Sysgem logfile concentrator
Author: t | 2025-04-24
View a list of Sysgem Logfile Concentrator integrations and software that integrates with Sysgem Logfile Concentrator below. Compare the best Sysgem Logfile Concentrator integrations as well as features, ratings, user reviews, and pricing of software that integrates with Sysgem Logfile Concentrator. Here are the current Sysgem Logfile View a list of Sysgem Logfile Concentrator integrations and software that integrates with Sysgem Logfile Concentrator below. Compare the best Sysgem Logfile Concentrator integrations as
Sysgem Logfile Concentrator Integrations - SourceForge
Flexible and modular tools for monitoring and managing systems, administering user accounts and auditing security in one single screen - across Windows, UNIX/Linux, OpenVMS and IBM iNow accessible in full functionality with SEM's Virtual UI using any web browser.SEM Application ModulesSEM offers the three core application modules Sysgem System Manager (SSyM), Sysgem Account Manager (SAcM) and Sysgem File Synchronizer (SFiS) which all run via the SEM framework SYSGEM SYSTEM MANAGER (SSyM) Unite, simplify and integrate core system administration solutions across a multi-platform environment SYSGEM ACCOUNT MANAGER (SAcM) Unify user account management across a multi-platform, multi-application environment SYSGEM FILE SAFEGUARD (SFiS)Manage the controlled distribution and deployment of configuration files across infrastructureSEM FeaturesUniteSimplifyIntegrateFull visibility of your system’s hardware and software capacity usage with intelligent alerting and analysis to prevent operational holdups, cleanup and reprocessing work - reducing your organization’s reliance on its IT help desk and sysadmin teams Identity and Access Management (IAM) tools designed not only for managing standard users’ identity and access but also to inherently control, track and safeguard privileged access across an organization’s network infrastructure Decrease security threats and protect your organization’s digital assets and their management with least privileged access management Streamline and secure the performance and health of your heterogeneous and integrated IT infrastructure independent of its heritage complexity with automated monitoring and reporting functionality Ensure full audit and regulatory compliance with cross-platform configuration management Manage, monitor and secure administrative access of MSPs and IT outsourcing vendors to your organizations Equally supporting heritage (legacy) IT environments critical to your organization’s operations by simplifying traditionally high-skilled and complex administration, adaptation and development workAccessible as a desktop application or anywhere with our new SEM virtual UILEARN MORE ABOUT SYSGEM'S PRODUCTS Been used in a lab environment. Use Groups on the VPN 3000 Concentrator Groups can be defined for both Cisco Secure ACS for Windows and the VPN 3000 Concentrator, but they use groups somewhat differently. Perform these tasks in order to simplify things: Configure a single group on the VPN 3000 Concentrator for when you establish the initial tunnel. This is often called the Tunnel Group and it is used to establish an encrypted Internet Key Exchange (IKE) session to the VPN 3000 Concentrator using a pre-shared key (the group password). This is the same group name and password that should be configured on all Cisco VPN Clients that want to connect to the VPN Concentrator. Configure groups on the Cisco Secure ACS for Windows server that use standard RADIUS Attributes and Vendor Specific Attributes (VSAs) for policy management. The VSAs that should be used with the VPN 3000 Concentrator are the RADIUS (VPN 3000) attributes. Configure users on the Cisco Secure ACS for Windows RADIUS server and assign them to one of the groups configured on the same server. The users inherit attributes defined for their group and Cisco Secure ACS for Windows sends those attributes to VPN Concentrator when the user is authenticated. How the VPN 3000 Concentrator Uses Group and User Attributes After the VPN 3000 Concentrator authenticates the Tunnel Group with the VPN Concentrator and the user with RADIUS, it must organize the attributes it has received. The VPN Concentrator uses the attributes in this order of preference, whether the authentication is done in the VPN Concentrator or with RADIUS: User