beautypg.com

Managing the security log file – H3C Technologies H3C SecPath F1000-E User Manual

Page 240

background image

17

security log administrator can trigger the saving of security logs into the log file manually). After the

contents of the buffer are saved into the security log file successfully, the security log file buffer is cleared

immediately.
The size of the security log file is limited. When the size of the security log file reaches the predefined

maximum value, the system deletes the oldest information and then writes the new information into the

security log file. To avoid security log file loss, you can set the alarm threshold of the security log file

usage. When the alarm threshold is reached, the system outputs the log information to inform the

administrator. In this case, the administrator can log in to the device as the security log administrator, and

then back up the security log file, preventing the loss of important historical data.
By default, the saving of security logs into the security log file is disabled. The parameters, such as the

saving frequency, the maximum size and the alarm threshold of the security log file usage, have their

default settings. To modify these parameters, you need to log in to the device as the system administrator,

and then follow the steps in the following table to configure the related parameters:

Table 7 Save security logs into the security log file

To do…

Use the command…

Remarks

Enter system view

system-view

Enable the information center

info-center enable

Optional
Enabled by default.

Enable the saving of the security

logs into the security log file

info-center security-logfile
enable

Required
Disabled by default.

Set the frequency with which the
system saves the security log file

info-center security-logfile
frequency
freq-sec

Optional
Defaults to 86400 seconds.

Set the maximum storage space

reserved for the security log file

info-center security-logfile
size-quota
size

Optional
Defaults to 10 MB.

Set the alarm threshold of the
security log file usage

info-center security-logfile
alarm-threshold
usage

Optional
80 by default. (That is, when the
usage of the security log file

reaches 80%, the system will

inform the user.)

Managing the security log file

After passing the AAA local authentication, the security log administrator can perform the following

operations:

Table 8 Manage the security log file

To do…

Use the command…

Remarks

Display the summary of the security
log file

display security-logfile
summary

Optional
Available in user view