3Com IntelliJack NJ200 Software-Handbuch - Seite 6

Blättern Sie online oder laden Sie pdf Software-Handbuch für Netzwerk-Hardware 3Com IntelliJack NJ200 herunter. 3Com IntelliJack NJ200 7 Seiten. Network jacks
Auch für 3Com IntelliJack NJ200: Ergänzendes Handbuch (14 seiten), Datenblatt (4 seiten)

3Com IntelliJack NJ200 Software-Handbuch
3 C O M
®
N J 2 0 0 N E T W O R K J A C K — S N M P T R A P S
Configuring the Network
Management Platform

Business Application

6
After the NJ200 Network Jacks have been properly configured for SNMP traps and trap
destination tables, the network management platform needs to be configured for SNMP
traps and event alerts. Obviously, these procedures will vary depending on the network
management application. For detailed information, please consult the manufacturer's
installation and/or technical documentation.
Here is a summary of the overall setup process:
1. Configure and enable SNMP traps using 3Com Central Configuration Manager.
2. Configure trap destination table for each NJ200 Network Jack using any standard
MIB browser.
3. Launch the third-party network management platform application and complete
network discovery to map all devices.
4. Configure notification types and delivery methods.
The ability to remotely monitor for, diagnose, and pinpoint the cause of network prob-
lems is a tremendous timesaver for IT staff. The following scenario, while fictional,
demonstrates how using SNMP traps helps solve real-world problems and deliver sig-
nificant time and cost savings.
The IT staff gets a trouble ticket stating that, "The network is down." They could spend
hours checking servers, switches, routers, gateways, operating systems, and applica-
tions, and calling their ISP or other service providers—only to find out that the
problem isn't the network.
Or, they can check for event alerts on their 3Com Network Supervisor management con-
sole, pinpoint the real problem to a failed NIC connected to a 3Com NJ200 Network
Jack in Room 315/Building A in Engineering, replace the faulty network link, and have
the user back online in minutes.
Better yet, with proactive monitoring, IT staff can detect an underperforming NIC and
replace it during the user's lunch break, before it fails completely—avoiding any dis-
ruption at all to user productivity or business operations.