Saving Security Logs Into The Security Log File - HP MSR Series Configuration Manual

Msr router series network management and monitoring
Hide thumbs Also See for MSR Series:
Table of Contents

Advertisement

To solve this problem, you can save security logs into a security log file without affecting the current log
output rules. After logging in to the device, the system administrator can enable the saving of security
logs into the security log file and configure related parameters. However, the system administrator cannot
perform any operations on the security log file. Only the security log administrator who has passed AAA
local authentication and logged in to the device can manage the security log file.
A security log administrator is a local user who is authorized by AAA to play the security log
administrator role.
For more information about local user and AAA local authentication, see Security Configuration Guide.

Saving security logs into the security log file

If this feature is enabled, the system first outputs security logs to the security log file buffer, and then saves
the logs in the security log file buffer into the security log file at a specified interval (the security log
administrator can also manually save security logs into the log file). After the logs are saved, the buffer
is cleared immediately.
The size of the security log file is limited. If the maximum size is reached, the system deletes the oldest log
and writes the new log into the security log file. To avoid losing security logs, you can set an alarm
threshold. When the alarm threshold is reached, the system outputs a message to inform the
administrator. The administrator can log in to the device as the security log administrator and back up
the security log file.
By default, security logs are not saved into the security log file. The parameters, such as the saving
interval, the maximum size, and the alarm threshold, have default settings. To modify these parameters,
log in to the device as the system administrator, and then follow the steps in the following table to
configure the related parameters:
Step
1.
Enter system view.
2.
Enable the information center.
3.
Enable the saving of the
security logs into the security
log file.
4.
Set the interval for saving
security logs to the security log
file.
5.
Set the maximum size of the
security log file.
6.
Set the alarm threshold of the
security log file usage.
The following matrix shows the feature and router compatibility:
Command
system-view
info-center enable
info-center security-logfile enable
info-center security-logfile
frequency freq-sec
info-center security-logfile
size-quota size
info-center security-logfile
alarm-threshold usage
190
Remarks
N/A
Optional.
Enabled by default.
Disabled by default.
Optional.
Optional.
Optional.
80 by default. That is, when the
usage of the security log file
reaches 80%, the system informs
the user.

Advertisement

Table of Contents
loading

Table of Contents