Command Manual (For Soliton) – SNMP-RMON
H3C S3100 Series Ethernet Switches
Chapter 2 RMON Configuration Commands
2-10
ASN.1 INTEGER data type (that is, INTEGER, Counter, Gauge, or TimeTicks) can be
used as alarm variables.
sampling
-
time
: Sampling interval (in seconds), in the range 5 to 65,535.
delta
: Specifies to sample increments (that is, the current increment with regard to the
latest sample)
absolute
: Specifies to sample absolute values.
rising_threshold threshold
-
value1
: Specifies the rising threshold. The
threshold
-
value1
argument ranges from 0 to 2,147,483,647.
event
-
entry1
: Index of the event entry corresponding to the rising threshold, in the
range of 0 to 65535.
falling_threshold threshold
-
value2
: Specifies the falling threshold. The
threshold
-
value2
argument ranges from 0 to 2,147,483,647.
event
-
entry2
: Index of the event entry corresponding to the falling threshold, in the
range 0 to 65535.
owner text
: Specifies the owner of the entry, a string of 1 to 127 characters.
Description
Use the
rmon alarm
command to add an alarm entry to the alarm table. If you do not
specify the
owner text
keyword/argument combination, the owner of the entry is
displayed as “null”.
Use the
undo rmon alarm
command to remove an alarm entry from the alarm table.
You can use the
rmon alarm
command to define an alarm entry so that a specific alarm
event can be triggered under specific circumstances. The act (such as logging and
sending traps to NMS) taken after an alarm event occurs is determined by the
corresponding alarm entry.
Note:
Before adding an alarm entry, make sure the events to be referenced in the alarm entry
exist. Refer to the
rmon event
command for related information.
With an alarm entry defined in an alarm group, a network device performs the following
operations accordingly:
z
Sample the defined alarm variables (
alarm-variable
) once in each specified period,
which is specified by the
sampling-time
argument.
z
Comparing the sampled value with the set thresholds and performing the
corresponding operations, as described in
Table 2-7
.