CAUTION:
Because the default system configurations for different channels are different, you need to first disable the
output of log, trap, and debugging information of all modules on the specified channel (console in this
example). Then configure the output rule as needed so that unnecessary information will not be output.
# Configure the information output rule: allow log information of ARP and IP modules with severity equal
to or higher than informational to be output to the console. (The source modules allowed to output
information depend on the switch model.)
[Sysname] info-center source arp channel console log level informational state on
[Sysname] info-center source ip channel console log level informational state on
[Sysname] quit
# Enable the display of log information on a terminal. (Optional, this function is enabled by default.)
<Sysname> terminal monitor
Info: Current terminal monitor is on.
<Sysname> terminal logging
Info: Current terminal logging is on.
After the configuration takes effect, if the specified module generates log information, the information
center automatically sends the log information to the console, which then displays the information.
Saving security logs into the security log file
Network requirements
As shown in Figure 57, to efficiently and conveniently view the security events and understand the
security status of the device, make sure of the following points:
• Save security logs into the security log file Flash:/securitylog/seclog.log at a frequency of one hour.
• Only the security log administrator can view the contents of the security log file and back up the
security log file into the FTP server. All other logged-in users cannot view, copy and rename the
security log file.
174