Symbol Technologies WS 2000 Setting Up and Viewing the System Log, Viewing the Log on the Switch

Page 84

System Administration

Transmitted

Description

Field

 

TX Overruns

The total number of buffer overruns (when packets are sent faster

than the WAN interface can handle them)

 

TX Carrier

The total number of TCP/IP data carrier errors received

 

 

Setting Up and Viewing the System Log

The WS 2000 Network Management System keeps a log of the events that happen on the switch. The switch has a modest of amount of memory to store events. If the administrator wishes to keep a more complete event history, the administrator needs to enable a log server.

To view the log or set up a log server, select System Configuration --> Logs from the left menu.

Viewing the Log on the Switch

To save a log of the most recent events that are retained on the switch, click the View button. The system will display a prompt asking for the administrator password. After the password has been entered, click the Get File button and a dialogue will be displayed with buttons to Open or Save the log.txt file. Click Save and specify a location to save the file.

To view the saved log.txt file on a Microsoft Windows based computer use the WordPad application. Viewing the log file with Notepad, the default text file view on most Windows based computers, will not properly display the formatting of the log file.

Copyright © 2004 Symbol Technologies, Inc. All Rights Reserved

84

WS 2000 Wireless Switch: 1.0 Date of last Revision: March 2004

 

Image 84
Contents WS 2000 Wireless Switch Version System Reference72E-67701-01 Rev a March Copyright PatentsTable of Contents Chapter Advanced Configuration Chapter Field Office Example 111 WS 2000 Wireless Switch System Reference Guide About this DocumentDocument Conventions Management of Access Ports Wireless LAN Wlan SecuritySystem Overview Firewall SecurityTechnical Specifications Physical SpecificationsHardware Overview Operating System OS Services Cell Controller ServicesPower Specifications Environmental SpecificationsGateway Services 802.11a Support 802.11b SupportAccess Ports Gateway Services WS 2000 Wireless Switch FirewallNetwork Address Translation NAT Layer 3 Routing Snmp Management SupportDhcp Client and Server Overview802.1x with Radius Authentication WEP 64 40-bit keyWEP 128 104-bit Key 802.1x with Shared Key Authentication Kerberos AuthenticationWireless Protected Access WPA KeyGuard-MCM SupportInstalling the Switch Set up Communication to the SwitchGetting Started Overview Getting Started Overview Changing the Administrator Password Configure the LAN Interface Configuring the SwitchDefining the Subnets Field DescriptionConfigure Subnets InterfacesDhcp Configuration Advanced Dhcp Settings Configure the WAN Interface Communicating with the Outside WorldSetting Up Point-to-Point over Ethernet PPPoE Communication Enable Wireless LANs WLANs ChapWireless Summary Area Configure WLANs Access Port AdoptionConfigure Wlan Security Field Description NameSubnet Setting the Authentication Method 802.1x EAP AuthenticationSetting the Encryption Method Kerberos AuthenticationConfiguring WEP Encryption Configuring WPA-TKIP Configure Wlan Security KeyGuard-MCM No EncryptionConfigure Access Ports Mobile Unit Access Control List ACLConfigure Access Ports Configure Subnet Access NameAccess Overview Table Access Exception AreaColor Access Type Description Green YellowProtocol Transport Description Port Used HttpTransport Description ALLAdvanced Configuration WLAN-How to Configure Advanced SettingsWLAN-Setting Default Access Port Settings WLAN-Setting Default Access Port Settings Beacon Interval Dtim PeriodWLAN-Advanced Access Port Settings Primary WlanSecurity Beacon WLAN-Advanced Access Port Settings Beacon is a packet broadcast by the adopted access ports to Gateway-How to Configure Network Address Translation NAT Gateway-How to Configure Network Address Translation NAT Gateway-How to Configure the WS 2000 Firewall Always On Firewall