cc/td/doc/product/vpn/vpn3000/4_0
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Events
Event Class
Event Severity Level
Event Log
Configuration | System | Event
Configuration | System | Events | General
Configuration | System | Events | FTP Backup
Configuration | System | Events | Classes
Configuration | System | Events | Classes | Add or Modify
Configuration | System | Events | Trap Destinations
Configuration | System | Events | Trap Destinations | Add or Modify
Configuration | System | Events | Syslog Servers
Configuration | System | Events | Syslog Servers | Add or Modify
Configuration | System | Events | SMTP Servers
Configuration | System | Events | SMTP Servers | Add or Modify
Configuration | System | Events | E-mail Recipients
Configuration | System | Events | E-mail Recipients | Add or Modify

Events


An event is any significant occurrence within or affecting the VPN 3000 Concentrator, such as an alarm, trap (an event message sent to an SNMP system is called a "trap"), error condition, network problem, task completion, threshold breach, or status change. The VPN Concentrator records events in an event log, which is stored in nonvolatile memory. You can also specify that certain events trigger a console message, a UNIX syslog record, an e-mail message, or an SNMP management system trap.

Event attributes include class and severity level.

Event Class

Event class denotes the source of the event and refers to a specific hardware or software subsystem within the VPN Concentrator. Table 10-1 lists the event classes.

Table 10-1   VPN Concentrator Event Classes

Class Name  Class Description (Event Source)  Cisco-Specific
Event Class?
 
AUTH

Authentication

N

AUTHDBG

Authentication debugging

Y

AUTHDECODE

Authentication protocol decoding

Y

AUTOUPDATE

Autoupdate subsystem

N

BMGT

Bandwidth management subsystem

Y

BMGTDBG

Bandwidth management debugging

Y

CAPI

Cryptography subsystem

N

CERT

Digital certificates subsystem including SCEP

N

CONFIG

Configuration subsystem

N

DHCP

DHCP subsystem

N

DHCPDBG

DHCP debugging

Y

DHCPDECODE

DHCP decoding

Y

DM

Data Movement subsystem

N

DNS

DNS subsystem

N

DNSDBG

DNS debugging

Y

DNSDECODE

DNS decoding

Y

EVENT

Event subsystem

N

EVENTDBG

Event subsystem debugging

Y

EVENTMIB

Event MIB changes

Y

EXPANSIONCARD

Expansion card (module) subsystem

N

FILTER

Filter subsystem

N

FILTERDBG

Filter debugging

Y

FSM

Finite State Machine subsystem (for debugging)

Y

FTPD

FTP daemon subsystem

N

GENERAL

NTP subsystem and other general events

N

GRE

GRE subsystem

N

GREDBG

GRE debugging

Y

GREDECODE

GRE decoding

Y

HARDWAREMON

Hardware monitoring (fans, temperature, voltages, etc.)

N

HTTP

HTTP subsystem

N

IKE

ISAKMP/Oakley (IKE) subsystem

N

IKEDBG

ISAKMP/Oakley (IKE) debugging

Y

IKEDECODE

ISAKMP/Oakley (IKE) decoding

Y

IP

IP router subsystem

N

IPDBG

IP router debugging

Y

IPDECODE

IP packet decoding

Y

IPSEC

IP Security subsystem

N

IPSECDBG

IP Security debugging

Y

IPSECDECODE

IP Security decoding

Y

L2TP

L2TP subsystem

N

L2TPDBG

L2TP debugging

Y

L2TPDECODE

L2TP decoding

Y

LBSSF

Load Balancing subsystem

N

MIB2TRAP

MIB-II trap subsystem: SNMP MIB-II traps

N

OSPF

OSPF subsystem

N

PPP

PPP subsystem

N

PPPDBG

PPP debugging

Y

PPPDECODE

PPP decoding

Y

PPTP

PPTP subsystem

N

PPTPDBG

PPTP debugging

Y

PPTPDECODE

PPTP decoding

Y

PSH

Operating system command shell

N

PSOS

Embedded real-time operating system

N

QUEUE

System queue

N

REBOOT

System rebooting

N

RM

Resource Manager subsystem

N

SMTP

SMTP event handling

N

SNMP

SNMP trap subsystem

N

SSH

SSH subsystem

N

SSL

SSL subsystem

N

SYSTEM

Buffer, heap, and other system utilities

N

TCP

TCP subsystem

N

TELNET

Telnet subsystem

N

TELNETDBG

Telnet debugging

Y

TELNETDECODE

Telnet decoding

Y

TIME

System time (clock)

N

VRRP

VRRP subsystem

N

XML

XML

N


Note   The Cisco-specific event classes provide information that is meaningful only to Cisco engineering or support personnel. Also, the DBG and DECODE events require significant system resources and might seriously degrade performance. We recommend that you avoid logging these events unless Cisco requests it.

