beautypg.com

H3C Technologies H3C SecPath F1000-E User Manual

Page 223

background image

i

Table of Contents

Information Center Configuration ······························································································································· 1

Information Center Overview···········································································································································1

Introduction to Information Center··························································································································1

Classification of System Information·······················································································································2

Eight Levels of System Information··························································································································2

Eight Output Destinations and Ten Channels of System Information··································································3

Outputting System Information by Source Module ·······························································································4

Default Output Rules of System Information···········································································································4

System Information Format ······································································································································5

Configuring Information Center·······································································································································8

Information Center Configuration Task List············································································································8

Outputting System Information to the Console······································································································8

Outputting System Information to a Monitor Terminal··························································································9

Outputting System Information to a Log Host····································································································· 10

Outputting System Information to the Trap Buffer ······························································································ 11

Outputting System Information to the Log Buffer································································································ 12

Outputting System Information to the SNMP Module························································································ 13

Outputting System Information to the Web Interface ························································································ 14

Saving System Information to a Log File············································································································· 15

Saving Security Logs into the Security Log File ·································································································· 16

Configuring Synchronous Information Output···································································································· 19

Disabling a Port from Generating Link Up/Down Logging Information·························································· 20

Displaying and Maintaining Information Center ········································································································ 20

Information Center Configuration Examples ··············································································································· 21

Outputting Log Information to a Unix Log Host·································································································· 21

Outputting Log Information to a Linux Log Host································································································· 22

Outputting Log Information to the Console········································································································· 24

Saving Security Logs into the Security Log File ·································································································· 25