[Top] [Prev] [Next] [Bottom]

Index


A


access control,  3-15

Authorization List,  4-9

controls registration with Sender,  3-15

how to set up,  4-10

B


background image traps,  4-29

C


center-to-periphery forwarding,  2-7

Configuration Tool,  1-2

how to invoke,  4-2

what it can do,  4-1

Cooperative Consoles (CC)

software components,  1-2

types of information forwarded,  1-2

cooptools.schema

how to load,  1-5

Created by cc field,  3-5

D


Database (DB) Template,  4-9

how to set up,  4-24

Database Name

to authorize Receiver access,  4-11

database synchronization

see synchronization,  3-20

DB Template

format of,  4-28

sample files,  4-25

selected by filter,  4-22

Delete Permission

configuring,  4-5

explanation of,  3-23

E


Enterprise Trap Names,  4-31

Event Dispatcher

role of in CC,  3-14

Event Dispatcher (na.event)

role in CC,  1-4

event-forwarding

example of,  3-16

Events/Traps field,  4-20

possible values,  4-20

executable binary files for CC,  3-29

F


Filter File Entries

examples,  5-1 to 5-8

Filter Table,  4-9

how to set up,  4-13

Filter Table window,  4-14

Filter Type,  4-18

forwarding

defined by Filter Table,  4-16

defined by filters,  3-18

of database information,  4-23

of element's agents list,  4-28

of element's schema attributes,  4-28

of glyph color values,  4-29

of screen coordinates,  4-29

of view membership information,  4-29

selecting by component type,  4-18

selecting by host name,  4-18

selecting by view name,  4-18

selecting by view type,  4-18

selecting events by priority,  4-21

selecting events/traps to ignore,  4-21

G


Glyph Traps,  4-21

H


-h option for Receiver,  3-10

holding area views,  3-8

I


Internationalization for CC,  4-34

L


localizing

global,  3-27

of selected elements,  3-26

localizing elements

defined,  3-25

N


na.event,  3-14

P


peer-to-peer configuration

and localization option,  3-29

peer-to-peer forwarding

definition of,  2-1

example of,  2-1

periphery-to-center forwarding

examples of,  2-3

priority of events

can be changed when forwarded,  3-19

how to change when forwarded,  4-21

R


Receiver

configuring synchronization,  4-5

Receiver daemon,  1-2

-h option,  3-10

registration list,  3-4

setting up Registration List,  4-4

shutdown,  3-29

starting CC from,  3-2

Receiver window

Start Connection button,  3-2

Stop Connection button,  3-2

receiving station

adding to Authorization List for Sender,  4-11

definition,  1-2

Registration List

adding remote Senders,  4-5

registration with remote Senders,  3-4

Reload All button,  3-3

S


Sender Configuration window,  4-8

Sender daemon,  1-2

Authorization List for,  4-9

Database Template,  4-9

operation of,  3-14

registration with na.event,  3-14

Trap Selection Template,  4-9

sending station

definition,  1-2

shutdown procedure for CC,  3-29

SNM database traps,  4-27

types defined,  3-19

SNM events,  1-2

converted to traps for forwarding,  3-15

SNM Tools menu

adding CC to,  1-5

SNMP traps,  1-2

software requirements,  1-1

source of an element

defined,  3-23

Start Connection button,  3-2

startup procedure,  3-1

SunNet Manager

version compatibility with CC,  1-1

synchronization

how to do it,  3-21

of runtime databases,  3-20

what it is,  3-7

synchronization, automatic

at scheduled intervals,  4-5

at startup,  4-5

T


topology information

forwarding of,  3-5

Trap Selection Template

enterprise names,  4-32

how to set up,  4-31

trap numbers,  4-32

Trap Template

selected by filter,  4-21

traps

Glyph,  1-2

SNM database,  1-2

SNMP,  1-2

V


view membership information

forwarding of,  4-29


[Top] [Prev] [Next] [Bottom]

Copyright 1996 Sun Microsystems, Inc., 2550 Garcia Ave., Mtn. View, CA 94043-1100 USA. All Rights Reserved