attributes—These attributes always take precedence over any others. Tunnel Group attributes—Any attributes not returned when the user was authenticated are filled in by the Tunnel Group attributes. Base Group attributes—Any attributes missing from the user or Tunnel Group attributes are filled in by the VPN Concentrator Base Group attributes. VPN 3000 Series Concentrator Configuration Complete the procedure in this section in order to configure a Cisco VPN 3000 Concentrator for the parameters required to the IPsec connection as well as the AAA client for the VPN user to authenticate with the RADIUS server. In this lab setting, the VPN Concentrator is first accessed through the console port and a minimal configuration is added as this output shows: Login: admin!--- The password must be "admin".Password:***** Welcome to Cisco Systems VPN 3000 Concentrator Series Command Line InterfaceCopyrightPrivacy profile for Sysgem Logfile Concentrator
The ChallengeUser account management is an important part of managing your computer systems, but it is often a very involved and time-consuming process. Delays in making correctly configured accounts available to end-users result in lost business or a compromise in security.The SolutionThe Sysgem Account Manager (SAcM) is a fully featured application for user account management on multiple platforms. It supports basic operating system accounts and user profiles in end-user layered applications. With SAcM, you create accounts from default templates on multiple systems in one simple operation.Existing accounts – across all platforms, network-wide – are sorted, filtered and multiply-selected, and updated in a single operation.SAcM allows you to delegate responsibility with confidence and safety. Statistical and detailed user account reports are produced with ease.And with the separately available Sysgem Development Manager (SDeM) Module, its features and functions are easily customized to meet your own specific needs.Key Features and BenefitsProvides a single point for creating & managing multiple accounts on multiple computer systems of multiple platform types, including the maintenance of user entries in layered applications.Prevents delays in creating the user account environment for “new starters” by simplifying the process. Whereas this once involved many tasks and a number of different people, with SAcM a single and simple operation by an authorized user-account administrator is all it takes.Allows multiple accounts (cross-platform and network-wide) to be selected and updated as part of day-to-day account administration.Reduces security risks when staff leave by determining the ownership of user accounts. The accounts for someone who has just left the organization, for example, can be identified, disabled and scheduled for deletion at a predefined review date. For more details on this feature see the description of the Subscriber DB.Facilitates the management of user groups, quotas, rights, privileges, passwords and intrusions.Simplifies help desk operations for user administration, enables responsibility to be delegated with safety, and ensures full audit trail accountability.During account creation, default field values are applied depending on the user-group to which each user belongs. The ownership of user accounts can be linked to a subscriber database of employees.Makes it easy to produce accurate, up-to-date reports on. View a list of Sysgem Logfile Concentrator integrations and software that integrates with Sysgem Logfile Concentrator below. Compare the best Sysgem Logfile Concentrator integrations as well as features, ratings, user reviews, and pricing of software that integrates with Sysgem Logfile Concentrator. Here are the current Sysgem LogfileBuy Sysgem Logfile Concentrator on Bizoforce
