Alcatel Carrier Internetworking Solutions Switch/Router 用户手册

下载
页码 1100
 Displaying Debug Entries in the MPM Log
Page 10-13
Displaying Debug Entries in the MPM Log
The 
debuglog
 command displays the debug entries in the mpm.log file. (Note: Currently 
there are no facilities using debugging.
) Below is a sample display of the 
debuglog
 
command.
Task Name
Time
Debug Message
--------------------------------
---------------------
---------------------------------------------------------
tUdpRelay
14:33:36
Undersized DHCP req rcvd; discarding
The fields displayed by the 
debuglog
 command are described here.
Task Name
. The task that generated the debug message.
Time
. The time the message was generated by the task.
Debug Message
. Information relevant to debugging.
Displaying Secure Access Entries in the MPM Log
The 
seclog
 command displays the secure access violation event entries in the mpm.log file. To 
display this data, enter
seclog
at the system prompt. A screen similar to the following will be displayed.
Secure Access Violations Log
Slot/
Elapsed Time
Time
Protocol
Source IP
Attempts
Intf
(secs)
------------------------
-------------
--------------
--------------
-------
------------------- 
12:49:02
FTP
172.23.8.801
1
5/1
23
03:15:34
Telnet
198.20.2.101
10
2/3
240
Descriptions of the fields are as follows:
Time
. The first time the access violation occurred.
Protocol
. The IP protocol for which the violation occurred.
Source IP
. The source IP address of the unauthorized user.
Attempts
. The number of access attempts made by this user within the sample period (5 
minutes).
Slot/Intf. 
The physical port that received the unauthorized user information.
Elapsed Time (secs). 
The duration (in seconds) from the first unauthorized access to the end of 
the sampling period (5 minutes). Secure access violations will take 5 minutes to display in the 
log file.