Solstice Enterprise Manager 4.1 Managing Your Network Doc SetContentsPrevious


A - B - C - D - E - F - G - H - I - J - K - L - M - N - O - P - Q - R - S - T - U - V - W - X - Y - Z

Index

A

access control, scope of access (security)
defining, 1, 2
to base object, 1
access manager, See security1
access, data, 1
accessing remote MIS servers (security), 1
action operation (security), 1, 2
adding attributes
SNMP Data, adding attributes, 1
administrativeState value, 1
agent communications, object
agent communications, 1
agent/station model, 1, 2
agents
CMIP, 1
CMIP MPAs, 1, 2, 3
communications, 1
configuring, 1
default, 1
description, 1, 2, 3
legacy support, 1
MIS, 1
MPAs, 1, 2
protocol descriptions, 1
RPC, 1, 2
SNMP, 1
SunNet Manager, 1
alarm
configuration files, 1
definition, 1
instances
viewing, 1
security, 1
severity, 1
state
overview, 1
alarm associations
alarm representing an association, 1, 2
and summary view, 1, 2
attributes used to group alarms
default, 1
specifying, 1
definition, 1
definition of attributes used to group alarms, 1
rules
loading from a file, 1
saving to a file, 1
setting, 1
alarm attributes
for grouping into associations, 1
selecting for display in Alarms, 1
alarm deletion controllers
creating, 1
displaying for a remote MIS, 1
modifying, 1
Alarm Deletion Controllers window
using to delete alarms, 1
alarm filtering rules
configuration file, 1
deselecting, 1
loading, 1
printing, 1
saving, 1
setting, 1
alarm filters
overview, 1
Alarm Manager, See Alarms window1
AlarmLog
alarms collected by, 1
alarms not collected by, 1
alarms
acknowledging, 1
annotating, 1
clearing, 1, 2
colors, 1
default log file, 1
default severity colors, 1
deleting1
automatically, 1
manually, 1
with Alarm Deletion Controllers, 1
filtering, 1
for deletion, 1
graphing, 1
grouping into associations, 1
hiding, 1
logging management activity, 1
Network Views, in, 1, 2
printing a list, 1
propagating severity, 1
scrolling automatically, 1
severity, 1
showing duplicates, 1
status, 1
summarizing, 1
viewing, 1, 2, 3
associations, 1, 2
details, 1
in a non-default log, 1
instances, 1
on a remote MIS, 1
specific network component, 1
summary, 1
alarms security
logging activities, 1
Alarms window1
associations view, 1
changing alarm sort order, 1
changing attribute labels, 1
customizing display, 1
customizing Tools menu, 1
functions, 1
localized text strings, 1
opening and exiting, 1
overview, 1, 2
specifying attributes displayed, 1
summary view, 1
using, 1
ancillary services, MIS, 1
APIs, 1, 2
application features, See tool tasks1
architecture, EM, 1, 2
associations, See alarm associations1
attribute data, tools for gathering, 1
attributes
alarm
for grouping into associations, 1
attributes of object sets (security), 1
attributes, object, 1
autoEntryScope field, 1
autoManagement daemon
about, 1
-debug parameter, 1
reference information, 1
starting/stopping, 1
working with customized autoManagement Entry objects, 1
autoManagement Entry object
launching IsSnmpSystemUp Template, 1
launching LinkUp Template, 1
launching Ping-Reachable Template, 1
locked or unlocked, 1

B

background images, 1, 2
Network Views, 1
bitmap backgrounds, 1

C

changing log entry display, 1
changing tool description (security), 1
classifying devices, 1
clearing alarms, 1
cluster, layout, 1, 2
CMIP agents, 1
CMIP environment variables, 1
CMIP MPAs, 1, 2, 3
CMIP protocol
supported, 1
CMIS filters (security), 1
collections, See data collections1
color
default alarm severity, 1
Network Views presentation, 1
Network Views settings, 1
used to indicate alarm severity, 1
column headings (log entries), customizing, 1
column order (log entries), changing, 1
compilers, 1
component representations, in Network Views, 1
components, EM, 1
configurable object type data, 1
configuration files
em_alarmmgr_ap.cf, 1, 2
em_alarmmgr_fp.cf, 1
em_alarmmgr_i18n.cf, 1
em_alarmmgr_tp.cf, 1, 2
em_alarmmgr_vp.cf, 1, 2
em_logview.cf, 1
emenv.csh, 1
emenv.sh, 1
connecting to a MIS, 1
CORBA gateway, 1
create operation (security), 1, 2
custom mangement applications, 1
custom network management tools, 1

