Cisco Cisco Content Security Management Appliance M160 Guía Del Usuario
12-9
Cisco IronPort AsyncOS 7.2.0 for Security Management User Guide
OL-21768-01
Chapter 12 Logging
–
System log
Using Configuration History Logs
A configuration history log consists of a configuration file with an additional
section listing the name of the user, a description of where in the configuration the
user made changes, and the comment the user entered when committing the
change. Each time a user commits a change, a new log is created containing the
configuration file after the change.
section listing the name of the user, a description of where in the configuration the
user made changes, and the comment the user entered when committing the
change. Each time a user commits a change, a new log is created containing the
configuration file after the change.
Configuration History Log Example
In this example, the configuration history log shows that the user (admin) added
a guest user to the table that defines which local users are allowed to log in to the
system.
a guest user to the table that defines which local users are allowed to log in to the
system.
<?xml version="1.0" encoding="ISO-8859-1"?>
<!DOCTYPE config SYSTEM "config.dtd">
<!--
XML generated by configuration change.
Change comment: added guest user
User: admin
Configuration are described as:
This table defines which local users are allowed to log into the
system.
Product: Cisco IronPort M160 Messaging Gateway(tm) Appliance
Model Number: M160
Version: 6.7.0-231
Serial Number: 000000000ABC-D000000