Configuring data logs, N in, Figure – H3C Technologies H3C SecBlade IPS Cards User Manual
Page 110
13-20
Figure 13-20 Device logs
describes the configuration items for the system and operation logs.
Table 13-13 Configuration items for the system and operation logs
Item
Description
Log Type
Set whether to send the system logs or operation logs to the remote log host.
IP
Set the IP address of the remote log host.
Remote Log
Host
Port
Set the service port of the remote log host.
Remote Log Timestamp
Set the timestamp format of the logs sent to the remote log host.
Local Disk Usage Threshold
Set the disk usage threshold for the system and operation logs.
When the disk usage of the system and operation logs exceeds the specified
threshold, the oldest log files will be deleted.
After the threshold value ranges, the disk usage corresponding the disk
usage threshold is displayed, and in the bracket, the total disk usage is
displayed.
Log Lifetime
Select the maximum number of days that the system or operation log files can
be saved. The system automatically deletes the overdue system or operation
log files.
You can select one week, two weeks, three weeks, 30 days or customize as
needed. You can manually set the log lifetime when you select Customize.
Functions of the log configuration module
Configuring Data Logs
Data logs are those logs stored in the database, such as IPS attack logs, service logs, virus logs, URL
filter logs and blacklist logs.