VPN Concentrator what method to use to authenticate users. Mode Config—Check Mode Config. Click Apply. Complete these steps in order to configure multiple authentication servers on the VPN 3000 Concentrator. Once the group is defined, highlight that group, and click Authentication Servers under the Modify column. Individual authentication servers can be defined for each group even if these servers do not exist in the global servers. Choose the server type RADIUS, and add these parameters for your Cisco Secure ACS for Windows RADIUS server. Leave all other parameters in their default state. Authentication Server—Enter the IP address of your Cisco Secure ACS for Windows RADIUS server. Server Secret—Enter the RADIUS server secret. This must be the same secret you use when you configure the VPN 3000 Concentrator in the Cisco Secure ACS for Windows configuration. Verify—Re-enter the password for verification. Choose Configuration > System > Address Management > Assignment and check Use Address from Authentication Server in order to assign the IP address to the VPN Clients from the IP pool created in the RADIUS server once the client gets authenticated. RADIUS Server Configuration This section of the document describes the procedure required to configure the Cisco Secure ACS as a RADIUS server for VPN Client user authentication forwarded by the Cisco VPN 3000 Series Concentrator - AAA client. Double-click the ACS Admin icon in order to start the admin session on the PC that runs the Cisco Secure ACS for Windows RADIUS server. Log in with the proper username and password, if required. Complete these steps in order to add the VPN 3000 Concentrator to the Cisco Secure ACS for Windows server configuration. Choose Network Configuration and click Add Entry in order to add an AAA client to the RADIUS server. Add these parameters for your VPN 3000 Concentrator: AAA Client Hostname—Enter the hostname of your VPN 3000 Concentrator (for DNS resolution). AAA Client IP Address—Enter the IP address of your VPN 3000 Concentrator. Key—Enter the RADIUS server secret. This must be the same secret you configured when you added the Authentication Server on the VPN Concentrator. Authenticate Using—Choose RADIUS (Cisco VPN 3000/ASA/PIX 7.x+). This allows the VPN 3000 VSAs to display in the Group configuration window. Click Submit. Choose Interface Configuration, click RADIUS (Cisco VPN 3000/ASA/PIX 7.x+), and check Group [26] Vendor-Specific. Note: 'RADIUS attribute 26' refers to all vendor specific attributes. For example, choose Interface Configuration > Herbalist has rendered a variety of medicinalingredients into this soothing, restorative substance.Health poultices instantly restore some of the user's health. Recipe: Elfroot: 4 Flask: 1 Distillation Agent: 2 Concentrator Agent: 2Potent Lyrium Potion - A potion that contains a small amount of refined lyrium.Lyrium potion instantly restores a portion of the user's mana. Only spellcasterscan use it. Recipe: Lyrium Dust: 4 Flask: 1 Distillation Agent: 2 Concentrator Agent: 2 --------------------III.ii ENHANCING--------------------Greater Ice Salve - A sticky, snow-white salve. No two particles of it areidentical.Ice salve increases the user's resistance to cold damage for a short time. Recipe: Frostrock: 2 Flask: 1 Distillation Agent: 1 Concentrator Agent: 1Greater Nature Salve - This thick brown salve makes the user smell like dirt andherbs.Nature salve increases the user's resistance to nature damage for a short time. Recipe: Lifestone: 2 Flask: 1 Distillation Agent: 1 Concentrator Agent: 1Greater Spirit Salve - This balm has a soothing effect on the mind.Spirit balm increases the user's resistance to spirit damage for a short time. Recipe: Spirit Shard: 2 Flask: 1 Distillation Agent: 1 Concentrator Agent: 1Greater Warmth Balm - This light balm attunes the user to the element of fire.Warmth balm increases the user's resistance to fire damage for a short time. Recipe: Fire Crystal: 2 Flask: 1 Distillation Agent: 1 Concentrator Agent: 2Incense of Awareness - Small lumps of a curious resin that can be burned torelease fragrant smoke.This incense makes the user more aware of surrounding action, but less able toresist hostile influences, granting a bonus to defense, but a penalty to mentalresistance. Recipe: Lyrium Dust: 1 Deep Mushroom: 1 Flask: 1 Distillation Agent: 1Lesser Ice Salve - A sticky, snow-white salve. No two particles of it areidentical.Ice salve increases the user's resistance to cold damage for a short time. Recipe: Frostrock: 1 Flask:Sysgem Logfile Concentrator Alternatives - SourceForge
