beautypg.com

Security monitoring thresholds – Brocade Monitoring and Alerting Policy Suite Administrators Guide (Supporting Fabric OS v7.3.0) User Manual

Page 108

background image

Default resource monitoring thresholds

TABLE 32

Monitoring statistic

MAPS thresholds and actions per policy

Actions

Aggressive

Moderate

Conservative

Flash (percentage used)

90

90

90

RASLOG, SNMP, EMAIL

CPU (percentage used)

80

80

80

RASLOG, SNMP, EMAIL

Memory (percentage
used)

75

75

75

RASLOG, SNMP, EMAIL

Management port (up or
down)

Up/Down

Up/Down

Up/Down

RASLOG, SNMP, EMAIL

Security monitoring thresholds

The following table lists the default monitoring thresholds for security criteria used by MAPS. Unless
noted otherwise, all thresholds are measured per minute and actions are triggered when the reported
value is greater than the threshold value.

Default security monitoring thresholds

TABLE 33

Monitoring statistic

MAPS thresholds and actions per policy

Actions

Aggressive

Moderate

Conservative

DCC violations

0

2

4

RASLOG, SNMP, EMAIL

HTTP violation

0

2

4

RASLOG, SNMP, EMAIL

Illegal command

0

2

4

RASLOG, SNMP, EMAIL

Incompatible security DB 0

2

4

RASLOG, SNMP, EMAIL

Login violations

0

2

4

RASLOG, SNMP, EMAIL

Invalid certifications

0

2

4

RASLOG, SNMP, EMAIL

No-FCS

0

2

4

RASLOG, SNMP, EMAIL

SCC violations

0

2

4

RASLOG, SNMP, EMAIL

SLAP failures

0

2

4

RASLOG, SNMP, EMAIL

Telnet violations

0

2

4

RASLOG, SNMP, EMAIL

TS out of sync

1/hr

2/day

2/hr

4/day

4/hr

10/day

RASLOG, SNMP, EMAIL

Security monitoring thresholds

108

Monitoring and Alerting Policy Suite Administrator's Guide

53-1003147-01