beautypg.com

Managing security logs – H3C Technologies H3C SecBlade LB Cards User Manual

Page 30

background image

21

Step Command

Remarks

1.

Enter system view.

system-view

N/A

2.

Enable the information center. info-center enable

Optional.
Enabled by default.

3.

Enable the log file feature.

info-center logfile enable

Optional.
Enabled by default.

4.

Configure the interval at which
the system saves logs in the

logfile buffer to the log file.

info-center logfile frequency
freq-sec

Optional.
The default saving interval is

86400 seconds.

5.

Configure the maximum size
of the log file.

info-center logfile size-quota size

Optional.
The default setting is 10 MB.
To ensure normal operation of the
device, set the size argument to a

value between 1 MB and 10 MB.

6.

Configure the directory to
save the log file.

info-center logfile switch-directory
dir-name

Optional.
By default, the log file is saved in

the logfile directory under the root
directory of the storage device (the

root directory of a storage device

varies with devices).
The configuration made by this
command cannot survive a system

reboot.

7.

Manually save the log file

buffer content to the log file.

logfile save

Optional.
Available in any view.
By default, the system saves logs in
the log file buffer to the log file at

the interval configured by the

info-center logfile frequency
command.

Managing security logs

Security logs are very important for locating and troubleshooting network problems. Generally, security

logs are output together with other logs. It is difficult to identify security logs among all logs.
To solve this problem, you can save security logs into a security log file without affecting the current log

output rules.
The configuration of this feature and the management of the security log file are separate, and the

security log file is managed by a privileged user. After logging in to the device, the administrator can
enable the saving of security logs into the security log file and configure related parameters However,

only the privileged user, known as the security log administrator, can perform operations on the security

log file. The privileged user must pass AAA local authentication and log in to the device. No other users

(including the system administrator) can perform operations on the security log file.

This manual is related to the following products: