|
Contents ..................................................................................2Chapter 1 Introducing ..........................................................3Introducing ......................................................................................................................................................3SNMP ...................................................................................................................................................................3Trademarks.......................................................................................................................................................3Operating Environment ...........................................................................................................................4Chapter 2 Set up ....................................................................5PJ Network Manager installation........................................................................................................6PJ Network Manager un-installation ................................................................................................6Chapter 3 Basic Operation ...................................................7Launching and quitting PJ Network Manager...........................................................................8Name of status window...........................................................................................................................8Quitting PJ Network Manager..............................................................................................................9Menu tree .........................................................................................................................................................9What's Target ..................................................................................................................................................9Name of the button on the tool bar .............................................................................................10Icon display for the target....................................................................................................................10Addition of the target ............................................................................................................................11Editing the target ......................................................................................................................................11Deletion of the target.............................................................................................................................11Setting up the warning value ...........................................................................................................12Starting target monitoring..................................................................................................................12When happens the alert on the target .......................................................................................13When happens the trap event on the target ..........................................................................13What's Trap....................................................................................................................................................13Stopping monitoring the target......................................................................................................14Displaying all the status information of the target ..............................................................14Setting the target group ......................................................................................................................14Setting up the password of Telnet .................................................................................................15Setting commands batch processing for multiple targets .............................................15Setting timer for targets........................................................................................................................16Setting up default setting....................................................................................................................17Customizing the status list ..................................................................................................................19Viewing the alert information ...........................................................................................................22Viewing the event log............................................................................................................................23Description of Event, Type, Warning column, Warning value ......................................24About event treatment .........................................................................................................................26Viewing the command history.........................................................................................................27Storing the management file ............................................................................................................28Information saved to the registry ..................................................................................................28Registering the target information from the defined file at once ..............................29Format of the defined file ....................................................................................................................30Example of the defined file .................................................................................................................30Login to the target equipment ........................................................................................................31Contents
PreviousNext |