All user operations and results of the operations are recorded in the NE security log.
In the NE Explorer, click the NE and select from the Function Tree.
In this user interface, you can browse NE security log and initial the specified log, including NE user, event name and generating time.
If the NE resets, all operation logs will be lost.
Button |
Description |
|---|---|
Initialize |
Deletes the original operation logs. |
Field |
Value |
Description |
|---|---|---|
Filter Criteria |
User, Log Name, From, To |
Sets filter conditions of the NE security log. |
User |
For example: SONET |
The NE user that operates to the NE. |
Log Name |
ALL, OPT, NR |
The name of the log files to be retrieved.
|
Operation Time |
yyyy-mm-dd hh-mm-ss |
The time log is created. |
Log Detail |
For example: ACT-USER::SONET:100::SONET |
Displays TL1 command. |