EasyManua.ls Logo

Nomadix Access Gateways - Managing the Log Options {Logging

Nomadix Access Gateways
330 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
ACCESS GATEWAY
System Administration 91
The IP addresses from subscribers that are on a subnet different from the Access Gateway
(for example, misconfigured) are translated by Nomadix’ Dynamic Address Translation
(DAT) patented technology to the
Subscriber IP Address.
8. Enter a Valid Subnet Mask in the Subnet Mask Field.
The subnet mask defines the number of IP addresses that are available on the routed
subnet where the Access Gateway is located.
9. Enter a valid default gateway IP address in the Default Gateway field.
The default gateway is the IP address of the router that the Access Gateway uses to
transmit data to the Internet.
10. When finished, you must reboot the system for the new settings to take effect. Click on the
check box for
Reboot after changes are saved? to reboot the system after saving your
changes.
11. Click on the Submit button to save your changes and reboot the system, or click on the
Reset button if you want to reset all the values to their previous state.
Managing the Log Options {Logging}
System logging creates log files and error messages generated at the system level. AAA
logging creates activity log files for the AAA (Authorization, Authentication, and Accounting)
functions. You can enable either of these options.
The subscriber interface acts as a multifunctional “translator.” For example, if a
subscribers computer is setup statically for a network with a gateway address of
10.1.1.1, the Access Gateway emulates the gateway to accommodate this
subscriber while emulating other gateways to accommodate other subscribers.
Although the AAA and billing logs can go to the same server, we recommend that
they have their own unique server ID number assigned (between 0 and 7). When
managing multiple properties, the properties are identified in the log files by their
IP addresses.

Table of Contents

Related product manuals