Event Severity Level

Severity level indicates how serious or significant the event is,. It indicates how likely it is to cause unstable operation of the VPN concentrator, whether it represents a high-level or low-level operation, or whether it returns little or great detail. Level 1 is most significant. Table 10-2 describes the severity levels.

Table 10-2   VPN Concentrator Event Severity Levels

Level  Category  Description 
1

Fault

A crash or non-recoverable error.

2

Warning

A pending crash or severe problem that requires user intervention.

3

Warning

A potentially serious problem that might require user action.

4

Information

An information-only event with few details.

5

Information

An information-only event with moderate detail.

6

Information

An information-only event with greatest detail.

7

Debug

Least amount of debugging detail.

8

Debug

Moderate amount of debugging detail.

9

Debug

Greatest amount of debugging detail.

10

Packet Decode

High-level packet header decoding

11

Packet Decode

Low-level packet header decoding

12

Packet Decode

Hex dump of header

13

Packet Decode

Hex dump of packet

Within a severity level category, higher-numbered events provide more details than lower-numbered events, without necessarily duplicating the lower-level details. For example, within the Information category, Level 6 provides greater detail than Level 4, but does not necessarily include the same information as Level 4.

Logging higher-numbered severity levels causes performance to deteriorate, since more system resources are used to log and handle these events.


Note   The Debug (7-9) and Packet Decode (10-13) severity levels are intended for use by Cisco engineering and support personnel. We recommend that you avoid logging these events unless Cisco requests it.

The VPN Concentrator, by default, displays all events of severity level 1 through 3 on the console. It writes all events of severity level 1 through 5 to the event log. You can change these defaults on the Configuration | System | Events | General screen, and you can configure specific events for special handling on the Configuration | System | Events | Classes screens.

Event Log

The VPN Concentrator records events in an event log, which is stored in nonvolatile memory. Thus the event log persists even if the system is powered off. For troubleshooting any system difficulty, or just to examine details of system activity, consult the event log first.

The Model 3015-3080 event log holds 2048 events, the Model 3005 holds 256 events. The log wraps when it is full; that is, newer events overwrite older events when the log is full.

For the event log, you can configure:

Event Log Data

Each entry (record) in the event log consists of several fields including:

For more information, see the Monitoring | Filterable Event Log screen.

Configuration | System | Event

This section of the Manager lets you configure how the VPN Concentrator handles events. Events provide information for system monitoring, auditing, management, accounting, and troubleshooting.


Figure 10-1   Configuration | System | Events Screen


Configuration | System | Events | General

This Manager screen lets you configure the general, or default, handling of all events. These defaults apply to all event classes.

You can override these default settings by configuring specific events for special handling on the Configuration | System | Events | Classes screens.


Figure 10-2   Configuration | System | Events | General Screen


Save Log on Wrap

Check the Save Log on Wrap check box to automatically save the event log when it is full. (The box is unchecked by default.) The Model 3015-3080 event log holds 2048 events, the Model 3005 holds 256 events. When the log is full, newer events overwrite older events; that is, entry 2049 overwrites entry 1, etc.

If you select automatic save, the system saves the log file to a file in Flash memory with the filename LOGNNNNN.TXT, where NNNNN is an increasing sequence number that starts with 00001 and restarts after 99999. The sequence numbers continue through reboots. For example, if four log files have already been saved, the next one saved after a reboot is LOG00005.TXT.

If Flash memory has less than 2.56 MB of free space, the system deletes the oldest log file(s) to make room for the newest saved log file. It also generates an event that notes the deletion. If there are no old log files to delete, the save function fails, and the system generates an event that notes the failure.

Each saved log file requires about 334 KB. To conserve space in Flash memory, we recommend that you periodically remove the saved log files. Keeping more than 10 to 12 files wastes space. The Administration | File Management | Files screen shows total, used, and free space in Flash memory.


Note   The VPN Concentrator automatically saves the log file if it crashes, and when it is rebooted, regardless of this Save Log on Wrap setting. This log file is named SAVELOG.TXT, and it overwrites any existing file with that name. The SAVELOG.TXT file is useful for debugging.

