector properties for the currently selected collector. |
View > Operation Properties | Displays the operation properties for the operation associated with the currently selected collector. |
View > Display Statistics | Displays statistical and graphical information for the currently selected collector that has been collected between the start time and stop for the collector. |
View > Display Real-time | Displays statistical and graphical information for the currently selected collector in real time. |
Configure > Source Router | Displays the Source Router window, which displays a list of the currently defined source routers and provides options for defining, modifying, or deleting a source router. |
Configure > Target | Displays the Target window, which displays a list of the currently defined targets and provides options for defining, modifying, or deleting a target. |
Configure > Operation | Displays the Operation window, which displays a list of the currently defined operations and provides options for defining, modifying, or deleting an operation. |
Help > Topics | Displays the table of contents for the IPM online help. |
Help > Window | Displays online help for the window that is currently displayed. |
Help > About | Displays version and copyright information about the IPM application. |
The Message Log window (Figure A-13) provides a log of status messages generated by IPM. To access the Message Log window, select View > Message Log in the IPM Main window.
The Message Log window is composed of the following sections:
By default, when you access the Message Log window, the Log Control tab (Figure A-13) is displayed.
| Field | Description |
|---|---|
Application Name | Name of the process. |
Message Category | Types of messages that can be generated for troubleshooting process problems. The message categories available for IPM include: Debug---Useful when debugging a problem in conjunction with Cisco's TAC. Error---Generates messages when an error condition occurs. Info---Generates messages to notify you of status information. Trace---Generates trace calls. The Error and Info message categories are enabled by default. To enable a message category, click Enabled. |
The buttons in the Log Control tab of the Message Log window provide the following functions:
| Button | Description |
|---|---|
Reset | Resets the message categories to their default state (Enabled or Disabled). |
Apply | Executes changes that you have made to the messages categories (Enabled or Disabled). |
Help | Displays information about the window. |
The Log Display tab (Figure A-14) of the Message Log window displays messages generated by enabled message categories defined in the Log Control tab. When you access the Message Log window, the Log Control tab is displayed by default. To access the Log Display tab, click Log Display in the tab bar.
The buttons in the Log Display tab of the Message Log window provide the following functions:
| Button | Description |
|---|---|
All | Displays all messages generated by the message categories enabled in the Log Control tab of the Message Log window. |
ViewN (up to 6) | Displays the messages that match the criteria that you defined in the New View window. |
New View | Displays the New View window which allows you to specify criteria for the message to be displayed in the Log Display tab of the Message Log window. |
Clear View | Removes all of the currently displayed messages from the view. |
Pause View | Stops scrolling of the messages as they are received. New messages are still received but the list does not scroll in the view. |
Help | Displays information about the window. |
The Operation window (Figure A-15) displays a list of the existing configured operations. It also provides options for creating, editing, and updating operations and for viewing the properties of an existing operation.
To display the Operation window, select Configure > Operation from the IPM Main window.
The Operation window contains the following fields:
| Field | Description |
|---|---|
Name | Symbolic name (up to 32 characters) to assign to the operation. This name appears in the Operation field on lists and in drop-down boxes. Do not include special characters such as \Q ! @ # $ % ^ * ' '' & |. |
Type | Collector type. The following values are possible: Echo---Performs end-to-end IPM operations only. PathEcho---Performs IPM operations using a route discovery algorithm to find a path to the target and each device in the path. PathEcho is for the IP protocol only. |
Protocol | Protocol used by the collector. The following values are possible: IP Echo---IP/ICMP Echo that requires a destination IP address or host name. SNA SSCP Echo---SNA's SSCP Native Echo. Requires the host name defined for the PU connection to VTAM. SNA Echo LU0---SNA LU Type 0 connection to Cisco's NSPECHO host application. Requires the host name defined for the PU connection to VTAM SNA Echo LU2---SNA LU Type 2 connection to Cisco's NSPECHO host application. Requires the host name defined for the PU connection to VTAM. |
Frequency | Frequency, in seconds, that data is collected at the router. Information is accumulated and stored in the database by the network management system every hour. Valid values are 10 to 3600 (1 hour). The default is 60 seconds. For normal operation, do not set the frequency value to less than 60 seconds. A frequency of less than 60 seconds may slow down the network performance. A frequency of less than 60 seconds should be used for only short periods of time. |
Timeout (MSecs) | Response timeout, in minutes, for the collector. If the response time exceeds the timeout value, then a trap or alert is issued. |
Timeout | Indicates whether traps or alerts are enabled or disabled. Traps or alerts are sent if the response time exceeds the timeout value. |
Owner | Person who defined the operation. |
Reaction | Action the operation takes if the response time exceeds the timeout value. Possible values are Trap, Alert, Trap and Alert, or Nothing. |
The menus on the Operation window provide the following options:
| Menu Command | Description |
|---|---|
File > Close | Closes the window. |
Edit > Add | Displays the Add Operation window to allow you to create an operation for collecting response-time data. |
Edit > Update | Displays the Update Operation window to allow you to rename the selected operation. |
Edit > Delete | After confirmation, deletes the selected operation from the Operation window. |
View > Properties | Displays the operation properties for the currently selected operation. |
Help > Topics | Displays the table of contents for the IPM online help. |
Help > Window | Displays online help for the window that is currently displayed. |
Help > About | Displays version and copyright information about the IPM application. |
The Operation Properties window (Figure A-16) allows you to view the properties of an operation. To display the Operation Properties window, select View > Operation Properties from the IPM Main window.