FiltersConfigurable Firewall Filters Gateway-How to Configure Static Routes Mime Flood Attack CheckSetting the RIP Configuration Defining RoutesNo RIP RIPSecurity-How to Configure 802.1x EAP Authentication RIP v2Compat NoneSecurity-How to Configure 802.1x EAP Authentication Security-How to Configure 802.1x EAP Authentication Security-How to Configure Kerberos Authentication Security-How to Specify a Network Time Protocol NTP Server Switch Settings WS 2000 Wireless Switch LED FunctionsOverview Location DescriptionChanging the Name of the Switch Change the Location and Country Settings of the WS Location fieldHow to Restart the WS 2000 Wireless Switch Updating the WS 2000 Wireless Switch’s FirmwareChecking for and Downloading Firmware updates Performing the Firmware UpdateSystem Configuration Exporting and Importing Wireless Switch SettingsTo Import or Export Settings to an FTP Site To Import Settings to a Local FileTo Export Settings to a Local File How to Restore Default Configuration Settings Property Value Remote Administration How to Configure Snmp TrapsSetting the Snmp Version Configuration Setting Up Snmp v1/v2c Community DefinitionsSetting Up Snmp v3 Community Definitions NoAuthAuthNoPriv AuthPrivSetting Up the Access Control List Setting the Trap ConfigurationAuthentication ConfigurationTrap Trap Name Generates a Trap when… Category Cold StartSetting the Trap Configuration for Snmp v1/v2c Configure Administrator Access Setting the Trap Configuration for SnmpConfigure Management Access Access Port DescriptionAccess Port Statistics Setup AirBEAM Software AccessChanging the Administrator and Manager Passwords Statistics and LogsGeneral Access Port Information Received and Transmitted Tables Associated Mobile UnitsSubnet Statistics Received Field Description Transmitted Description FieldWAN Statistics InterfacesReceived Field Description Setting Up and Viewing the System Log Viewing the Log on the SwitchSetting Up a Log Server Retail Use Cases BackgroundPlan Configuring the System Settings Contacting the Wireless SwitchEntering the Basic System Settings Setting Access Control Configuring the Subnets IP Address PlanSubnet IP Address Range Configuring POS Subnet For each subnetConfiguring the Printer Subnet Retail Use Cases Configuring the Cafe Subnet Retail Use Cases Configuring the WAN Interface Configuring Network Address Translation NAT Retail Use Cases Configuring the Access Ports Setting Access Port DefaultsSwitch Port Connected to Inspecting the FirewallNaming the POS Access Port Configuring the Printer Access Port Configuring the Cafe Access Port Associating the Access Ports to the WLANs Configuring the WLANs Configuring the Cafe WlanConfiguring the Printer Wlan Name PrinterConfiguring the POS Wlan For the POS WLAN, she makes the following choicesSetting Subnet Access Retail Use Cases Testing Connections Configuring the ClientsWireless Authentication Encryption Channel Client IP Address Subnet Mask Gateway PortField Office Example Plan Configuring the System Settings Entering the Basic System Settings Setting Access Control Field Office Example Configuring the LAN Configuring the Engineering LANField Office Example Field Office Example Configuring the Sales Subnet Configuring the WAN Field Office Example Setting Up Network Address Translation Field Office Example Confirm Firewall Configuration Adopting Access PortsMAC Address Location Adoption List LabelField Office Example Configuring the WLANs Security Field Office Example Wlan Field Office Example Field Office Example Field Office Example Access Port Channel Configuring Subnet Access Installing the Access Ports and Testing Appendix A. Sample Configuration File NTP menu Wlan 1 configuration set mode 1 enable Wlan 3 configuration set mode 3 disable Default 802.11 a radio configuration set reg a in/out 149 Access Port configuration LAN Dhcp configuration network Firewall configuration set syn enable Outbound 1-To-Many NAT configuration set outb map s1 Page Index FTP Snmp 802.1x EAP authentication