You can manage saved log files with options on this screen and on the Administration | File Management screens.

Save Log Format

Click the Save Log Format drop-down menu button to specify the format of the saved log files.

Refer to the section on Monitoring | Filterable Event Log in VPN 3000 Series Concentrator Reference Volume II: Administration and Monitoring for details on event log fields.

FTP Saved Log on Wrap

Check the FTP Saved Log on Wrap check box to automatically send the saved event log file, when it wraps, via FTP to a remote computer. (The box is unchecked by default.) This option copies the log file but does not delete it from the VPN Concentrator. If you check this box, you must also configure FTP destination system parameters on the Configuration | System | Events | FTP Backup screen.

E-mail Source Address

Enter the address to put in the From: field of an e-mailed event message. Enter up to 48 alphanumeric characters with no spaces, for example: cisco@cisco.com. You should configure this field if you configure any Severity to E-mail events; if you leave it blank, the From: field has the same address as the To: field (the recipient's e-mail address).

Syslog Format

Click the Syslog Format drop-down menu button and choose the format for all events sent to syslog servers. Choices are:

Sequence Date Time SEV=Severity Class/Number RPT=RepeatCount String

For example:

3 12/06/1999 14:37:06.680 SEV=4 HTTP/47 RPT=17 10.10.1.35 New administrator login: admin.

Sequence: Date Time TimeZone TimeZoneOffset %Class-Severity-Number: RPT=RepeatCount: String

For example:

3 1999 Dec 06 14:37:06.680 EDT -4:00 %HTTP-5-47:RPT=17 10.10.1.35: New administrator login: admin.

The Original severities and the Cisco IOS severities differ. Original severities number from 1-13. (For the meaning of each Original severity, see Table 10-2.) Cisco IOS severities number from 0-7. Table 10-3 shows the meaning of Cisco IOS severities and how they map to Original severities.

Table 10-3   Cisco IOS Severities

Cisco IOS Severity  Meaning  Original Severity 

0

Emergencies

1

1

Alerts

Not used

2

Critical

2

3

Errors

Not used

4

Warning

3

5

Notification

4

6

Informational

5, 6

7

Debugging

7-13

Events to Log

Click the Events to Log drop-down menu button and choose the range of event severity levels to enter in the event log by default. The choices are: None, Severity 1, Severities 1-2, Severities 1-3, Severities 1-4, Severities 1-5 and Use Event List. The default is Severities 1-5. Using the default means that all events of severity level 1 through severity level 5 are entered in the event log. If you choose Use Event List, configure the Event List to specify the event types to log.

Events to Console

Click the Events to Console drop-down menu button and choose the range of event severity levels to display on the console by default. The choices are: None, Severity 1, Severities 1-2, Severities 1-3, Severities 1-4, Severities 1-5 and Use Event List. The default is Severities 1-3. Using the default means that all events of severity level 1 through severity level 3 are displayed on the console. If you choose Use Event List, configure the Event List to specify the event types to display on the console

Events to Syslog

Click the Events to Syslog drop-down menu button and choose the range of event severity levels to send to a syslog server by default. The choices are: None, Severity 1, Severities 1-2, Severities 1-3, Severities 1-4, Severities 1-5 and Use Event List. The default is None. Using the default means that no events are sent to a syslog server. If you choose Use Event List, configure the Event List to specify the event types to send to the syslog server.

If you select any severity levels to send, you must also configure the syslog server(s) on the Configuration | System | Events | Syslog Servers screens.

Events to E-mail

Click the Events to E-mail drop-down menu button and choose the range of event severity levels to e-mail to recipients by default. The choices are: None, Severity 1, Severities 1-2, Severities 1-3, and Use Event List. The default is None. Using the default means that no events are sent via e-mail. If you choose Use Event List, configure the Event List to specify the event types to e-mail.

If you select any severity levels events to e-mail, you must also configure an SMTP server on the Configuration | System | Events | SMTP Servers screens, and you must configure e-mail recipients on the Configuration | System | Events | E-mail Recipients screens. You should also configure the preceding E-mail Source Address.

Events to Trap

Click the Events to Trap drop-down menu button and choose the range of event severity levels to send to an SNMP network management system by default. Event messages sent to SNMP systems are called "traps." The choices are: None, Severity 1, Severities 1-2, Severities 1-3, and Use Event List. The default is None: no events are sent as SNMP traps. If you choose Use Event List, configure the Event List to specify the event types to trap.

