472
Monitoring the security gateway
Monitoring log files
5
Optionally, on the Description tab, type a more detailed description than you typed in the Caption
text box.
6
Click
OK
.
7
Optionally, do one of the following:
■
To save your configuration now and activate later, on the toolbar, click
Save
.
■
To activate your configuration now, on the toolbar, click
Activate
.
When prompted to save your changes, click
Yes
.
Related Information
For further information related to this topic, see the following:
■
“Service Parameters For Log Properties—General tab”
■
“Service Parameters For Log Properties—Description tab”
Using the Event Logs toolbars
The Event Logs window has the following tool bar buttons. Which are available and active depends on
the kind of log you are viewing.
Rollover Request
Port Number
Use the up and down arrows to select the port number on which logserviced is listening
for requests to roll over the logfile.
Auto delete old
logfiles
To automatically delete old logfiles rather than suspend logging when there is no
additional space, check
Auto delete old logfiles
.
Minimum number
of hours to keep
logfile
Use the up and down arrows to select the minimum time (in hours) to keep old log files.
Command to run
when diskspace
exhausted
Type the command to execute when the log file reaches the size threshold.
Caption
Type a brief description of the logging service.
Table 12-1
Event Logs upper tab toolbar
Icon
Function
Description
New Log
Saves the existing log file to old logs directory and starts a new log file.
Open Log
Lets you open, delete or backup an archived log file.
Current
If you are viewing an archived log file, returns you to the current log file. If an old log
file is open (shown in the view), this opens the log file that is currently being written
to. (Disabled if already viewing current)
Properties
Opens the properties dialog box, and displays log entry details.
Search
Opens the Search dialog box, which lets you configure basic and advance searches to
focus on certain types of events.
Clear Search
If you are viewing a searched log, you can return to the normal view (unsearched view
of the logged events). Change view to show unfiltered data. (This button is disabled if
the filter is empty.)
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...