This section describes how to configure syslog receiving.
Prerequisites
- If you select TCP, to complete the syslog receiving configuration,
you must ensure that you have completed the certificate configuration
on the device.
- Upload root certificate rootcert.cer and CA certificate cacert.cer of the management center to the cfcard:/security/ folder of the device through FTP. If this folder does not
exist, create one.
- Enter ssl policy ssldl and access the ssl policy view. ssldl indicates the view name.
Enter trusted-ca load asn1-ca rootcert.cer and
import the root certificate.
Enter trusted-ca load asn1-ca cacert.cer and import the CA certificate.
- If you select TCP, you shall run the info-center loghost ip-address transport tcp ssl-policy policy-name command on the device.
- If you select UDP, you shall run the info-center loghost ip-address command on the device.
- If you select both TCP and UDP, you shall run the info-center
loghost ip-address transport tcp ssl-policy policy-name or info-center loghost ip-address command on the device as required.
Procedure
- Choose .
- Modify the syslog receiving configuration. For the description
of syslog receiving parameters, see Table 1.
Table 1 Description of syslog receiving parameters
Parameter
|
Description
|
|
|
You shall configure this item when the ATIC serves as the
server for receiving syslogs.
NOTE: Usually, the default value
is used. The default value for TCP is 6514, and that for UDP is 514.
To change the port, ensure that the newly configured port is not in
conflict with existing ones.
|
NOTE: UDP is insecure. You are advised to use the more secure
TCP (TLSv1.2).
Copyright © Huawei Technologies Co., Ltd.