291
Managing security logs
Security logs are very important for locating and troubleshooting network problems. Generally,
security logs are output together with other logs. It is difficult to identify security logs among all logs.
To solve this problem, you can save security logs to the security log file without affecting the current
log output rules.
Saving security logs to the security log file
After you enable the saving of the security logs to the security log file:
•
The system first outputs security logs to the security log file buffer.
•
The system saves logs from the security log file buffer to the security log file at the specified
interval (a user authorized the security-audit role can also manually save security logs to the
security log file).
•
After the security logs are saved, the buffer is cleared immediately.
The device supports only one security log file. To avoid security log loss, you can set an alarm
threshold for the security log file usage. When the alarm threshold is reached, the system outputs a
message to inform the administrator. The administrator can log in to the device with the
security-audit user role and back up the security log file to prevent the loss of important data.
To save security logs to the security log file:
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enable the information
center.
info-center enable
By default, the information center
is enabled.
3.
Enable the saving of the
security logs to the security
log file.
info-center security-logfile
enable
By default, saving security logs to
the security log file is disabled.
4.
Set the interval at which the
system saves security logs.
info-center security-logfile
frequency
freq-sec
The default saving interval is
86400 seconds.
5.
(Optional.) Set the maximum
size for the security log file.
info-center security-logfile
size-quota size
The default setting is 10 MB.
6.
(Optional.) Set the alarm
threshold of the security log
file usage.
info-center security-logfile
alarm-threshold
usage
By default, the alarm threshold of
the security log file usage is 80.
When the usage of the security
log file reaches 80%, the system
will inform the user.
Managing the security log file
To use the security log file management commands in this section, a local user must be authorized
the security-audit user role. For information about configuring the security-audit user role, see
Security Command Reference
.
To manage the security log file:
Task
Command
Remarks
Display a summary of the security
log file.
display security-logfile
summary
Available in user view.
Summary of Contents for FlexNetwork 10500 SERIES
Page 224: ...213 ...
Page 311: ...300 Now the system can record log information to the specified file ...