Fabric OS Administrator’s Guide
59
53-1001763-02
Audit log configuration
3
Out of range Flash contributing to MARGINAL status: (0..1) [1]
MarginalPorts contributing to DOWN status: (0..1800) [112]
MarginalPorts contributing to MARGINAL status: (0..1800) [44]
FaultyPorts contributing to DOWN status: (0..1800) [112]
FaultyPorts contributing to MARGINAL status: (0..1800) [44]
MissingSFPs contributing to DOWN status: (0..576) [0]
MissingSFPs contributing to MARGINAL status: (0..576) [0]
No change
On the Brocade 48000, and Brocade DCX and DCX-4S enterprise-class platforms, the command
output includes parameters related to CP blades.
Audit log configuration
When managing SANs you may want to audit certain classes of events to ensure that you can view
and generate an audit log for what is happening on a switch, particularly for security-related event
changes. These events include login failures, zone configuration changes, firmware downloads,
and other configuration changes—in other words—critical changes that have a serious effect on the
operation and security of the switch.
Important information related to event classes is also tracked and made available. For example,
you can track changes from an external source by the user name, IP address, or type of
management interface used to access the switch.
Auditable events are generated by the switch and streamed to an external host through a
configured system message log daemon (syslog). You specify a filter on the output to select the
event classes that are sent through the system message log. The filtered events are streamed
chronologically and sent to the system message log on an external host in the specified audit
message format. This ensures that they can be easily distinguished from other system message log
events that occur in the network. Then, at some regular interval of your choosing, you can review
the audit events to look for unexpected changes.
Before you configure audit event logging, familiarize yourself with the following audit event log
behaviors and limitations:
•
By default,
all
event classes
are configured for audit; to create an audit event log
for specific
events
, you must explicitly set a filter with the
class
operand and then enable it.
•
Audited events are generated specific to a switch and have no negative impact on
performance.
•
The last 256 events are persistently stored on the switch and are streamed to a system
message log.
•
The audit log depends on the system message log facility and IP network to send messages
from the switch to a remote host. Because the audit event log configuration has no control over
these facilities, audit events can be lost if the system message log and IP network facilities fail.
•
If too many events are generated by the switch, the system message log becomes a bottleneck
and audit events are dropped by the Fabric OS.
•
If the user name, IP address, or user interface is not transported,
None
is used instead for
each of the respective fields.
•
For High Availability, the audit event logs exist independently on both active and standby CPs.
The configuration changes that occur on the active CP are propagated to the standby CP and
take effect.
•
Audit log configuration is also updated through a configuration download.
Содержание 53-1001763-02
Страница 1: ...53 1001763 02 13 September 2010 Fabric OS Administrator s Guide Supporting Fabric OS v6 4 0 ...
Страница 4: ...iv Fabric OS Administrator s Guide 53 1001763 02 ...
Страница 24: ...xxiv Fabric OS Administrator s Guide 53 1001763 02 ...
Страница 28: ...xxviii Fabric OS Administrator s Guide 53 1001763 02 ...
Страница 32: ...xxxii Fabric OS Administrator s Guide 53 1001763 02 ...
Страница 40: ...xl Fabric OS Administrator s Guide 53 1001763 02 ...
Страница 42: ...2 Fabric OS Administrator s Guide 53 1001763 02 ...
Страница 54: ...14 Fabric OS Administrator s Guide 53 1001763 02 High availability of daemon processes 1 ...
Страница 74: ...34 Fabric OS Administrator s Guide 53 1001763 02 Basic connections 2 ...
Страница 102: ...62 Fabric OS Administrator s Guide 53 1001763 02 Audit log configuration 3 ...
Страница 156: ...116 Fabric OS Administrator s Guide 53 1001763 02 The authentication model using RADIUS and LDAP 5 ...
Страница 214: ...174 Fabric OS Administrator s Guide 53 1001763 02 Management interface security 7 ...
Страница 228: ...188 Fabric OS Administrator s Guide 53 1001763 02 Brocade configuration form 8 ...
Страница 276: ...236 Fabric OS Administrator s Guide 53 1001763 02 Creating a logical fabric using XISLs 10 ...
Страница 404: ...364 Fabric OS Administrator s Guide 53 1001763 02 ...
Страница 440: ...400 Fabric OS Administrator s Guide 53 1001763 02 Performance data collection 17 ...
Страница 464: ...424 Fabric OS Administrator s Guide 53 1001763 02 Disabling bottleneck detection on a switch 18 ...
Страница 480: ...440 Fabric OS Administrator s Guide 53 1001763 02 F_Port masterless trunking 19 ...
Страница 494: ...454 Fabric OS Administrator s Guide 53 1001763 02 Buffer credit recovery 20 ...
Страница 560: ...520 Fabric OS Administrator s Guide 53 1001763 02 Port indexing on the Brocade DCX 4S backbone C ...
Страница 574: ...534 Fabric OS Administrator s Guide 53 1001763 02 Hexadecimal overview E ...