If you select any severity levels to send, you must also configure SNMP destination system parameters on the Configuration | System | Events | Trap Destinations screens.

The VPN Concentrator can send the standard, or "well-known," SNMP traps listed in Table 10-4. To have an SNMP NMS receive them, you must configure the events as in the table, and configure a trap destination.

Table 10-4   Configuring "Well-Known" SNMP Traps

To Send this "Well-Known" SNMP Trap  Configure Either General Event Handling or this Event Class  With this Severity to Trap 

coldStart

EVENT

1 or higher

linkDown

IP

1-3 or higher

linkUp

IP

1-3 or higher

authFailure

(This trap is SNMP authentication failure, not tunnel authentication failure.)

SNMP

1-3 or higher

Event List

Use the Event List text box to define particular events that you want to track. This feature allows you to pare down the event log to contain just the events that interest you. You can track events by class, severity, or event ID.

You can use this feature in two ways. You can set global defaults to track this customized list, sending the results to your preferred event destination (log, console, syslog, e-mail, or trap). Or, you can override global defaults to track this customized list for an individual event class.

If you want to...  Follow these steps: 

Set global defaults to track this customized list of events.

  • Define the event list, including the event classes, event severities, or particular event IDs to track.
  • Choose Use Event List from one or more of the following drop-down menus on the Configuration | System | Events | General page (this page):
    • Events to Log
    • Events to Console
    • Events to Syslog
    • Events to E-mail
    • Events to Trap

Override any global defaults for a particular event class to track these events only, within that class.

  • Define the event list, including the event severities or particular events within the event classes that you want to track.
  • On the Configuration | System | Events | Classes page, select the event class you want to modify or add a new one.
  • On the Configuration | System | Events | Classes | Add/Modify page, choose Use Event List from one or more of the following drop-down menus:
    • Events to Log
    • Events to Console
    • Events to Syslog
    • Events to E-mail
    • Events to Trap

Event List Syntax

Each line in the Event List represents one entry. Each entry has the following format: <Event Class> / <List of Event IDs or Severity Numbers> where:

Variable  Can be...  Syntax  For example 

Event Class

 

Any predefined event class

 

Use event class name

 

IKE

 

 

All event classes

Use keyword "ALL"1

ALL

Event IDs

A single event number

Use event number

123

 

A range of event numbers

Use hyphen to indicate range

13-45

Severity Numbers

An event severity level or a range of event severity levels.

Use "SEV(L)" where L is the event severity level or the range of event severity levels

SEV(1)

SEV(1-3)

 

A combination of single events, a range of events, or event severities

 

IKE/1,13-45,SEV(3)

For the ALL event class, you can specify only event severities, not particular event numbers. For example, ALL/SEV(1) is a valid entry; ALL/123 is not.

Note the following rules:

IKE/SEV(1), SEV(3)
IKE/1, 13-45

The following lines are examples of valid event list entries:

ALL/SEV(1)
AUTH/1, 3-8, 22, SEV(2)
IKE/SEV(5-6)

Apply / Cancel

To include your settings for default event handling in the active configuration, click Apply. The Manager returns to the Configuration | System | Events screen.

Reminder:

To save the active configuration and make it the boot configuration, click the Save Needed icon at the top of the Manager window. To discard your settings, click Cancel. The Manager returns to the Configuration | System | Events screen.

Configuration | System | Events | FTP Backup

This screen lets you configure parameters for using FTP to automatically back up saved event log files on a remote computer. If you enable FTP Saved Log on Wrap on the Configuration | System | Events | General screen, you must configure the FTP parameters on this screen.

The VPN Concentrator acts as an FTP client when executing this function.


Note   Another way to back up saved event log files on a remote computer is to enable an external Syslog server.


Figure 10-3   Configuration | System | Events | FTP Backup Screen


FTP Server

Enter the IP address or host name of the destination computer to receive copies of saved event log files via FTP. (If you have configured a DNS server, you can enter a host name; otherwise enter an IP address.)

FTP Directory

Enter the complete directory path name on the destination computer to receive copies of saved event log files. For example, c:\vpn\logfiles.

FTP Username

Enter the username for FTP login on the destination computer.

FTP Password

Enter the password to use with the FTP username. The field displays only asterisks.

Verify

Re-enter the FTP password to verify it. The field displays only asterisks.

