Re: [j-nsp] Traffic Logging

2008-12-02 Thread Diogo Montagner
You can use the firewall filters with the count option applied to the interfaces. After you commit you can issue show firewall filter name_of_filter and find for the counter information on the output. Reference (find for count action): http://www.juniper.net/techpubs/software/junos/junos90/swconfi

Re: [j-nsp] Traffic Logging

2008-12-02 Thread a. rahman isnaini rst / netsoft
Hi Danny, I'm logging a small traffic for test purpose before redirecting the real one to syslog server. Here the output of showing firewall log detail with filter name logging-traffic. As you can see there are no others traffic logged, but point to point IP which BGP session only. (192.168.3

Re: [j-nsp] Traffic Logging

2008-12-02 Thread Danny Vernals
The "then log" option only logs to the PFE buffer which is rather limited in size and also is only exposed in the "sh firewall log" command you mention, it's not sent to the syslog daemon. However if you expect to be logging at a high pps it has the benefit of not adding excess load to the RE. To

Re: [j-nsp] Traffic Logging

2008-12-01 Thread a. rahman isnaini rst / netsoft
No luck, Ricardo :( Ricardo Tavares wrote: Try something like: = set system syslog file Special-Events daemon info set system syslog file Special-Events match "(.*EVENT UpDown.*->.*)|(.*bgp.*)|(.*LDP.*)|(.*OSPF.*);"

Re: [j-nsp] Traffic Logging

2008-12-01 Thread Ricardo Tavares
Try something like: = set system syslog file Special-Events daemon info set system syslog file Special-Events match "(.*EVENT UpDown.*->.*)|(.*bgp.*)|(.*LDP.*)|(.*OSPF.*);" = so you can do: show log S

[j-nsp] Traffic Logging

2008-12-01 Thread a. rahman isnaini rst / netsoft
Hi, To generate log like cisco "sh logging" using access-list, i have configured : - Firewall>Family Inet>Filter "log">Match all then log - Interface>Unit x> Family Inet> input filter "log" - System>Services>Syslog>all facilities [any] All I've seen by "show log messages" is just simply stand