47To do… Use the command… RemarksConfigure the maximumstorage space reserved for alog fileinfo-center logfile size-quotasizeOptionalThe default value is 2 MB.Configure the directory tosave the log fileinfo-center logfileswitch-directory dir-nameOptionalBy default, the log file is saved in the rootdirectory of the flash.Manually save the log buffercontent to the log file logfile saveOptionalAvailable in any viewBy default, the system saves the log file withthe frequency defined by the info-centerlogfile frequency command.NOTE:• To make sure that the device works normally, use the info-center logfile size-quota command to set alog file to be no smaller than 1 MB and no larger than 10 MB.• The info-center logfile switch-directory command is always used when you back up or move files. Theconfiguration will be invalid after system reboot or the master and slave switchover.Saving security logs into the security log fileIntroductionYou can understand the device status, locate and troubleshoot network problems by viewing systeminformation, especially the security logs. Generally, all kinds of system information including security logsis output into one folder, and it is difficult to recognize and check the security logs among all kinds ofsystem information.This function enables the system to save the security logs into the security log file in a specific directorywithout affecting the current output rules of the system information. It means that the system picks up allsecurity logs from the system information, copies and saves them into the security log file in a specifieddirectory when outputting the system information to different destinations. You can perform centralizedmanagement to the security logs and view the security logs conveniently.The configuration of this feature and the management of the security log file are separated, and thesecurity log file is managed by a privileged user. After logging in to the device, the administrator canenable the saving of security logs into the security log file and configure related parameters by executingthe commands listed in Table 5; however, only the privileged user, known as the security logadministrator, can perform operations (see Table 6 for details) to the security log file after passing theAAA local authentication and logging in to the device, and other users (including the systemadministrator) cannot perform these operations to the security log file.NOTE:• You can authorize a security log administrator by executing the authorization-attribute user-rolesecurity-audit command in local user view.• The system administrator cannot view, copy, and rename the security log file; otherwise, the systemprompts “% Execution error”. The system administrator can view, copy and rename other types of files.• For more information about local user and AAA local authentication, seeSecurity Configuration Guide.