User Manual
U-SYS IAD108 Integrated Access Device
Table of Contents
v
7.4
Management of Operation Log ........................................7-25
7.4.1 Adding Log host.....................................................7-27
7.4.2 Deleting Log Host ..................................................7-28
7.4.3 Activating Log Host................................................7-28
7.4.4 Deactivating Log Host ...........................................7-31
7.4.5 Showing Operation Log Information......................7-33
7.4.6 Showing Operation Log List ..................................7-34
7.4.7 Showing Log Host Configurations .........................7-37
7.4.8 Setting Information Output Control Switch of Log Host7-38
7.4.9 Setting Information Output Control Level of Log Host7-40
7.4.10 Querying Information Output Control Switch of Log
Host ................................................................................7-42
7.4.11 Showing Information Output Control Level of Log
Host ................................................................................7-43
7.5
Alarm Management..........................................................7-44
7.5.1 Description of Common Alarm Attributes ..............7-44
7.5.2 Alarm Management Task ......................................7-46
7.5.3 Showing Alarm Records........................................7-47
7.5.4 Showing Alarm Configuration Information.............7-52
7.5.5 Setting Alarm Output to Command Line Terminal 7-52
7.6
Setting RTCP Alarm Threshold........................................7-56
7.7
Patch Management ..........................................................7-58
7.7.1 Overview of Patch .................................................7-58
7.7.2 Steps of Operating Patches ..................................7-59
7.8
Network Test Tools ..........................................................7-60
7.8.1 ping........................................................................7-60
7.8.2 tracert ....................................................................7-62
7.8.3 Example for Command Ping .................................7-63
7.8.4 Example for Command tracert ..............................7-66