Web Interface Operation
Eaton ePDU G3 Operation Manual P-164000277—Rev 5
97
9.
Click
Save
. If desired, test the configuration (see “Test Trap”).
10. Click
Test.
(See the“Test Trap”section that follows for more information).
Test Trap
This action consists of sending a test trap (#53) to all configured and enabled trap receivers. To achieve this
action, the following requirements must be met:
l
The ePDU Network Management and Control (eNMC) module is running in Normal Operation mode.
l
The ePDU Network Management and Control (eNMC) module is connected to the Local Area Network
(LAN).
l
The ePDU Network Management and Control (eNMC) module owns a valid IP address.
l
The SNMP must be enabled: SNMPv1, SNMPv3, or SNMPv1&v3.
The target trap receiver configuration requires a valid IP address and the trap receiver protocol must match the
configured SNMP version.
Syslog
Retrieve or Modify Syslog Data
1.
Access the Web interface and log in.
2.
Under Logs & Notifications, select Syslog. The Syslog Server page displays.
3.
Review to the Syslog status, the port number, and the protocol for the specified Syslog server.
4.
To enable or disable a server, click the check box beside the Syslog server name and click the
Enable
or
Disable
button.
5.
To modify the settings for a server, click the Syslog name. The Syslog Server Settings dialog displays.
6.
In the Syslog Server Settings dialog, enable or disable the selected server from the Enable Server
drop-down list. You can also change the following:
l
port number and the protocol selection to either UDP or TCP from the Protocol drop-down list
l
message transfer method according to:
- 5424: Syslog Protocol IETF
- 5425: TLS
- 5426: Transfer over UDP
- 6587: Transfer over TCP
- 3167: Syslog protocol IETF (obsolete)
l
facility code used for all messages from 1 to 23
l
use of unicode byte order mask (BOM) according to RFC 5424
NOTE
To receive the test trap #53, the trap receiver must be configured with a protocol
compliant with the one defined as the trap source (see “Enable/Disable the SNMP
Agent” on page 108).
NOTE