
9-32
Cisco PIX Firewall and VPN Configuration Guide
78-15033-01
Chapter 9 Accessing and Monitoring PIX Firewall
Using Syslog
To save test crash information to Flash memory, enter the following command:
crashinfo test
This command can be used for reassurance and testing and does not actually crash the PIX Firewall. This
command erases the current contents of the crash file in Flash memory, and saves information to Flash
memory that is similar to what is saved during an actual system crash. This command simulates crash
information and returns to the command prompt that was present before entering the command.
To view the current contents of the crash flash file, enter the following command:
show crashinfo
If the crash information stored in Flash memory is a test crash, the first string of the file will be
“: Saved_Test_Crash” and the last one will be “: End_Test_Crash.” If the crash information stored in
Flash memory is from a real crash, the first string of the file will be “: Saved_Crash” and the last one
will be “: End_Crash.”
If you want to actually crash the PIX Firewall, enter the following command:
crashinfo force [page-fault|watchdog]
Caution Only use this command with great caution. It actually crashes the PIX Firewall and then reboots it.
The crash is first dumped to Flash memory and then printed to the local console.
Use the page-fault option to cause a PIX Firewall crash as a result of a page fault. Use the watchdog
option to crash the PIX
Firewall as a result of the PIX Firewall watch dog feature.
After entering the crashinfo force command, the PIX Firewall displays the following warning prompt:
WARNING: This command will force the PIX to crash and
reboot. Do you wish to proceed? [confirm]:
Type y or press Enter to confirm the operation. The PIX Firewall will crash and reboot.
To display whether saving crash information to Flash memory is enabled or disabled, enter the following
command:
show crashinfo save
Using Syslog
This section describes how to control how PIX Firewall works with syslog and includes the following
topics:
• Enabling Logging to Syslog Servers, page 9-33
• Changing Syslog Message Levels, page 9-33
• Disabling Syslog Messages, page 9-34
• Viewing Modified Message Levels, page 9-34
• Logging Access Control List Activity, page 9-35
• Managing IDS Syslog Messages, page 9-39
Refer to the Cisco PIX Firewall System Log Messages for syslog message numbers and other detailed
information.
Kommentare zu diesen Handbüchern