The Operation Properties window is composed of the following sections:
From the Protocol tab (Figure A-16) of the Operation Properties window, you view information about the selected operation, such as name and description of the operation, sampling interval, type, protocol, request size, and response size. The Protocol tab is automatically displayed when you access the Operation Properties window.
The Protocol tab of the Operation Properties window contains the following fields:
| Field | Description |
|---|---|
Name | Symbolic name (up to 32 characters) that to assign to the operation. This name appears in the Operation field on lists and in drop-down boxes. Do not include special characters such as \Q ! @ # $ % ^ * ' '' & |. |
Description | Description (up to 255 characters) that describes the operation. Do not include special characters such as \Q ! @ # $ % ^ * ' '' & |. |
RTT Type | Collector type. The following values are possible: Echo---Performs end-to-end IPM operations only. PathEcho---Performs IPM operations using a route discovery algorithm to find a path to the target and each device in the path. (For the IP protocol only.) |
Protocol | Protocol used by the collector. The following values are possible: IP Echo---IP/ICMP Echo. Requires a destination IP address or host name. SNA SSCP Echo---SNA's SSCP Native Echo. Requires the host name defined for the PU connection to VTAM. SNA Echo LU0---SNA LU type 0 connection to Cisco's NSPECHO host application. Requires the host name defined for the PU connection to VTAM. SNA Echo LU2---SNA LU type 2 connection to Cisco's NSPECHO host application, which requires the host name defined for the PU connection to VTAM. |
Frequency | Interval, in seconds, that data is collected at the router. Information is accumulated and stored in the database by the network management system every hour. Valid values are 10 to 3600 (1 hour). The default is 60 seconds. For normal operation, do not set the frequency value to less than 60 seconds. A frequency of less than 60 seconds may slow down the network performance. A frequency of less than 60 seconds should be used for only short periods of time. |
Request Size | Size, in bytes, of the protocol data in the payload of the collector's request packet. Valid values are 1 to 16384. The default is 1 byte. This option is valid only for LU0 and LU2 protocols. |
Response Size | Size, in bytes, of the protocol data in the payload in the collector's response packet. Valid values are 1 to 16384. For SNA Echo and LU0 protocols the default is 1 byte. For all others, the default is the same value as the request size. This option is valid only for LU0 and LU2 protocols. |
Verify Data | Indicates whether the echo response was examined for unexpected data. If the response contains unexpected data, the Verify Data counter is incremented. This option is valid on for SNA protocols. |
The buttons in the Operation Properties window provide the following functions:
| Button | Description |
|---|---|
OK | Implements the changes and close the window. |
Help | Displays information about the window. |
From the Statistics tab (Figure A-17) of the Operation Properties window, you view configuration information about the collection of statistics. The Protocol tab is automatically displayed when you access the Operation Properties window. To access the Statistics tab, click Stats in the tab bar.
The Statistics tab of the Operation Properties window contains the following fields:
| Field | Description |
|---|---|
Collect Stats | Indicates whether statistics collection is enabled or disabled. Possible values are True or False. |
Num of Paths | Number of paths specified in operation configuration. The default value is 5. |
Num of Hops | Number of hops specified in the operation configuration. The default value is 15. |
The buttons in the Operation Properties window provide the following functions:
| Button | Description |
|---|---|
OK | Implements the changes and close the window. |
Help | Displays information about the window. |
From the Threshold tab (Figure A-18) of the Operation Properties window, you enable the collection of statistics and you specify the number of paths and hops. You also enable data verification. The Protocol tab is automatically displayed when you access the Operation Properties window. To access the Threshold tab, click Threshold in the tab bar.
