HP VPN Firewall Appliances System Management and Maintenance Configuration Guide

67
Out
p
ut destination Format Exam
p
le
Log host
HP format:
<PRI>timestamp
Sysname %%vvmodule/level
/digest: source content
unicom format:
<PRI>timestamp Sysname
vvmodule/level/serial_numb
er: content
china-telnetcom format:
<PRI>version timestamp
hostip sysname - msgid:
content
china-unicom-nat444 format:
<PRI> version timestamp
hostip sysname - msgid:
content
HP format:
<189>Oct 9 14:59:04 2009
Sysname %%10SHELL/5/SHELL_LOGIN(l):
VTY logged in from 192.168.1.21.
unicom format:
{ <186>Oct 13 16:48:08 2000 Sysname
10IFNET/2/210231a64jx073000020:
log_type=port;content=Vlan-interface1
link status is DOWN.
{ <186>Oct 13 16:48:08 2000 Sysname
10IFNET/2/210231a64jx073000020:
log_type=port;content=Line protocol on
the interface Vlan-interface1 is DOWN.
china-telnetcom format:
<134>1 Jun 7 12:34:08 10.1.1.1 Sysname -
NAT444:userbasedA [17 10.0.0.1 -
192.168.0.1 - 10000 11000]
china-unicom-nat444 format:
<134> 1 Jun 7 12:34:08 10.1.1.1 Sysname -
NAT444: SessionA[17 10.0.0.1 -
192.168.0.1 - 10000 11000]
NOTE:
The china-telnetcom and china-unicom-nat444 formats are available only for NAT444. For more
information about NAT444, see
NAT and ALG Configuration Guide
.
Table 11 describes the fields in the system information.
Table 11 System information field description
Field Descri
p
tion
PRI (priority)
The priority is calculated by using this formula: facility*8+level, where:
facility is the facility name. It can be configured with info-center loghost. It is
used to identify different log sources on the log host, and to query and filter logs
from specific log sources.
level ranges from 0 to 7. See Table 7 for more information.
Note that the priority field is available only for information that is sent to the log
host.
Timestamp
The timestamp records the time when the system information was generated.
System information sent to the log host and that sent to the other destinations have
different precisions, and their timestamp formats are configured with different
commands. For more information, see Table 12 and Table 13.