F3726, F3211, F3174, R5135, R3816-HP Firewalls and UTM Devices System Management and Maintenance Command Reference-6PW100
100
Views
System view
Default command level
2: System level
Parameters
usage: Specifies an alarm threshold in the range of 1 to 100.
Usage guidelines
When the size of the security log file reaches the upper limit, the system deletes the oldest information
and then writes the new information into the security log file buffer. This feature can avoid security log
loss by setting an alarm threshold. When the threshold is reached, the system outputs log information to
inform the administrator. The administrator can log in to the device as the security log administrator, and
back up the security log file.
Examples
# Set the alarm threshold for security log file usage to 90%.
<Sysname> system-view
[Sysname] info-center security-logfile alarm-threshold 90
Related commands
info-center security-logfile size-quota
info-center security-logfile enable
Use info-center security-logfile enable to enable the saving of the security logs into the security log file.
Use undo info-center security-logfile enable to restore the default.
Syntax
info-center security-logfile enable
undo info-center security-logfile enable
Default
The saving of security logs into the security log file is disabled.
Views
System view
Default command level
2: System level
Usage guidelines
This feature enables the system to output security logs into the security log file buffer, and saves the logs
from the buffer to the security log file at a specific interval.
Examples
# Enable the saving of the security logs into the security log file.
<Sysname> system-view
[Sysname] info-center security-logfile enable