
450 Appendix B Log Descriptions
NN47923-500
Log Commands
Go to the command interpreter interface (the Command Interpreter
Appendix explains how to access and use the commands).
Configuring what you want the Business Secure Router to
log
Use the sys logs load command to load the log setting buffer that allows
you to configure which logs the Business Secure Router is to record.
Use sys logs category followed by a log category and a parameter to decide
what to record.
No Server to authenticate
user.
There is no authentication server to authenticate
a user.
Local User Database does not
find user`s credential.
A user was not authenticated by the local user
database because the user is not listed in the
local user database.
Table 138 Log categories and available settings
Log Categories Available Parameters
access 0, 1, 2, 3
attack 0, 1, 2, 3
error 0, 1, 2, 3
ike 0, 1, 2, 3
ipsec 0, 1, 2, 3
javablocked 0, 1, 2, 3
mten 0, 1
upnp 0, 1
urlblocked 0, 1, 2, 3
Table 137 IEEE 802.1X Logs
Log Message Description
Komentarze do niniejszej Instrukcji