Description                                                    Configure command auditing.

Syntax                                                                  [no] audit {enable [privilege] | size num-entries}




Enables command auditing.

Command auditing is disabled by default.


Enables logging of Privileged EXEC commands. Without this option, only configuration commands are logged.


Specifies the number of entries the audit log file can hold. You can specify 1000-30000 entries. When the log is full, the oldest entries are removed to make room for new entries.

When the feature is enabled, the audit log can hold 20,000 entries by default.

Mode                                                                   Configuration mode

Usage                                                                  Command auditing logs the following types of system management events:

     Admin logins and logouts for CLI, GUI, and aXAPI sessions

     Unsuccessful admin login attempts

     Configuration changes. All attempts to change the configuration are logged, even if they are unsuccessful.

     CLI commands at the Privileged EXEC level (if audit logging is enabled for this level)

The audit log is maintained in a separate file, apart from the system log. The audit log is ADP-aware. The audit log messages that are displayed for an admin depend upon the admin’s role (privilege level). Admins with Root, Read Write, or Read Only privileges who view the audit log can view all the messages, for all system partitions.

Admins who have privileges only within a specific partition can view only the audit log messages related to management of that partition. Partition Real Server Operator admins can not view any audit log entries.

NOTE:                                                                   Backups of the system log include the audit log.

Table of Contents