SNMP Sample Clauses

SNMP. The Client establishes communication and access device information via SNMPv1 and SNMPv3. Early UPS and PDU models only support SNMPv1 protocol, and some newer models have supported SNMPv3 protocol. User can choose the proper SNMP protocol according to the device. SNMP Protocol. User can determines which SNMP protocol to use over the network communication between Client and devices. It is recommended to choose Both option because Client attempts on the correct SNMP protocol for device to interact. SNMPv1
AutoNDA by SimpleDocs
SNMP. Customer is responsible for application of the Verizon-provided SNMP “read access community string” for all monitored WLAN Controllers, or Virtual Wireless LAN Controllers with IAP Management and the application of Verizon-assigned management IP addresses, as required for management by Verizon.
SNMP. ‌ The SNMP protocol is one of the most used protocols between the NMS and the Network Elements. It is standardized by the IETF. The most relevant RFCs are: • RFC 1157 - A Simple Network Management Protocol (SNMP) [RFC1157] • RFC 3416 - Introduction to version 2 of the Internet-standard Network Management Framework [RFC3416] • RFC 3414 - User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3) [RFC3414]] If SNMP is implemented, at least version 2 must be supported. Version 3 is optional; however if it is supported, it should include both authentication and encryption, and notifications via Traps and Inform Requests.
SNMP. There shall be no holdback of Sale Proceeds with respect to any liability that may be due or become due to one or both of SNMP Research International Inc. or SNMP Research Inc. (either or together, “SNMP”). No Debtor has or shall have any ... (g)

Related to SNMP

  • Network Interface Device (NID) 2.7.1 The NID is defined as any means of interconnection of end-user customer premises wiring to BellSouth’s distribution plant, such as a cross-connect device used for that purpose. The NID is a single-line termination device or that portion of a multiple-line termination device required to terminate a single line or circuit at the premises. The NID features two independent xxxxxxxx or divisions that separate the service provider’s network from the end user’s customer-premises wiring. Each chamber or division contains the appropriate connection points or posts to which the service provider and the end user each make their connections. The NID provides a protective ground connection and is capable of terminating cables such as twisted pair cable.

  • Compatibility 1. Any unresolved issue arising from a mutual agreement procedure case otherwise within the scope of the arbitration process provided for in this Article and Articles 25A to 25G shall not be submitted to arbitration if the issue falls within the scope of a case with respect to which an arbitration panel or similar body has previously been set up in accordance with a bilateral or multilateral convention that provides for mandatory binding arbitration of unresolved issues arising from a mutual agreement procedure case.

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

  • Signaling Each Party will provide the other Party with access to its databases and associated signaling necessary for the routing and completion of the other Party’s traffic in accordance with the provisions contained in the Unbundled Network Element Attachment or applicable access tariff.

  • Interface A defined set of transmission facilities that separate Load Zones and that separate the NYCA from adjacent Control Areas. Investor-Owned Transmission Owners. A Transmission Owner that is owned by private investors. At the present time these include: Central Xxxxxx Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation.

  • Interfaces Bellcore’s GR-446-CORE defines the interface between the administration system and LIDB including specific message formats. (Bellcore’s TR-NWP-000029, Section 10)

  • Network Interface Device 2.7.1 The NID is defined as any means of interconnection of the End User’s customer premises wiring to BellSouth’s distribution plant, such as a cross-connect device used for that purpose. The NID is a single line termination device or that portion of a multiple line termination device required to terminate a single line or circuit at the premises. The NID features two independent xxxxxxxx or divisions that separate the service provider’s network from the End User’s premises wiring. Each chamber or division contains the appropriate connection points or posts to which the service provider and the End User each make their connections. The NID provides a protective ground connection and is capable of terminating cables such as twisted pair cable.

  • Geometric visibility The visibility of the illuminating surface, including its visibility in areas which do not appear to be illuminated in the direction of observation considered, shall be ensured within a divergent space defined by generating lines based on the perimeter of the illuminating surface and forming an angle of not less than 5° with the axis of reference of the headlamp. The origin of the angles of geometric visibility is the perimeter of the projection of the illuminating surface on a transverse plane tangent to the foremost part of the lens of the headlamp.

  • Synchronization The Licensor hereby grants limited synchronization rights for One (1) music video streamed online (Youtube, Vimeo, etc..) for up to 500,000 non-monetized video streams on all total sites. A separate synchronisation license will need to be purchased for distribution of video to Television, Film or Video game.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

Time is Money Join Law Insider Premium to draft better contracts faster.