The Threshold tab of the Operation Properties window contains the following fields:
| Field | Description |
|---|---|
Threshold Type | Algorithm used by the IPM to calculate rising and falling threshold violations. The following values are possible: Never---Do not calculate threshold violations. This is the default. Immediate---When the response time exceeds the rising threshold or drops below the falling threshold, immediately perform the action defined by Event Type. Consecutive---When the response time exceeds the rising threshold consecutively Count1 times or drops below the falling threshold consecutively Count1 times, perform the action defined by Event Type. Optionally, you can specify the number of consecutive occurrences. The default is 5. X of Y---When the response time exceeds the rising threshold Count1 out of the last Count2 times or drops below the falling threshold Count1 out of the last Count2 times, perform the action defined by Event Type. Optionally, you can specify the number of violations that must occur within a specified number. Valid values for both the x-value (Count1) and y-value (Count2) are 1 through 16. The default is 5 for both. Average---When the average of the last Count1 response times exceeds the rising threshold or when the average of the last Count1 response times drops below the falling threshold, perform the action defined by Event Type. Optionally, you can specify the number of operations to average. The default is the average of the last 5 response-time operations. For example, if the collector's threshold is 5000 ms and the collector's last 3 attempts' results are 6000, 6000, and 5000 ms, the average would be 6000 + 6000 + 5000 = 17000/3 > 5000, thus violating the 5000-ms threshold. |
Rising Threshold | If the Set Threshold option is enabled, you specify a rising threshold (standard RMON-type hysteresis mechanism), in milliseconds. Valid values are between 1 and 2147483647. The default is 5000 ms. When the actual response time exceeds the rising threshold, the collector uses the algorithm specified in Threshold Type to calculate if a threshold violation occurs. If a violation occurs, the action (as defined in Event Type) is taken. |
Falling Threshold | If the Set Threshold option is enabled, you specify a falling threshold (standard RMON-type hysteresis mechanism), in milliseconds. Valid values are between 0 and 2147483647. The default value is 3000 ms. When the actual response time falls below the falling threshold, the collector uses the algorithm specified in Threshold Type to calculate if a threshold violation occurs. If a violation occurs, the action (as defined in Event Type) is taken. |
Response Timeout | Amount of time (in milliseconds) that the collector should wait for a response to its echo operation. When a timeout occurs, the Timeout counter is incremented. The timeout value must be less than the specified interval. Valid values are between 0 and 60480000. The default value is 5000 ms. |
Event Type | Action or combination of actions that the collector performs when you select Disconnect or TimeOut, or when a threshold is violated. For the action type to occur for threshold events, the threshold type must be defined to anything other than Never. The following actions are possible: Trap---Send an SNMP trap. Send a trap when a rising threshold is violated, a timeout occurs, or a connection loss occurs. Send a second trap when falling threshold clears, reconnection occurs, or is no longer timing out. Alert---Send an SNA NMVT Alert on a rising threshold violation, and an SNA NMVT Resolution on a falling threshold violation. Trap & Alert---Send both a trap and NMVT. None---No action is taken. |
Timeout Enabled | Indicates whether or not sending a trap or alert is enabled when the response time exceeds the timeout value. Possible values are True or False. |
Connection Loss Enabled | Indicates whether or not sending a trap or alert is enabled when a connection is lost. Possible values are True or False. |
The buttons in the Operation Properties window provide the following functions:
| Button | Description |
|---|---|
OK | Implements the changes and close the window. |
Help | Displays information about the window. |
The Process Details window (Figure A-19) displays detailed information about a specific process. To access the Process Details window, select a process in the Process Manager Information window (Figure A-20) and then click Details.
