MikroTik Certified Internetworking Engineer (MTCINE)
1 Introduction to Networking
1-1 Basic Networking Concepts
1-2 OSI Model
1-3 TCPIP Model
1-4 Network Devices
1-5 Network Topologies
2 MikroTik RouterOS Basics
2-1 Introduction to RouterOS
2-2 RouterOS Interface
2-3 Basic Configuration
2-4 User Management
2-5 System Logging
3 IP Addressing and Subnetting
3-1 IPv4 Addressing
3-2 Subnetting
3-3 IPv6 Addressing
3-4 IPv6 Subnetting
3-5 NAT and PAT
4 Routing
4-1 Static Routing
4-2 Dynamic Routing Protocols
4-3 OSPF
4-4 BGP
4-5 EIGRP
5 Wireless Networking
5-1 Wireless Basics
5-2 Wireless Security
5-3 Wireless Configuration
5-4 Wireless Bridging
5-5 Wireless Repeaters
6 VPN Technologies
6-1 VPN Basics
6-2 IPsec VPN
6-3 OpenVPN
6-4 L2TPPPTP
6-5 SSL VPN
7 Quality of Service (QoS)
7-1 QoS Basics
7-2 Traffic Shaping
7-3 Policing
7-4 Prioritization
7-5 Queue Types
8 Firewall and Security
8-1 Firewall Basics
8-2 Firewall Rules
8-3 NAT Rules
8-4 Filtering Rules
8-5 Hotspot and Captive Portal
9 Advanced Topics
9-1 VLANs
9-2 MPLS
9-3 High Availability
9-4 Load Balancing
9-5 Monitoring and Troubleshooting
2.5 System Logging Explained

2.5 System Logging Explained

Key Concepts of System Logging

System logging is a critical aspect of network management, providing insights into the operational status and health of a network. It involves recording events, errors, and warnings generated by network devices, such as routers and switches. This data is essential for troubleshooting, auditing, and ensuring the security and reliability of the network.

1. Logging Levels

Logging levels define the severity of the events being logged. Common logging levels include:

Example: If a critical error occurs on a router, it will generate a log entry at the "Critical" level, alerting administrators to take immediate action.

2. Logging Destinations

Logging destinations determine where log messages are sent. Common destinations include:

Example: For a large network, logs might be configured to send critical errors to an email address and all other logs to a centralized system log server for detailed analysis.

3. Logging Categories

Logging categories allow administrators to filter and manage logs based on specific types of events. Common categories include:

Example: If an administrator is troubleshooting a DHCP issue, they can focus on the "DHCP" logging category to isolate relevant log entries.

4. Log Rotation

Log rotation is the process of managing log file sizes by periodically archiving and deleting old logs. This prevents log files from consuming excessive disk space and ensures that only relevant logs are retained.

Example: A router might be configured to rotate logs daily, archiving the previous day's logs and deleting logs older than 30 days.

5. Log Analysis

Log analysis involves reviewing and interpreting log data to identify patterns, anomalies, and potential issues. Tools and techniques such as log aggregation, correlation, and visualization are used to make sense of large volumes of log data.

Example: A network administrator might use a log analysis tool to identify recurring firewall alerts, indicating a potential security breach that needs further investigation.