96
Tools
From address
Specify the email address that appears in the From field of alert messages sent from the AP, for
example [email protected]. It is recommended that you use an email address that exits on
your own network, so that the address will receive a notification if an email from the AP is
undeliverable, and to prevent spam filters on the network from blocking the sending or delivery
of emails from the AP.
The address can be a maximum of 255 characters and can contain only printable characters.
By default, no address is configured.
Urgent message severity
This setting determines the severity level for log messages that are considered to be urgent.
Messages in this category are sent immediately upon being generated. The security level you
select and all higher levels are considered urgent:
•
Emergency
indicates that the system is unusable. It is the highest level of severity.
•
Alert
indicates action must be taken immediately.
•
Critical
indicates critical conditions.
•
Error
indicates error conditions.
•
Warning
indicates warning conditions.
•
Notice
indicates normal but significant conditions.
•
Informational
indicates informational messages.
•
Debug
indicates debug-level messages.
Non-urgent severity
This setting determines the severity level for log messages that are considered to be non-urgent.
Messages in this category are collected and sent in a digest form at the time interval specified
by the non-urgent log duration. The security level you select and all levels up to but not
including the lowest urgent level are considered non-urgent. Messages below the security level
you specify are not sent via email.
See the
Urgent message severity
description for information about the security levels.
Non urgent log duration
This setting determines how frequently the non-urgent messages are sent to the email (SMTP)
server. The range is 30 to 1440 minutes. The default is 30 minutes.
Non-urgent messages are sent when the time duration is reached or the number of messages
exceeds the configured
Depth
value on the
System log
page, whichever is first.
Summary of Contents for M210
Page 6: ...6 ...
Page 30: ...30 Managing the M210 ...
Page 32: ...32 Managing the M210 ...
Page 46: ...46 Working with wireless communities and authentication ...
Page 74: ...74 Creating WDS links ...
Page 106: ...106 Tools ...
Page 110: ...110 ...