Log management, Configuring syslog – H3C Technologies H3C SecPath F1000-E User Manual
Page 923
![background image](https://www.manualsdir.com/files/813036/content/doc923.png)
1
Log Management
The log management feature enables you to store the system messages or logs generated by actions such
as packet filtering to the log buffer or send them to the log hosts. The analysis and archiving of the logs
can enable you to check the security holes of the firewall, when and who try to disobey security policies,
and the types of the network attacks. The real-time logs can also be used to detect the ongoing attacks.
NOTE:
After receiving an invalid packet, the device directly drops the packet and does not log it. Invalid packets
include IP packets with header checksum errors, packets with invalid destination IP addresses, and raw IP
packets with the protocol number of 1, 5, 17, or 58. You can execute the debug commands on the
command line interface to view the detailed information.
Configuring Syslog
The syslog module allows you to set the related parameters of the information center. Acting as the system
information hub, the information center classifies and manages the system information, offering a
powerful support for network administrators and developers in monitoring the network performance and
diagnosing network problems. The information center can output the log information to the Web
interface for users to view the logs. Meanwhile, it can also output the log information to the specified
syslog log host based on your configuration.
Select Log Report > Syslog from the navigation tree to enter the page as shown in
.