15-9
Cisco ONS 15454 Procedure Guide, R5.0
December 2004
Chapter 15 Maintain the Node
NTP-A300 Viewing the Audit Trail Records
Caution
Cisco recommends that you save the node database to safe location if you will not be restoring the node
using the database provided on the software CD.
Caution
To avoid a node IP and secure IP ending up in the same domain after restoring a database, ensure that
the node IP stored in the database differs in domain from that of the node in repeater mode. Also, after
restoring a database, ensure that the node IP and secure IP differ in domain.
Note
The following parameters are not backed up and restored when you delete the database and restore the
factory settings: node name, IP address, subnet mask and gateway, and IIOP port. If you change the node
name and then restore a backed up database with a different node name, the circuits map to the new
renamed node. Cisco recommends keeping a record of the old and new node names.
Step 1
If you need to install or replace one or more TCC2/TCC2P cards, see the
TCC2/TCC2P Cards” task on page 17-42
.
Step 2
If you are using Microsoft Windows, complete the
“DLP-A244 Use the Reinitialization Tool to Clear the
Database and Upload Software (Windows)” task on page 19-25
Step 3
If you are using UNIX, complete the
“DLP-A245 Use the Reinitialization Tool to Clear the Database
and Upload Software (UNIX)” task on page 19-27
.
Stop. You have completed this procedure.
NTP-A300 Viewing the Audit Trail Records
Step 1
Complete the
“DLP-A60 Log into CTC” task on page 17-66
at the node where you want to view the audit
trail log. If you are already logged in, continue with
.
Step 2
In the node view, click the
Maintenance > Audit
tabs.
Step 3
Click
Retrieve
.
A window containing the most recent Audit Trail records appears as shown in
Purpose
This procedure describes how to view Audit Trail records. Audit trail
records are useful for maintaining security, recovering lost transactions, and
enforcing accountability. Accountability refers to tracing user activities;
that is, associating a process or action with a specific user.
Tools/Equipment
None
Prerequisite Procedures
None
Required/As Needed
As needed
Onsite/Remote
Onsite or remote
Security Level
Provisioning
Summary of Contents for ONS 15454 Series
Page 28: ...Tables xxviii Cisco ONS 15454 Procedure Guide R5 0 December 2004 ...
Page 44: ...Tasks xliv Cisco ONS 15454 Procedure Guide R5 0 December 2004 ...
Page 53: ...liii Cisco ONS 15454 Procedure Guide R5 0 December 2004 About this Guide Document Conventions ...
Page 55: ...lv Cisco ONS 15454 Procedure Guide R5 0 December 2004 About this Guide Document Conventions ...
Page 850: ...Index IN 22 Cisco ONS 15454 Procedure Guide R5 0 December 2004 description 4 11 remove 18 23 ...