Cisco Cisco Web Security Appliance S390 Betriebsanweisung
434
I R O N P O R T A S Y N C O S 6 . 3 F O R W E B U S E R G U I D E
13. Submit and commit your changes.
14. If you chose SCP as the retrieval method, the appliance displays an SSH key to you must
place on the SCP server host.
FTP on Remote Server
(FTP Push)
(FTP Push)
This method periodically pushes log files to an FTP server on a remote
computer.
When you choose this method, you must enter the following
information:
• Maximum time between file transfers
• FTP server host name
• Directory on FTP server to store the log file
• Username and password of a user that has permission to connect to
computer.
When you choose this method, you must enter the following
information:
• Maximum time between file transfers
• FTP server host name
• Directory on FTP server to store the log file
• Username and password of a user that has permission to connect to
the FTP server
Note: AsyncOS for Web only supports passive mode for remote FTP
servers. It cannot push log files to an FTP server in active mode.
servers. It cannot push log files to an FTP server in active mode.
SCP on Remote Server
(SCP Push)
(SCP Push)
This method periodically pushes log files using the secure copy
protocol to an SCP server on a remote computer. This method requires
an SSH SCP server on a remote computer using the SSH1 or SSH2
protocol. The subscription requires a user name, SSH key, and
destination directory on the remote computer. Log files are transferred
based on a rollover schedule set by you.
When you choose this method, you must enter the following
information:
• Maximum time between file transfers
• Protocol to use for transmission, either SSH1 or SSH2
• SCP server host name
• Directory on SCP server to store the log file
• Username of a user that has permission to connect to the SCP server
Choose whether or not to enable host key checking.
protocol to an SCP server on a remote computer. This method requires
an SSH SCP server on a remote computer using the SSH1 or SSH2
protocol. The subscription requires a user name, SSH key, and
destination directory on the remote computer. Log files are transferred
based on a rollover schedule set by you.
When you choose this method, you must enter the following
information:
• Maximum time between file transfers
• Protocol to use for transmission, either SSH1 or SSH2
• SCP server host name
• Directory on SCP server to store the log file
• Username of a user that has permission to connect to the SCP server
Choose whether or not to enable host key checking.
Syslog Push
This method sends log messages to a remote syslog server. This method
conforms to RFC 3164. The appliance uses port 514.
When you choose this method, you must enter the following
information:
• Syslog server host name
• Protocol to use for transmission, either UDP or TCP
• Facility to use with the log
You can only choose syslog for text-based logs.
conforms to RFC 3164. The appliance uses port 514.
When you choose this method, you must enter the following
information:
• Syslog server host name
• Protocol to use for transmission, either UDP or TCP
• Facility to use with the log
You can only choose syslog for text-based logs.
Table 20-4 Log Transfer Protocols (Continued)
Retrieval Method
Description