You can use the firewall filters with the count option applied to the
interfaces. After you commit you can issue show firewall filter
name_of_filter and find for the counter information on the output.
Reference (find for count action):
http://www.juniper.net/techpubs/software/junos/junos90/swconfi
Hi Danny,
I'm logging a small traffic for test purpose before redirecting the real
one to syslog server.
Here the output of showing firewall log detail with filter name
logging-traffic.
As you can see there are no others traffic logged, but point to point IP
which BGP session only. (192.168.3
The "then log" option only logs to the PFE buffer which is rather
limited in size and also is only exposed in the "sh firewall log"
command you mention, it's not sent to the syslog daemon. However if
you expect to be logging at a high pps it has the benefit of not
adding excess load to the RE. To
No luck, Ricardo :(
Ricardo Tavares wrote:
Try something like:
=
set system syslog file Special-Events daemon info
set system syslog file Special-Events match "(.*EVENT
UpDown.*->.*)|(.*bgp.*)|(.*LDP.*)|(.*OSPF.*);"
Try something like:
=
set system syslog file Special-Events daemon info
set system syslog file Special-Events match "(.*EVENT
UpDown.*->.*)|(.*bgp.*)|(.*LDP.*)|(.*OSPF.*);"
=
so you can do:
show log S
Hi,
To generate log like cisco "sh logging" using access-list, i have
configured :
- Firewall>Family Inet>Filter "log">Match all then log
- Interface>Unit x> Family Inet> input filter "log"
- System>Services>Syslog>all facilities [any]
All I've seen by "show log messages" is just simply stand
6 matches
Mail list logo