The Process Details window contains the following fields:
| Field | Description |
|---|---|
Process Name | Name of the process selected in the Process Manager Information window. |
AutoStart | Indicates whether this process is automatically started as part of the IPM and Process Manager start-up script. Possible values are Yes, No, or Restart. |
Dependencies | Processes that must be in Ready state before the current process starts. |
Executable | Full path name for the executable file for the process. |
Version | Version number of the process application. |
Arguments | Valid arguments used when starting the process. |
Timeout | Value used when the application is trying to determine whether the process is in Ready state. Also used at shutdown to kill dependent processes if they are no longer responding. |
StartTime | Date and time that the process was started. |
StopTime | Date and time that the process was stopped. If the process is currently running, this value is set to zero. |
Process ID | Number to uniquely identify the process. |
State | Indicates the current state of the process. The states are also indicated by color (red, yellow, or green). The following values are possible: Initial---Process is being initialized (yellow). Starting---Process has been started but is not yet in Ready state (yellow). Ready---Process has been started and is currently running (green). Stopping---Process is being stopped (red). Stopped---Process has been stopped (red). |
Last Message | Status message which reflects the current state of the process. |
The button in the Process Details window provides the following function:
| Button | Description |
|---|---|
OK | Closes the window. |
The Process Management Information window (Figure A-20) displays status information about the IPM processes. This window also provides options for starting or stopping a process and for viewing more detailed information about a process. To access the Process Management Information window, select View > Process Manager from the IPM Main window. By default, the IPM tab is displayed. To access information about the base service processes, click Services in the Tab bar.
The Process Management Information window contains the following fields:
| Field | Description |
|---|---|
Name | Indicates the names of the currently running processes, such as ConfigServer. |
Process ID | Number to uniquely identify the process. |
State | Indicates the current state of the process. The states are also indicated by color (red, yellow, or green). The following values are possible: Initial---Process is being initialized (yellow). Starting---Process has been started but is not yet in Ready state (yellow). Ready---Process has been started and is currently running (green). Stopping---Process is being stopped (red). Stopped---Process has been stopped (red). |
Last Message | Status message that reflects the current state of the process. |
The buttons in the Process Management Information window provide the following functions:
| Button | Description |
|---|---|
Start | Starts running the selected process. If the process is already running, a messages is displayed to notify you that the process is already running. |
Stop | Stops running the selected process. If the process is not currently running, nothing happens. |
Stop All | Stops running all of the processes. |
Details | Displays the Process Details window for the selected process. |
The Real Time Display window (Figure A-21) displays statistical and graphical information in real time for the selected collector. To access the Real Time Display window, select a collector in the IPM Main window, then select View > Display Real-time.
The Real-Time Display window contains the following fields:
| Field | Description |
|---|---|
Collector Name | Name of the collector. By default the name of the collector is composed of the source name, target name, and operation name. |
Instance | Name to uniquely identify a specific instance of a collector if the same collector is started multiple times simultaneously or sequentially. |
Source | Name assigned to the configured source router. |
Target | Name assigned to the configured target device. |
Frequency | Frequency, in seconds, that data is collected at the router. Information is accumulated and stored in the database by the network management system every hour. Valid values are 10 to 3600 (1 hour). The default is 60 seconds. |
Start Time/Stop Time | Date and time that the collector started collecting data and the date and time that the collector stopped collecting data. |
Response Time | Time, in milliseconds, that it took for the source router to receive a response to the echo message from the target device. |
The buttons on the Real Time Display Response window provide the following functions:
| Menu Command | Description |
|---|---|
Prints the Real Time Display window. | |
Grid On/Grid Off | Hides or displays a grid separating each response-time interval. |
Close | Closes the Real-Time Display window. |
Help | Displays information about the window. |
The Response Graphs window is described in the following sections:
For Echo, the Response Graphs window (Figure A-22) allows you to view response-time data, error data, and threshold-violation data collected by the collector for the path between a selected source and target.
For PathEcho, the Response Graphs window (Figure A-23) allows you to view response-time data, error data, and threshold-violation data collected by the collector for each hop in the path between a selected source and target.
The Response Graphs window is divided into two areas:
The Path List section (Figure A-24), on the left side of the Response Graphs window, contains a list of the paths that the collector found between the source and the target.
PathEcho represents the various paths found between the source and the target for which response-time measurements are taken. The maximum number of paths shown are the six most used paths.
To display the hops in a path, click on the path icon or double-click on the path name.
Each hop (and its host name) is displayed in the listing. To view statistics for a specific hop, click on the hop icon or double-click on the hop name. Clicking on a specific hop icon displays the statistics between the hop and the source, which allows you to locate bottlenecks in the network.
The maximum number of hops that can be displayed is controlled by the Number of Hops field on the Configure Data Collection Statistics window. If there are more hops between the source and the destination than are allowed, subsequent hops and the destination will not be displayed.
To collapse the path, click on the path icon again and all the hops in the path are hidden.
When you click on a path icon, the response time graph for all of the hops in that path are displayed in the statistics area (Figure A-25) of the Response Graphs window.
