NeDi Hilfe
Make sure you understand how policy actions work! You can disable all network interfaces for example, if you don't know what you're doing!
Search for 'safety on!' in libmisc.pm and toggle commenting on the 2 '$clistat' lines, if you're confident!
This module lets you define conditions on device configurations, neighbors or learned MAC addresses and take action upon hit or miss.
The class of a policy determines where in the discovery it's processed. This is important, if you want to take action on neighbor names and learned MAC addresses for example, as only the last matching policy with an action will be executed.
| Order | Class | Operator | Description |
|---|---|---|---|
| 1 | Neighbor Name | ~ or !~ | After collecting all LLDP, CDP or FDP neighbors their names are processed |
| 2 | Neighbor Type | ~ or !~ | Right after the names, their types are processed |
| 3 | MAC Address | ~ or !~ | After collecting the bridge-forward entries (MAC address table) they're processed |
| 4 | Connection Before | ~ or !~ | When writing the interfaces to the DB, the previous connection information is processed to detect device links gone down for example |
| - | Configuration | ~ or !~ | Configurations are processed with -b or -Bx, but this policy does not depend on the others above |
| - | Device Monitor | any | Add new devices to monitoring. If you enter - or no in target, it'll be added in maintenance mode. CPU & Mem thresholds are taken from .def, alert action is applied to target and does not create alerts itself |
| - | Total # of MACs | > or < | This policy refers to total # of learned MAC addresses (including those on uplinks).It does not depend on the others above as it's evaluated after writing nodes of a device |
| - | Packets, Bytes and Flows | > or < | Those policies are used by flowi.pl (on nfdump files) allowing for alerts on excessive or missing traffic |
Stolen Nodes
in Nodes-Status to create a MAC policy of that node
Configuration Compliance
Device Monitor
PoE Police
Link Alerts
Traffic
General Topics
and then added again
(and enabled respectively)
withelists a port, thus avoids any other action to be executed