beautypg.com
i
Contents
Using ping, tracert, and system debugging ··············································································································· 1
Ping ····················································································································································································· 1
Using a ping command to test network connectivity ···························································································· 1
Ping example ···························································································································································· 1
Tracert ················································································································································································ 3
Prerequisites ······························································································································································ 4
Using a tracert command to identify failed or all nodes in a path ····································································· 5
System debugging ···························································································································································· 5
Debugging information control switches················································································································ 5
Debugging a feature module ·································································································································· 6
Ping and tracert example ················································································································································· 7
Configuring the information center ····························································································································· 9
Overview ············································································································································································ 9
Classification of system information ······················································································································· 9
System information levels ········································································································································ 9
Output channels and destinations ······················································································································· 10
Default output rules of system information ·········································································································· 11
System information formats ·································································································································· 11
Information center configuration task list ····················································································································· 14
Outputting system information to the console ············································································································· 15
Outputting system information to the monitor terminal ······························································································ 15
Outputting system information to a log host ··············································································································· 17
Outputting system information to the trap buffer ········································································································ 17
Outputting system information to the log buffer ·········································································································· 18
Outputting system information to the SNMP module ································································································· 19
Outputting system information to the Web interface ·································································································· 20
Saving system information to a log file ························································································································ 20
Managing security logs ················································································································································· 21
Saving security logs into the security log file ······································································································ 22
Managing the security log file ····························································································································· 23
Enabling synchronous information output ··················································································································· 25
Disabling an interface from generating link up/down logging information ··························································· 26
Displaying and maintaining information center ········································································································· 27
Information center configuration examples ················································································································· 27
Outputting log information to the console ·········································································································· 27
Outputting log information to a UNIX log host ·································································································· 28
Outputting log information to a Linux log host ··································································································· 30
Saving security logs into the security log file ······································································································ 31
Managing logs ··························································································································································· 34
Configuring syslog ························································································································································· 34
User logging (flow logging) overview ························································································································· 36
Configuring user logging in the Web interface ·········································································································· 37
Displaying user logging statistics ························································································································· 39
Clearing user logs and user logging statistics ···································································································· 39
Configuring the time zone for user logs ·············································································································· 40
Configuring user logging at the CLI ····························································································································· 40
User logging configuration task list ····················································································································· 40
Configuring the user logging version ·················································································································· 40