HP 6125XLG R2306-HP 6125XLG Blade Switch Network Management and Monitoring Con - Page 66

Saving security logs into the security log file, Managing the security log file

Page 66 highlights

Saving security logs into the security log file After you enable the saving of the security logs into the security log file, the system first outputs security logs to the security log file buffer, and then saves the logs from the security log file buffer into the security log file at a specified interval (the security log administrator can also manually save security logs into the log file). After the security logs are saved, the buffer is cleared immediately. The device supports only one security log file. To avoid security log loss, you can set an alarm threshold for the security log file usage. When the alarm threshold is reached, the system outputs a message to inform the administrator. The administrator can log in to the device as the security log administrator and back up the security log file to prevent the loss of important data. To save security logs into the security log file: Step 1. Enter system view. Command system-view 2. Enable the information center. info-center enable 3. Enable the saving of the security logs into the security log file. 4. Set the interval at which the system saves security logs. 5. (Optional.) Set the maximum size of the security log file. info-center security-logfile enable info-center security-logfile frequency freq-sec info-center security-logfile size-quota size 6. (Optional.) Set the alarm threshold of the security log file usage. info-center security-logfile alarm-threshold usage Remarks N/A By default, the information center is enabled. By default, the function is disabled. By default, the default saving interval is 86400 seconds. By default, the maximum size of the security log file is 10 MB. By default, the alarm threshold of the security log file usage is 80. When the usage of the security log file reaches 80%, the system will inform the user. Managing the security log file To manage and maintain the security log file, the security log administrator must pass local AAA authentication first. For more information about security log administrator, see Security Configuration Guide. To manage the security log file: Task Display a summary of the security log file. Command Remarks display security-logfile summary Available in user view. 60

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148

60
Saving security logs into the security log file
After you enable the saving of the security logs into the security log file, the system first outputs security
logs to the security log file buffer, and then saves the logs from the security log file buffer into the security
log file at a specified interval (the security log administrator can also manually save security logs into the
log file). After the security logs are saved, the buffer is cleared immediately.
The device supports only one security log file. To avoid security log loss, you can set an alarm threshold
for the security log file usage. When the alarm threshold is reached, the system outputs a message to
inform the administrator. The administrator can log in to the device as the security log administrator and
back up the security log file to prevent the loss of important data.
To save security logs into the security log file:
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enable the information center.
info-center enable
By default, the information center is
enabled.
3.
Enable the saving of the
security logs into the security
log file.
info-center security-logfile enable
By default, the function is disabled.
4.
Set the interval at which the
system saves security logs.
info-center security-logfile
frequency
freq-sec
By default, the default saving
interval is 86400 seconds.
5.
(Optional.) Set the maximum
size of the security log file.
info-center security-logfile
size-quota
size
By default, the maximum size of the
security log file is 10 MB.
6.
(Optional.) Set the alarm
threshold of the security log
file usage.
info-center security-logfile
alarm-threshold
usage
By default, the alarm threshold of
the security log file usage is 80.
When the usage of the security log
file reaches 80%, the system will
inform the user.
Managing the security log file
To manage and maintain the security log file, the security log administrator must pass local AAA
authentication first. For more information about security log administrator, see
Security Configuration
Guide
.
To manage the security log file:
Task
Command
Remarks
Display a summary of the security
log file.
display security-logfile summary
Available in user view.