Apply / Cancel

To include your FTP backup system settings in the active configuration, click Apply. The Manager returns to the Configuration | System | Events screen.

Reminder:

To save the active configuration and make it the boot configuration, click the Save Needed icon at the top of the Manager window.

To discard your settings, click Cancel. The Manager returns to the Configuration | System | Events screen.

Configuration | System | Events | Classes

This section of the Manager lets you add, configure, modify, and delete specific event classes for special handling. You can thus override the general, or default, handling of event classes. For example, you might want to send e-mail for HARDWAREMON events of severity 1 and 2, whereas default event handling does not send any e-mail.

Event classes denote the source of an event and refer to a specific hardware or software subsystem within the VPN Concentrator. Table 10-1 describes the event classes.


Figure 10-4   Configuration | System | Events | Classes Screen


To configure default event handling, click the highlighted link that says "Click here to configure general event parameters."

Configured Event Classes

The Configured Event Classes list shows the event classes that have been configured for special handling. The initial default entry is MIB2TRAP, which are SNMP MIB-II events, or "traps," that you might want to monitor with an SNMP network management system. Other configured event classes are listed in order by class number and name. If no classes have been configured for special handling, the list shows --Empty--.

Add / Modify / Delete

To configure and add a new event class for special handling, click Add. See Configuration | System | Events | Classes | Add.

To modify an event class that has been configured for special handling, select the event class from the list and click Modify. See Configuration | System | Events | Classes | Modify.

To remove an event class that has been configured for special handling, select the event class from the list and click Delete.


Note   There is no confirmation or undo.

The Manager refreshes the screen and shows the remaining entries in the list.

Reminder:

The Manager immediately includes your changes in the active configuration. To save the active configuration and make it the boot configuration, click the Save Needed icon at the top of the Manager window.

Configuration | System | Events | Classes | Add or Modify

These screens let you:

If you chose Use Event List for any of the fields on the Configuration | System | Events | General screen, that default will appear for the same field on this screen. For example, if you chose Use Event List for the Events to Trap field on the Configuration | System | Events | General screen, the Events to Trap field on this screen defaults to Use Event List as well.


Figure 10-5   Configuration | System | Events | Classes | Add or Modify Screen


Class Name

Add screen:

Modify screen:

All subsequent parameters on this screen apply to this event class only.

Enable

Check the Enable check box to enable the special handling of this event class. (The box is checked by default.)

Unchecking this box lets you set up the parameters for the event class but activate it later, or temporarily disable special handling without deleting the entry. The Configured Event Classes list on the Configuration | System | Events | Classes screen indicates disabled event classes. Disabled event classes are handled in accordance with the default parameters for all event classes.

Events to Log

Click the Events to Log drop-down menu button and choose the range of event severity levels to enter in the event log. Choices are: None, Severity 1, Severities 1-2, Severities 1-3, ..., Severities 1-13, and Use Event List. The default is Severities 1-5. Using the default means that events of severity level 1 through severity level 5 are entered in the event log.

If you choose Use Event List, configure the Event List on the Configuration | System | Events screen to specify which of the particular events in this class you want to log. See Configuration | System | Events | General.

Events to Console

Click the Events to Console drop-down menu button and choose the range of event severity levels to display on the console. Choices are: None, Severity 1, Severities 1-2, Severities 1-3, ..., Severities 1-13, and Use Event List. The default is Severities 1-3. Using the default means that events of severity level 1 through severity level 3 are displayed on the console.

If you choose Use Event List, configure the Event List on the Configuration | System | Events page to specify which of the particular events in this class you want to display on the console. See Configuration | System | Events | General.

Events to Syslog

Click the Events to Syslog drop-down menu button and choose the range of event severity levels to send to a syslog server. Choices are: None, Severity 1, Severities 1-2, Severities 1-3, ..., Severities 1-13, and Use Event List. The default is None. Using the default means that no events are sent to a syslog server.


Note   Sending events to a syslog server generates IP packets, which can generate new events if this setting is above level 9. We strongly recommend that you keep this setting at or below level 6. Avoid setting this parameter above level 9.

If you select any severity levels to send, you must also configure the syslog server(s) on the Configuration | System | Events | Syslog Servers screens, and you should configure the Syslog Format on the Configuration | System | Events | General screen.

If you choose Use Event List, configure the Event List on the Configuration | System | Events page to specify which of the particular events in this class you want to send to the syslog server. See Configuration | System | Events | General.

