beautypg.com

H3C Technologies H3C SecBlade LB Cards User Manual

Page 6

background image

i

Contents

Using ping, tracert, and system debugging ··············································································································· 1

 

Ping ····················································································································································································· 1

 

Using a ping command to test network connectivity ···························································································· 1

 

Ping example ···························································································································································· 1

 

Tracert ················································································································································································ 3

 

Prerequisites ······························································································································································ 4

 

Using a tracert command to identify failed or all nodes in a path ····································································· 5

 

System debugging ···························································································································································· 5

 

Debugging information control switches················································································································ 5

 

Debugging a feature module ·································································································································· 6

 

Ping and tracert example ················································································································································· 7

 

Configuring the information center ····························································································································· 9

 

Overview ············································································································································································ 9

 

Classification of system information ······················································································································· 9

 

System information levels ········································································································································ 9

 

Output channels and destinations ······················································································································· 10

 

Default output rules of system information ·········································································································· 11

 

System information formats ·································································································································· 11

 

Information center configuration task list ····················································································································· 14

 

Outputting system information to the console ············································································································· 15

 

Outputting system information to the monitor terminal ······························································································ 15

 

Outputting system information to a log host ··············································································································· 17

 

Outputting system information to the trap buffer ········································································································ 17

 

Outputting system information to the log buffer ·········································································································· 18

 

Outputting system information to the SNMP module ································································································· 19

 

Outputting system information to the Web interface ·································································································· 20

 

Saving system information to a log file ························································································································ 20

 

Managing security logs ················································································································································· 21

 

Saving security logs into the security log file ······································································································ 22

 

Managing the security log file ····························································································································· 23

 

Enabling synchronous information output ··················································································································· 25

 

Disabling an interface from generating link up/down logging information ··························································· 26

 

Displaying and maintaining information center ········································································································· 27

 

Information center configuration examples ················································································································· 27

 

Outputting log information to the console ·········································································································· 27

 

Outputting log information to a UNIX log host ·································································································· 28

 

Outputting log information to a Linux log host ··································································································· 30

 

Saving security logs into the security log file ······································································································ 31

 

Managing logs ··························································································································································· 34

 

Configuring syslog ························································································································································· 34

 

User logging (flow logging) overview ························································································································· 36

 

Configuring user logging in the Web interface ·········································································································· 37

 

Displaying user logging statistics ························································································································· 39

 

Clearing user logs and user logging statistics ···································································································· 39

 

Configuring the time zone for user logs ·············································································································· 40

 

Configuring user logging at the CLI ····························································································································· 40

 

User logging configuration task list ····················································································································· 40

 

Configuring the user logging version ·················································································································· 40

 

This manual is related to the following products: