Cisco Cisco Web Security Appliance S170 사용자 가이드
20-8
Cisco AsyncOS for Web User Guide
Chapter 20 Monitor System Activity Through Logs
Adding and Editing Log Subscriptions
Step 4
Submit and commit your changes.
Step 5
If you chose SCP as the retrieval method, the appliance displays an SSH key to you must place on the
SCP server host.
SCP server host.
Related Topics
•
.
Deleting a Log Subscription
Step 1
Choose System Administration > Log Subscriptions.
Step 2
Click the icon under the Delete column for the log subscription you want to delete.
Step 3
Submit and commit your changes.
Related Topics
•
.
Retrieval Method:
SCP on Remote Server
The SCP on Remote Server method (equivalent to SCP Push) periodically
pushes log files using the secure copy protocol to a remote SCP server. This
method requires an SSH SCP server on a remote computer using the SSH2
protocol. The subscription requires a user name, SSH key, and destination
directory on the remote computer. Log files are transferred based on a
rollover schedule set by you.
pushes log files using the secure copy protocol to a remote SCP server. This
method requires an SSH SCP server on a remote computer using the SSH2
protocol. The subscription requires a user name, SSH key, and destination
directory on the remote computer. Log files are transferred based on a
rollover schedule set by you.
When you choose this method, you must enter the following information:
•
SCP server hostname
•
Directory on SCP server to store the log file
•
Username of a user that has permission to connect to the SCP server
Retrieval Method:
Syslog Push
The Syslog Push method sends log messages to a remote syslog server on
port 514. This method conforms to RFC 3164.
port 514. This method conforms to RFC 3164.
When you choose this method, you must enter the following information:
•
Syslog server hostname
•
Protocol to use for transmission, either UDP or TCP
•
Facility to use with the log
You can only choose syslog for text-based logs.
Syslog messages greater than 1024 bytes are truncated. Access logs and
W3C access logs with many custom variables, especially of variable length,
might exceed the 1024 byte limit.
W3C access logs with many custom variables, especially of variable length,
might exceed the 1024 byte limit.
Option
Description