1 Concentrator Agent: 1Lesser Nature Salve - This thick brown salve makes the user smell like dirt andherbs.Nature salve increases the user's resistance to nature damage for a short time. Recipe: Lifestone: 1 Flask: 1 Concentrator Agent: 1Lesser Spirit Balm - This balm has a soothing effect on the mind.Spirit balm increases the user's resistance to spirit damage for a short time. Recipe: Spirit Shard: 1 Flask: 1 Concentrator Agent: 1Lesser Warmth Balm - This light balm attunes the user to the element of fire.Warmth balm increases the user's resistance to fire damage for a short time. Recipe: Fire Crystal: 1 Flask: 1 Concentrator Agent: 1Rock Salve - A salve of animal tallow that smells foul and is filled with tinyshards of rock.Rock salve increases the user's armor and physical resistance, but decreasesmovement speed and attack speed. Recipe: Deep Mushroom: 2 Flask: 1 Distillation Agent: 1Swift Salve - Made from tallow, swift salve is infused with peppermint and isrefreshing and zingy.Swift salve increases the user's movement and attack speed for a short time. Recipe: Lyrium Dust: 2 Deep Mushroom: 2 Flask: 1 Concentrator Agent: 1Greater Elixir of Grounding - N/ALesser Elixir of Grounding - N/A--------------------III.iii TABLE--------------------Note 1:Abbreviations as follows: Dis Agt = Distillation Agent, Con Agt = Concentrator Agent, Cor Agt = Corrupter Agent, Comp = ComponentNote 2: Items after the blank row I did not find in my original playthrough of DA:O. Ifanyone can confirm that they do indeed exist in game and recipe is correct,please let me know.Note 3:Reading the table: First item is the name, second is the skill level required,then the first component needed and quantity needed, then a list of commoncomponents in each recipe with an amount. Sorry for the ugliness, but it hasto be in plain text for Gamefaqs, I have a spreadsheet ifSysGem Logfile Concentrator for Windows - CNET Download
Configuration > 1-Interfaces > 2-Public > 4-Select IP Filter > 1. Private (Default). Choose Administration > 7-Access Rights > 2-Access Control List > 1-Add Manager Workstation in order to add the IP address of the external manager. These steps are only required if you manage the VPN Concentrator from outside. Once you have completed these two steps, the rest of the configuration can be done through the GUI by using a web browser and connecting to the IP of the interface you just configured. In this example and at this point, the VPN Concentrator is accessible through HTML from the inside network: Choose Configuration > Interfaces in order to recheck the interfaces after you bring up the GUI. Complete these steps in order to add the Cisco Secure ACS for Windows RADIUS server to the VPN 3000 Concentrator configuration. Choose Configuration > System > Servers > Authentication, and click Add from the left menu. Choose the server type RADIUS and add these parameters for your Cisco Secure ACS for Windows RADIUS server. Leave all other parameters in their default state. Authentication Server—Enter the IP address of your Cisco Secure ACS for Windows RADIUS server. Server Secret—Enter the RADIUS server secret. This must be the same secret you use when you configure the VPN 3000 Concentrator in the Cisco Secure ACS for Windows configuration. Verify—Re-enter the password for verification. This adds the authentication server in the global configuration of the VPN 3000 Concentrator. This server is used by all groups except for when an authentication server has been specifically defined. If an authentication server is not configured for a group, it reverts to the global authentication server. Complete these steps in order to configure the Tunnel Group on the VPN 3000 Concentrator. Choose Configuration > User Management > Groups from the left menu and click Add. Change or add these parameters in the Configuration tabs. Do not click Apply until you change all of these parameters: Note: These parameters are the minimum needed for remote access VPN connections. These parameters also assume the default settings in the Base Group on the VPN 3000 Concentrator have not been changed. Identity Group Name—Type a group name. For example, IPsecUsers. Password—Enter a password for the group. This is the pre-shared key for the IKE session. Verify—Re-enter the password for verification. Type—Leave this as the default: Internal. IPsec Tunnel Type—Choose Remote-Access. Authentication—RADIUS. This tells the. View a list of Sysgem Logfile Concentrator integrations and software that integrates with Sysgem Logfile Concentrator below. Compare the best Sysgem Logfile Concentrator integrations as well as features, ratings, user reviews, and pricing of software that integrates with Sysgem Logfile Concentrator. Here are the current Sysgem LogfileSysgem Logfile Concentrator Reviews in 2025 - SourceForge
