H. Security Specifications
This appendix describes the following items related to the security specifications:
•
List of log capacities
•
Security function list
H.1 List of log capacities
Log files, which are stored in
/var/log
, are important for finding signs of security attacks or for investigating
security accidents. There is a limit on the amount of log data that can be stored in CE50-10. Due to these
specifications, log files are automatically deleted after a certain period has passed after the log data is generated.
Table H‒1: Log file retention period list shows the standard retention period of log files generated by the OS and RAS
function of the CE50-10. If necessary, consider copying log files to external media before they are deleted. For some
log files, the retention period might change depending on how they are used. For such log files, the prerequisite
specification conditions for the retention period are also described.
Table H‒1: Log file retention period list
No.
Log file name
Description
Retention period
(standard)
Prerequisite
1
syslog
System message
Approx. 3 days
The unit is restarted once a day.
2
wtmp
Login history
Approx. 160 days
A login to the unit is performed
once a day.
3
auth.log
Authentication history
Approx. 13 days
Operation with root privileges is
performed approximately 20 times
per day.
4
sar.log
Operation management
information
Approx. 3 days
--
5
netlog
Network statistics
Approx. 21 days
--
6
errlog
KX message
Approx. 5,000 days
One KX message is generated per
day.
7
temp.log
Temperature information
Approx. 7 days
--
8
memlog.log
Memory error information
Approx. 213 days
--
9
ras_mcu.log
RAS MCU monitoring error
information
Approx. 1,280 days
One error occurs per day.
10
volt.log
Voltage value information
Approx. 71 days
--
11
uptime.log
Cumulative power-on time per
manufacturing number
--
#1
--
12
reg.log
Internal register information
Approx. 71 days
--
13
flog.log
RAS MCU
Flash log
--
#1
--
#1
Only the latest information is always saved. Past information is not saved.
H.2 Updating the encryption algorithm
If a vulnerability is found in the algorithm used for encryption, you need to stop using that algorithm and use another.
H. Security Specifications
176
Summary of Contents for CE50-10
Page 1: ...Hitachi Industrial Edge Computer CE50 10 Instruction Manual CC 65 0171 ...
Page 10: ......
Page 23: ...Figure 1 6 Attaching mounting brackets 4 1 Installing the CE50 10 7 ...
Page 26: ......
Page 38: ......
Page 42: ...4 2 5 Connection diagram Figure 4 2 Connection diagram 4 External Contact Functions 26 ...
Page 44: ......
Page 87: ... sudo etc init d netfilter persistent save 5 Configuring Software Environment 71 ...
Page 117: ...version information 13 Log out from the unit exit 5 Configuring Software Environment 101 ...
Page 148: ......
Page 149: ...7 Maintaining the CE50 10 This chapter describes maintenance of the CE50 10 133 ...
Page 157: ...8 Troubleshooting This chapter describes troubleshooting of the CE50 10 141 ...
Page 162: ...8 1 14 Cannot turn off the power to the unit Please contact us 8 Troubleshooting 146 ...