Events to E-mail

Click the Events to E-mail drop-down menu button and choose the range of event severity levels to send to recipients via e-mail. The choices are: None, Severity 1, Severities 1-2, Severities 1-3, and Use Event List. The default is None: no events are sent via e-mail.

If you select any event severity levels to e-mail, you must also configure an SMTP server on the Configuration | System | Events | SMTP Servers screen, and you must configure e-mail recipients on the Configuration | System | Events | E-mail Recipients screens. You should also configure the E-mail Source Address on the Configuration | System | Events | General screen.

If you choose Use Event List, configure the Event List on the Configuration | System | Events page to specify which of the particular events in this class you want to send. See Configuration | System | Events | General.

Events to Trap

Click the Events to Trap drop-down menu button and choose the range of event severity levels to send to an SNMP network management system. Event messages sent to SNMP systems are called "traps." The choices are: None, Severity 1, Severities 1-2, Severities 1-3, Severities 1-4, Severities 1-5, and Use Event List. The default is None. Using the default means that no events are sent as SNMP traps.

If you select any event severity levels to send, you must also configure SNMP destination system parameters on the Configuration | System | Events | Trap Destinations screens.

To configure "well-known" SNMP traps, see Table 10-4 under Events to Trap for Configuration | System | Events | General.

Add or Apply / Cancel

To add this event class to the list of those with special handling, click Add. Or to apply your changes to this configured event class, click Apply. Both actions include your entry in the active configuration. The Manager returns to the Configuration | System | Events | Classes screen. Any new event class appears in the Configured Event Classes list.

Reminder:

To save the active configuration and make it the boot configuration, click the Save Needed icon at the top of the Manager window.

To discard your settings, click Cancel. The Manager returns to the Configuration | System | Events | Classes screen.

Configuration | System | Events | Trap Destinations

This section of the Manager lets you configure SNMP network management systems as destinations of event traps. Event messages sent to SNMP systems are called "traps." If you configure any event handling—default or special—with values in Severity to Trap fields, you must configure trap destinations in this section.

To configure default event handling, click the highlighted link that says "Click here to configure general event parameters." To configure special event handling, see the Configuration | System | Events | Classes screens.

To configure well-known SNMP traps, see Table 10-4.

To have an SNMP-based network management system (NMS) receive any events, you must also configure the NMS to see the VPN Concentrator as a managed device or agent in the NMS domain.


Figure 10-6   Configuration | System | Events | Trap Destinations Screen


Trap Destinations

The Trap Destinations list shows the SNMP network management systems that have been configured as destinations for event trap messages, and the SNMP protocol version associated with each destination. If no trap destinations have been configured, the list shows --Empty--.

Add / Modify / Delete

To configure a new SNMP trap destination, click Add. See Configuration | System | Events | Trap Destinations | Add.

To modify an SNMP trap destination that has been configured, select the destination from the list and click Modify. See Configuration | System | Events | Trap Destinations | Modify.

To remove an SNMP trap destination that has been configured, select the destination from the list and click Delete.


Note   There is no confirmation or undo.

The Manager refreshes the screen and shows the remaining entries in the list.

Reminder:

The Manager immediately includes your changes in the active configuration. To save the active configuration and make it the boot configuration, click the Save Needed icon at the top of the Manager window.

Configuration | System | Events | Trap Destinations | Add or Modify

These screens let you:


Figure 10-7   Configuration | System | Events | Trap Destinations | Add or Modify Screen


Destination

Enter the IP address or host name of the SNMP network management system that is a destination for event trap messages. (If you have configured a DNS server, you can enter a host name; otherwise enter an IP address.)

SNMP Version

Click the SNMP Version drop-down menu button and choose the SNMP protocol version to use when formatting traps to this destination. Choices are SNMPv1 (version 1; the default) and SNMPv2 (version 2).

Community

Enter the community string to use in identifying traps from the VPN Concentrator to this destination. The community string is like a password: it validates messages between the VPN Concentrator and this NMS destination. If you leave this field blank, the default community string is public.

Port

Enter the UDP port number by which you access the destination SNMP server. Use a decimal number from 0 to 65535. The default value is 162, which is the well-known port number for SNMP traps.

Add or Apply / Cancel

To add this system to the list of SNMP trap destinations, click Add. Or to apply your changes to this trap destination, click Apply. Both actions include your entry in the active configuration. The Manager returns to the Configuration | System | Events | Trap Destinations screen. Any new destination system appears in the Trap Destinations list.

