Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

show security log

Syntax

Description

Display security event logs. This command continuously displays security events on the screen. To stop the display, press Ctrl+c.

Options

all

Display all audit event logs stored in the device memory.

destination-address

Display audit event logs with the specified destination address.

destination-port

Display audit event logs with the specified destination port.

event-id

Display audit event logs with the specified event identification number.

failure

Display failed audit event logs.

file

Display security logs in binary format.

interface-name

Display audit event logs with the specified interface.

newer-than

Display audit event logs newer than the specified date and time.

older-than

Display audit event logs older than the specified date and time.

process

Display audit event logs with the specified process that generated the event.

profile

Display security log profile information.

protocol

Display audit event logs generated through the specified protocol.

query

Query logs from database.

report

Display on-box reports for system traffic logs.

severity

Display audit event logs generated with the specified severity.

sort-by

Display audit event logs generated sorted with the specified options.

source-address

Display audit event logs with the specified source address.

source-port

Display audit event logs with the specified source port.

stream

Display security logs stream information.

success

Display successful audit event logs.

username

Display audit event logs generated for the specified user.

Required Privilege Level

view

Output Fields

Table 1 lists the output fields for the show security log command. Output fields are listed in the approximate order in which they appear.

Table 1: show security log Output Fields

Field Name

Field Description

Event time

The timestamp of the events received.

Security logs were always timestamped using the UTC time zone by running set system time-zone utc and set security log utc-timestamp CLI commands. Now, time zone can be defined using the local time zone by running the set system time-zone time-zone command to specify the local time zone that the system should use when timestamping the security logs.

Message

Security events are listed.

Sample Output

show security log

Release Information

Command introduced in Junos OS Release 11.2 .