Concentrator 5 Liter Concentrators8 Liter High Flow Concentrators10 Liter High Flow ConcentratorsLow Maintenance & Easy OperationPortable Concentrator Continuous settings 0.5 to 2 LPM (in .5 Increments)Pulse dose settings 1 to 6Size (approx.) 11.5 x 10 x 6 InchesWeight (approx.)10 Lbs. with BatteryPortable Concentrator Durable, Reliable & Easy to UsePulse Mode: 1 – 6 Liters Per MinuteContinuous Mode: 1-2 Liters Per MinuteOxygen Purity: 87% to 96% In All SettingsApproximate Weight: 10 lbs.Sustainable for Air Travel: FAA CompliantLightweight Portable Concentrator Light Weight, Simple & Easy to UsePulse Mode: 1 – 5 Liters Per MinuteContinuous Mode: Not AvailableOxygen Purity: 87% to 96% In All SettingsApproximate Weight: 5.5 lbs.Sustainable for Air Travel: FAA CompliantTanks E-TanksM60-TanksM6-TanksStandard or conserving regulatorsSingle or dual E-Tank cartsShoulder carrying case for M6-TankSuction Machine Stationary, Portable, or Intermittent availableHigh-performance vacuum systemShut-off in canister protects against overflowEasy to clean and infection control friendlyBiPAP & CPAP Machines Continuous Positive Airway Pressure SystemBi-Level Positive Airway Pressure SystemTreatment for Obstructive Sleep Apnea Lightweight and CompactEasy, One Switch OperationNebulizer Delivers Medication in Mist FormEffective Breathing TreatmentSmall, Portable, and Very QuietQuiet, low noise level piston style compressorComments
Flexible and modular tools for monitoring and managing systems, administering user accounts and auditing security in one single screen - across Windows, UNIX/Linux, OpenVMS and IBM iNow accessible in full functionality with SEM's Virtual UI using any web browser.SEM Application ModulesSEM offers the three core application modules Sysgem System Manager (SSyM), Sysgem Account Manager (SAcM) and Sysgem File Synchronizer (SFiS) which all run via the SEM framework SYSGEM SYSTEM MANAGER (SSyM) Unite, simplify and integrate core system administration solutions across a multi-platform environment SYSGEM ACCOUNT MANAGER (SAcM) Unify user account management across a multi-platform, multi-application environment SYSGEM FILE SAFEGUARD (SFiS)Manage the controlled distribution and deployment of configuration files across infrastructureSEM FeaturesUniteSimplifyIntegrateFull visibility of your system’s hardware and software capacity usage with intelligent alerting and analysis to prevent operational holdups, cleanup and reprocessing work - reducing your organization’s reliance on its IT help desk and sysadmin teams Identity and Access Management (IAM) tools designed not only for managing standard users’ identity and access but also to inherently control, track and safeguard privileged access across an organization’s network infrastructure Decrease security threats and protect your organization’s digital assets and their management with least privileged access management Streamline and secure the performance and health of your heterogeneous and integrated IT infrastructure independent of its heritage complexity with automated monitoring and reporting functionality Ensure full audit and regulatory compliance with cross-platform configuration management Manage, monitor and secure administrative access of MSPs and IT outsourcing vendors to your organizations Equally supporting heritage (legacy) IT environments critical to your organization’s operations by simplifying traditionally high-skilled and complex administration, adaptation and development workAccessible as a desktop application or anywhere with our new SEM virtual UILEARN MORE ABOUT SYSGEM'S PRODUCTS
2025-04-20Been used in a lab environment. Use Groups on the VPN 3000 Concentrator Groups can be defined for both Cisco Secure ACS for Windows and the VPN 3000 Concentrator, but they use groups somewhat differently. Perform these tasks in order to simplify things: Configure a single group on the VPN 3000 Concentrator for when you establish the initial tunnel. This is often called the Tunnel Group and it is used to establish an encrypted Internet Key Exchange (IKE) session to the VPN 3000 Concentrator using a pre-shared key (the group password). This is the same group name and password that should be configured on all Cisco VPN Clients that want to connect to the VPN Concentrator. Configure groups on the Cisco Secure ACS for Windows server that use standard