D

data access, in MIS, 1
data collection tools, 1
data collections
command-line options, 1
creating, 1
GDMO classes, 1
starting Data Collections, 1
Data Collections tool, 1
database, MIS, 1
dataCollectorEntry object GDMO class, 1
default access rule (security), 1, 2, 3
default agents, 1
default alarm severity colors, 1
default folder, 1
default object attributes command, 1
default view, Network Views, 1
deleting log entries, 1
deleting objects, 1
deleting tool tasks (security), 1
designer, requests, 1
devices, classifying, 1
Discover, See Network Discovery1
discover.conf file, 1
discriminator construct, 1
display properties, general, 1
double-click actions, configuration, 1

E

em command, 1
EM objects provided per MIB group, 1
EM tools, 1
em_accesscmd utility, 1, 2, 3, 4, 5
em_accessmgr command, 1, 2, 3, 4
em_alarmmgr command, 1, 2
em_auto daemon, See autoManagement daemon1
em_datacollector command, optional parameters, 1
em_discover command, 1
em_discover -M command, 1
em_layout command, 1
em_login daemon, 1, 2
em_logview command, 1
em_nnconfig utility, 1
em_oct command, 1, 2
em_purgemgr command, 1
em_reqedit command, 1
em_simplerequests command, 1
em_viewer command, 1
Enterprise Manager
accessing online documentation, 1
adding tools, 1
basic concepts, 1
configuration file, 1
core management tools, 1
core management tools executables, 1
environment variables, 1
modifying tool configurations, 1
removing tools, 1
script to set environment variables, 1
setting environment variables, 1
starting, 1
starting individual tools, 1
system variables, 1
environment variables, 1
environment variables, CMIP, 1
error messages, 1
error messages, SNMP to CMIP translation, 1
event logs
events not recorded by default, 1
events recorded by default, 1

F

fault management, proactive, 1
features, EM, 1
file limit in SNM Results Browser, 1
filtering log entries, 1
filters, alarm, See alarms1
finding by name, Network Views, 1
folders
about, 1
emptying and deleting, 1
loading files, 1
Full Access group (security)
accessing tools and objects, 1
default rights, 1
granting privileges, 1

G

geographical maps
adding new, 1
configuration files, 1
layers, 1
more about, 1
navigating in, 1
using as background, 1
get operation (security)
example of, in Defaults dialog, 1
option description, 1
global deny rule, 1, 2, 3
See also security rules1, 2, 3, 4
global grant rule, 1, 2
See also security rules1, 2, 3, 4
GMC files, 1
graphing alarms, 1
graphing information trends, 1
graphing trends
Grapher, 1
graphs
3-D graph, 1
merging, replotting, 1
printing, 1
starting EM - Graphs, 1
group profiles (security)
access privileges of, 1, 2
changing members, 1
creating from the command line, 1
definition, 1
deleting, 1
deleting from the command line, 1
maintaining, 1
printing, 1
saving and reusing, 1
See alsouser profiles1
supplied with default installation, 1
groups (security), 1, 2
See also group profiles1
assigning access rules to, 1
assigning object sets, 1
assigning tool tasks, 1
changing membership, 1
controlling access to tools, 1
definition, 1
Full Access group
access to tools and objects, 1
default rights, 1
granting privileges, 1
minimum number of members, 1
Operators group, 1, 2
searching, 1
supplied with installation, 1, 2

H

hiding log entry attributes, 1
hierarchical views, 1
hop counts, Network Discovery, 1

I

icon label size, 1
icon objects, creating, 1
icon size, 1
icons, configuring display, 1
icons, Network Views, 1
images, background in Network Views, 1, 2, 3
Index attributes
SNMP Browser, indexes, 1
init_user file, 1
installation
predefined access rules, 1
predefined groups, 1
predefined object sets, 1
introduction, EM, 1
item deny rule, 1
managed objects, 1
object sets, 1
See also security rules1, 2, 3, 4
item grant rule, 1
managed objects, 1
object sets, 1
See also security rules1, 2, 3

