Managing security logs – H3C Technologies H3C SecBlade LB Cards User Manual
Page 30
21
Step Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enable the information center. info-center enable
Optional.
Enabled by default.
3.
Enable the log file feature.
info-center logfile enable
Optional.
Enabled by default.
4.
Configure the interval at which
the system saves logs in the
logfile buffer to the log file.
info-center logfile frequency
freq-sec
Optional.
The default saving interval is
86400 seconds.
5.
Configure the maximum size
of the log file.
info-center logfile size-quota size
Optional.
The default setting is 10 MB.
To ensure normal operation of the
device, set the size argument to a
value between 1 MB and 10 MB.
6.
Configure the directory to
save the log file.
info-center logfile switch-directory
dir-name
Optional.
By default, the log file is saved in
the logfile directory under the root
directory of the storage device (the
root directory of a storage device
varies with devices).
The configuration made by this
command cannot survive a system
reboot.
7.
Manually save the log file
buffer content to the log file.
logfile save
Optional.
Available in any view.
By default, the system saves logs in
the log file buffer to the log file at
the interval configured by the
info-center logfile frequency
command.
Managing security logs
Security logs are very important for locating and troubleshooting network problems. Generally, security
logs are output together with other logs. It is difficult to identify security logs among all logs.
To solve this problem, you can save security logs into a security log file without affecting the current log
output rules.
The configuration of this feature and the management of the security log file are separate, and the
security log file is managed by a privileged user. After logging in to the device, the administrator can
enable the saving of security logs into the security log file and configure related parameters However,
only the privileged user, known as the security log administrator, can perform operations on the security
log file. The privileged user must pass AAA local authentication and log in to the device. No other users
(including the system administrator) can perform operations on the security log file.