No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

AR500, AR510, AR531, AR550, AR1500, and AR2500 Security Hardening And Maintenance Guide

This document provides guidance for strengthening network and device security in terms of network security risks, security architecture, and security hardening policies. It also provides guidance for routine maintenance of device security in terms of the management, control, and forwarding planes.
Rate and give feedback :
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Log Information Security

Log Information Security

Functions

Logs record information such as user operations on devices and device running status. Stored as log files on devices, logs help network administrators monitor the running status of routers and diagnose network faults.

Security Policy

Log security is ensured by the access mode authentication and socket security. Logs can be viewed in the following modes:

  1. A user accesses a device to view logs by using command lines.

  2. A user copies log files to a local disk over FTP. Diagnosis logs must be parsed by a parsing tool.

  3. A user sends logs to the log server when a log host is configured.

In the preceding modes, users must pass the password, AAA, or public-key authentication and successfully access devices to view logs online or obtain log files. When a log host is configured, socket must be used to protect data.

Configuration and Maintenance Methods

See the configuration maintenance in the Console, Telnet, SSH, TFTP, and Socket authentication modes.

Configuration and Maintenance Suggestions

See the configuration maintenance suggestions in the Console, Telnet, SSH, TFTP, and Socket authentication modes.

Translation
Download
Updated: 2019-05-06

Document ID: EDOC1000097300

Views: 4807

Downloads: 72

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next