This section describes how to configure syslog receiving.
Prerequisites
- If you select TCP, to complete the syslog receiving configuration, you must ensure that you have completed the certificate configuration on the device.
- Upload root certificate rootcert.cer and CA certificate cacert.cer of the management center to the cfcard:/security/ folder of the device through FTP. If this folder does not exist, create one.
- Enter ssl policy ssldl and access the ssl policy view. ssldl indicates the view name.
Enter trusted-ca load asn1-ca rootcert.cer and import the root certificate.
Enter trusted-ca load asn1-ca cacert.cer and import the CA certificate.
- If you select TCP, you shall run the info-center loghost ip-address transport tcp ssl-policy policy-name command on the device.
- If you select UDP, you shall run the info-center loghost ip-address command on the device.
- If you select both TCP and UDP, you shall run the info-center loghost ip-address transport tcp ssl-policy policy-name or info-center loghost ip-address command on the device as required.
Procedure
- Choose .
- Modify the syslog receiving configuration. For the description of syslog receiving parameters, see Table 1.
Table 1 Description of syslog receiving parameters
Parameter
|
Description
|
|
|
You shall configure this item when the ATIC serves as the server for receiving syslogs.
NOTE: Usually, the default value is used. The default value for TCP is 6514, and that for UDP is 514. To change the port, ensure that the newly configured port is not in conflict with existing ones.
|
NOTE: UDP is insecure. You are advised to use the more secure TCP (TLSv1.2).
Copyright © Huawei Technologies Co., Ltd.