Each time you select a hop within a path, the data for that hop is displayed in the Statistics section on the right side of the Response Graphs window (Figure A-26). The data is displayed in three graphs: Response Time, Error Distribution, and Cumulative Threshold Data.
If the duration of the collector is more than 24 hours, the data is displayed in daily increments.
The data for each hop in the path is displayed in three graphs:
The Response Time graph (Figure A-27) displays the response times (in milliseconds) as recorded at each hour between the specified start and end times. For each hour, the graph shows the maximum response time recorded, the minimum response time recorded, and the average response time recorded.
The Error Distribution graph (Figure A-28) displays the errors as recorded at each hour between the specified start and end times.
The Error Distribution graph displays the number of failed operations caused by the following occurrences:
The Cumulative Threshold Data graph (Figure A-29) displays the proportion of total threshold violations (as defined on the Thresholds tab of the Add Operation window) that were caused by:
The menus on the Display Response window provide the following options:
| Menu Command | Description |
|---|---|
File > Print | Prints the Display Response window graphs: Response Time, Error Distribution, or Threshold. |
File > Close | Closes the Display Response window. |
View > Demand Poll | Collects data from the source router immediately instead of waiting for the hourly update interval. The collected data is displayed in the Real-Time Display window. |
View > Real-time Display | Monitors the live performance of a specific hop along a path. Only completed operations without errors are monitored. |
Option > Hourly | Changes the granularity of the graphs to show collected statistics at an hourly interval. |
Option > Daily | Changes the granularity of the graphs to show collected statistics at an daily interval. |
Option > Weekly | Changes the granularity of the graphs to show collected statistics at an weekly interval. |
Option > Monthly | Changes the granularity of the graphs to show collected statistics at an monthly interval. |
Option > Custom | Changes the granularity of the graphs to show collected statistics at an interval that you specify. |
Help > Topics | Displays the table of contents for the IPM online help. |
Help > Window | Displays online help for the window that is currently displayed. |
Help > About | Displays version and copyright information about the IPM application. |
The Restart Collector window (Figure A-30) allows you to restart a collector that is already running. When you restart collector, you specify the start time and duration for the collector. To access the Restart Collector window, select a collector in the IPM Main window, then select Edit > Start/Restart.
The Restart Collector window contains the following fields:
| Field | Description |
|---|---|
Source | Name of the router that is selected as the source router for this collector. |
Target | Name of the device that is selected as the target for this collector. |
Operation | Defined operation that is selected for this collector. |
Start Time | Defines the date and time at which the collector will start collecting data. The available options are: Now---Starts the collector immediately after it is configured. Date & Time---Starts the collector at the date and time that you specify. |
Duration | Defines the length of time that the collector will run. The available options are: Forever---Starts the collector to run continuously until you stop it by selecting Edit > Stop from the IPM Main menu. Day(s)/Hour(s)/Min(s)---Stops the collector after the specified length of time has elapsed. |
The buttons in the Restart Collector window provide the following functions:
| Button | Description |
|---|---|
OK | Implements the changes and close the window. |
Cancel | Closes the window without implementing any of the changes. |
Help | Displays information about the window. |
The Seed File window (Figure A-31) allows you to add collectors, source routers, or targets from a previously defined seed file. You can load a collector seed file from the IPM Main window, a source router seed file from the Source Router window, and a target seed file from the Target window. To access the Seed File window, select File > Open.
The Seed File window contains the following field:
| Field | Description |
|---|---|
Enter Seed File Name | Name of the file containing the collector, source router, or target definitions. The seed file must be located in the appropriate directory.
|
The buttons in the Restart Collector window provide the following functions:
| Button | Description |
|---|---|
OK | Implements the changes and close the window. |
Cancel | Closes the window without implementing any of the changes. |
The Source Properties window (Figure A-32) allows you to view the source properties of a source router. To display the Source Properties window, select View > Source Properties from the IPM Main window.
The Source Properties window contains the following fields:
| Field | Description |
|---|---|
Source Router | Host name of the router on which the source resides. |
Read Community | Community name (or password) for read access to the information maintained by the SNMP agent. |
Contact | Name and phone number of the person responsible for maintaining this source router. This field should not exceed 255 characters. Do not include special characters such as \Q ! @ # $ % ^ & * ' '' |. |
Location | Location of the source router. |
IOS Version | Version information for the Cisco IOS software running on the router. |
RTR Version | Version information for the RTR agent running on the router. |
System Up Time | Date and time that the source router was brought online. |
Max. Collectors | Maximum number of collectors supported. |
Max. Packet Size | Maximum packet size (in bytes) supported by this router. |
Last SNMP Set Time | Time and date the configuration was last set. |
The buttons in the Source Properties window provide the following functions:
| Button | Description |
|---|---|
OK | Closes the window. |
Help | Displays information about the window. |
The Source Router window (Figure A-33) displays a list of configured source routers. This window also provides options for defining, modifying, or deleting a source router. To display the Source Router window, select Configure > Source Router from the IPM Main window.
