F3726, F3211, F3174, R5135, R3816-HP Firewalls and UTM Devices System Management and Maintenance Configuration Guide-6PW100
iii
Deleting the next-startup configuration file ········································································································· 56
Displaying and maintaining a configuration file ······························································································· 56
Configuring the information center ··························································································································· 58
Overview ········································································································································································· 58
Classification of system information ···················································································································· 58
System information levels ····································································································································· 58
Output channels and destinations ······················································································································· 59
Default output rules of system information ·········································································································· 60
System information formats ·································································································································· 61
Information center configuration task list ····················································································································· 64
Outputting system information to the console ············································································································· 65
Outputting system information to the monitor terminal ······························································································ 66
Outputting system information to a log host ··············································································································· 67
Outputting system information to the trap buffer ········································································································ 68
Outputting system information to the log buffer ·········································································································· 69
Outputting system information to the SNMP module ································································································· 70
Outputting system information to the Web interface ·································································································· 71
Saving system information to a log file ························································································································ 71
Managing security logs and the security log file ········································································································ 73
Saving security logs into the security log file ······································································································ 73
Managing the security log file ····························································································································· 74
Enabling synchronous information output ··················································································································· 76
Disabling an interface from generating link up/down logging information ··························································· 77
Displaying and maintaining information center ········································································································· 78
Information center configuration examples ················································································································· 78
Outputting log information to the console ·········································································································· 78
Outputting log information to a UNIX log host ·································································································· 79
Outputting log information to a Linux log host ··································································································· 81
Saving security logs into the security log file ······································································································ 82
Managing logs ··························································································································································· 85
Configuring syslog ························································································································································· 85
User logging (flow logging) overview ························································································································· 87
Configuring user logging in the Web interface ·········································································································· 89
Configuring user logging ····································································································································· 89
Displaying user logging statistics ························································································································· 90
Clearing user logs and user logging statistics ···································································································· 91
Configuring user logging at the CLI ····························································································································· 91
User logging configuration task list ····················································································································· 91
Configuring the user logging version ·················································································································· 91
Configuring the source address for user logging packets ················································································ 92
Exporting user logs ················································································································································ 92
Displaying and maintaining user logging ·········································································································· 94
User logging configuration example ··················································································································· 94
Troubleshooting user logging ······························································································································· 95
Configuring session logging ········································································································································· 95
Session logging configuration task list ················································································································ 95
Configuring a session logging policy ················································································································· 96
Setting session logging thresholds ······················································································································· 97
Log report ········································································································································································ 97
Displaying system logs ·········································································································································· 98
Displaying connection limit logs ·························································································································· 99
Displaying attack prevention logs ····················································································································· 100
Displaying blacklist logs ····································································································································· 100