M o n i t o r i n g J u n i p e r E X S w i t c h
7
10.
ENCRYPTFLAG
– This flag appears only when
v3
is selected as the
SNMPVERSION
. By
default, the eG agent does not encrypt SNMP requests. Accordingly, the
ENCRYPTFLAG
is
set to
NO
by default. To ensure that SNMP requests sent by the eG agent are encrypted,
select the
YES
option.
11.
ENCRYPTTYPE
– If the
ENCRYPTFLAG
is set to
YES
, then you will have to mention the
encryption type by selecting an option from the
ENCRYPTTYPE
list. SNMP v3 supports the
following encryption types:
DES
– Data Encryption Standard
AES
– Advanced Encryption Standard
12.
ENCRYPTPASSWORD
– Specify the encryption password here.
13.
CONFIRM PASSWORD
– Confirm the encryption password by retyping it here.
14.
TIMEOUT
-
Specify the duration (in seconds) within which the SNMP query executed by this
test should time out in the
TIMEOUT
text box. The default is 10 seconds.
15.
DATA OVER TCP
–
By default, in an IT environment, all data transmission occurs over
UDP. Some environments however, may be specifically configured to offload a fraction of
the data traffic – for instance, certain types of data traffic or traffic pertaining to specific
components – to other protocols like TCP, so as to prevent UDP overloads. In such
environments, you can instruct the eG agent to conduct the SNMP data traffic related to the
Juniper EX Switch over TCP (and not UDP). For this, set the
DATA OVER TCP
flag to
Yes
.
By default, this flag is set to
No
.
Outputs of the
test
One set of results for each hardware component of the target Juniper EX Switch that is to be
monitored
Measurements
made by the
test
Measurement
Measurement
Unit
Interpretation
Memory:
Indicates the total memory
allocated to this hardware
component.
MB
Buffer utilization:
Indicates the percentage of
buffer memory utilized by this
hardware component.
Percent
A low value is desired for this measure. A
gradual/sudden increase in the value of this
measure is a cause of concern which
indicates that the buffer memory is running
short of resources. You can either increase
the size of the buffer memory or free up the
space that is already utilized to contain the
value of this measure within possible limits.
Comparing the value of this measure across
the hardware components will help you in
identifying the hardware component that is
utilizing the memory resources extensively.