HP MSR2000/3000/4000 Router Series Network Management and Monitoring Configuration Guide
201
Default output rules for security logs
Security logs can only be output to the security log file, and cannot be filtered by source modules and
severity levels. Table 17 sh
ows the default output rule for security logs.
Table 17 Default output rule for security logs
Destination Lo
g
source modules
Out
p
ut switch
Severit
y
Security log file All supported modules Disabled Debug
Default output rules for hidden logs
Hidden logs can be output to the log host, log buffer, and the log file, but they cannot be filtered by
source modules and severity levels. Table 18 sh
ows the default output rules for hidden logs.
Table 18 Default output rules for hidden logs
Destination Lo
g
source modules
Out
p
ut switch
Severit
y
Log host All supported modules Enabled Informational
Log buffer All supported modules Enabled Informational
Log file All supported modules Enabled Informational
Log formats
The format of logs varies with output destinations. Table 19 shows the original format of log information,
which might be different from what you see. The actual format depends on the log resolution tool used.
Table 19 Log formats
Output destination Format Example
Console, monitor
terminal, log buffer, or
log file
Prefix Timestamp Sysname
Module/Level/Mnemonic: Content
%Nov 24 14:21:43:502 2010 HP
SYSLOG/6/SYSLOG_RESTART:
System restarted –-
HP Comware Software.