J

JMA server, 1

L

labels, configuring display, 1
labels, icon, 1
layers, map
displaying map layers, 1
layout options, 1
layout views, 1
legacy support, 1
limit command, 1
log entries1
adding tools to menu, 1
AlarmLog, 1
changing column order, 1
changing sort order of log records, 1
combining records in single view, 1
command-line options, 1
configuration file, 1, 2
customizing column headings, 1
customizing window display, 1
deleting, 1
environment variables, 1
events not recorded by default, 1
events recorded by default, 1
filtering log records, 1
filtering test, 1
overview, 1
printing, 1
removing tools from menu, 1
searching for, 1
security privileges, 1
showing and hiding attributes in window, 1
starting, 1
viewing log record details, 1
log manager, 1
log records, See log entries1
log viewer, See log entries1
logging
alarms management, 1
Network Discovery, 1
Network Views, 1
Logging tab, 1
logical views, 1
logical views, in Network Views
creating, 1
definition, 1
login privileges for root and superusers (security), 1
login to remote MIS servers, 1

M

macros, Network Views, 1
managed objects, 1
by function, 1
creating, 1
in Network Views, 1
location of, 1
modifying, 1
Management Information Base, 1
management overview, 1
Management Protocol Adapter
configuring over RFC1006, 1
running a configuration script, 1
starting remotely, 1
management tools, EM, 1
maps, geographical, 1, 2, 3
adding new maps, 1
components of, 1
navigating in views, 1
using as background, 1
menu, tools, 1
menus, pop-up, 1
mesh, layout, 1, 2
message log, Network Views, 1
MIB groups, 1
MIB terminology, 1
MIBs, 1
MIBs supported by EM, 1
MIS, 1
ancillary services, 1
creating, 1
data access, 1
description, 1
Nerve Center, 1
object orientation, 1
overview, 1
remote
viewing alarm deletion controllers, 1
viewing alarms on, 1
MIS agents, 1
MIS requests, 1, 2
advanced, 1
basic, 1
viewing, 1
modules, EM API, 1
Monitor, Network, 1, 2
Monitoring network components, 1
MPA
communication agents, 1
more about, 1
running a configuration script, 1
starting remotely, 1
using over RFC1006, 1
multiple instances, of Network Views, 1
multiple object selection (security)
example of, in Defaults dialog, 1
option description, 1

N

navigating, in geographical maps, 1
Nerve Center, 1
Nerve Center request templates, 1
NerveCenter alarms, logged in, 1
Network Discovery
classifying devices, 1
command-line options, 1, 2
creating a new MIS database, 1
deciding what to discover, 1
failed, 1
getting started, 1
hop counts, 1
loading and saving rules, 1
logging, 1
Monitor, 1, 2
overview, 1
ports, 1
probe stage, 1
protocols, 1
proxy agents, 1
queries, 1
reference, 1
related files, 1
related tasks, 1
search methods, 1, 2
stopping, 1
viewing progress, 1
network management applications, custom, 1
network management software, description, 1
Network management tools, 1
network management, protocols, 1
Network Monitor, 1, 2
Network Tools, 1
Network Views, 1, 2
adding geographical maps, 1
advanced requests, 1
alarm status, 1
alarms, 1, 2
background images, 1, 2
basic concepts, 1
clearing alarms, 1
CMIP agents, 1
CMIP MPAs, 1
color settings, 1
command-line options, 1
component representations, 1
configurable object type data, 1
configuring double-click actions, 1
creating icon objects, 1
creating logical views, 1
default agents, 1
default view, 1
deleting objects, 1
discovering network objects, 1
displaying and selecting objects, 1
editing views, 1
features, 1
finding by name, 1
general display properties, 1
geographical maps, 1, 2, 3, 4
icon and label display, 1
icon label size, 1
icon objects, 1
icon size, 1
layout options, 1
logical views, 1
macros, 1
message log, 1
MIS agents, 1
multiple instances, 1
Network Discovery, 1
Network Discovery, and, 1
object attributes command, 1
object palette, 1, 2
object properties, 1, 2, 3
object types, 1, 2
overview, 1
pop-up menus, 1
presentation colors, 1
propagating alarm severity, 1
reference information, 1, 2
requests, 1, 2, 3
RPC agents, 1
saved views, 1
saving and loading settings, 1
searching for objects, 1
selecting a view, 1
SNMP agents, 1
tasks for working with views, 1
toolbars, 1
tools menu, 1
variables, 1
view layout, 1
viewing alarms, 1
zoom settings, 1
zooming in and out, 1
non-topological views, 1