Reminder:

To save the active configuration and make it the boot configuration, click the Save Needed icon at the top of the Manager window.

To discard your settings, click Cancel. The Manager returns to the Configuration | System | Events | Trap Destinations screen, and the Trap Destinations list is unchanged.

Configuration | System | Events | Syslog Servers

This section of the Manager lets you configure syslog servers as recipients of event messages. Syslog is a daemon, or background process, that records events. The VPN Concentrator can send event messages in two syslog formats to configured syslog systems. If you configure any event handling—default or special—with values in Severity to Syslog fields, you must configure syslog servers in this section.

To configure default event handling and syslog formats, click the highlighted link that says "Click here to configure general event parameters." To configure special event handling, see the Configuration | System | Events | Classes screens.


Figure 10-8   Configuration | System | Events | Syslog Servers Screen


Syslog Servers

The Syslog Servers list shows the syslog servers that have been configured as recipients of event messages. You can configure a maximum of five syslog servers. If no syslog servers have been configured, the list shows --Empty--.

Add / Modify / Delete

To configure a new syslog server, click Add. See Configuration | System | Events | Syslog Servers | Add.

To modify a syslog server that has been configured, select the server from the list and click Modify. See Configuration | System | Events | Syslog Servers | Modify.

To remove a syslog server that has been configured, select the server from the list and click Delete. There is no confirmation or undo. The Manager refreshes the screen and shows the remaining entries in the list.

Reminder:

The Manager immediately includes your changes in the active configuration. To save the active configuration and make it the boot configuration, click the Save Needed icon at the top of the Manager window.

Configuration | System | Events | Syslog Servers | Add or Modify

These screens let you:


Figure 10-9   Configuration | System | Events | Syslog Servers | Add or Modify Screen


Syslog Server

Enter the IP address or host name of the syslog server to receive event messages. (If you have configured a DNS server, you can enter a host name; otherwise, enter an IP address.)

Port

Enter the UDP port number by which you access the syslog server. Use a decimal number from 0 to 65535. The default value is 514, which is the well-known port number.

Facility

Click the Facility drop-down menu button and choose the syslog facility tag for events sent to this server. The facility tag lets the syslog server sort messages into different files or destinations. The choices are:

Add or Apply / Cancel

To add this server to the list of syslog servers, click Add. Or to apply your changes to this syslog server, click Apply. Both actions include your entry in the active configuration. The Manager returns to the Configuration | System | Events | Syslog Servers screen. Any new server appears in the Syslog Servers list.

Reminder:

To save the active configuration and make it the boot configuration, click the Save Needed icon at the top of the Manager window.

To discard your entries, click Cancel. The Manager returns to the Configuration | System | Events | Syslog Servers screen, and the Syslog Servers list is unchanged.

Configuration | System | Events | SMTP Servers

This section of the Manager lets you configure SMTP servers that you use to e-mail event messages to e-mail recipients. If you configure any event handling—default or special—with values in Severity to E-mail fields, you must identify at least one SMTP server to handle the outgoing e-mail, and you must name at least one e-mail recipient to receive the event messages. You can configure two SMTP servers: one primary and one backup in case the primary is unavailable.

To configure e-mail recipients, see the Configuration | System | Events | E-mail Recipients screen.

To configure default event handling, click the highlighted link that says "Click here to configure general event parameters." To configure special event handling, see the Configuration | System | Events | Classes screens.


Figure 10-10   Configuration | System | Events | SMTP Servers Screen


SMTP Servers

The SMTP Servers list shows the configured SMTP servers in the order in which the system accesses them. You can configure two prioritized SMTP servers so that you have a backup server in case the primary server is offline, congested, etc. If no SMTP servers have been configured, the list shows --Empty--.

Add / Modify / Delete / Move

To configure a new SMTP server, click Add. See Configuration | System | Events | SMTP Servers | Add.

To modify a configured SMTP server, select the server from the list and click Modify. See Configuration | System | Events | SMTP Servers | Modify.

To remove a configured SMTP server, select the server from the list and click Delete.


Note   There is no confirmation or undo.

The Manager refreshes the screen and shows the remaining entries in the SMTP Servers list.

To change the order in which the system accesses configured SMTP servers, select the server from the list and click Move [Up Arrow] or Move [Down Arrow]. The Manager refreshes the screen and shows the reordered SMTP Servers list.

