encor! enetworks TM Version A, March 2010 2013 Encore Networks, Inc. All rights reserved. Using the Syslog Feature This document provides basic information for using the syslog feature in the ELIOS software. When activated, syslog record activities for a specified BANDIT product. C.1 Configuring the Syslog Feature 1 Power up the BANDIT and log into the Main Menu. (For details, see Starting the ELIOS Software.) Main Menu ---------- 1) QuickStart Config Builder 2) Typical Configurations 3) Advanced Configurations 4) Tools V) View Current Unit Status F) Cellular Fast Connect L) Load Factory Defaults P) Load Plug and Play Defaults W) Write Configuration R) Reset Unit X) exit Session S) Statistics Y) system Administration 2 On the Main Menu, select System Administration. For details, see The System Administration Menu. For information on trademarks, safety, limitations of liability, and similar topics, see Notices. Home Module: Software Configuration Document C
Page 2 Software Configuration Module, Document C System Administration ---------------------- 1) Passwords 2) SNMP Configuration 3) Database Management 4) Telnet Terminal 5) Port Data Capture 6) SNMP Triggered TRAPs 7) Expansion Flash Programming B) Config Banner C) Copy Configuration N) Network Download R) Remote Logging U) Upgrade Code V) VPN Commands W) Wireless Options 3 On the System Administration menu, select Remote Logging. The System Admin Remote Logging Menu is displayed. System Admin Remote Logging ----- 1) 2) Secondary Remote Logging Note: This menu lets you configure logging in two remote devices, for redundancy. We recommend that the remote devices be at separate sites. 4 Select or Secondary Remote Logging. The Menu or Secondary Remote Logging Menu is displayed, according to the selection. 1) Logging : Disabled 2) IP Address : Undefined
Using the Syslog Feature Page 3 Secondary Remote Logging 1) Logging : Disabled 2) IP Address : Undefined 5 On the Primary or Secondary Remote Logging Menu, select Logging. A menu is displayed to activate Primary or Secondary Remote Logging. 1) Enable 2) Disable 6 Select Enable. The Primary or Secondary Remote Logging Menu is redisplayed, showing that remote logging has been enabled. 1) Logging : Enabled 2) IP Address : Undefined 7 Select IP Address. The following prompt is displayed. Enter Remote Logging IP Address : 8 Type the IP address of the device that the syslog daemon is on, and press Enter.! Note: You can use your preferred logging application (for example, a TFTP server) to act as the syslog daemon. Caution: Use separate IP addresses for the primary and secondary syslog logging sites. The Primary or Secondary Remote Logging Menu is redisplayed, showing the remote logging IP address.
Page 4 Software Configuration Module, Document C 1) Logging : Enabled 2) IP Address : 192.168.101.48 Enter Choice Note: The Log Facility for this logging remains syslog. 9 Press Enter once to return to the System Admin Remote Logging Menu. System Admin Remote Logging ----- 1) 2) Secondary Remote Logging 10 Do one of the following: a If you have configured only or only Secondary Remote Logging, select the other one and repeat Step 4 through Step 9 for that logging. b If you have configured both and Secondary Remote Logging, press Escape until you reach the Main Menu. Main Menu ---------- 1) QuickStart Config Builder 2) Typical Configurations 3) Advanced Configurations 4) Tools V) View Current Unit Status F) Cellular Fast Connect L) Load Factory Defaults P) Load Plug and Play Defaults W) Write Configuration R) Reset Unit X) exit Session S) Statistics Y) system Administration 11 On the Main Menu, select Write Configuration to save the syslog settings. (For details, see Saving (Writing) a Configuration.)
Using the Syslog Feature Page 5 12 Then, on the Main Menu, select Reset Unit so that the BANDIT will use the saved configuration. (For details, see Resetting the Device.) The BANDIT device will send all syslog activity to the configured syslog daemons. Note: You can use the syslog daemon application to review or print the log files. The preceding procedure will configure login attempts. For configuration of logins for specific ports or features, see the following: Configuring Address Translation IP/VPN Policy For information about Syslog statistics, see Syslog Statistics.
Page 6 Software Configuration Module, Document C