R3721-F3210-F3171-HP High-End Firewalls System Management and Maintenance Configuration Guide-6PW101

68
Ste
p
Command
Remarks
5. Set the maximum storage
space reserved for the security
log file.
info-center security-logfile
size-quota size
Optional.
6. Set the alarm threshold of the
security log file usage.
info-center security-logfile
alarm-threshold usage
Optional.
80 by default. (That is, when the
usage of the security log file
reaches 80%, the system will
inform the user.)
Managing the security log file
After passing the AAA local authentication, the security log administrator can perform the following
operations:
Task Command
Remarks
Display the summary of
the security log file.
display security-logfile summary [ | { begin
| exclude | include } regular-expression ]
Optional.
Change the directory
where the security log
file is saved.
info-center security-logfile switch-directory
dir-name
Optional.
By default, the directory to save the
security log file is the seclog directory
under the root directory of the
storage medium.
Available in user view.
Display contents of the
security log file buffer.
display security-logfile buffer [ | { begin |
exclude | include } regular-expression ]
Optional.
Save all the logs in the
security log file buffer
into the security log file.
security-logfile save
Optional.
By default, the system automatically
saves the security log file at the
interval configured by the info-center
security-logfile frequency command.
The directory for the log file can be
specified using the info-center
security-logfile switch-directory
command.
Available in user view.