Raritan Computer EMX2-111 Manual Do Utilizador
Chapter 7: Event Rules, Event Actions and Application Logs
141
Security level
Description
"noAuthNoPriv"
Select this if no authorization or privacy protocols
are needed.
are needed.
Click OK
"authNoPriv"
Select this if authorization is required but no
privacy protocols are required.
privacy protocols are required.
Select the authentication protocol - MD5 or
SHA
SHA
Enter the authentication passphrase and then
confirm the authentication passphrase
confirm the authentication passphrase
Click OK
"authPriv"
Select this if authentication and privacy protocols
are required.
are required.
Select the authentication protocol - MD5 or
SHA
SHA
Enter the authentication passphrase and
confirm the authentication passphrase
confirm the authentication passphrase
Select the Privacy Protocol - DES or AES
Enter the privacy passphrase and then confirm
the privacy passphrase
the privacy passphrase
Click OK
Syslog Message
Use this action automatically forward event messages to the specified
syslog server.
syslog server.
To configure a syslog message action:
1. Choose Device Settings > Event Rules. The Event Rules Settings
dialog opens.
2. Click the Actions tab.
3. Click New.
4. In the "Action name" field, type a new name for the action. The
default name is New Action <number>, where <number> is a
sequential number based on how many actions are already created.
sequential number based on how many actions are already created.
5. In the Action field, click the drop-down arrow and select the desired
action from the list.
6. In the "Syslog server" field, specify the IP address to which the
syslog is forwarded.