[Contents] [Prev] [Next] [Index] [Report an Error]

Configuring System Logging

A file that records when authentication and authorization is granted and rejected, as well as all user commands, provides an excellent way to track all management activity on the router. Checking these files for failed authentication events can help identify attempts to hack into the router. These files can also provide logs of all the command executed on the router and who has performed them. You can review logs of the commands executed on the router and correlate any event in the network with changes made at a particular time. These files are stored locally on the router. Place the firewall logs in a separate system log file.

[edit]
system {
syslog {
file messages {
any notice;
authorization info;
daemon any;
kernel any;
archive size 10m files 5 no-world-readable;
}
file authorization-commands {
authorization any;
interactive-commands any;
}
file firewall-logs {
firewall any;
}
}
}

[Contents] [Prev] [Next] [Index] [Report an Error]