is related to user accounts and passwords. After a successful installation, you should immediately change the default passwords. Many attacks come from within an organization and this helps to minimize the risk. The IWS login is generally secure since it utilizes encryption techniques to hide usernames and passwords from network spyware.
Malicious software covertly attaches itself to unsuspecting devices. These programs are generally designed to compromise personal information or to create system havoc. Since the VBrick appliance uses an
Configuration: System > Logging
Certain log events are captured and can be viewed locally. This local log is saved in volatile memory and hold the most recent 20 entries. See Status: System Log on page 73 for examples of log information. To save log information indefinitely, it is recommended that remote logging be utilized. Remote servers generally offer ample storage and offer the additional benefit of collecting log information from several VBricks simultaneously. When logging externally, specify either the IP address or hostname a server that is configured to receive SNMP traps on port 162 into the Remote Event Log IP Address or Remove Event Log DNS Host Name fields.
50 | © 2007 VBrick Systems, Inc. |