This document provides use cases for configuring alarm alerts and thresholds and for troubleshooting the alarm once received. The alarm is generated when the baseline threshold configured is exceeded. The alert can be configured for notification by email, log, trap, or all three. The scenarios covered application performance, hosts, conversations, interface utilization, DiffServ, and voice.
Vendors (Listed Alphabetically):
Advertising Info |
Contact Us |
Submit a White Paper