The Source Router window contains the following fields:
| Field | Description |
|---|---|
Source | Host name of the router on which the source resides. |
Read Comm | Community name (or password) for read access to the information maintained by the SNMP agent. |
IOS Version | Version information for the Cisco IOS software running on the router. |
RTR Version | Version information for the RTR agent running on the router. |
The menus on the Source Router window provide the following options:
| Menu Command | Description |
|---|---|
File > Open | Displays the Seed File window for loading source routers previously defined in a source router seed file. |
File > Close | Closes the window. |
Edit > Add | Displays the Add Source Router window for defining a new source router. |
Edit > Update | Displays the Update Source Router window for modifying the configuration of an existing source router. |
Edit > Delete | After confirmation, deletes the selected source router from the Source Router window. |
View > Source Properties | Displays the properties for the currently selected source router. |
Help > Topics | Displays the table of contents for the IPM online help. |
Help > Window | Displays online help for the window that is currently displayed. |
Help > About | Displays version and copyright information about the IPM application. |
The Target window (Figure A-34) displays a list of devices that are configured as targets. This window also provides options for defining, modifying, or deleting a target. To display the Target window, select Configure > Target from the IPM Main window.
The Target window contains the following fields:
| Field | Description |
|---|---|
Host | Displays the host name of the target device. (For SNA Echo LU0 or SNA SSCP Echo only.) |
Type | Displays the protocol used with the target. The following values are possible: ICMP_ECHO---IP/ICMP Echo, which requires a destination IP address or host name. SNA Echo LU0---SNA LU type 0 connection to Cisco's NSPECHO host application, which requires the host name defined for the SNA PU connection to VTAM. SNA Echo LU2---SNA LU type 2 connection to Cisco's NSPECHO host application, which requires the host name defined for the SNA PU connection to VTAM. SNA SSCP Echo---SNA SSCP-LU Native Echo, which requires the host name defined for the SNA PU connection to VTAM. |
The menus on the Target window contain the following options:
| Menu Command | Description |
|---|---|
File > Open | Displays the Seed File window for loading targets previously defined in a target seed file. |
File > Close | Closes the window. |
Edit > Add | Displays the Add Target window for defining a new target device. |
Edit > Delete | After confirmation, deletes the selected target from the Target window. |
Help > Topics | Displays the table of contents for the IPM online help. |
Help > Window | Displays online help for the window that is currently displayed. |
Help > About | Displays version and copyright information about the IPM application. |
The Time Filter window (Figure A-35) allows you to specify the beginning and ending dates and times for displaying response-time statistics. This window is displayed when you select View > Display Stats in the IPM Main window. After you specify the start date and time and stop date and time, select the initial display increment and click OK. The Response window (Figure A-25) is displayed.
The Time Filter window contains the following fields:
| Field | Description |
|---|---|
Collector Name | Displays the name of the collector. By default the name of the collector is composed of the source name, target name, and operation name. |
Instance Name | Name to uniquely identify a specific instance of a collector if the same collector is started multiple times simultaneously or sequentially. |
Start Date | Starting date and time for which you want to display response-time data. This can be a time in the past or in the future. The date and time information is in the format MM/DD/YYYY hh:mm:ss. No other date and time format is accepted. The default start date and time is the selected collector's start date and time. |
End Date | Ending date and time for which you want to display response-time data. The date and time information is in the format MM/DD/YYYY:hh:mm:ss. No other date and time format is accepted. The default end date and time is the selected collector's end date and time. |
Statistics Format | The format, or increment, for displaying the response-time statistics in the graph. |
The buttons in the Time Filter window provide the following functions:
| Button | Description |
|---|---|
OK | Implement the changes and close the window. |
Cancel | Closes the window without implementing any of the changes. |
Help | Displays information about the window. |
The Update Operation window (Figure A-36) allows you to modify the configuration of an existing operation. To display the Update Operation window, select Edit > Update from the Operation window.
