[Top]
[Prev]
[Next] [Bottom]
Index
A
- access control, 3-15
- Authorization List, 4-9
- controls registration with
Sender, 3-15
- how to set up, 4-10
B
- background image traps,
4-29
C
- center-to-periphery
forwarding, 2-7
- Configuration Tool,
1-2
- how to invoke,
4-2
- what it
can do, 4-1
- Cooperative Consoles (CC)
-
software components, 1-2
-
types of information forwarded, 1-2
- cooptools.schema
-
how to load, 1-5
-
Created by cc field, 3-5
D
-
Database (DB) Template, 4-9
-
how to set up, 4-24
-
Database Name
-
to authorize Receiver access, 4-11
-
database synchronization
-
see synchronization, 3-20
-
DB Template
-
format of, 4-28
-
sample files, 4-25
-
selected by filter, 4-22
-
Delete Permission
-
configuring, 4-5
-
explanation of, 3-23
E
-
Enterprise Trap Names, 4-31
-
Event Dispatcher
-
role of in CC, 3-14
-
Event Dispatcher (na.event)
-
role in CC, 1-4
-
event-forwarding
-
example of, 3-16
-
Events/Traps field, 4-20
-
possible values, 4-20
-
executable binary files for CC, 3-29
F
-
Filter File Entries
-
examples, 5-1
to 5-8
-
Filter Table, 4-9
-
how to set up, 4-13
-
Filter Table window, 4-14
-
Filter Type, 4-18
-
forwarding
-
defined by Filter Table, 4-16
-
defined by filters, 3-18
-
of database information, 4-23
-
of element's agents list, 4-28
-
of element's schema attributes, 4-28
-
of glyph color values, 4-29
-
of screen coordinates, 4-29
-
of view membership information, 4-29
-
selecting by component type, 4-18
-
selecting by host name, 4-18
-
selecting by view name, 4-18
-
selecting by view type, 4-18
-
selecting events by priority, 4-21
-
selecting events/traps to ignore, 4-21
G
-
Glyph Traps, 4-21
H
-
-h option for Receiver, 3-10
-
holding area views, 3-8
I
-
Internationalization for CC, 4-34
L
-
localizing
-
global, 3-27
-
of selected elements, 3-26
-
localizing elements
-
defined, 3-25
N
-
na.event, 3-14
P
-
peer-to-peer configuration
-
and localization option, 3-29
-
peer-to-peer forwarding
-
definition of, 2-1
-
example of, 2-1
-
periphery-to-center forwarding
-
examples of, 2-3
-
priority of events
-
can be changed when forwarded, 3-19
-
how to change when forwarded, 4-21
R
-
Receiver
-
configuring synchronization, 4-5
-
Receiver daemon, 1-2
-
-h option, 3-10
-
registration list, 3-4
-
setting up Registration List, 4-4
-
shutdown, 3-29
-
starting CC from, 3-2
-
Receiver window
-
Start Connection button, 3-2
-
Stop Connection button, 3-2
-
receiving station
-
adding to Authorization List for Sender, 4-11
-
definition, 1-2
-
Registration List
-
adding remote Senders, 4-5
-
registration with remote Senders, 3-4
-
Reload All button, 3-3
S
-
Sender Configuration window, 4-8
-
Sender daemon, 1-2
-
Authorization List for, 4-9
-
Database Template, 4-9
-
operation of, 3-14
-
registration with na.event, 3-14
-
Trap Selection Template, 4-9
-
sending station
-
definition, 1-2
-
shutdown procedure for CC, 3-29
-
SNM database traps, 4-27
-
types defined, 3-19
-
SNM events, 1-2
-
converted to traps for forwarding, 3-15
-
SNM Tools menu
-
adding CC to, 1-5
-
SNMP traps, 1-2
-
software requirements, 1-1
-
source of an element
-
defined, 3-23
-
Start Connection button, 3-2
-
startup procedure, 3-1
-
SunNet Manager
-
version compatibility with CC, 1-1
-
synchronization
-
how to do it, 3-21
-
of runtime databases, 3-20
-
what it is, 3-7
-
synchronization, automatic
-
at scheduled intervals, 4-5
-
at startup, 4-5
T
-
topology information
-
forwarding of, 3-5
-
Trap Selection Template
-
enterprise names, 4-32
-
how to set up, 4-31
-
trap numbers, 4-32
-
Trap Template
-
selected by filter, 4-21
-
traps
-
Glyph, 1-2
-
SNM database, 1-2
-
SNMP, 1-2
V
-
view membership information
-
forwarding of, 4-29
[Top]
[Prev]
[Next] [Bottom]
Copyright 1996 Sun Microsystems, Inc., 2550 Garcia Ave., Mtn. View, CA 94043-1100
USA. All Rights Reserved