beautypg.com

H3C Technologies H3C SecPath F1000-E User Manual

Page 8

background image

iii

System information levels ····································································································································· 56

 

Output channels and destinations ······················································································································· 57

 

Outputting system information by source module ······························································································ 58

 

Default output rules of system information ·········································································································· 58

 

System information formats ·································································································································· 59

 

Information center configuration task list ····················································································································· 62

 

Outputting system information to the console ············································································································· 63

 

Outputting system information to the monitor terminal ······························································································ 63

 

Outputting system information to a log host ··············································································································· 64

 

Outputting system information to the trap buffer ········································································································ 65

 

Outputting system information to the log buffer ·········································································································· 66

 

Outputting system information to the SNMP module ································································································· 67

 

Outputting system information to the Web interface ·································································································· 67

 

Saving system information to the log file ····················································································································· 68

 

Saving security logs into the security log file ·············································································································· 69

 

Saving security logs into the security log file ······································································································ 70

 

Managing the security log file ····························································································································· 70

 

Enabling synchronous information output ··················································································································· 73

 

Disabling a port from generating link up/down logging information ····································································· 73

 

Displaying and maintaining information center ········································································································· 74

 

Information center configuration examples ················································································································· 74

 

Outputting log information to a UNIX log host ·································································································· 74

 

Outputting log information to a Linux log host ··································································································· 76

 

Outputting log information to the console ·········································································································· 77

 

Managing logs ··························································································································································· 79

 

Configuring syslog ························································································································································· 79

 

Configuring user logging ·············································································································································· 81

 

Configuring user logging in the Web interface ································································································· 82

 

Configuring user logging at the CLI ···················································································································· 84

 

Configuring the timestamps for user logs ··········································································································· 85

 

User logging configuration example ··················································································································· 87

 

Troubleshooting user logging ······························································································································· 88

 

Configuring session logging ········································································································································· 88

 

Session logging configuration task list ················································································································ 89

 

Configuring a session logging policy ················································································································· 89

 

Configuring global parameters for session logging ·························································································· 90

 

Log report ········································································································································································ 90

 

Displaying system logs ·········································································································································· 91

 

Displaying connection limit logs ·························································································································· 92

 

Displaying attack prevention logs ······················································································································· 93

 

Displaying blacklist logs ······································································································································· 93

 

Displaying interzone policy logs ························································································································· 94

 

Displaying user logs ·············································································································································· 95

 

Configuring NTP ························································································································································ 98

 

Overview ········································································································································································· 98

 

NTP application ····················································································································································· 98

 

NTP advantages ···················································································································································· 98

 

How NTP works ····················································································································································· 99

 

NTP message format ··········································································································································· 100

 

NTP operation modes ········································································································································· 101

 

NTP for VPNs ······················································································································································· 103

 

NTP configuration task list ··········································································································································· 104

 

Configuring the NTP operation modes ······················································································································ 104