About Log Audit

captain_dragon
captain_dragon  Jackeroo  (1)
6 years 10 months ago  View: 1697  Reply: 0
1F

 

Security logs

Security logs record security events. The recorded security events include the following types:

l   Account login events, such as user login/logout, and account locking and unlocking.

l   Account management events, such as account addition, deletion, or modification, password change, and rights change.

Only the security administrator group has the right to query security logs.

Operation logs

Operation logs record all operations performed on the U2000 and NEs managed by the U2000. Users that have the right to query operation logs can view them. Managing all logs enables administrators to view their operations on the U2000.

System logs

System logs record key events during the U2000 operation.

 

An NE syslog records all operations performed on an NE, including the NE name, IP address, operation summary, detailed information about operations, operation module, log level, data and time when the syslog is sent. This helps security audit for operations performed on the NE. In the case of incorrect operations, effective remedies are available.

Transport, access, and IP NEs process NE syslogs differently.

l   Transport NEs: The U2000 is able to forward the syslogs of transport NEs to the syslog server. Users can also enable NEs to directly send logs to the syslog server.

l   Access NEs: The U2000 allows users to browse the operation syslogs of access NEs but is unable to forward the logs to the syslog server. Users can enable NEs to directly send logs to the syslog server in the NE CLI.

l   IP NEs: The U2000 allows users to browse the run syslogs of IP NEs and is able to forward the logs to the syslog server.