Chapter 2 Status and logging 45

System log

The system log contains all system events that are considered significant enough to be written to disk, including those displayed in the configuration and security logs. Events that appear in the system log include:

LDAP activity

configuration activity

server authentication and authorization requests

The following is the general format of the log entries:

time stamp

task that issued the event (tEvtLgMgr, tObjMgr, tHttpdTask)

number that indicates the CPU that issued the event (0=CPU 0, 1=CPU 1)

software module that issued the event

priority code assignment (number in brackets) (for a description of these codes, see “Event log” on page 41)

indicates that the packet matched the rule in the listed section

indicates the matching packet source, destination, protocol, and action configured for that rule

The following example shows a system log:

11:29:31 tEvtLgMgr 0 : CSFW [12] Rule[OVERRIDE 1]Firewall:

[192.32.250.204:1024-10.0.18.12:2048, icmp], action: Allow

Security log

The Security log records all activity about system or user security. It lists all security events, both failures and successes. The events can include:

authentication and authorization

tunnel or administration requests

encryption, authentication, or compression

hours of access

number of session violations

Nortel VPN Router Troubleshooting

Page 45
Image 45
Nortel Networks NN46110-602 manual System log, Security log