O

object attributes command, 1
object classes, 1
object filters (security), 1
object instances (security), 1, 2
object orientation, 1
object palette, 1, 2
object properties
CMIP agents, 1
CMIP environment variables, 1
CMIP MPAs, 1, 2, 3
command line, 1
configuring display, 1
creating, 1
getting started, 1
MIS agents, 1
modifying, 1
RPC agents, 1
SNMP agents, 1
viewing, 1, 2
object sets (security)
assigning to groups, 1
controlling user access, 1
creating, 1
creating CMIS filters, 1
criteria defining, 1
default access rules, 1, 2
definition, 1
deleting, 1
deleting access rules on, 1
denying access to all, 1, 2
denying access to specific, 1, 2
examples, 1
granting access to all, 1, 2
granting access to specific, 1, 2
implementation guidelines, 1
maintaining, 1
maintaining access rules on, 1
rules for controlling access to, 1
supplied with installation, 1, 2
tasks for controlling access to, 1
updating, 1
updating access rules, 1
viewing group access privileges, 1
when to control user access to, 1
object types, 1
objects
configurable data, 1
creating in Network Views, 1
deleting, 1
displaying and selecting, 1
displaying specific types, 1
finding by name, 1
searching for, 1
types, 1, 2
online documentation, access to, 1
Operators group (security), 1, 2
OSI alarms, logged in AlarmLog, 1
OSI standard alarms, 1
osimcsd MIS process, 1
overview, EM, 1
APIs, 1
application development support tools, 1
complete listings, 1
components, 1
data access, 1
description, 1
features, 1
MIS, 1
MIS services, 1
MPAs, 1
Nerve Center, 1
object orientation, 1
PMI, 1
protocols, 1
task overview, 1
tools, 1

P

palette, object, 1, 2
password authentication, 1
Ping/SNMP optimization, 1
Ping/SNMP/RPC tab, 1
PMI, 1
polling
in RPC/CMIP Data, 1
intervals, 1
using proxy agents, 1
pop-up menus, 1
Portable Management Interface, 1
ports for network discovery, 1
printing log entries, 1
probe, Network Discovery, 1
Probe_OID, 1
propagating alarm severity, 1, 2
properties, object
CMIP agents, 1
CMIP environment variables, 1
CMIP MPAs, 1, 2, 3
command line, 1
command-line options, 1
configurable data, 1
creating, 1
getting started, 1
MIS agents, 1
modifying, 1
more about, 1
RPC agents, 1
SNMP agents, 1
viewing, 1
protocols
Network Discovery, 1
network management, 1
proxy agents, 1

Q

queries, Network Discovery, 1

R

reconnecting to a MIS, 1
recording SNMP Data, 1
remote CMIP, 1
report formats, 1, 2
reports
about, 1
cloning, 1
viewing, 1
request templates
about, 1
customizing, 1
requestInfo attribute, 1
requests, 1, 2
advanced, 1, 2
basic, 1, 2
designer, 1
stopping, 1
viewing, 1
restarting CMIP MPA stack, 1
results browser, See SNM Results Browser1
rk6d MIS process, 1
root privileges (security), 1
RPC
legacy support, 1
supported, 1
RPC agents, 1
RPC/CMIP Data, 1
RPC/CMIP Data, starting, 1
rules, Monitor, 1
rules, Network Discovery, 1

