Cisco Cisco Email Security Appliance C160 Mode D'Emploi

Page de 1210
 
38-6
Cisco AsyncOS 9.0 for Email User Guide
 
Chapter 38      Logging
  Overview
Log Retrieval Methods
Log files can be retrieved based upon one of the following file transfer protocols. You set the protocol 
while creating or editing the log subscription in the GUI or via the 
logconfig
 command during the log 
subscription process.
Safe/Block Lists 
Logs
Reporting Logs
Reporting Query 
Logs
Updater Logs
Tracking Logs
Authentication 
Logs
Configuration 
History Logs
API Logs
Table 38-2
Log Type Comparison  (continued)
Contains
Tr
ansactional
Stateless
Recorded as text
Recorded as mbox file
Recorded as binary
Periodic Status 
Information
M
e
ssage R
e
ceiving 
In
for
m
ation
Del
ivery Information
Individu
al Ha
rd 
Bounc
e
s
Individu
al Soft Bounces
Injection S
M
TP 
Conversati
on
Hea
d
er Logging
Del
ivery SMTP 
Conversatio
n
Configuration Information
Table 38-3
Log Transfer Protocols 
Manually 
Download
This method lets you access log files at any time by clicking a link to the log directory 
on the Log Subscriptions page, then clicking the log file to access. Depending on your 
browser, you can view the file in a browser window, or open or save it as a text file. This 
method uses the HTTP(S) protocol and is the default retrieval method. 
Note
Using this method, you cannot retrieve logs for any computer in a cluster, 
regardless of level (machine, group, or cluster), even if you specify this method 
in the CLI. 
FTP Push
This method periodically pushes log files to an FTP server on a remote computer. The 
subscription requires a username, password, and destination directory on the remote 
computer. Log files are transferred based on a rollover schedule set by you.