Cisco Cisco Web Security Appliance S170 사용자 가이드
24-1
Cisco IronPort AsyncOS 7.7.5 for Web User Guide
Chapter 24 Logging
Logging Overview
24
Logging
•
•
•
•
•
•
•
•
•
Logging Overview
You can use log files to monitor web traffic. To configure the appliance to create log files, you create log
subscriptions. A log subscription is an appliance configuration that associates a log file type with a name,
logging level, and other parameters, such as size and destination information. You can subscribe to a
variety of log file types. For more information about log subscriptions, see
subscriptions. A log subscription is an appliance configuration that associates a log file type with a name,
logging level, and other parameters, such as size and destination information. You can subscribe to a
variety of log file types. For more information about log subscriptions, see
.
In typical appliance monitoring, the appliance administrator usually reads the following log files:
•
Access log. Records all Web Proxy filtering and scanning activity. For more information about the
access log, see
access log, see
.
•
Traffic Monitor log. Records all L4 Traffic Monitor activity. For more information about the traffic
monitor log, see
monitor log, see
.
The appliance also creates other log file types, such as the system log file. You might want to read other
log files to troubleshoot appliance errors. For a list of each type, see
log files to troubleshoot appliance errors. For a list of each type, see
The appliance provides several options for customizing the type of information recorded in the access
log. For more information, see
log. For more information, see
Log File Types
The log file type indicates what information is recorded in the generated log, such as web traffic or
system data. By default, the Web Security appliance has log subscriptions for most log file types already
created. However, there are some log file types that specific to troubleshooting the Web Proxy. Those
logs are not created by default. For more information on those log file types, see
system data. By default, the Web Security appliance has log subscriptions for most log file types already
created. However, there are some log file types that specific to troubleshooting the Web Proxy. Those
logs are not created by default. For more information on those log file types, see
.