- Table of Contents
-
- 03-Security Command Reference
- 00-Preface
- 01-ARP attack protection commands
- 02-ASPF commands
- 03-IP-MAC binding commands
- 04-Keychain commands
- 05-ND attack defense commands
- 06-Password control commands
- 07-uRPF commands
- 08-Location identification commands
- 09-Security zone commands
- 10-User identification commands
- 11-MAC learning through a Layer 3 device commands
- 12-Security policy commands
- 13-Microsegmentation commands
- 14-IP-SGT mapping commands
- 15-SMS commands
- 16-Trusted access control commands
- 17-Application account auditing commands
- 18-Terminal identification commands
- 19-IPoE commands
- 20-SSL commands
- 21-Flow manager commands
- 22-Object group commands
- 23-IP source guard commands
- 24-Server connection detection commands
- 25-Session management commands
- 26-DDoS protection commands
- 27-PKI commands
- 28-Crypto engine commands
- 29-AAA commands
- 30-Portal commands
- 31-IPsec commands
- 32-Public key management commands
- 33-Attack detection and prevention commands
- 34-Connection limit commands
- 35-SSH commands
- 36-SDP zero trust commands
- 37-APR commands
- 38-Overbilling prevention commands
- Related Documents
-
| Title | Size | Download |
|---|---|---|
| 17-Application account auditing commands | 34.97 KB |
Application account auditing commands
This feature parses personal information from user packets and must be used for legitimate purposes.
app-account extract enable
Use app-account extract enable to enable application account auditing.
Use undo app-account extract enable to disable application account auditing.
Syntax
app-account extract enable
undo app-account extract enable
Default
Application account auditing is disabled.
Views
System view
Predefined user roles
network-admin
context-admin
Usage guidelines
This command can audit the application name and user account in the application layer of packets. Then, the audited information is sent as system logs to the information center for processing.
Examples
# Enable application account auditing.
<Sysname> system-view
[Sysname] app-account extract enable
