show security log
Syntax
show security log {all| destination-address| destination-port| event-id| failure|interface-name| newer-than| older-than| process| protocol|report| severity| sort-by| source-address| source-port| success| user}
Description
Display security event logs. This command continuously displays security events on the screen. To stop the display, press Ctrl+c.
Options
all |
Display all audit event logs stored in the device memory. |
destination-address |
Display audit event logs with the specified destination address. |
destination-port |
Display audit event logs with the specified destination port. |
event-id |
Display audit event logs with the specified event identification number. |
failure |
Display failed audit event logs. |
file |
Display security logs in binary format. |
interface-name |
Display audit event logs with the specified interface. |
newer-than |
Display audit event logs newer than the specified date and time. |
older-than |
Display audit event logs older than the specified date and time. |
process |
Display audit event logs with the specified process that generated the event. |
profile |
Display security log profile information. |
protocol |
Display audit event logs generated through the specified protocol. |
query |
Query logs from database. |
report |
Display on-box reports for system traffic logs. |
severity |
Display audit event logs generated with the specified severity. |
sort-by |
Display audit event logs generated sorted with the specified options. |
source-address |
Display audit event logs with the specified source address. |
source-port |
Display audit event logs with the specified source port. |
stream |
Display security logs stream information. |
success |
Display successful audit event logs. |
username |
Display audit event logs generated for the specified user. |
Required Privilege Level
view
Output Fields
Table 1 lists the output fields for
the show security log
command. Output fields are listed
in the approximate order in which they appear.
Field Name |
Field Description |
---|---|
|
The timestamp of the events received. Security logs were always timestamped using the UTC time zone
by running |
|
Security events are listed. |
Sample Output
show security log
user@host> show security log Event time Message 2010-10-22 13:28:37 CST session created 1.1.1.2/1-->2.2.2.2/1308 icmp 1.1.1.2/1-->2.2.2.2/1308 None None 1 policy1 trustZone untrustZone 52 N/A(N/A) ge-0/0/1.0 2010-10-22 13:28:38 CST session created 1.1.1.2/1-->2.2.2.2/1308 icmp 1.1.1.2/1-->2.2.2.2/1308 None None 1 policy1 trustZone untrustZone 54 N/A(N/A) ge-0/0/1.0 ... 2010-10-22 13:36:12 CST session denied m icmp 1(8) policy1 trustZone untrustZone N/A(N/A) ge-0/0/1.0 2010-10-22 13:36:14 CST session denied 1.1.1.2/2-->2.2.2.2/54812 icmp 1(8) policy1 trustZone untrustZone N/A(N/A) ge-0/0/1.0 ... 2010-10-27 15:50:11 CST IP spoofing! source: 2.2.2.20, destination: 2.2.2.2, protocol-id: 17, zone name: trustZone, interface name: ge-0/0/1.0, action: drop 2010-10-27 15:50:11 CST IP spoofing! source: source: 2.2.2.20, destination: 2.2.2.2, protocol-id: 17, zone name: trustZone, interface name: ge-0/0/1.0, action: drop ... 2011-02-18 15:53:34 CST PKID_PV_OBJECT_READ: A PKI object was read into memory from /var/db/certs/common/certification-authority/ca-profile1-ca1.cert 2011-02-18 15:53:35 CST PKID_PV_OBJECT_READ: A PKI object was read into memory from /var/db/certs/common/crl/ca-profile1.crl 2011-02-18 15:53:35 CST PKID_PV_OBJECT_READ: A PKI object was read into memory from /var/db/certs/system-key-pair/system-generated.priv 2011-02-18 15:53:35 CST PKID_PV_OBJECT_READ: A PKI object was read into memory from /var/db/certs/system-cert/system-generated.cert 2011-02-18 15:53:35 CST PKID_PV_OBJECT_READ: A PKI object was read into memory from /var/db/certs/common/key-pair/cert1.priv 2011-02-18 15:53:42 CST PKID_PV_OBJECT_READ: A PKI object was read into memory from /var/db/certs/common/key-pair/test2.priv ... 2011-03-14 23:00:40 PDT IDP_COMMIT_COMPLETED: IDP policy commit is complete. IDP_POLICY_LOAD_FAILED: IDP policy loading failed ;poli cy[/var/db/idpd/bins/.bin.gz.v], detector[/usr/libdata/libidp-detector.so.tgz.v] ,failure detail[Policy loading failed :: Policy file not found 2011-03-14 23:00:58 PDT ] IDP_POLICY_LOAD_FAILED: IDP policy loading failed ;poli cy[/var/db/idpd/bins/.bin.gz.v], detector[/usr/libdata/libidp-detector.so.tgz.v] ,failure detail[Policy loading failed :: Policy file not found 2011-03-14 23:00:58 PDT ] IDP_POLICY_LOAD_FAILED: IDP policy loading failed ;poli cy[/var/db/idpd/bins/.bin.gz.v], detector[/usr/libdata/libidp-detector.so.tgz.v] ,failure detail[Policy loading failed :: Policy file not found 2011-03-14 23:00:58 PDT ] ... Event time Message 2011-03-21 14:21:49 CST UI_CMDLINE_READ_LINE: User 'root', command 'set date ntp 9.9.9.1 source-address 6.6.6.1 ' 2011-03-21 14:23:01 CST UI_CMDLINE_READ_LINE: User 'root', command 'set date ntp 9.9.9.1 source-address 6.6.6.1 .5 ' 2011-03-21 14:23:05 CST KMD_PM_SA_ESTABLISHED: Local gateway: 7.7.7.1, Remote gateway: 8.8.8.1, Local ID: ipv4(any:0,[0..3]=6.6.6.1), Remote ID: ipv4(any:0,[0..3]=9.9.9.1), Direction: inbound, SPI: 37a2a179, AUX-SPI: 0, Mode: tunnel, Type: dynamic 2011-03-21 14:23:05 CST KMD_PM_SA_ESTABLISHED: Local gateway: 7.7.7.1, Remote gateway: 8.8.8.1, Local ID: ipv4(any:0,[0..3]=6.6.6.1), Remote ID: ipv4(any:0,[0..3]=9.9.9.1), Direction: outbound, SPI: b2231c1f, AUX-SPI: 0, Mode: tunnel, Type: dynamic 2011-03-21 14:23:08 CST UI_CMDLINE_READ_LINE: User 'root', command 'set date ntp 9.9.9.1 source-address 6.6.6.1 ' 2011-03-21 14:23:13 CST UI_CMDLINE_READ_LINE: User 'root', command 'show security log '
Release Information
Command introduced in Junos OS Release 11.2 .