HP 6125XLG R2306-HP 6125XLG Blade Switch Network Management and Monitoring Com - Page 69

info-center security-logfile alarm-threshold, Views, Predefined user roles, Parameters

Page 69 highlights

Views System view Predefined user roles network-admin Parameters interface-type interface-number: Specifies the egress interface for logs by the interface type and interface number. Usage guidelines The system uses the primary IP address of the specified egress interface as the source IP address of log information no matter which physical interface is used to output the logs. The info-center loghost source command takes effect only after the information center is enabled with the info-center enable command. The IP address of the specified egress interface must have been configured. Otherwise, although the info-center loghost source command can be configured successfully, the log host cannot receive any log. Examples # Specify the IP address of interface loopback 0 as the source IP address of logs. system-view [Sysname] interface loopback 0 [Sysname-LoopBack0] ip address 2.2.2.2 32 [Sysname-LoopBack0] quit [Sysname] info-center loghost source loopback 0 info-center security-logfile alarm-threshold Use info-center security-logfile alarm-threshold to set the alarm threshold for security log file usage. Use undo info-center security-logfile alarm-threshold to restore the default. Syntax info-center security-logfile alarm-threshold usage undo info-center security-logfile alarm-threshold Default The alarm threshold for security log file usage is 80. When the usage of the security log file reaches 80%, the system outputs a message to inform the administrator. Views System view Predefined user roles network-admin Parameters usage: Specifies an alarm threshold. The value must be an integer in the range of 1 to 100. 67

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207

67
Views
System view
Predefined user roles
network-admin
Parameters
interface-type interface-number
: Specifies the egress interface for logs by the interface type and interface
number.
Usage guidelines
The system uses the primary IP address of the specified egress interface as the source IP address of log
information no matter which physical interface is used to output the logs.
The
info-center loghost source
command takes effect only after the information center is enabled with the
info-center enable
command.
The IP address of the specified egress interface must have been configured. Otherwise, although the
info-center loghost source
command can be configured successfully, the log host cannot receive any log.
Examples
# Specify the IP address of interface loopback 0 as the source IP address of logs.
<Sysname> system-view
[Sysname] interface loopback 0
[Sysname-LoopBack0] ip address 2.2.2.2 32
[Sysname-LoopBack0] quit
[Sysname] info-center loghost source loopback 0
info-center security-logfile alarm-threshold
Use
info-center security-logfile alarm-threshold
to set the alarm threshold for security log file usage.
Use
undo info-center security-logfile alarm-threshold
to restore the default.
Syntax
info-center security-logfile alarm-threshold
usage
undo info-center security-logfile alarm-threshold
Default
The alarm threshold for security log file usage is 80. When the usage of the security log file reaches 80%,
the system outputs a message to inform the administrator.
Views
System view
Predefined user roles
network-admin
Parameters
usage
: Specifies an alarm threshold. The value must be an integer in the range of 1 to 100.