get ssg 550 after reboot

Posted on 2011-10-31
Last Modified: 2012-05-12
I appreciate if one help in the following issue:
I need to get the log file of juniper SSG 550 after reboot it.
Thanks a lot
Question by:raafetsabah
    LVL 2

    Expert Comment

    what log exactly are you looking for ?

    asset-recovery       ?
    cli                 ?
    flow-deny      ?    
    self                 ?
    setting              ?
    traffic           ?
    usb                 ?

    Author Comment

    Dear Khadour,
    I have juniper ssg 550, at Dubai company branch which is far from me, and i need to get a policy log file to see who is connected to our server, but out guys there shut down it and then power on it many times. as i heard that ssg 550 lost its log after shut down.
    so, can i get or recover the policy log file please??but i need it by using cli commands.
    I appreciate your support so much.
    LVL 67

    Assisted Solution

    No, you cannot recover those logs. They are volatile stuff. Rebooting will delete the RAM used, and there is no way to get them back. If you need something persistent, you need an external monitoring tool (but I don't know of any doing that).
    LVL 12

    Expert Comment

    Try setting something up yo regularly off load the logs
    Then you can look after the fact
    It is not a complete immediate solution.. but it might meet your needs of who was recently connected and what transpired

    Author Comment

    still nothing usefull to get reports of who and which IP access ssg 550.
    please do your best to help.
    thank you so much
    LVL 67

    Expert Comment

    Your question is answered: "Can I?" - "no". The log is volatile, and you cannot recover it after power off or reboot.
    LVL 32

    Accepted Solution

    Try configuring syslog service and have it written to a remote server;

    Take a look at the KB above.

    LVL 33

    Expert Comment

    This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.

    Featured Post

    Maximize Your Threat Intelligence Reporting

    Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

    Join & Write a Comment

    Suggested Solutions

    Title # Comments Views Activity
    NPS Radius for Wireless Issues 4 53
    ACL per VPN User 12 97
    ACLs per VPN User 12 59
    Sonicwall SOHO SSL-VPN no LAN Access 5 40
    I recently had the displeasure of buying a new firewall at one of the buildings I play Sys Admin at. I had to get a better firewall than the cheap one that I had there since I was reconnecting the main office to the satellite office via point-to-poi…
    Network traffic routing plays key role in your network, if you have single site with heavy browsing or multiple sites, replicating important application data from your Primary Default Gateway ,you have to route your other network traffic from your p…
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
    Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

    754 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    17 Experts available now in Live!

    Get 1:1 Help Now