Managing the security log file – H3C Technologies H3C SecPath F1000-E User Manual
Page 240
17
security log administrator can trigger the saving of security logs into the log file manually). After the
contents of the buffer are saved into the security log file successfully, the security log file buffer is cleared
immediately.
The size of the security log file is limited. When the size of the security log file reaches the predefined
maximum value, the system deletes the oldest information and then writes the new information into the
security log file. To avoid security log file loss, you can set the alarm threshold of the security log file
usage. When the alarm threshold is reached, the system outputs the log information to inform the
administrator. In this case, the administrator can log in to the device as the security log administrator, and
then back up the security log file, preventing the loss of important historical data.
By default, the saving of security logs into the security log file is disabled. The parameters, such as the
saving frequency, the maximum size and the alarm threshold of the security log file usage, have their
default settings. To modify these parameters, you need to log in to the device as the system administrator,
and then follow the steps in the following table to configure the related parameters:
Table 7 Save security logs into the security log file
To do…
Use the command…
Remarks
Enter system view
system-view
—
Enable the information center
info-center enable
Optional
Enabled by default.
Enable the saving of the security
logs into the security log file
info-center security-logfile
enable
Required
Disabled by default.
Set the frequency with which the
system saves the security log file
info-center security-logfile
frequency freq-sec
Optional
Defaults to 86400 seconds.
Set the maximum storage space
reserved for the security log file
info-center security-logfile
size-quota size
Optional
Defaults to 10 MB.
Set the alarm threshold of the
security log file usage
info-center security-logfile
alarm-threshold usage
Optional
80 by default. (That is, when the
usage of the security log file
reaches 80%, the system will
inform the user.)
Managing the security log file
After passing the AAA local authentication, the security log administrator can perform the following
operations:
Table 8 Manage the security log file
To do…
Use the command…
Remarks
Display the summary of the security
log file
display security-logfile
summary
Optional
Available in user view