ii
Configuring SNTP ······················································································································································ 48
Configuration restrictions and guidelines ···················································································································· 48
Configuration task list ···················································································································································· 48
Enabling the SNTP service ············································································································································ 48
Specifying an NTP server for the device ····················································································································· 48
Configuring SNTP authentication ································································································································· 49
Displaying and maintaining SNTP ······························································································································· 50
SNTP configuration example ········································································································································ 50
Configuring the information center ··························································································································· 52
Overview········································································································································································· 52
Log types ································································································································································ 52
Log levels ································································································································································ 52
Log destinations ····················································································································································· 53
Default log output rules ········································································································································· 53
Log format ······························································································································································ 53
Information center configuration task list ····················································································································· 55
Outputting logs to the console ······································································································································ 56
Outputting logs to the monitor terminal ······················································································································· 56
Outputting logs to a log host ········································································································································ 57
Outputting logs to the log buffer ·································································································································· 57
Saving logs to the log file·············································································································································· 58
Managing security logs ················································································································································· 59
Saving security logs into the security log file······································································································ 60
Managing the security log file ····························································································································· 60
Enabling synchronous information output ··················································································································· 61
Enabling duplicate log suppression ····························································································································· 61
Disabling an interface from generating link up/down logging information ··························································· 62
Displaying and maintaining information center ········································································································· 62
Configuration example for outputting logs to the console ························································································· 63
Configuration example for outputting logs to a UNIX log host················································································· 63
Configuration example for outputting logs to a Linux log host ················································································· 65
Configuring SNMP····················································································································································· 67
Overview········································································································································································· 67
FIPS compliance ····························································································································································· 67
SNMP framework ·················································································································································· 67
MIB and view-based MIB access control ············································································································ 67
SNMP operations ·················································································································································· 68
Protocol versions ···················································································································································· 68
Configuring SNMP basic parameters ·························································································································· 68
Configuring SNMPv1 or SNMPv2c basic parameters······················································································ 69
Configuring SNMPv3 basic parameters ············································································································· 70
Configuring SNMP logging ·········································································································································· 73
Configuring SNMP notifications ··································································································································· 74
Enabling SNMP notifications ······························································································································· 74
Configuring the SNMP agent to send notifications to a host ··········································································· 75
Displaying the SNMP settings······································································································································· 76
SNMPv1/SNMPv2c configuration example ··············································································································· 77
SNMPv3 configuration example ·································································································································· 78
Configuring NQA ······················································································································································ 81
Overview········································································································································································· 81
Collaboration ························································································································································· 81
Threshold monitoring ············································································································································ 82
NQA client configuration task list ································································································································ 82