Chapter 3: Using CyberMONITOR3-32CyberMONITOR User’s GuideCommitted Burst - The maximum amount of data on the network during a time interval,without the network discarding any data.Excess Burst - The maximum amount of data allowed to exceed the Committed Burst (there isno guarantee that this data will be passed by the network - it may be discarded).Throughput - A device's committed transfer rate.The File menu item lets you access either Print, (prints the table to a file), Refresh, which reloadsthe Frame Relay table, or Close, which closes the table window.TrapsFigure 3-24, below, shows the Traps Menu, selected by clicking the Traps menu item from theMenu Bar.Figure 3-24 Traps Menu ItemThe Traps Destination Configuration window shown in Figure 3-25, displays when you click onthe Configure Traps menu item in the Traps pull-down menu. This menu lets you set up your PC(via its IP Address) as the destination for traps generated by the device you are monitoring. Youcan set other additional IP Addresses (up to eight) as recipients of traps generated by the deviceyou are monitoring.The Trap Destination Configuration window shows the IP Addresses of devices designated asdestinations to receive traps. The state of each designated trap receiver (Enabled or Disabled) isshown in the right hand column.The Add, Delete, and Modify buttons are used to add, delete, or modify existing entries in thetable of IP Addresses of trap destinations. The Add button displays the Add Trap Destinationwindow shown in Figure 3-26 on the following page. Enter the IP Address of the device that is toreceive traps, and click the Enable Trap checkbox to enable trapping. The Delete button deletesthe item that is highlighted in the Trap Destination Configuration window.