Create Probing Profile elements for monitoring third-party devices

Probing Profiles define the monitoring of third-party device status (using SNMPv1/SNMPv2c/SNMPv3/Ping/TCP) and the settings for receiving statistics information from them (using SNMPv1).

For more details about the product and how to configure features, click Help or press F1.

Steps

  1. Select Configuration, then browse to Monitoring.
  2. Browse to Third-Party Devices > Probing Profiles.
  3. Right-click Probing Profiles, then select New > Probing Profile.
  4. Define the probing profile settings on the General tab.
  5. On the Status tab, define the probing profile status settings.
  6. (SNMP/SNMPv2c/SNMPv3 probing only) On the Statistics tab, define the settings for statistics reception using SNMPv1 traps.
  7. Click OK.

Probing Profile Properties dialog box

Use this dialog box to define the properties for a Probing Profile.

Option Definition
General tab
Name The name of the element.
Probing Interval Defines how often the probing is done.
Retry Count Defines how many times probing is attempted if the connection is not established.
Timeout Defines how long the third-party device is probed.
Category

(Optional)

Includes the element in predefined categories. Click Select to select a category.
Comment

(Optional)

A comment for your own reference.
Option Definition
Status tab
Probing Method Defines the probing method to use.
  • Disabled — No method is used.
  • Ping — The device is pinged with ICMP messages.
  • SNMP — SNMP traps are used.
  • SNMP V2c — SNMP V2c traps are used.
  • SNMP V3 — SNMP V3 traps are used.
  • TCP — TCP probing is used.
Port Enter the port number.
SNMP Community Select the SNMP Community used for authentication with the third-party device.
Security Name Enter the SNMP security name of the user.
Context Name Enter the SNMP context name of the user.
Security Level Select from the following:
  • NoAuthNoPriv — There is no authentication, and communication between devices is not encrypted.
  • AuthNoPriv — There is authentication, but communication between devices is not encrypted.

    Use MD5 or SHA authentication in the Authentication Protocol drop-down list.

  • AuthPriv — There is authentication, and communication between devices is encrypted.

    Use MD5 or SHA authentication in the Authentication Protocol drop-down list.

    Use DES, AES, AES192, AES256, or 3DES for encryption in the Privacy Protocol drop-down list.

Option Definition
Statistics tab
Memory Used To choose the correct OID from an MIB, click Select.
Memory Free To choose the correct OID from an MIB, click Select.
CPU Usage To choose the correct OID from an MIB, click Select.
Interface Statistics Returns statistics for the interface.
IP Address Enter the IP address to probe.
Test Tests if the IP address can be probed.
Clear Clears the results of the test.