03.03.2015 Views

eTrust Audit Reference Guide - CA Technologies

eTrust Audit Reference Guide - CA Technologies

eTrust Audit Reference Guide - CA Technologies

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 4: Configuration Files<br />

About Queues ................................................................................ 4-1<br />

About Queue Rules............................................................................ 4-2<br />

Windows ................................................................................. 4-2<br />

UNIX..................................................................................... 4-2<br />

Example .................................................................................. 4-3<br />

About Actions ................................................................................ 4-3<br />

Recorder Configuration File .................................................................... 4-6<br />

Comment Lines ........................................................................... 4-7<br />

The Asterisk as Wildcard ................................................................... 4-7<br />

Redirector Configuration File................................................................... 4-7<br />

Router Configuration File ...................................................................... 4-8<br />

Chapter 5: Router Configuration File Rule Language<br />

<strong>Reference</strong><br />

Location of the Router Configuration File ........................................................ 5-1<br />

File Structure ................................................................................. 5-1<br />

Variables ..................................................................................... 5-2<br />

Variable Expiration ........................................................................ 5-3<br />

Dynamic Variable Names .................................................................. 5-3<br />

Using Variables in Filter Rules .............................................................. 5-3<br />

Groups ....................................................................................... 5-4<br />

Loops .................................................................................... 5-4<br />

Command Syntax ............................................................................. 5-4<br />

action; target .............................................................................. 5-4<br />

action; remote ............................................................................. 5-5<br />

do........................................................................................ 5-6<br />

type: ..................................................................................... 5-7<br />

include ................................................................................... 5-8<br />

exclude ................................................................................... 5-8<br />

rule ...................................................................................... 5-9<br />

group .................................................................................... 5-9<br />

Regular Expressions .......................................................................... 5-10<br />

Supported Binary Operators................................................................... 5-10<br />

Including Additional Data Types .............................................................. 5-11<br />

Identifying Events using SAPI Tokens.......................................................... 5-12<br />

iv<br />

<strong>Reference</strong> <strong>Guide</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!