
UAS 7616 DIU
4-7
GDC 087R706-000-02
7.
Continue the save process by typing
Y
and pressing the Enter key, or abort the save by typ-
ing
N
and pressing the Enter key.
If you continue the save, the word
SAVING
is displayed at the bottom of the screen. When
it disappears the save is complete and the new settings are in effect.
8.
When you’re done with Unit Configuration, you may either return to the Configuration
Menu screen by pressing the Enter key – identified as
CR
(Carriage Return) in the screen
prompt – or return to the Main Menu by typing
0
and pressing the Enter key.
If you start to leave the Unit Configuration screen while there are unsaved changes, the screen
displays
*WARNING - EXITING WITHOUT SAVING CHANGES Continue? [ ] Y(es), N(o)
You can type
N
and press the Enter key to keep the Unit Configuration screen on display while
you perform a save, or you can type
Y
and press the Enter key to finish exiting. Unsaved changes
are lost if you exit without performing a save.
Alarm Configuration
Selection 2, Alarm Configuration, from the UAS 7616 Configuration menu calls up the UAS
7616 Alarm Configuration Submenu shown in Figure 4-5. From that submenu you can select the
four screens in which you perform the actual alarm configuration: the Alarm Mask Submenus for
Loop1, Loop2 and Loop3; or the Alarm Thresholds Submenu.
Each Alarm Mask Configuration Submenu enables you to designate which alarms are to be
reported by means of SNMP traps when they occur on the loop, and which are to be masked (not
reported). Figure 4-6 illustrates the screen for Loop1; the three mask configuration screens are
identical.
Masking applies only to the SNMP alarm reporting function. The terminal interface Monitor/
Alarms function always displays the actual status of alarm conditions.
The Alarm Thresholds Submenu, Figure 4-7, contains the selections for setting thresholds for Bit
Error Rate (BER) alarms on all three loops.
The alarm configuration procedure appears following the figures.