System log, Security log – Nortel Networks NN46110-602 User Manual

Page 45

Advertising
background image

Chapter 2 Status and logging 45

Nortel VPN Router Troubleshooting

System log

The system log contains all system events that are considered significant enough
to be written to disk, including those displayed in the configuration and security
logs. Events that appear in the system log include:

LDAP activity

configuration activity

server authentication and authorization requests

The following is the general format of the log entries:

time stamp

task that issued the event (tEvtLgMgr, tObjMgr, tHttpdTask)

number that indicates the CPU that issued the event (0=CPU 0, 1=CPU 1)

software module that issued the event

priority code assignment (number in brackets) (for a description of these
codes, see

“Event log” on page 41

)

indicates that the packet matched the rule in the listed section

indicates the matching packet source, destination, protocol, and action
configured for that rule

The following example shows a system log:

11:29:31 tEvtLgMgr 0 : CSFW [12] Rule[OVERRIDE 1]Firewall:
[192.32.250.204:1024-10.0.18.12:2048, icmp], action: Allow

Security log

The Security log records all activity about system or user security. It lists all
security events, both failures and successes. The events can include:

authentication and authorization

tunnel or administration requests

encryption, authentication, or compression

hours of access

number of session violations

Advertising