Symantec 10521148 Implementation Guide - Page 147

Using SCP to rotate log files, Limit Size for Traffic Record Directory

Page 147 highlights

Maintaining and administering the 7100 Series 139 Managing log files and backups ■ Click Yes to generate new SSH keys. This replaces any existing keys. ■ Click No to exit the process. 3 In Generating SSH Keys, no action is required. This pop-up is briefly displayed while Network Security is generating the SSH keys. 4 In Public Key, read the public key filename at the top, and the instructions for installing it on the target host. In the instructions, is the home directory of user on the target host who can use the public key to decrypt the transferred log files. This user should not be root. 5 Follow the instructions to add the public key to the target host, and click Close. Using SCP to rotate log files After generating and installing the SSH keys, you can configure log and database parameters for automatic log rotation to the target host. To configure automatic log rotation 1 Do one of the following: ■ On Devices, right-click the 7100 Series node object, then click Configuration > Network Security Parameters. ■ On Devices, click Configuration > Node > Network Security Parameters and choose a node from the pull-down list in Select Node. Click OK. 2 In Symantec Network Security Configuration Parameters, under Log and Database Parameters, set values for each of the listed parameters. 3 In Size to Trigger Rotation, enter the rotation size. 4 In Flag for SCP Usage, click True. 5 In Destination Host for SCP, type the target host name or IP address. 6 In User Account for SCP, type user name to transfer files to on the target host. 7 In Destination Directory for SCP, type the directory to transfer files to on the target host. 8 In Limit Size for Archive Directory, type the maximum disk space allowed for archived files. 9 In Limit Size for Traffic Record Directory, type the maximum disk space allowed for traffic record data.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214

139
Maintaining and administering the 7100 Series
Managing log files and backups
Click
Yes
to generate new SSH keys. This replaces any existing keys.
Click
No
to exit the process.
3
In
Generating SSH Keys
, no action is required.
This pop-up is briefly displayed while Network Security is generating the
SSH keys.
4
In
Public Key
, read the public key filename at the top, and the instructions
for installing it on the target host.
In the instructions, <user_home_dir> is the home directory of user on the
target host who can use the public key to decrypt the transferred log files.
This user should not be root.
5
Follow the instructions to add the public key to the target host, and click
Close
.
Using SCP to rotate log files
After generating and installing the SSH keys, you can configure log and
database parameters for automatic log rotation to the target host.
To configure automatic log rotation
1
Do one of the following:
On
Devices
, right-click the 7100 Series node object, then click
Configuration
>
Network Security Parameters
.
On
Devices
, click
Configuration
>
Node
>
Network Security
Parameters
and choose a node from the pull-down list in
Select Node
.
Click
OK.
2
In
Symantec Network Security Configuration Parameters
, under
Log and
Database Parameters
, set values for each of the listed parameters.
3
In
Size to Trigger Rotation
, enter the rotation size.
4
In
Flag for SCP Usage
, click
True
.
5
In
Destination Host for SCP
, type the target host name or IP address.
6
In
User Account for SCP
, type user name to transfer files to on the target
host.
7
In
Destination Directory for SCP
, type the directory to transfer files to on
the target host.
8
In
Limit Size for Archive Directory
, type the maximum disk space allowed
for archived files.
9
In
Limit Size for Traffic Record Directory
, type the maximum disk space
allowed for traffic record data.