Industrial defender configuration, Industrial defender agent configuration – RuggedCom RuggedRouter RX1100 User Manual
Page 286
![background image](/manuals/199656/286/background.png)
34. Maintaining The Router
Revision 1.14.3
286
RX1000/RX1100™
• Temperatures
• Voltages
• User logins/logouts
• Network Interface traffic
• CPU load
• Disk usage
In addition, when syslog is properly configured, the SEM will be able to collect system logging
information for further processing. These include, but are not limited to:
• Webmin logins (both attempted and complete)
• Webmin actions
• SSH logins
34.3.2. Industrial Defender Configuration
Figure 34.6. Industrial Defender Agent Configuration
The Industrial Defender Agent depends, for proper functionality, on a key retrieved from an SEM unit.
The Webmin Industrial Defender Agent General Configuration page provides a three-step approach
to configure the Industrial Defender Agent by:
• Configuring the IP addresses of the SEM unit and RuggedRouter
• Launching a key exchange sequence with the SEM
• Helping to configure remote system logging operation