RADIUS Attributes and Vendor Specific Attributes (VSAs) for policy management. The VSAs that should be used with the VPN 3000 Concentrator are the RADIUS (VPN 3000) attributes. Configure users on the Cisco Secure ACS for Windows RADIUS server and assign them to one of the groups configured on the same server. The users inherit attributes defined for their group and Cisco Secure ACS for Windows sends those attributes to VPN Concentrator when the user is authenticated. How the VPN 3000 Concentrator Uses Group and User Attributes After the VPN 3000 Concentrator authenticates the Tunnel Group with the VPN Concentrator and the user with RADIUS, it must organize the attributes it has received. The VPN Concentrator uses the attributes in this order of preference, whether the authentication is done in the VPN Concentrator or with RADIUS: User attributes—These attributes always take precedence over any others. Tunnel Group attributes—Any attributes not returned when the user was authenticated are filled in by the Tunnel Group attributes. Base Group attributes—Any attributes missing from the user or Tunnel Group attributes are filled in by the VPN Concentrator Base Group attributes. VPN 3000 Series Concentrator Configuration Complete the procedure in this section in order to configure a Cisco VPN 3000 Concentrator for the parameters required to the IPsec connection as well as the AAA client for the VPN user to authenticate with the RADIUS server. In this lab setting, the VPN Concentrator is first accessed through the console port and a minimal configuration is added as this output shows: Login: admin!--- The password must be "admin".Password:***** Welcome to Cisco Systems VPN 3000 Concentrator Series Command Line InterfaceCopyright
2025-04-03The ChallengeUser account management is an important part of managing your computer systems, but it is often a very involved and time-consuming process. Delays in making correctly configured accounts available to end-users result in lost business or a compromise in security.The SolutionThe Sysgem Account Manager (SAcM) is a fully featured application for user account management on multiple platforms. It supports basic operating system accounts and user profiles in end-user layered applications. With SAcM, you create accounts from default templates on multiple systems in one simple operation.Existing accounts – across all platforms, network-wide – are sorted, filtered and multiply-selected, and updated in a single operation.SAcM allows you to delegate responsibility with confidence and safety. Statistical and detailed user account reports are produced with ease.And with the separately available Sysgem Development Manager (SDeM) Module, its features and functions are easily customized to meet your own specific needs.Key Features and BenefitsProvides a single point for creating & managing multiple accounts on multiple computer systems of multiple platform types, including the maintenance of user entries in layered applications.Prevents delays in creating the user account environment for “new starters” by simplifying the process. Whereas this once involved many tasks and a number of different people, with SAcM a single and simple operation by an authorized user-account administrator is all it takes.Allows multiple accounts (cross-platform and network-wide) to be selected and updated as part of day-to-day account administration.Reduces security risks when staff leave by determining the ownership of user accounts. The accounts for someone who has just left the organization, for example, can be identified, disabled and scheduled for deletion at a predefined review date. For more details on this feature see the description of the Subscriber DB.Facilitates the management of user groups, quotas, rights, privileges, passwords and intrusions.Simplifies help desk operations for user administration, enables responsibility to be delegated with safety, and ensures full audit trail accountability.During account creation, default field values are applied depending on the user-group to which each user belongs. The ownership of user accounts can be linked to a subscriber database of employees.Makes it easy to produce accurate, up-to-date reports on
