The inlet temperature is measuring the air coming onto (and going across) the supervisor. That's the one you can affect via the external environment.That number is the one referenced in the operating temperature specification.
The alarm threshold you cited are the on-chip temperature thresholds for asic-1. ASICs (application specific integrated circuits) generate hear as a byproduct of their operation. If air is flowing properly from the inlet, those thresholds should not be exceeded on those heat-generating components.
If for whatever reason the airflow isn't cooling the ASIC adequately, the alarm threshold will trigger generating a syslog message and, optionally, and SNMP trap.
On our NOC we use EMC Smarts to monitor some Cisco 6500 core switches.
The Smarts is able to read the high threshold for the temperature sensor of the various measure points, like ASIC, VTT, EARL inlet, EARL outlet, etc.
For some points it seems that Smarts get garbage values. I searched on the running config of the 6500 switch but could not find any the CLI configuration that sets this threshold alarm values. I searched on the docs but could not find any information about how this thresholds are set. Are them set using other config, like TCL? I am wondering if some test points does not have the proper threshold value configured.
Can you point me some docs about configure these thresholds?
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...