Here’s how to see what the gateway is seeing in real time.
First you’ll need to turn on the ssh daemon on the gateway. You do this by connecting to the gateway’s web interface and logging in. You’ll get to the networking page. Once you are there, change your URL to say “ https://<ipaddress>/tac.shtml”. On the page that will come up click the ‘start sshd’ button. A popup will appear.
You will then be able to start up an ssh client (I use putty myself) and log in using the normal gwadmin credentials.
Change your directory over to /var/applog
# cd /var/applog
Now you’ll want to ‘tail’ all the log files in the directory.
# tail –f *log*
This will show you the log text as it is being fed into the logs. It can get lengthy, so you will probably want to set your SSH client to send the output to a file. You can at least see things happening in real time.
One of the first things you’ll see are events in the acev.log.1 file then the bp_msg log will show the processing of whatever data we got. After that the dsm_exec log shows what happens when we look the credential up and acev.log.1 is where you see the xml that is generated for the event so the gateway can send it back to the CPAM server. The bp_msg log will pick up the post event processing and finally the dsm_exec log shows the relock steps being processed.
Here's an example:
==> acev.log.1 <==
12/06/12 17:47:35.459 LOG_DBGacev_gen_event(): got event id 0x0400001f
12/06/12 17:47:35.497 LOG_DBGacev_gen_event(): got event id 0x03000109
12/06/12 17:47:35.578 LOG_DBGacev_gen_event(): got event id 0x01000008
==> bp_msg.log.1 <==
12/06/12 17:47:35.431 LOG_DBGprocess_card_event(): InterfaceEvent from card 1. IntfType 4, Index 1, Ev 31
12/06/12 17:47:35.432 LOG_INFOpost_raw_intf_event(): Posting raw IntfEvent 0x400001f for m00/rdr01. EvLen 24, InfoLen 8