Cisco Cisco Email Security Appliance C160 Mode D'Emploi

Page de 1219
 
38-37
Cisco AsyncOS 9.1 for Email User Guide
 
Chapter 38      Logging
  Log Types
Using Authentication Logs
The authentication log records successful user logins and unsuccessful login attempts
.
Authentication Log Example
In this example, the log shows the log in attempts by users “admin,” “joe,” and “dan.” 
Using Configuration History Logs
A configuration history log consists of a configuration file with an additional section listing the name of 
the user, a description of where in the configuration the user made changes, and the comment the user 
entered when committing the change. Each time a user commits a change, a new log is created containing 
the configuration file after the change.
Configuration History Log Example
In this example, the configuration history log shows that the user (admin) added a guest user to the table 
that defines which local users are allowed to log in to the system. 
Table 38-31
Authentication Log Statistics 
Statistic
Description
Timestamp
Time that the bytes were transmitted.
Message
The message consists of the username of a user who attempted to log in to the 
appliance and whether the user was authenticated successfully. 
Wed Sep 17 15:16:25 2008 Info: Begin Logfile
Wed Sep 17 15:16:25 2008 Info: Version: 6.5.0-262 SN: XXXXXXX-XXXXX
Wed Sep 17 15:16:25 2008 Info: Time offset from UTC: 0 seconds
Wed Sep 17 15:18:21 2008 Info: User admin was authenticated successfully.
Wed Sep 17 16:26:17 2008 Info: User joe failed authentication.
Wed Sep 17 16:28:28 2008 Info: User joe was authenticated successfully.
Wed Sep 17 20:59:30 2008 Info: User admin was authenticated successfully.
Wed Sep 17 21:37:09 2008 Info: User dan failed authentication.
<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE config SYSTEM "config.dtd">
<!--
  XML generated by configuration change.
  Change comment: added guest user