Alcatel Carrier Internetworking Solutions Switch/Router Network Router User Manual


  Open as PDF
of 1100
 
Displaying Debug Entries in the MPM Log
Page 10-13
Displaying Debug Entries in the MPM Log
The debuglog command displays the debug entries in the mpm.log file. (Note: Currently
there are no facilities using debugging.) Below is a sample display of the debuglog
command.
Task Name Time Debug Message
-------------------------------- --------------------- ---------------------------------------------------------
tUdpRelay 14:33:36 Undersized DHCP req rcvd; discarding
The fields displayed by the debuglog command are described here.
Task Name. The task that generated the debug message.
Time. The time the message was generated by the task.
Debug Message. Information relevant to debugging.
Displaying Secure Access Entries in the MPM Log
The seclog command displays the secure access violation event entries in the mpm.log file. To
display this data, enter
seclog
at the system prompt. A screen similar to the following will be displayed.
Secure Access Violations Log
Slot/ Elapsed Time
Time Protocol Source IP Attempts Intf (secs)
------------------------ ------------- -------------- -------------- ------- -------------------
12:49:02 FTP 172.23.8.801 1 5/1 23
03:15:34 Telnet 198.20.2.101 10 2/3 240
Descriptions of the fields are as follows:
Time. The first time the access violation occurred.
Protocol. The IP protocol for which the violation occurred.
Source IP. The source IP address of the unauthorized user.
Attempts. The number of access attempts made by this user within the sample period (5
minutes).
Slot/Intf. The physical port that received the unauthorized user information.
Elapsed Time (secs). The duration (in seconds) from the first unauthorized access to the end of
the sampling period (5 minutes). Secure access violations will take 5 minutes to display in the
log file.