EPICenter Concepts and Solutions Guide
4
Creating the Device Inventory .....................................................................................................33
Using Discovery ..................................................................................................................33
Adding Devices Individually..................................................................................................35
Setting up Default Device Contact Information.......................................................................36
Creating and Using Device Groups ........................................................................................36
Managing Device Configurations and Firmware.............................................................................38
Saving Baseline Configuration Files in the Configuration Manager............................................38
Scheduling Configuration File Archiving ................................................................................40
Checking for Software Updates.............................................................................................41
Using the EPICenter Alarm System .............................................................................................42
Predefined Alarms...............................................................................................................42
The Alarm Log Browser ........................................................................................................43
Filtering the Alarm Log Display.............................................................................................44
Creating or Modifying an Alarm Definition..............................................................................47
Threshold Configuration for RMON and CPU Utilization Alarms ...............................................54
Configuring a CPU Utilization Rule .......................................................................................57
Using Topology Views ................................................................................................................59
Automated Map Creation vs. Manual Map Creation .................................................................61
Customizing the Look of Your Maps.......................................................................................62
Using Basic EPICenter Reports...................................................................................................62
Chapter 3: Managing your Network Assets...................................................................................... 67
Creating a Network Component Inventory.....................................................................................67
Using Discovery to Find Network Devices...............................................................................67
Adding Devices Individually..................................................................................................70
Importing Devices Using the DevCLI Utility............................................................................71
Making Device Contact Information Changes................................................................................71
Organizing Your Inventory with Device Groups..............................................................................73
Monitoring Critical Links with Port Groups ...................................................................................74
Inventory Reports ......................................................................................................................77
Uploading Inventory Information to Extreme ..........................................................................78
Chapter 4: Configuring and Monitoring Your Network ...................................................................... 79
Scalable, Concurrent Multidevice Configuration ...........................................................................79
User-Defined Telnet Macros .......................................................................................................79
Creating Telnet Macros for Re-Use........................................................................................80
Creating Macros to be Run From a Menu ...............................................................................82
Role-based Telnet Macro Execution.......................................................................................83
Network-wide VLAN Configuration...............................................................................................84
Graphical and HTML-based Configuration Monitoring ...................................................................85
EAPS Protocol Monitoring and Verification...................................................................................86
EAPS Domain and Device Status ..........................................................................................87
Focus Mode........................................................................................................................88
EAPS Detail Status Displays.................................................................................................89
Verifying the EAPS Configuration ..........................................................................................90
The EAPS Log Report ..........................................................................................................92