S

saved views, in Network Views, 1
scope of access, See access control, scope of access1
scripts, environment variables, 1
search methods, Network Discovery, 1
searching in Network Discovery, 1
searching in Network Views, 1
searching log entries, 1
security
accessing remote MIS servers, 1
adding tools, 1
command-line options, 1
configuration files, 1
creating object sets, 1
deleting object sets, 1
granting privileges, 1
guidelines for implementing, 1
implementation schemes, 1
overview, 1
preparation tasks for implementing, 1
starting the Security tool, 1
superuser access privileges, 1
tasks for controlling access to objects, 1
tasks for controlling access to tools, 1
tasks performed from the command line, 1
security control
disabling, 1
enabling, 1
managed objects, 1, 2, 3
preparing for, 1
tools, 1, 2, 3
user access to remote MIS servers, 1
using rules for, 1
security policy, 1
security profiles
creating by duplicating existing profiles, 1, 2
definition, 1
for groups, 1
for users, 1
maintaining group profiles, 1
security reference information, 1
security rules
access rules policy, 1
applicable to users and groups, 1
assigning to groups, 1
conflicts, 1
controlling access to object sets, 1
controlling access to tools, 1
creating for tools and tasks, 1
default access rule, 1, 2
deleting object rules, 1
denying access to all objects, 1, 2
denying access to specific objects, 1, 2
duplicating, 1
enforcement policy, 1
example of conflicting rules, 1
granting access to all objects, 1, 2
granting access to specific objects, 1, 2
maintaining access rules controlling objects, 1
supplied with installation, 1, 2
updating, 1
updating access rules controlling objects, 1
using, 1
viewing access privileges to objects, 1
viewing tool privileges, 1
Services/TopoTypes tab, 1
set operation (security), 1, 2
severity, alarm, 1, 2, 3
showing log entry attributes, 1
SNM agents, 1
SNM event notifications, 1
SNM Results Browser
changing window position and size, 1
customizing, 1
defining an output size, 1
deleting, printing reports, 1
folders, 1
loading collections as streams, 1
setting report formats, 1
specifying a printer, 1
starting, 1
viewing reports, 1
SNM RPC event notifications, 1
SNMP, 1
MIBs, 1
supported, 1
SNMP agent, specifying, 1
SNMP Agent, viewing object attributes, 1
SNMP agents, 1, 2
SNMP Agents, selecting multiple, 1
SNMP Data, 1, 2
SNMP data
getting attribute data, 1
tables, 1
SNMP Data Browser, 1
SNMP Data tools, 1
SNMP Data, creating a row, 1
SNMP Data, displaying remote data, 1
SNMP Data, polling an agent, 1
SNMP Data, queries
SNMP Data, getting attribute data, 1
SNMP Data, remote data, 1
SNMP Data, setting attribute data, 1
SNMP Data, tables, 1
SNMP Data, window, 1
SNMP Read Community, 1, 2
SNMP trap notifications, logged in AlarmLog, 1
SNMPv2c, 1
sorting log entries, 1
stopping Network Discovery, 1
streams
about, 1, 2
clearing, deleting, 1
displaying, graphing, 1
organized in the SNM Results Browser, 1
printing, 1
selecting, 1, 2
variables, 1
viewing, 1
SunNet Manager, 1
SunNet Manager Results Browser, See SNM Results Browser1
support tools, for application development, 1
system variables, 1

T

targets, See object sets1
Telecommunications Management Networks, 1
tile, layout, 1, 2
TMN, 1
tool names, modifying, 1
tool tasks (security)
assigning to groups, 1
controlling access to, 1
definition, 1
getting list for a user, 1
specifying from the command line, 1
toolbars, Network Views, 1
tools (log entries)
adding to log entries menu, 1
removing from log entries menu, 1
tools (security)
adding by duplication, 1
adding from the command line, 1
adding to EM, 1, 2
controlling access to, 1
definition, 1
getting list accessible to users, 1
implementation guidelines, 1
removing, 1
rules for controlling access to, 1
tasks for controlling access to, 1
updating access rules, 1
viewing group access privileges, 1
when to control user access, 1
tools menu, 1
tools, custom application development, 1
tools, EM, 1, 2
tree, layout, 1, 2

U

UNIX accounts (security), 1, 2
user profiles (security)
changing group membership, 1
collecting information for, 1
connecting to a remote MIS, 1
creating from the command line, 1
deleting, 1
deleting from the command line, 1
maintaining, 1
preparing, 1
printing, 1
saving and reusing, 1
users (security)
accessible tools, getting list of, 1
accessing a remote MIS, 1
assigning to other groups, 1
authorized tool tasks, getting list of, 1
changing group membership, 1
controlling access to tools, 1
membership in multiple groups, 1
searching for users, 1
UNIX accounts for, 1, 2

V

variables, environment, 1
variables, Network Views, 1
view
dialog, 1
layout, 1
log entry details, 1
Network Discovery progress, 1
settings, Network Views, 1
zoom settings, 1
zooming in and out, 1
View Only group (security), 1, 2
viewer, See Network Views1
views, editing, 1
views, selecting in Network Views, 1

Z

zoom controls, 1
zoom settings, 1

Sun Microsystems, Inc.
Copyright information. All rights reserved.
Doc Set  |   Contents   |   Previous