5-45
General System Configuration
Enabling System Logging
Web: Setting Logging Parameters
The Event Log – Settings screen configures system logs and server details for
the access point.
The Web interface enables you to modify these parameters:
■
Primary Syslog Host:
Enables the logging of error messages.
■
IP Address:
The IP address of a server.
■
Port
: The UDP port used by a server. (The default is 514.)
■
[Update]:
Updates the logging settings.
N o t e
To view log messages generated by the access point, click Device Information
> Event Log and select the Log tab. See
“Event Log” on page 10-9
.
Figure 5-10. Setting Logging Parameters
To Enable Logging:
1.
Click Device Information > Event Log and select the Settings tab.
2.
Click the
Primary Host
box to enable the system log setup.
3.
Enter the IP address of the server.
4.
Set the Relay port used by the server.
5.
Click
[Update]
.
CLI: Setting Logging Parameters
CLI Commands Used in This Section
Command Syntax
CLI Reference Page
log
9-31
Содержание 530 - Notebook PC
Страница 1: ...Management and Configuration Guide www procurve com ProCurve Wireless Access Point 530 ...
Страница 2: ......
Страница 3: ...ProCurve Wireless Access Point 530 Management and Configuration Guide ...
Страница 21: ...1 1 1 Getting Started ...
Страница 29: ...2 1 2 Selecting a Management Interface ...
Страница 35: ...3 1 3 Using the Command Line Interface CLI ...
Страница 50: ...3 16 Using the Command Line Interface CLI CLI Control and Editing This page is intentionally unused ...
Страница 51: ...4 1 4 Using the ProCurve Web Browser Interface ...
Страница 85: ...5 1 5 General System Configuration ...
Страница 152: ...5 68 General System Configuration Managing Group Configuration ...
Страница 193: ...6 41 Wireless Interface Configuration Managing Multiple WLAN BSS SSID Interfaces This page is intentionally unused ...
Страница 194: ...6 42 Wireless Interface Configuration Managing Multiple WLAN BSS SSID Interfaces ...
Страница 195: ...7 1 7 Wireless Security Configuration ...
Страница 270: ...7 76 Wireless Security Configuration Web Authentication for Mobile Users ...
Страница 271: ...8 1 8 Special Features ...
Страница 308: ...8 38 Special Features Identity Driven Management This page is intentionally unused ...
Страница 309: ...9 1 9 Command Line Reference ...
Страница 476: ...9 168 Command Line Reference Spanning Tree Protocol STP This page is intentionally unused ...
Страница 477: ...A 1 A File Uploads Downloads and Resets ...
Страница 497: ...A 21 File Uploads Downloads and Resets Disabling the Access Point Push Buttons This page is intentionally unused ...
Страница 498: ...A 22 File Uploads Downloads and Resets Disabling the Access Point Push Buttons ...
Страница 499: ...B 1 B Defaults ...
Страница 512: ...B 14 Defaults Wireless Distribution System WDS This page is intentionally unused ...
Страница 513: ...C 1 C Adaptive Tx Power Control Use Cases ...
Страница 523: ...D 1 D Open Source Licenses ...
Страница 525: ...D 3 Open Source Licenses Overview This appendix includes the following information Open Source licenses ...
Страница 556: ...D 34 Open Source Licenses ...
Страница 561: ......