beautypg.com

8 network alarm management – HP Intelligent Management Center Licenses User Manual

Page 14

background image

Returned Result................................................................................................................266
Example.........................................................................................................................267

Add IP-to-MAC Address Binding.............................................................................................268

Interface URI...................................................................................................................268
Access Method................................................................................................................268
Returned Result................................................................................................................268
Example.........................................................................................................................269

Delete IP-to-MAC Address Binding..........................................................................................270

Interface URI...................................................................................................................270
Access Method................................................................................................................270
Returned Result................................................................................................................270
Example.........................................................................................................................270

Query Conflict and Unauthorized Access Policy........................................................................271

Interface URI...................................................................................................................271
Access Method................................................................................................................271
Returned Result................................................................................................................271
Example.........................................................................................................................272

Query Unknown Access Policy...............................................................................................273

Interface URI...................................................................................................................273
Access Method................................................................................................................273
Returned Result................................................................................................................273
Example.........................................................................................................................274

Modify Conflict and Unauthorized Access Policy.......................................................................275

Interface URI...................................................................................................................275
Access Method................................................................................................................275
Returned Result................................................................................................................275
Example.........................................................................................................................276

Modify Unknown Access Policy..............................................................................................277

Interface URI...................................................................................................................277
Access Method................................................................................................................277
Returned Result................................................................................................................278
Example.........................................................................................................................278

8 Network Alarm Management...................................................................279

Query Alarms......................................................................................................................280

Interface URI...................................................................................................................280
Access Method................................................................................................................280
Returned Result................................................................................................................281
Example.........................................................................................................................282

Query Alarm Information.......................................................................................................283

Interface URI...................................................................................................................283
Access Method................................................................................................................283
Returned Result................................................................................................................283
Example.........................................................................................................................286

Query Root Alarm Information................................................................................................287

Interface URI...................................................................................................................287
Access Method................................................................................................................287
Returned Result................................................................................................................287
Example.........................................................................................................................288

Query Child Alarms..............................................................................................................289

Interface URI...................................................................................................................289
Access Method................................................................................................................289
Returned Result................................................................................................................289
Example.........................................................................................................................290

Query Top N Alarming Devices..............................................................................................291

14

Contents