Refer to the following sections for information about these topics:
• 10-1: Managing the Firewall Clock—Discusses ways to set and maintain the firewall’s internal clock so that events and messages can have accurate time stamps.
• 10-2: Generating Logging Messages—Explains how firewalls generate logging messages and how you can configure them to do that.
• 10-3: Fine-Tuning Logging Message Generation—Covers the configuration steps that can be used to enable or disable specific logging messages or change their severity levels. This section also discusses how to configure access list activity logging.
• 10-4: Analyzing Firewall Logs—Provides an overview of how you can approach collecting and analyzing the logging messages ...