SNMP Sample Clauses

SNMP. The Client establishes communication and access device information via SNMPv1 and SNMPv3. Early UPS and PDU models only support SNMPv1 protocol, and some newer models have supported SNMPv3 protocol. User can choose the proper SNMP protocol according to the device. SNMP Protocol. User can determines which SNMP protocol to use over the network communication between Client and devices. It is recommended to choose Both option because Client attempts on the correct SNMP protocol for device to interact.
AutoNDA by SimpleDocs
SNMP. ‌ The SNMP protocol is one of the most used protocols between the NMS and the Network Elements. It is standardized by the IETF. The most relevant RFCs are: • RFC 1157 - A Simple Network Management Protocol (SNMP) [RFC1157] • RFC 3416 - Introduction to version 2 of the Internet-standard Network Management Framework [RFC3416] • RFC 3414 - User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3) [RFC3414]] If SNMP is implemented, at least version 2 must be supported. Version 3 is optional; however if it is supported, it should include both authentication and encryption, and notifications via Traps and Inform Requests.
SNMP. Customer is responsible for application of the Verizon-provided SNMP “read access community string” for all monitored WLAN Controllers, or Virtual Wireless LAN Controllers with IAP Management and the application of Verizon-assigned management IP addresses, as required for management by Verizon.
SNMP. There shall be no holdback of Sale Proceeds with respect to any liability that may be due or become due to one or both of SNMP Research International Inc. or SNMP Research Inc. (either or together, “SNMP”). No Debtor has or shall have any ...
SNMP. ‌ The Simple Network Management Protocol (SNMP) is a popular protocol that has been standardised in a number of RFCs and whose objective is to manage network resources. This management process includes both 1) retriev- ing monitoring and configuration data, as well as 2) configuring network equipment directly. In the monitoring tool context, SNMPv2 is used for retrieving monitoring data from devices.

Related to SNMP

  • Compatibility 1. Any unresolved issue arising from a mutual agreement procedure case otherwise within the scope of the arbitration process provided for in this Article and Articles 25A to 25G shall not be submitted to arbitration if the issue falls within the scope of a case with respect to which an arbitration panel or similar body has previously been set up in accordance with a bilateral or multilateral convention that provides for mandatory binding arbitration of unresolved issues arising from a mutual agreement procedure case. 2. Nothing in this Article and Articles 25A to 25G shall affect the fulfilment of wider obligations with respect to the arbitration of unresolved issues arising in the context of a mutual agreement procedure resulting from other conventions to which the Contracting States are or will become parties.”.

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

  • Signaling Each Party will provide the other Party with access to its databases and associated signaling necessary for the routing and completion of the other Party’s traffic in accordance with the provisions contained in the Unbundled Network Element Attachment or applicable access tariff.

  • Interface A defined set of transmission facilities that separate Load Zones and that separate the NYCA from adjacent Control Areas. Investor-Owned Transmission Owners. A Transmission Owner that is owned by private investors. At the present time these include: Central Xxxxxx Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation.

  • Interfaces GTE provides the CLECs with choices for access to OSS pre-ordering, ordering, maintenance and repair systems. Availability of the interfaces is fundamental to the CLEC being able to effectively do business with GTE. Additionally, in many instances, CLEC personnel must work with the service personnel of GTE. Measurements in this category assess the availability to the CLECs of systems and personnel at GTE work centers.

  • Network Interface Device 4.1 The NID is defined as any means of interconnection of end-user customer premises wiring to BellSouth’s distribution plant, such as a cross-connect device used for that purpose. The NID is a single-line termination device or that portion of a multiple-line termination device required to terminate a single line or circuit at the premises. The NID features two independent xxxxxxxx or divisions that separate the service provider’s network from the End User’s on-premises wiring. Each chamber or division contains the appropriate connection points or posts to which the service provider and the End User each make their connections. The NID provides a protective ground connection and is capable of terminating cables such as twisted pair cable. 4.1.1 BellSouth shall permit Al-Call to connect Al-Call ’s loop facilities to on-premises wiring through the BellSouth NID or at any other technically feasible point.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Synchronization The Licensor hereby grants limited synchronization rights for One (1) music video streamed online (Youtube, Vimeo, etc..) for up to 500,000 non-monetized video streams on all total sites. A separate synchronisation license will need to be purchased for distribution of video to Television, Film or Video game.

  • RTT Round-­‐Trip Time or RTT refers to the time measured from the sending of the first bit of the first packet of the sequence of packets needed to make a request until the reception of the last bit of the last packet of the sequence needed to receive the response. If the client does not receive the whole sequence of packets needed to consider the response as received, the request will be considered unanswered.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!