Cisco Cisco Web Security Appliance S160 Guía Del Usuario
C H A P T E R
20-1
Cisco AsyncOS 8.0.6 for Web User Guide
20
Monitor System Activity Through Logs
•
•
•
•
•
•
•
•
•
•
•
•
•
Overview of Logging
The Web Security appliance records its own system and traffic management activities by writing them
to log files. Administrators can consult these log files to monitor and troubleshoot the appliance.
to log files. Administrators can consult these log files to monitor and troubleshoot the appliance.
The appliance divides different types of activity into different logging types to simplify the task of
finding information on specific activities. The majority of these are automatically enabled by default,
but some must be manually enabled as required.
finding information on specific activities. The majority of these are automatically enabled by default,
but some must be manually enabled as required.
Enable and manage log files through log file subscriptions. Subscriptions allow you to define the settings
for creating, customizing, and managing log files.
for creating, customizing, and managing log files.
The two main log files types typically used by administrators are:
•
Access log. This records all Web Proxy filtering and scanning activity.
•
Traffic Monitor log. This records all Layer-4 Traffic Monitor activity.
You can view current and past appliance activity using these and other log types. Reference tables are
available to help you interpret log file entries.
available to help you interpret log file entries.