Device Management

10

 

Log Management

 

 

 

 

 

STEP 5 Check the box of Click here if you accept with SEULA to accept the SEULA (Software End User License Agreement) requirements. You can click the SEULA link to see the detailed SEULA requirements on Cisco.com.

STEP 6 Click Validate License to validate the security license on your security appliance.

After the license is installed or renewed, the expiration date of the security license is updated immediately. The security services are activated by the security license.

Log Management

You can configure logs for various events that occur on your network. The event logs can be used for tracking potential security threats. A variety of events can be captured and logged for review. These logs can be saved to the local syslog daemon or to a specified remote syslog server, or be emailed to a specified email address.

This section describes how to view the event logs, and configure the log settings and the log facilities. Refer to the following topics:

Viewing Logs, page 442

Configuring Log Settings, page 444

Configuring Log Facilities, page 447

Viewing Logs

Use the View Logs page to view the logs for specific severity level, log facility, or source and/or destination IP address, or to search the logs by keyword.

NOTE Make sure that you enable the Local Log feature before you view the logs. See Configuring Log Settings, page 444.

STEP 1 Click Device Management > Logs > View Logs.

STEP 2 Specify the logs to be viewed:

Log Severity: Choose the severity level to filter the logs. For example: If you select Critical, all logs listed under the Critical, Emergency, and Alert categories are displayed.

Cisco ISA500 Series Integrated Security Appliances Administration Guide

442

Page 442
Image 442
Casio ISA550WBUN3K9 manual Log Management, Viewing Logs, Click Device Management Logs View Logs