474
Monitoring the security gateway
Monitoring log files
To browse through events logged by the security gateway
1
In the SGMI, in the left pane, under Monitors, click
Logs
.
2
In the right pane, on the Event Logs tab, in the event log table, do one of the following:
■
On your computer’s keyboard, use the up or down arrow to browse through the list of log
messages
■
On the right edge of the Events Logs tab, use the scroll bar or up and down arrows to browse
through the list of log messages.
3
To view the most recent log messages, click
Autorefresh
.
To copy log message text
1
In the SGMI, in the left pane, under Monitors, click
Logs
.
2
In the right pane, on the Event Logs tab, in the event log table, select a log entry, and then click
Properties
.
3
In the Event dialog box, to copy the text of the log message to paste in another application, click
Copy.
4
Paste the message into the application of your choice.
5
To close the Event dialog box, click
Close
.
To print log file text
1
In the SGMI, in the left pane, under Monitors, click
Logs
.
2
In the right pane, on the Event Logs tab, in the event log table, select a log entry, and then click
Properties
.
3
In the Event dialog box, to print the log message, click
.
4
To close the Event dialog box, click
Close
.
Related Information
None.
Viewing cluster log files
You can view cluster log file information. This is not real-time information, but looks backwards for
the last fifteen minutes from when you checked the Include events from all cluster members check box.
Prerequisites
None.
To view cluster log files
1
In the SGMI, in the left pane, under Monitors, click
Logs
.
2
To view cluster log files for the last fifteen minutes, on the top of the Events tab above the table,
check
Include events from all cluster members
.
You will not see events older or newer than the last fifteen minutes since you checked this check
box.
Related Information
None.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...