574
Field descriptions
Monitors field descriptions
Open Archived Log File dialog box
In the SGMI, on the Event Logs tab, clicking Open Log displays the Open Archived Log File dialog box,
which you use to select an archived log file for viewing.
Associated tasks
The task that you can perform with this dialog box is:
■
“Opening, deleting, and backing up archived log files”
:
IDS/IPS Alerts tab
The IDS/IPS Alerts tab lets you view the alerts that are generated when IDS detects an intrusion based
on an IDS signature.
Associated tasks
The task that you can perform with this tab is:
■
Classification
Limits the log messages displayed according to their classification.
You can expand the Classification tree to select a classification category at any level in the
tree.
Components
Limits the log messages displayed according to the component of the security gateway that
generated them.
Parameters
Limits the log messages displayed according to parameters contained in the messages and
the values you specify.
System names
Limits the log messages displayed according to the security gateway that generated them.
Process IDs
Limits the log messages displayed according to the process IDs associated with the
messages.
Message numbers
Limits the log messages displayed according to the message numbers.
Text patterns
Limits the log messages displayed based on the text pattern matches within the log
messages.
You can specify a partial text string, which may have many matches, or a more complete text
string to reduce the matches. Wildcards have no effect.
Table D-10
Event Log tab—Log Search dialog box—Advanced tab (Continued)
Field
Description
Table D-11
Open Archived Log File dialog box
Button
Description
Security gateway log
files
Lets you navigate the directory where archived log files are stored and select the one you
want to view.
Backup
Lets you backup the selected file to the location of your choice.
Table D-12
IDS/IPS Alerts tab
Field
Description
New Log
Saves the existing log file to the old logs directory, and starts a new log file.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...