System log, Security log – Nortel Networks NN46110-602 User Manual
Page 45

Chapter 2 Status and logging 45
Nortel VPN Router Troubleshooting
System log
The system log contains all system events that are considered significant enough
to be written to disk, including those displayed in the configuration and security
logs. Events that appear in the system log include:
•
LDAP activity
•
configuration activity
•
server authentication and authorization requests
The following is the general format of the log entries:
•
time stamp
•
task that issued the event (tEvtLgMgr, tObjMgr, tHttpdTask)
•
number that indicates the CPU that issued the event (0=CPU 0, 1=CPU 1)
•
software module that issued the event
•
priority code assignment (number in brackets) (for a description of these
codes, see
•
indicates that the packet matched the rule in the listed section
•
indicates the matching packet source, destination, protocol, and action
configured for that rule
The following example shows a system log:
11:29:31 tEvtLgMgr 0 : CSFW [12] Rule[OVERRIDE 1]Firewall:
[192.32.250.204:1024-10.0.18.12:2048, icmp], action: Allow
Security log
The Security log records all activity about system or user security. It lists all
security events, both failures and successes. The events can include:
•
authentication and authorization
•
tunnel or administration requests
•
encryption, authentication, or compression
•
hours of access
•
number of session violations