3Com IntelliJack NJ200 Посібник з програмного забезпечення - Сторінка 6
Переглянути онлайн або завантажити pdf Посібник з програмного забезпечення для Мережеве обладнання 3Com IntelliJack NJ200. 3Com IntelliJack NJ200 7 сторінок. Network jacks
Також для 3Com IntelliJack NJ200: Додатковий посібник (14 сторінок), Технічний паспорт (4 сторінок)
3 C O M
®
N J 2 0 0 N E T W O R K J A C K — S N M P T R A P S
Configuring the Network
Management Platform
Business Application
6
After the NJ200 Network Jacks have been properly configured for SNMP traps and trap
destination tables, the network management platform needs to be configured for SNMP
traps and event alerts. Obviously, these procedures will vary depending on the network
management application. For detailed information, please consult the manufacturer's
installation and/or technical documentation.
Here is a summary of the overall setup process:
1. Configure and enable SNMP traps using 3Com Central Configuration Manager.
2. Configure trap destination table for each NJ200 Network Jack using any standard
MIB browser.
3. Launch the third-party network management platform application and complete
network discovery to map all devices.
4. Configure notification types and delivery methods.
The ability to remotely monitor for, diagnose, and pinpoint the cause of network prob-
lems is a tremendous timesaver for IT staff. The following scenario, while fictional,
demonstrates how using SNMP traps helps solve real-world problems and deliver sig-
nificant time and cost savings.
The IT staff gets a trouble ticket stating that, "The network is down." They could spend
hours checking servers, switches, routers, gateways, operating systems, and applica-
tions, and calling their ISP or other service providers—only to find out that the
problem isn't the network.
Or, they can check for event alerts on their 3Com Network Supervisor management con-
sole, pinpoint the real problem to a failed NIC connected to a 3Com NJ200 Network
Jack in Room 315/Building A in Engineering, replace the faulty network link, and have
the user back online in minutes.
Better yet, with proactive monitoring, IT staff can detect an underperforming NIC and
replace it during the user's lunch break, before it fails completely—avoiding any dis-
ruption at all to user productivity or business operations.