Administrators Guide (Supporting Fabric OS v7.3.0) Manual

Default resource monitoring thresholdsTABLE 32
Monitoring statistic
MAPS thresholds and actions per policy
ActionsAggressive Moderate Conservative
Flash (percentage used) 90 90 90 RASLOG, SNMP, EMAIL
CPU (percentage used) 80 80 80 RASLOG, SNMP, EMAIL
Memory (percentage
used)
75 75 75 RASLOG, SNMP, EMAIL
Management port (up or
down)
Up/Down Up/Down Up/Down RASLOG, SNMP, EMAIL
Security monitoring thresholds
The following table lists the default monitoring thresholds for security criteria used by MAPS. Unless
noted otherwise, all thresholds are measured per minute and actions are triggered when the reported
value is greater than the threshold value.
Default security monitoring thresholdsTABLE 33
Monitoring statistic
MAPS thresholds and actions per policy
ActionsAggressive Moderate Conservative
DCC violations 0 2 4 RASLOG, SNMP, EMAIL
HTTP violation 0 2 4 RASLOG, SNMP, EMAIL
Illegal command 0 2 4 RASLOG, SNMP, EMAIL
Incompatible security DB 0 2 4 RASLOG, SNMP, EMAIL
Login violations 0 2 4 RASLOG, SNMP, EMAIL
Invalid certifications 0 2 4 RASLOG, SNMP, EMAIL
No-FCS 0 2 4 RASLOG, SNMP, EMAIL
SCC violations 0 2 4 RASLOG, SNMP, EMAIL
SLAP failures 0 2 4 RASLOG, SNMP, EMAIL
Telnet violations 0 2 4 RASLOG, SNMP, EMAIL
TS out of sync 1/hr
2/day
2/hr
4/day
4/hr
10/day
RASLOG, SNMP, EMAIL
Security monitoring thresholds
108 Monitoring and Alerting Policy Suite Administrator's Guide
53-1003147-01