No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.

Knowledge Base

FAQ – What Is the Alarm Handling Strategy of the N2510

Publication Date:  2012-07-25  |   Views:  183  |   Downloads:  0  |   Author:  SU1001975186  |   Document ID:  EKB0000507086


Issue Description


What is the alarm handling strategy of the N2510?

If IP addresses of both the N2510 and N2000 BMS are configured when Simple Network Management Protocol (SNMP) parameters of a host are set, traps are transmitted to the N2510 and N2000 BMS at the same time. What is the alarm handling strategy of the N2510 and how about the capability of the N2510 in tackling traps? In general, alarms of the N2000 BMS are more than those of the N2510. 

Alarm Information


Handling Process


The N2510 supports two types of alarms:

Service alarms, such as port rate unfulfilment

System alarms such as high CPU usage of a server and high memory usage

After a host transmits traps to the N2510, the N2510 quickly identifies alarms that belong to the N2510, parses alarms, and discards irrelevant traps. This process is very short. 

Root Cause