2025-04-10VPN Concentrator what method to use to authenticate users. Mode Config—Check Mode Config. Click Apply. Complete these steps in order to configure multiple authentication servers on the VPN 3000 Concentrator. Once the group is defined, highlight that group, and click Authentication Servers under the Modify column. Individual authentication servers can be defined for each group even if these servers do not exist in the global servers. Choose the server type RADIUS, and add these parameters for your Cisco Secure ACS for Windows RADIUS server. Leave all other parameters in their default state. Authentication Server—Enter the IP address of your Cisco Secure ACS for Windows RADIUS server. Server Secret—Enter the RADIUS server secret. This must be the same secret you use when you configure the VPN 3000 Concentrator in the Cisco Secure ACS for Windows configuration. Verify—Re-enter the password for verification. Choose Configuration > System > Address Management > Assignment and check Use Address from Authentication Server in order to assign the IP address to the VPN Clients from the IP pool created in the RADIUS server once the client gets authenticated. RADIUS Server Configuration This section of the document describes the procedure required to configure the Cisco Secure ACS as a RADIUS server for VPN Client user authentication forwarded by the Cisco VPN 3000 Series Concentrator - AAA client. Double-click the ACS Admin icon in order to start the admin session on the PC that runs the Cisco Secure ACS for Windows RADIUS server. Log in with the proper username and password, if required. Complete these steps in order to add the VPN 3000 Concentrator to the Cisco Secure ACS for Windows server configuration. Choose Network Configuration and click Add Entry in order to add an AAA client to the RADIUS server. Add these parameters for your VPN 3000 Concentrator: AAA Client Hostname—Enter the hostname of your VPN 3000 Concentrator (for DNS resolution). AAA Client IP Address—Enter the IP address of your VPN 3000 Concentrator. Key—Enter the RADIUS server secret. This must be the same secret you configured when you added the Authentication Server on the VPN Concentrator. Authenticate Using—Choose RADIUS (Cisco VPN 3000/ASA/PIX 7.x+). This allows the VPN 3000 VSAs to display in the Group configuration window. Click Submit. Choose Interface Configuration, click RADIUS (Cisco VPN 3000/ASA/PIX 7.x+), and check Group [26] Vendor-Specific. Note: 'RADIUS attribute 26' refers to all vendor specific attributes. For example, choose Interface Configuration >
2025-04-09Herbalist has rendered a variety of medicinalingredients into this soothing, restorative substance.Health poultices instantly restore some of the user's health. Recipe: Elfroot: 4 Flask: 1 Distillation Agent: 2 Concentrator Agent: 2Potent Lyrium Potion - A potion that contains a small amount of refined lyrium.Lyrium potion instantly restores a portion of the user's mana. Only spellcasterscan use it. Recipe: Lyrium Dust: 4 Flask: 1 Distillation Agent: 2 Concentrator Agent: 2 --------------------III.ii ENHANCING--------------------Greater Ice Salve - A sticky, snow-white salve. No two particles of it areidentical.Ice salve increases the user's resistance to cold damage for a short time. Recipe: Frostrock: 2 Flask: 1 Distillation Agent: 1 Concentrator Agent: 1Greater Nature Salve - This thick brown salve makes the user smell like dirt andherbs.Nature salve increases the user's resistance to nature damage for a short time. Recipe: Lifestone: 2 Flask: 1 Distillation Agent: 1 Concentrator Agent: 1Greater Spirit Salve - This balm has a soothing effect on the mind.Spirit balm increases the user's resistance to spirit damage for a short time. Recipe: Spirit Shard: 2 Flask: 1 Distillation Agent: 1 Concentrator Agent: 1Greater Warmth Balm - This light balm attunes the user to the element of fire.Warmth balm increases the user's resistance to fire damage for a short time. Recipe: Fire Crystal: 2 Flask: 1 Distillation Agent: 1 Concentrator Agent: 2Incense of Awareness - Small lumps of a curious resin that can be burned torelease fragrant smoke.This incense makes the user more aware of surrounding action, but less able toresist hostile influences, granting a bonus to defense, but a penalty to mentalresistance. Recipe: Lyrium Dust: 1 Deep Mushroom: 1 Flask: 1 Distillation Agent: 1Lesser Ice Salve - A sticky, snow-white salve. No two particles of it areidentical.Ice salve increases the user's resistance to cold damage for a short time. Recipe: Frostrock: 1 Flask:
2025-04-20