Brocade Network Advisor SAN User Manual v12.3.0 User Manual

Page 1357

Advertising
background image

Brocade Network Advisor SAN User Manual

1305

53-1003154-01

Pseudo events

32

6. Select the pseudo event you created and click Next.

The Sources pane of the Add Event Action dialog box displays.

7. Select the source that you will use to monitor this event from the Selected Sources list.

8. Click Next to advance to the Policy pane of the Add Event Action dialog box.

The Policy pane of the Add Event Action dialog box displays.

9. Click the Take actions for the selected events when they occur button if you want to take action

for the selected events when they occur.

10. Click Next to advance to the Action Group-Actions pane of the Add Event Action dialog box.

The Action Group-Actions pane of the Add Event Action dialog box displays.

11. Select the Deploy CLI Configuration check box and click the Configure button if you want to

deploy a configuration from CLI Configuration Manager to products if the policy criteria have
been met.

NOTE

If the CLI configuration you chose from CLI Configuration Manager contains a non-Fabric OS
product as a target, the configuration will not be deployed to the non-Fabric OS product.

12. You can either select an existing CLI configuration or create a new one and select that

configuration. After selecting a CLI configuration, the name of the CLI configuration is
displayed in the Selected Configuration field.

-

Has Parameters - Displays Yes if the CLI configuration has parameters that require values
to be entered before it can be deployed, and displays No if no parameter needs to be
defined.

-

The Parameters list lists the parameters that need to be defined in the configuration.

The Parameter column displays the parameter and its variables in the CLI
configuration.

The Source column lists the appropriate SNMP attributes for the parameters. Each
attribute contains a specific parameter value, such as an IP address. Select the
attribute you want from the list.

The Transformation column uses the product IP addresses and MAC addresses listed
in the Address Finder. If the Address Finder list is empty, the product or port will not be
found. From this column, specify what you want Event Processor to do with the value
in the attribute:

-

Find Device: Find the product with the IP address in the attribute and deploy the
CLI configuration to that product.

-

Find Port: Find the port on a product with the IP address in the attribute and
deploy the CLI configuration to that port.

-

Find Intruder MAC: Find the product with the IP address in the attribute that
matches the intruder MAC address and deploy the CLI configuration to that
product.

-

None: The Event Processor only reports occurrence of the products.

13. Select the Deploy Product Configuration check box if you want to deploy a payload to the

products if the policy criteria have been met.

Advertising