Reminder:

The Manager immediately includes your changes in the active configuration. To save the active configuration and make it the boot configuration, click the Save Needed icon at the top of the Manager window.

Configuration | System | Events | SMTP Servers | Add or Modify

These screens let you:


Figure 10-11   Configuration | System | Events | SMTP Servers | Add or Modify Screen


SMTP Server

Enter the IP address or host name of the SMTP server. (If you have configured a DNS server, you can enter a host name; otherwise, enter an IP address.)

Add or Apply / Cancel

To add this server to the list of SMTP servers, click Add. Or to apply your changes to this SMTP server, click Apply. Both actions include your entry in the active configuration. The Manager returns to the Configuration | System | Events | SMTP Servers screen. Any new server appears in the SMTP Servers list.

Reminder:

To save the active configuration and make it the boot configuration, click the Save Needed icon at the top of the Manager window.

To discard your entry, click Cancel. The Manager returns to the Configuration | System | Events | SMTP Servers screen, and the SMTP Servers list is unchanged.

Configuration | System | Events | E-mail Recipients

This section of the Manager lets you configure e-mail recipients of event messages. You can configure a maximum of five e-mail recipients, and you can customize the event message severity levels for each recipient.

If you configure any event handling (either default or special) with values in Severity to E-mail fields, you must name at least one e-mail recipient to receive the event messages, and you must identify at least one SMTP server to handle the outgoing e-mail. You should also configure the E-mail Source Address on the Configuration | System | Events | General screen.

To configure SMTP servers, see the Configuration | System | Events | SMTP Servers screen, or click the highlighted link that says "configure an SMTP server."

To configure default event handling, click the highlighted link that says "Click here to configure general event parameters." To configure special event handling, see the Configuration | System | Events | Classes screens.


Figure 10-12   Configuration | System | Events | E-mail Recipients Screen


E-mail Recipients

The E-mail Recipients list shows configured event message e-mail recipients in the order they were configured. You can configure a maximum of five e-mail recipients. If no e-mail recipients have been configured, the list shows --Empty--.

Add / Modify / Delete

To configure a new e-mail recipient, click Add. See Configuration | System | Events | E-mail Recipients | Add.

To modify an e-mail recipient who has been configured, select the recipient from the list and click Modify. See Configuration | System | Events | E-mail Recipients | Modify.

To remove an e-mail recipient who has been configured, select the recipient from the list and click Delete.


Note   There is no confirmation or undo.

The Manager refreshes the screen and shows the remaining recipients in the E-mail Recipients list.

Reminder:

The Manager immediately includes your changes in the active configuration. To save the active configuration and make it the boot configuration, click the Save Needed icon at the top of the Manager window.

Configuration | System | Events | E-mail Recipients | Add or Modify

These screens let you:


Figure 10-13   Configuration | System | Events | E-mail Recipients | Add or Modify Screen


E-mail Address

Enter the recipient's complete e-mail address, for example: cisco@cisco.com.

Max Severity

Click the Max Severity drop-down menu button and choose the range of event severity levels to send to this recipient via e-mail. The choices are: None, 1, 1-2, 1-3. The default value is 1-3: configured events of severity level 1 through severity level 3 are sent to this recipient.

The event levels e-mailed to this recipient are the lesser of the Severity to E-mail setting for a customized event class, or this Max Severity setting. If an event class has not been customized, the events e-mailed are the lesser of this setting or the default Severity to E-mail setting. For example, if you configure IPSEC events with severity levels 1-3 to e-mail, all other events with no severity to e-mail, and cisco@cisco.com to receive e-mail events of severity levels 1-2, cisco will receive only IPSEC events of severity levels 1-2.

Add or Apply / Cancel

To add this recipient to the list of e-mail recipients, click Add. Or to apply your changes to this e-mail recipient, click Apply. Both actions include your entry in the active configuration. The Manager returns to the Configuration | System | Events | E-mail Recipients screen. Any new recipient appears at the bottom of the E-mail Recipients list.

Reminder:

To save the active configuration and make it the boot configuration, click the Save Needed icon at the top of the Manager window. To discard your entry, click Cancel. The Manager returns to the Configuration | System | Events | E-mail Recipients screen, and the E-mail Recipients list is unchanged.


hometocprevnextglossaryfeedbacksearchhelp
Posted: Wed Jul 16 12:40:01 PDT 2003
All contents are Copyright © 1992--2003 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.