Objectives: As a Brocade Certified vRouter Engineer, you must be able to demonstrate the ability to install, configure and troubleshoot features of Brocade Vyatta Network OS.
Target: This course is for anyone tasked with configuring or managing the Brocade Vyatta vRouter. This course also for those who are preparing to take the BCVRE Certification Exam.
Course prerequisites: Before taking these bundled courses, students should have basic IT networking experience, including working knowledge of TCP/IP.
- Logging Basics
- Feature-Specific Logging
- Monitoring in Real-Time
- User Management
One of the advantages of vRouter software is its extensive local logging capabilities.
vRouter supports an integrated hard drive, providing capacity for storing local messages without the requirement of an external server.
vRouter software uses the Linux standard syslogd process to store logs
Log messages are stored in the file /var/log/messages.
- When this file reaches 500KB in size, the vRouter renames the file to messages.0 and opens a new messages file.
- This continues up to the file messages.9, for a total of 5 gigabytes of log messages.
the vRouter system maintains separate logs for bootup messages, PPP connection setup, IPsec connection setup, and other features.
To view the entire set of log files in sequential order, use the command show log all.
If you just want to see what happened most recently on your device, you can use the show log tail command.
- This displays the last 10 log entries.
Example Show Log
In order to view protocol and feature activity, you first need to enable the vRouter to record the information in the system log.
By default, the vRouter does not capture routine activity, such as routing protocol exchanges or NAT or firewall packets.
For protocol exchanges that only involve the vRouter (DNS, routing updates, etc.), you enable logging from operational mode using the monitor command.
Be as specific as possible with your commands; protocol logging can be processor-intensive.
OSPF Log Example
Monitoring in Real-Time
The monitor command is used to enable protocolspecific logging.
It can also be used to enable real-time viewing of any logging, including end-user transit traffic if logging is enabled on a feature rule.
To use real-time monitoring:
- Enable logging for the appropriate protocol or feature
- Enable monitoring for the protocol or feature
Real-Time Monitoring Example
Creating “Login” User Accounts
Scenario on R3:
- User ID: john
- Full Name: John Smith
- Plaintext Password: lab123
The End of The Word
That’s information “Supporting BCVRE Study Guide Chapter 9 Logging and Packet Captures” who can admin infosolution.biz convey. Hope it is useful.
If you liked this article, don’t forget to click on the bell on the bottom right to get our updated information. And follow along too fans page facebook , chanel youtube and we instagram. Apart from that, we also have a collection of source code at GitHub. Thank you