Linksys WRE54G Cisco WAP54GP Wireless-G Access Point with Power Over Ethernet - Page 36

The Administration - Log Tab, Email Alert, Notification Queue Length, Syslog Notification - default login

Page 36 highlights

Wireless-G Access Point with Power Over Ethernet The Administration - Log Tab On this screen you can configure the log settings and alerts of particular events. Log You can have logs that keep track of the Access Point's activities. Email Alert E-Mail Alert. If you want the Access Point to send e-mail alerts in the event of certain attacks, select Enabled. The default is Disabled. E-Mail Address for Logs. Enter the e-mail address that will receive logs. Notification Queue Length Log Queue Length. You can designate the length of the log that will be e-mailed to you. The default is 20 entries. Log Time Threshold. You can designate how often the log will be emailed to you. The default is 600 seconds (10 minutes). Syslog Notification Syslog is a standard protocol used to capture information about network activity. The Access Point supports this protocol and send its activity logs to an external server. To enable Syslog, select Enabled. The default is Disabled. Syslog Server IP Address. Enter the IP address of the Syslog server. In addition to the standard event log, the Access Point can send a detailed log to an external Syslog server. The Access Point's Syslog captures all log activities and includes this information about all data transmissions: every connection source and destination IP address, IP server, and number of bytes transferred. Log Select the events that you want the Access Point to keep a log. Unauthorized Login Attempt. If you want to receive alert logs about any unauthorized login attempts, click the checkbox. Authorized Login. If you want to log authorized logins, click the checkbox. Chapter 6: Configuring the Wireless-G Access Point with Power Over Ethernet The Administration - Log Tab Figure 6-20: The Administration - Log 30

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68

30
Chapter 6: Configuring the Wireless-G Access Point with Power Over Ethernet
The Administration - Log Tab
Wireless-G Access Point with Power Over Ethernet
The Administration - Log Tab
On this screen you can configure the log settings and alerts of particular events.
Log
You can have logs that keep track of the Access Point’s activities.
Email Alert
E-Mail Alert
. If you want the Access Point to send e-mail alerts in the event of certain attacks, select
Enabled
.
The default is
Disabled
.
E-Mail Address for Logs
. Enter the e-mail address that will receive logs.
Notification Queue Length
Log Queue Length
. You can designate the length of the log that will be e-mailed to you. The default is
20
entries.
Log Time Threshold
. You can designate how often the log will be emailed to you. The default is
600
seconds (10
minutes).
Syslog Notification
Syslog is a standard protocol used to capture information about network activity. The Access Point supports this
protocol and send its activity logs to an external server. To enable Syslog, select
Enabled
. The default is
Disabled
.
Syslog Server IP Address
. Enter the IP address of the Syslog server. In addition to the standard event log, the
Access Point can send a detailed log to an external Syslog server. The Access Point’s Syslog captures all log
activities and includes this information about all data transmissions: every connection source and destination IP
address, IP server, and number of bytes transferred.
Log
Select the events that you want the Access Point to keep a log.
Unauthorized Login Attempt
. If you want to receive alert logs about any unauthorized login attempts, click the
checkbox.
Authorized Login
. If you want to log authorized logins, click the checkbox.
Figure 6-20: The Administration - Log