The Update Operation window is composed of the following sections:
From the Protocol tab (Figure A-36) of the Update Operation window, you specify a name and description for the operation, sampling interval, type, protocol, request size, and response size. The Protocol tab is automatically displayed when you access the Update Operation window.
The Protocol tab of the Update Operation window contains the following fields:
| Field | Description |
|---|---|
Name | Symbolic name assigned to the operation. This name appears in the Operation field on lists and in drop-down boxes. |
Description | Description (up to 255 characters) that describes the operation. Do not include special characters such as \Q ! @ # $ % ^ * ' '' & |. |
Sample Interval | Interval, in seconds, that data is collected at the router. Information is accumulated and stored in the database by the network management system every hour. Valid values are 10 to 3600 (1 hour). The default is 60 seconds. For normal operation, do not set the interval value to less than 60 seconds. An interval of less than 60 seconds may slow down the network performance. Intervals of less than 60 seconds should be used for only short periods of time. |
Type | Collector type. The following values are possible: Echo---Performs end-to-end IPM operations only. PathEcho---Performs IPM operations using a route discovery algorithm to find a path to the target and each device in the path. (For the IP protocol only.) |
Protocol | Protocol used by the collector. The following values are possible: IP Echo---IP/ICMP Echo that requires a destination IP address or host name. SNA SSCP Echo---SNA's SSCP Native Echo, which requires the host name defined for the PU connection to VTAM. SNA Echo LU0---SNA LU type 0 connection to Cisco's NSPECHO host application, which requires the host name defined for the PU connection to VTAM. SNA Echo LU2---SNA LU type 2 connection to Cisco's NSPECHO host application, which requires the host name defined for the PU connection to VTAM. |
Request Size | Size, in bytes, of the protocol data in the payload of the collector's request packet. Valid values are 1 to 16384. The default is 1 byte. This option is valid only for LU0 and LU2 protocols. |
Response Size | Size, in bytes, of the protocol data in the payload in the collector's response packet. Valid values are 1 to 16384. For SNA Echo and LU0 protocols the default is 1 byte. For all others, the default is the same value as the request size. This option is valid only for LU0 and LU2 protocols. |
Verify Data | Indicates whether the echo response was examined for unexpected data. If the response contains unexpected data, the Verify Data counter is incremented. This option is valid on for SNA protocols. |
The buttons in the Update Operation window provide the following functions:
| Button | Description |
|---|---|
OK | Implements the changes and close the window. |
Cancel | Closes the window without implementing any of the changes. |
Help | Displays information about the window. |
From the Statistics tab (Figure A-37) of the Update Operation window, you enable the collection of statistics and specify the number of paths and hops. The Protocol tab is automatically displayed when you access the Update Operation window. To access the Statistics tab, click Statistics in the tab bar.
The Statistics tab of the Update Operation window contains the following fields:
| Field | Description |
|---|---|
Collect Statistics? | Enable the Collect Statistics option to collect statistics on an hourly basis from the source router. The statistics are stored in the IPM database and are used for trend analysis. If the Collect Statistics option is not enabled, IPM runs in monitor mode only. In monitor mode, you view response time data in real time or set thresholds for notification of violations as they occur. |
Max Number of Paths | If the Collect Statistics option is enabled, you specify the number of paths for which to collect statistics. To ensure that you do not miss collecting statistics for relevant paths, set this value to a number slightly higher than the expected number of paths. The default value is 5. |
Max Number of Hops | If the Collect Statistics option is enabled, you specify the number of hops for which to collect statistics. To ensure that you do not miss collecting statistics for relevant hops, set this value to a number slightly higher than the expected number of hops. The default value is 15. |
The buttons in the Update Operation window provide the following functions:
| Button | Description |
|---|---|
OK | Implements the changes and close the window. |
Cancel | Closes the window without implementing any of the changes. |
Help | Displays information about the window. |
From the Threshold tab (Figure A-38) of the Update Operation window, you enable the collection of statistics and specify the number of paths and hops. The Protocol tab is automatically displayed when you access the Update Operation window. To access the Threshold tab, click Threshold in the tab bar.
