![Nortel SMC 2450 Скачать руководство пользователя страница 209](http://html1.mh-extra.com/html/nortel/smc-2450/smc-2450_implementation-manual_1706451209.webp)
Logging
Page 209 of 260
Secure Multimedia Controller
Implementation Guide
size or after a specific interval of time. After log rotation, the logs are
e-mailed to the specified external system. You can individually configure
each of the different log types, depending upon expected log volume.
Security log rate-limiting
The security log has the greatest risk of becoming large, consuming
significant system resources, or both. This can occur, for example, if a log
message is generated for every packet that transmits to the SMC. To limit this
risk, the SMC provides various levels of control over the number of generated
log messages and their rate.
Features
Limit by message type
In the Web UI at the
Multimedia Security > Security Settings > Log >
Messages
page, you can enable or disable logging for certain types of
messages such as particular attacks, globally allowed packets, and globally
denied packets.
Limit by count
You can specify that logging only occurs for a limited number of messages in
a given period of time. Limiting by count prevents the CPU from becoming
over-used in managing log resources; however, it also provides an inaccurate
report of the state of the current system because log messages beyond the
limit are dropped.
IMPORTANT!
Logging for Unavailable Policies (that is, generating a log message for
any traffic that does not match an existing policy) is disabled by default,
because it has the potential of generating many messages in a new
installation; however, logging for Unavailable Policies messages are
helpful when debugging network communication problems by
logging
packets that are silently dropped by the firewall.
Содержание SMC 2450
Страница 2: ......
Страница 4: ...Page 4 of 260 Revision history 553 3001 225 Standard 1 00 May 2006...
Страница 10: ...Page 10 of 260 Contents 553 3001 225 Standard 1 00 May 2006 Format 251 Log message table 253...
Страница 16: ...Page 16 of 260 List of procedures 553 3001 225 Standard 1 00 May 2006...
Страница 20: ...Page 20 of 260 About this document 553 3001 225 Standard 1 00 May 2006...
Страница 27: ...Description Page 27 of 260 Secure Multimedia Controller Implementation Guide Figure 1 Basic subnet mappings...
Страница 51: ...Description Page 51 of 260 Secure Multimedia Controller Implementation Guide Figure 7 SMC campus redundancy...
Страница 56: ...Page 56 of 260 Description 553 3001 225 Standard 1 00 May 2006...
Страница 76: ...Page 76 of 260 Hardware installation 553 3001 225 Standard 1 00 May 2006...
Страница 120: ...Page 120 of 260 Firewall deployment 553 3001 225 Standard 1 00 May 2006...
Страница 126: ...Page 126 of 260 Secure UNIStim deployment 553 3001 225 Standard 1 00 May 2006 Figure 22 Sample policy page...
Страница 160: ...Page 160 of 260 Secure UNIStim deployment 553 3001 225 Standard 1 00 May 2006...
Страница 182: ...Page 182 of 260 Maintenance 553 3001 225 Standard 1 00 May 2006...
Страница 196: ...Page 196 of 260 The Command Line Interface CLI 553 3001 225 Standard 1 00 May 2006...
Страница 212: ...Page 212 of 260 Logging 553 3001 225 Standard 1 00 May 2006...
Страница 228: ...Page 228 of 260 Appendix C Regulatory information 553 3001 225 Standard 1 00 May 2006 DenAn regulatory notice for Japan...
Страница 250: ...Page 250 of 260 Appendix D Software licenses 553 3001 225 Standard 1 00 May 2006...
Страница 260: ...Page 260 of 260 Appendix E SMC packet filter log messages 553 3001 225 Standard 1 00 May 2006...
Страница 261: ......