beautypg.com

Configuring data logs, N in, Figure – H3C Technologies H3C SecBlade IPS Cards User Manual

Page 110

background image

13-20

Figure 13-20 Device logs

Table 13-13

describes the configuration items for the system and operation logs.

Table 13-13 Configuration items for the system and operation logs

Item

Description

Log Type

Set whether to send the system logs or operation logs to the remote log host.

IP

Set the IP address of the remote log host.

Remote Log
Host

Port

Set the service port of the remote log host.

Remote Log Timestamp

Set the timestamp format of the logs sent to the remote log host.

Local Disk Usage Threshold

Set the disk usage threshold for the system and operation logs.

When the disk usage of the system and operation logs exceeds the specified
threshold, the oldest log files will be deleted.

After the threshold value ranges, the disk usage corresponding the disk
usage threshold is displayed, and in the bracket, the total disk usage is
displayed.

Log Lifetime

Select the maximum number of days that the system or operation log files can
be saved. The system automatically deletes the overdue system or operation
log files.

You can select one week, two weeks, three weeks, 30 days or customize as
needed. You can manually set the log lifetime when you select Customize.

Return to

Functions of the log configuration module

.

Configuring Data Logs

Data logs are those logs stored in the database, such as IPS attack logs, service logs, virus logs, URL

filter logs and blacklist logs.