42-13
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 42 Monitoring the Security Appliance
Configuring and Managing Logs
Sending System Log Messages to the Log Buffer
If configured as an output destination, the log buffer serves as a temporary storage location for system
log messages. New messages are appended to the end of the listing. When the buffer is full, that is, when
the buffer wraps, old messages are overwritten as new messages are generated, unless you configure the
adaptive security appliance to save the full buffer to another location.
This section includes the following topics:
•
Enabling the Log Buffer as an Output Destination, page 42-13
•
Viewing the Log Buffer, page 42-13
•
Automatically Saving the Full Log Buffer to Flash Memory, page 42-14
•
Automatically Saving the Full Log Buffer to an FTP Server, page 42-14
•
Saving the Current Contents of the Log Buffer to Internal Flash Memory, page 42-15
•
Clearing the Contents of the Log Buffer, page 42-15
Enabling the Log Buffer as an Output Destination
Note
To start logging to the buffer as defined in this procedure, be sure to enable logging for all output
locations. See the
“Enabling Logging to All Configured Output Destinations” section on page 42-6
. To
disable logging, see the
“Disabling Logging to All Configured Output Destinations” section on
page 42-6
.
To enable the log buffer as a log output destination, enter the following command:
hostname(config)#
logging buffered
{
severity_level
|
message_list
}
Where the
severity_level
argument specifies the severity levels of messages to be sent to the buffer. You
can specify the severity level number (0 through 7) or name. For severity level names, see the
“Severity
Levels” section on page 42-24
. For example, if you set the level to 3, then the security appliance sends
system log messages for level 3, 2, 1, and 0.
The
message_list
argument specifies a customized message list that identifies the system log messages
to send to the buffer. For information about creating custom message lists, see the
“Filtering System Log
Messages with Custom Message Lists” section on page 42-18
.
For example, to specify that messages with severity levels 1 and 2 should be saved in the log buffer, enter
one of the following commands:
hostname(config)#
logging buffered critical
or
hostname(config)#
logging buffered level 2
For the
message_list
option, specify the name of a message list containing criteria for selecting messages
to be saved in the log buffer.
hostname(config)#
logging buffered notif-list
Viewing the Log Buffer
To view the log buffer, enter the following command:
hostname(config)#
show logging
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......