36 Chapter 2 Status and logging

Most events are sent to the event log first. Significant events from the event log are sent to the system log. (Not all data that the system log saves comes from the event log.) From the system log, the VPN Router filters security entries for the security log and configuration entries for the configuration log. You can use the different log options to write specific event levels to the log files and view them, including:

Normal

Urgent

Detailed

All

Sessions

You can monitor which users are tunneled into the VPN Router, when they logged in, and the number of bytes and packets they transmitted or received. Additionally, you can see selected session details, and you can log off users.

Once a session is connected, detailed information about the connection is available from the Status > Sessions window. This window lists all connected sessions, including administrative sessions. As well as statistics, this information contains what encryption was negotiated and the SOIs of the security associations. Click the appropriate buttons beside each session to either log out of the session or view detailed information about it.

Reports

Use the Status > Reports window to view system and performance data in text or graphical format. You generate reports in an on-screen tabular format, and you can import the reports into a spreadsheet or database through the comma-delimited format.

At midnight (12:00 a.m.), the data collection task performs summary calculations and rewrites history files, along with other management and cleanup functions. To perform this task, leave the VPN Router running overnight. The VPN Router must be running at midnight to generate a historical graph for the day.

NN46110-602

Page 36
Image 36
Nortel Networks NN46110-602 manual Sessions, Reports