747
Field descriptions
System field descriptions
Service Parameters For Log Properties—Description tab
Optionally, provides an extended description. This information is useful to help track changes or it can
be used as criteria for searches.
The maximum length is 20,000 alphanumeric characters.
Consolidation Window
(seconds)
If, in this amount of time, more than the configured threshold of the same messages
are seen, a special consolidated log message is generated.
If the message has not been seen in the time specified, it is removed from the
consolidation tree.
The default value is 5 seconds.
Maintainer Sleep Time
(seconds)
Amount of time (in seconds) that the maintainer is inactive between trips through
the consolidation tree.
The default value is 1 second.
Log Request Port Number
Port number on which logserviced listens for log requests.
The default value is 6868.
Translation Request Port
Number
Port number on which logserviced listens for requests from services to translate log
messages.
The default value is 6867.
Rollover Request Port
Number
Port number on which logserviced listens for requests to roll over the log file.
The default value is 6866.
Auto delete old logfiles
Automatically deletes old log files rather than suspend logging when there is no
additional space.
This option is unchecked by default.
Minimum number of hours
to keep logfile
Minimum time (in hours) to keep old log files.
The default value is 24 hours.
If auto-delete is enabled, this ensures that log files are not deleted if they are less
than 24 hours old.
Command to run when
diskspace exhausted
Command to execute when the log file reaches the size threshold.
The security gateway’s binary directory (/usr/raptor/bin) is prepended to this
command.
Caption
An optional, brief description of the log service.
The maximum length is 128 characters.
For longer descriptions, use the Description tab.
Table D-229
Service Parameters For Log Properties—General tab (Continued)
Field
Description
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...