Info-Center Security-Logfile Alarm-Threshold - HPE FlexNetwork 7500 Series Network Management And Monitoring Command Reference

Hide thumbs Also See for FlexNetwork 7500 Series:
Table of Contents

Advertisement

Predefined user roles
network-admin
mdc-admin
Parameters
interface-type interface-number: Specifies the egress interface for logs.
Usage guidelines
The system uses the primary IP address of the specified egress interface as the source IP address of
log information no matter which physical interface is used to output the logs.
The info-center loghost source command takes effect only after the information center is enabled
with the info-center enable command.
Examples
# Specify the IP address of interface loopback 0 as the source IP address of logs.
<Sysname> system-view
[Sysname] interface loopback 0
[Sysname-LoopBack0] ip address 2.2.2.2 32
[Sysname-LoopBack0] quit
[Sysname] info-center loghost source loopback 0

info-center security-logfile alarm-threshold

Use info-center security-logfile alarm-threshold to set the alarm threshold for security log file
usage.
Use undo info-center security-logfile alarm-threshold to restore the default.
Syntax
info-center security-logfile alarm-threshold usage
undo info-center security-logfile alarm-threshold
Default
The alarm threshold for security log file usage is 80. When the usage of the security log file reaches
80%, the system outputs a message to inform the administrator.
Views
System view
Predefined user roles
network-admin
mdc-admin
Parameters
usage: Specifies an alarm threshold. The value must be an integer in the range of 1 to 100.
Usage guidelines
When the size of the security log file reaches the upper limit, the system deletes the oldest logs and
then writes new logs to the security log file. This feature helps avoid security log loss by setting an
alarm threshold for the security log file usage. When the threshold is reached, the system outputs log
information to inform the administrator. The administrator can log in to the device as the security log
administrator, and back up the security log file.
378

Advertisement

Table of Contents
loading

Table of Contents