![Nortel SMC 2450 Скачать руководство пользователя страница 208](http://html1.mh-extra.com/html/nortel/smc-2450/smc-2450_implementation-manual_1706451208.webp)
Page 208 of 260
Logging
553-3001-225
Standard 1.00
May 2006
Note:
Many System Log messages have Log IDs, such as
LIBADMIN_32 or USECPD_16. In the Web UI log display page, you
can search on these IDs and show additional information about the log
message (and possible resolutions).
Security Log
The Security Log displays attack and packet-level information, including
potential exploits and problem packets, logged from the SMC firewall. You
can view the Security log in the Web UI at the
Logs > Security Log
page.
Because the Security Log can log a message for every packet, it can quickly
become a performance bottleneck.
UNIStim log
The UNIStim Log contains basic UNIStim security information and errors
generated by the Secure UNIStim proxy. You can view the UNIStim log in
the Web UI at the
Logs > UNIStim Proxy Log
page.
Log configuration
Remote logging
You can configure the System Log and the Security Log messages to forward
to a remote system log server in real-time. To limit the amount of traffic, you
can also configure a filter to trap for System Log messages by the message
priority parameter. Configure Remote logging in the Web UI at the
Cluster
> Logs
page.
Log archiving
Because logs can potentially become large and consume too much disk space,
you can configure the SMC to rotate the logs either when they reach a certain
IMPORTANT!
The Security Log can degrade SMC performance if it logs too many
messages. See “Security log rate-limiting” on
page 209
for more
information about limiting the system effects of this log.
Содержание SMC 2450
Страница 2: ......
Страница 4: ...Page 4 of 260 Revision history 553 3001 225 Standard 1 00 May 2006...
Страница 10: ...Page 10 of 260 Contents 553 3001 225 Standard 1 00 May 2006 Format 251 Log message table 253...
Страница 16: ...Page 16 of 260 List of procedures 553 3001 225 Standard 1 00 May 2006...
Страница 20: ...Page 20 of 260 About this document 553 3001 225 Standard 1 00 May 2006...
Страница 27: ...Description Page 27 of 260 Secure Multimedia Controller Implementation Guide Figure 1 Basic subnet mappings...
Страница 51: ...Description Page 51 of 260 Secure Multimedia Controller Implementation Guide Figure 7 SMC campus redundancy...
Страница 56: ...Page 56 of 260 Description 553 3001 225 Standard 1 00 May 2006...
Страница 76: ...Page 76 of 260 Hardware installation 553 3001 225 Standard 1 00 May 2006...
Страница 120: ...Page 120 of 260 Firewall deployment 553 3001 225 Standard 1 00 May 2006...
Страница 126: ...Page 126 of 260 Secure UNIStim deployment 553 3001 225 Standard 1 00 May 2006 Figure 22 Sample policy page...
Страница 160: ...Page 160 of 260 Secure UNIStim deployment 553 3001 225 Standard 1 00 May 2006...
Страница 182: ...Page 182 of 260 Maintenance 553 3001 225 Standard 1 00 May 2006...
Страница 196: ...Page 196 of 260 The Command Line Interface CLI 553 3001 225 Standard 1 00 May 2006...
Страница 212: ...Page 212 of 260 Logging 553 3001 225 Standard 1 00 May 2006...
Страница 228: ...Page 228 of 260 Appendix C Regulatory information 553 3001 225 Standard 1 00 May 2006 DenAn regulatory notice for Japan...
Страница 250: ...Page 250 of 260 Appendix D Software licenses 553 3001 225 Standard 1 00 May 2006...
Страница 260: ...Page 260 of 260 Appendix E SMC packet filter log messages 553 3001 225 Standard 1 00 May 2006...
Страница 261: ......