Nortel Networks NN46110-602 Network Router User Manual


 
Chapter 2 Status and logging 45
Nortel VPN Router Troubleshooting
System log
The system log contains all system events that are considered significant enough
to be written to disk, including those displayed in the configuration and security
logs. Events that appear in the system log include:
LDAP activity
configuration activity
server authentication and authorization requests
The following is the general format of the log entries:
time stamp
task that issued the event (tEvtLgMgr, tObjMgr, tHttpdTask)
number that indicates the CPU that issued the event (0=CPU 0, 1=CPU 1)
software module that issued the event
priority code assignment (number in brackets) (for a description of these
codes, see “Event log” on page 41)
indicates that the packet matched the rule in the listed section
indicates the matching packet source, destination, protocol, and action
configured for that rule
The following example shows a system log:
11:29:31 tEvtLgMgr 0 : CSFW [12] Rule[OVERRIDE 1]Firewall:
[192.32.250.204:1024-10.0.18.12:2048, icmp], action: Allow
Security log
The Security log records all activity about system or user security. It lists all
security events, both failures and successes. The events can include:
authentication and authorization
tunnel or administration requests
encryption, authentication, or compression
hours of access
number of session violations