eTrust Audit Reference Guide - CA Technologies
eTrust Audit Reference Guide - CA Technologies
eTrust Audit Reference Guide - CA Technologies
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Chapter 4: Configuration Files<br />
About Queues ................................................................................ 4-1<br />
About Queue Rules............................................................................ 4-2<br />
Windows ................................................................................. 4-2<br />
UNIX..................................................................................... 4-2<br />
Example .................................................................................. 4-3<br />
About Actions ................................................................................ 4-3<br />
Recorder Configuration File .................................................................... 4-6<br />
Comment Lines ........................................................................... 4-7<br />
The Asterisk as Wildcard ................................................................... 4-7<br />
Redirector Configuration File................................................................... 4-7<br />
Router Configuration File ...................................................................... 4-8<br />
Chapter 5: Router Configuration File Rule Language<br />
<strong>Reference</strong><br />
Location of the Router Configuration File ........................................................ 5-1<br />
File Structure ................................................................................. 5-1<br />
Variables ..................................................................................... 5-2<br />
Variable Expiration ........................................................................ 5-3<br />
Dynamic Variable Names .................................................................. 5-3<br />
Using Variables in Filter Rules .............................................................. 5-3<br />
Groups ....................................................................................... 5-4<br />
Loops .................................................................................... 5-4<br />
Command Syntax ............................................................................. 5-4<br />
action; target .............................................................................. 5-4<br />
action; remote ............................................................................. 5-5<br />
do........................................................................................ 5-6<br />
type: ..................................................................................... 5-7<br />
include ................................................................................... 5-8<br />
exclude ................................................................................... 5-8<br />
rule ...................................................................................... 5-9<br />
group .................................................................................... 5-9<br />
Regular Expressions .......................................................................... 5-10<br />
Supported Binary Operators................................................................... 5-10<br />
Including Additional Data Types .............................................................. 5-11<br />
Identifying Events using SAPI Tokens.......................................................... 5-12<br />
iv<br />
<strong>Reference</strong> <strong>Guide</strong>