O'Reilly logo

Cisco ASA and PIX Firewall Handbook by Dave Hucaby

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

9-2. Generating Logging Messages

The firewall uses logging to send system messages to one or more logging destinations, where they can be collected, archived, and reviewed.

Messages are generated according to a severity level, specified by a number (0 through 7) or a keyword, as shown in Table 9-1.

Table 9-1. System Message Severity Levels
Severity LevelDescription
0: emergenciesThe system is unusable
1: alertsImmediate action is required
2: criticalA critical condition exists
3: errorsError message
4: warningsWarning message
5: notificationsA normal but significant condition
6: informationalInformation message
7: debuggingDebug output and very detailed logs

Logging messages can be sent to any of the following destinations:

  • The firewall console

  • Telnet ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required