H. Security Specifications
This appendix describes the following items related to the security specifications:
•
List of log capacities
•
Security function list
H.1 List of log capacities
Log files, which are stored in
/var/log
, are important for finding signs of security attacks or for investigating
security accidents. There is a limit on the amount of log data that can be stored in CE50-10. Due to these
specifications, log files are automatically deleted after a certain period has passed after the log data is generated.
Table H‒1: Log file retention period list shows the standard retention period of log files generated by the OS and RAS
function of the CE50-10. If necessary, consider copying log files to external media before they are deleted. For some
log files, the retention period might change depending on how they are used. For such log files, the prerequisite
specification conditions for the retention period are also described.
Table H‒1: Log file retention period list
No.
Log file name
Description
Retention period
(standard)
Prerequisite
1
syslog
System message
Approx. 3 days
The unit is restarted once a day.
2
wtmp
Login history
Approx. 160 days
A login to the unit is performed
once a day.
3
auth.log
Authentication history
Approx. 13 days
Operation with root privileges is
performed approximately 20 times
per day.
4
sar.log
Operation management
information
Approx. 3 days
--
5
netlog
Network statistics
Approx. 21 days
--
6
errlog
KX message
Approx. 5,000 days
One KX message is generated per
day.
7
temp.log
Temperature information
Approx. 7 days
--
8
memlog.log
Memory error information
Approx. 213 days
--
9
ras_mcu.log
RAS MCU monitoring error
information
Approx. 1,280 days
One error occurs per day.
10
volt.log
Voltage value information
Approx. 71 days
--
11
uptime.log
Cumulative power-on time per
manufacturing number
--
#1
--
12
reg.log
Internal register information
Approx. 71 days
--
13
flog.log
RAS MCU
Flash log
--
#1
--
#1
Only the latest information is always saved. Past information is not saved.
H.2 Updating the encryption algorithm
If a vulnerability is found in the algorithm used for encryption, you need to stop using that algorithm and use another.
H. Security Specifications
176
Содержание CE50-10
Страница 1: ...Hitachi Industrial Edge Computer CE50 10 Instruction Manual CC 65 0171 ...
Страница 10: ......
Страница 16: ...H 1 List of log capacities 176 H 2 Updating the encryption algorithm 176 I Communication Sheet 178 Contents vi ...
Страница 23: ...Figure 1 6 Attaching mounting brackets 4 1 Installing the CE50 10 7 ...
Страница 26: ......
Страница 38: ......
Страница 42: ...4 2 5 Connection diagram Figure 4 2 Connection diagram 4 External Contact Functions 26 ...
Страница 44: ......
Страница 52: ... gsettings set org gnome desktop background show desktop icons true 5 Configuring Software Environment 36 ...
Страница 87: ... sudo etc init d netfilter persistent save 5 Configuring Software Environment 71 ...
Страница 117: ...version information 13 Log out from the unit exit 5 Configuring Software Environment 101 ...
Страница 143: ...6 Managing User Accounts This chapter describes how to add and delete user accounts for the CE50 10 127 ...
Страница 148: ......
Страница 149: ...7 Maintaining the CE50 10 This chapter describes maintenance of the CE50 10 133 ...
Страница 157: ...8 Troubleshooting This chapter describes troubleshooting of the CE50 10 141 ...
Страница 159: ...Figure 8 2 Troubleshooting flow chart 8 1 1 Smoke or unusual odor WARNING 8 Troubleshooting 143 ...
Страница 162: ...8 1 14 Cannot turn off the power to the unit Please contact us 8 Troubleshooting 146 ...