ii
Configuring SNTP ······················································································································································48
Configuration restrictions and guidelines···················································································································· 48
Configuration task list ···················································································································································· 48
Enabling the SNTP service ············································································································································ 48
Specifying an NTP server for the device ····················································································································· 48
Configuring SNTP authentication ································································································································· 49
Displaying and maintaining SNTP ······························································································································· 50
SNTP configuration example ········································································································································ 50
Configuring the information center···························································································································52
Overview········································································································································································· 52
Log types ································································································································································ 52
Log levels································································································································································ 52
Log destinations ····················································································································································· 53
Default log output rules········································································································································· 53
Log format ······························································································································································ 53
Information center configuration task list····················································································································· 55
Outputting logs to the console ······································································································································ 56
Outputting logs to the monitor terminal ······················································································································· 56
Outputting logs to a log host ········································································································································ 57
Outputting logs to the log buffer ·································································································································· 57
Saving logs to the log file·············································································································································· 58
Managing security logs················································································································································· 59
Saving security logs into the security log file······································································································ 60
Managing the security log file ····························································································································· 60
Enabling synchronous information output ··················································································································· 61
Enabling duplicate log suppression ····························································································································· 61
Disabling an interface from generating link up/down logging information ··························································· 62
Displaying and maintaining information center ········································································································· 62
Configuration example for outputting logs to the console························································································· 63
Configuration example for outputting logs to a UNIX log host················································································· 63
Configuration example for outputting logs to a Linux log host ················································································· 65
Configuring SNMP·····················································································································································67
Overview········································································································································································· 67
FIPS compliance ····························································································································································· 67
SNMP framework·················································································································································· 67
MIB and view-based MIB access control ············································································································ 67
SNMP operations ·················································································································································· 68
Protocol versions···················································································································································· 68
Configuring SNMP basic parameters·························································································································· 68
Configuring SNMPv1 or SNMPv2c basic parameters······················································································ 69
Configuring SNMPv3 basic parameters············································································································· 70
Configuring SNMP logging ·········································································································································· 73
Configuring SNMP notifications··································································································································· 74
Enabling SNMP notifications ······························································································································· 74
Configuring the SNMP agent to send notifications to a host ··········································································· 75
Displaying the SNMP settings······································································································································· 76
SNMPv1/SNMPv2c configuration example··············································································································· 77
SNMPv3 configuration example ·································································································································· 78
Configuring NQA ······················································································································································81
Overview········································································································································································· 81
Collaboration························································································································································· 81
Threshold monitoring ············································································································································ 82
NQA client configuration task list ································································································································ 82