- Table of Contents
-
- 07-System
- 01-High availability group
- 02-VRRP
- 03-Track
- 04-BFD
- 05-NQA
- 06-Basic log settings
- 07-Email server
- 08-Session log settings
- 09-Sandbox log settings
- 10-Heartbeat log settings
- 10-Threat log settings
- 11-Application audit log settings
- 12-URL filtering log settings
- 13-Attack defense log settings
- 14-Reputation log settings
- 15-Bandwidth alarm logs
- 16-Configuration log settings
- 17-Security policy log
- 18-Terminal identification logging
- 20-WAF log settings
- 21-IP access logs
- 22-MAC access log
- 23-Bandwidth management logs
- 24-Context rate limit logging
- 25-Report settings
- 26-Session settings
- 27-Signature upgrade
- 28-Software upgrade
- 29-License management
- 30-IRF
- 31-IRF advanced settings
- 32-Contexts
- 33-Administrators
- 34-Date and time
- 35-MAC address learning through a Layer 3 device
- 36-SNMP
- 37-Configuration management
- 38-Reboot
- 39-About
- 40-Ping
- 41-Tracert
- 42-Packet capture
- 43-Webpage Diagnosis
- 44-Diagnostic Info
- 45-Packet trace
- 46-Fast Internet Access
- Related Documents
-
Title | Size | Download |
---|---|---|
16-Configuration log settings | 12.86 KB |
Introduction
This feature logs operations that administrators perform on the device.
The device can create a dedicated configuration log buffer and a separate log file to store configuration log messages. For the device to do so, click the System tab, select Log Settings > Basic Settings, and then select the Output to log buffer option on the Syslog page.
The device saves configuration log messages to the log file buffer before writing the messages to the log file in bulk. After writing the log messages in the log file buffer to the log file, the device clears the log file buffer.
The size of a log file is limited. After the limit is reached, the device replaces the oldest log messages with new log messages.