Manage the domain, View events in the system log, Manage the domain -18 – CANOGA PERKINS 1502 Domain Management Module User Manual

Page 28: View events in the system log -18

Advertising
background image

EdgeAccess Universal Chassis System

• Authentication Key: Shows the key that authenticates the notification for MD5 or SHA

Authentication Protocol; this is generated automatically for the Authentication Password,
but can be changed if the destination uses a different Authentication Key generation
algorithm; 16 Hex characters for MD5 protocol or 20 Hex characters for SHA protocol.

• Privacy Protocol: Set the protocol for encrypting the notification; can be DES

(authentication Protocol must be MD5 or SHA) or None

• Privacy Password: If the privacy protocol is DES, enter the password that generates the

encryption key for the message; 8 to 15 characters

• Privacy Key: Shows the key that encrypts the message for DES Privacy Protocol; this is

generated automatically for the Privacy Password, but can be changed if the destination
uses a different Privacy Key generation algorithm; 16 Hex characters

• Security Level: Can be "No Auth/No Priv," no user authentication or encryption for the

message; "Auth/No Priv," authenticates by user name, but no encryption for the message;
or "Auth/Priv," authenticates by user name and encrypts the message.

• Retries: How many times to try to resend the message if not acknowledged; Range is 0

to 10

• Timeout in Seconds: How long to wait, in seconds, for an acknowledgement before

retrying; Range is 1 to 30

6. To delete a destination, type

2

and press <Enter>, then at the prompt, highlight the IP

Address for that Host and press <Enter>. The host table appears again with your changes.

7. To return to the Domain Management Module menu, press <Esc>.

Manage the Domain

The domain is a group of up to eight linked chassis that are managed as a group through the
DMM. You can view events, including status and alarms, manage firmware for modules in the
domain, and manage logged-in users.

View Events in the System Log

You can use the information on the log and status screens for maintaining the system or
troubleshooting a fault. In addition to external notification of traps, the System Log screen lists
events generated by the DMM and managed modules within the domain, including traps. For a
typical System Log, see Figure 5. The events appear in chronological order with the most recent
event at the top of the list. Each entry lists the event, type, user, location, date, and time. The
Local column indicates the type of user with either a "*" for a locally-authenticated user or a
blank for a Radius-authenticated user. Events include both failed and successful attempts by
either the SNTP server or a user to set the system time.

The Flash Memory holds the System Log so that the event and trap information remains available
after power-down and power-up.

3-18

Model 1502 Domain Management Module

Advertising