Displaying debug entries in the mpm log, Displaying secure access entries in the mpm log, Displaying debug entries in the mpm log -13 – Alcatel Carrier Internetworking Solutions Omni Switch/Router User Manual

Page 269

Advertising
background image

Displaying Debug Entries in the MPM Log

Page 10-13

Displaying Debug Entries in the MPM Log

The

debuglog

command displays the debug entries in the mpm.log file. (Note: Currently

there are no facilities using debugging.

) Below is a sample display of the

debuglog

command.

Task Name

Time

Debug Message

--------------------------------

---------------------

---------------------------------------------------------

tUdpRelay

14:33:36

Undersized DHCP req rcvd; discarding

The fields displayed by the

debuglog

command are described here.

Task Name

. The task that generated the debug message.

Time

. The time the message was generated by the task.

Debug Message

. Information relevant to debugging.

Displaying Secure Access Entries in the MPM Log

The

seclog

command displays the secure access violation event entries in the mpm.log file. To

display this data, enter

seclog

at the system prompt. A screen similar to the following will be displayed.

Secure Access Violations Log

Slot/

Elapsed Time

Time

Protocol

Source IP

Attempts

Intf

(secs)

------------------------

-------------

--------------

--------------

-------

-------------------

12:49:02

FTP

172.23.8.801

1

5/1

23

03:15:34

Telnet

198.20.2.101

10

2/3

240

Descriptions of the fields are as follows:

Time

. The first time the access violation occurred.

Protocol

. The IP protocol for which the violation occurred.

Source IP

. The source IP address of the unauthorized user.

Attempts

. The number of access attempts made by this user within the sample period (5

minutes).

Slot/Intf.

The physical port that received the unauthorized user information.

Elapsed Time (secs).

The duration (in seconds) from the first unauthorized access to the end of

the sampling period (5 minutes). Secure access violations will take 5 minutes to display in the
log file.

Advertising