Руководство Пользователя для Cisco Cisco Content Security Management Appliance M160

Скачать
Страница из 450
 
15-22
AsyncOS 9.6 for Cisco Content Security Management Appliances User Guide
 
Chapter 15      Logging
  Log Subscriptions
Configuring Log Subscriptions
Log subscriptions create the individual log files that are stored on a Cisco Content Security appliance or 
remotely. A log subscription is either pushed (delivered to another computer) or polled (retrieved from 
the appliance). Generally, log subscriptions have the following attributes:
Use the Management Appliance > System Administration > Log Subscriptions page (or the 
logconfig
 
command in the CLI) to configure a log subscription. You are prompted for the log type, as shown in 
. For most log types, you are also asked to select a log level for the 
log subscription. 
Note
Configuration history logs only: If you anticipate loading configurations from the configuration history 
logs, be aware that you cannot load configurations containing masked passwords. On the Management 
Appliance > System Administration > Log Subscriptions page, select Yes when prompted whether you 
want to include passwords in the log. If you are using the 
logconfig
 command in the CLI, type 
y
 when 
prompted.
Setting the Log Level
Log levels determine the amount of information delivered in a log. Logs can have one of five levels of 
detail. A detailed log-level setting creates larger log files and has a greater impact on system 
performance than an abbreviated log-level setting. A detailed log-level setting includes all the messages 
contained in the abbreviated log-level settings, plus additional messages. As the level of detail increases, 
system performance decreases. 
Table 15-21
Log File Attributes 
Attribute
Description
Log Type
Defines the type of information recorded and the format of the log subscription. For 
more information, see 
Name
Descriptive name of log subscription that you provide for your future reference.
Log Filename
Physical name of the file when it is written to disk. If the system includes multiple 
content security appliances, use a unique log filename to identify the appliance that 
generated the log file.
Rollover by File 
Size
Maximum size that the file can reach before it rolls over. 
Rollover by Time 
When to roll over log files, based on time. See options at 
Log Level
Level of detail for each log subscription.
Retrieval Method
Method used to transfer the log files from the appliance.