302
Appendix K Log descriptions
N0115789
Go to the command interpreter interface (see
for information on how to access and use the
commands).
Configuring what you want the Business Secure Router to
log
Use the sys logs load command to load the log setting buffer that is used to
configure which logs the Business Secure Router is to record.
Use sys logs category followed by a log category and a parameter to decide what
to record.
Use the sys logs save command to store the settings in the Business Secure Router
(you must do this in order to record logs).
Table 84
Log categories and available settings
Log Categories
Available Parameters
access
0, 1, 2, 3
attack
0, 1, 2, 3
error
0, 1, 2, 3
ike
0, 1, 2, 3
ipsec
0, 1, 2, 3
javablocked
0, 1, 2, 3
mten
0, 1
upnp
0, 1
urlblocked
0, 1, 2, 3
urlforward
0, 1
Use 0 to not record logs for that category, 1 to record only logs for
that category, 2 to record only alerts for that category, and 3 to
record both logs and alerts for that category.
Summary of Contents for BCM50e
Page 18: ...18 Figures N0115789 ...
Page 22: ...22 Tables N0115789 ...
Page 28: ...28 Preface N0115789 ...
Page 38: ...38 Chapter 1 Getting to know your BCM50e Integrated Router N0115789 ...
Page 44: ...44 Chapter 2 Introducing the SMT N0115789 SMT menus at a glance Figure 6 SMT overview ...
Page 60: ...60 Chapter 4 LAN setup N0115789 ...
Page 82: ...82 Chapter 6 Remote Node setup N0115789 ...
Page 86: ...86 Chapter 7 IP Static Route Setup N0115789 ...
Page 114: ...114 Chapter 9 Network Address Translation NAT N0115789 ...
Page 136: ...136 Chapter 11 Filter configuration N0115789 ...
Page 140: ...140 Chapter 12 SNMP Configuration N0115789 ...
Page 144: ...144 Chapter 13 System security N0115789 ...
Page 172: ...172 Chapter 15 Firmware and configuration file maintenance N0115789 ...
Page 186: ...186 Chapter 17 Remote Management N0115789 ...
Page 206: ...206 Appendix B Triangle Route N0115789 ...
Page 226: ...226 Appendix D PPPoE N0115789 ...
Page 232: ...232 Appendix F N0115789 ...
Page 242: ...242 Appendix G IP subnetting N0115789 ...
Page 304: ...304 Appendix K Log descriptions N0115789 ...
Page 306: ...306 Appendix L Brute force password guessing protection N0115789 ...