The Threshold tab of the Update Operation window contains the following fields:
| Field | Description |
|---|---|
Threshold Type | Algorithm to be used by the IPM to calculate rising and falling threshold violations. The following values are possible: Never---Do not calculate threshold violations. This is the default. Immediate---When the response time exceeds the rising threshold or drops below the falling threshold, immediately perform the action defined by Event Type. Consecutive---When the response time exceeds the rising threshold consecutively Count1 times or drops below the falling threshold consecutively Count1 times, perform the action defined by Event Type. Optionally, you can specify the number of consecutive occurrences. The default is 5. X of Y ---When the response time exceeds the rising threshold Count1 out of the last Count2 times or drops below the falling threshold Count1 out of the last Count2 times, perform the action defined by Event Type. Optionally, you can specify the number of violations that must occur within a specified number. Valid values for both the x-value (Count1) and y-value (Count2) are 1 through 16. The default is 5 for both. Average---When the average of the last Count1 response times exceeds the rising threshold or when the average of the last Count1 response times drops below the falling threshold, perform the action defined by Event Type. Optionally, you can specify the number of operations to average. The default is the average of the last 5 response-time operations. For example, if the collector's threshold is 5000 ms and the collector's last 3 attempts are 6000, 6000, and 5000 ms, the average would be 6000 + 6000 + 5000 = 17000/3 > 5000, thus violating the 5000-ms threshold. |
Rising | If the Set Threshold option is enabled, you specify a rising threshold (standard RMON-type hysteresis mechanism), in milliseconds. Valid values are between 0 and 2147483647. The default is 5000 ms. When the actual response time exceeds the rising threshold, the collector uses the algorithm specified in Threshold Type to calculate whether a threshold violation occurs. If a violation occurs, the action (as defined in Event Type) is taken. |
Falling | If the Set Threshold option is enabled, you specify a falling threshold (standard RMON-type hysteresis mechanism), in milliseconds. Valid values are between 0 and 2147483647. The default value is 3000 ms. When the actual response time falls below the falling threshold, the collector uses the algorithm specified in Threshold Type to calculate whether a threshold violation occurs. If a violation occurs, the action (as defined in Event Type) is taken. |
Count1 | Value to be used in calculating the reaction type. This field is used for threshold types of Consecutive, X of Y, and Average. Valid values are 1 to 16. The default is 5. |
Count2 | Value to be used in calculating the X of Y threshold type. Valid values are 1 to 16. The default is 5. |
Response Timeout | Amount of time (in milliseconds) that the collector should wait for a response to its echo operation. When a timeout occurs, the Timeout counter is incremented. The timeout value must be less than the specified interval. Valid values are between 0 and 60480000. The default value is 4000 ms. |
Timeout | Indicates whether to enable checking for response-time reporting operation timeouts based on the timeout value configured for the collector. If you select TimeOut, the action (specified in Event Type) is taken whenever a timeout occurs or is cleared on this collector. |
Event Type | Action or combination of actions that the collector performs when you select Disconnect or TimeOut, or when a threshold is violated. For the action type to occur for threshold events, the threshold type must be defined to anything other than Never. The following actions are possible: Trap---Send an SNMP trap. Send a trap when a rising threshold is violated, a timeout occurs, or a connection loss occurs. Send a second trap when falling threshold clears, reconnection occurs, or is no longer timing out. Alert---Send an SNA NMVT Alert on a rising threshold violation, and an SNA NMVT Resolution on a falling threshold violation. Trap & Alert---Send both a trap and NMVT. None---No action is taken. |
Connection Lost | Indicates whether to enable checking for IPM connection loss in connection-oriented protocols. If you select Disconnect, the action (specified in Event Type) is taken whenever a loss of connection or a reconnection after a loss occurs on this collector. |
The buttons in the Update Operation window provide the following functions:
| Button | Description |
|---|---|
OK | Implements the changes and close the window. |
Cancel | Closes the window without implementing any of the changes. |
Help | Displays information about the window. |
The Update Source Router window (Figure A-39) allows you to modify the configuration of an existing source router. From this window, you can change the Read Community and Write Community source attributes. To display the Update Source Router window, select Edit > Update from the Source Router window.
The Update Source Router window contains the following fields:
| Field | Description |
|---|---|
Source Router | Displays the host name of the router on which the source resides. |
Read Community | Enter the community name (or password) for read access to the information maintained by the SNMP agent. This value can be from 1 to 32 characters. |
Write Community | Enter the community name (or password) for write access to the information maintained by the SNMP agent. This value can be from 1 to 32 characters. |
The buttons in the Update Source Router window provide the following functions:
| Button | Description |
|---|---|
OK | Implements the changes and close the window. |
Cancel | Closes the window without implementing any of the changes. |
Help | Displays information about the window. |
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Fri Mar 12 08:27:12 PST 1999
Copyright 1989-1999©Cisco Systems Inc.