Cisco Cisco Content Security Management Appliance M160 Guía Del Usuario
13-50
Cisco IronPort AsyncOS 8.0 for Security Management User Guide
Chapter 13 Common Administrative Tasks
In this example, a file named
changed.config.xml
is uploaded and the changes are committed:
mail3.example.com> loadconfig
1. Paste via CLI
2. Load from file
[1]> 2
Enter the name of the file to import:
[]> changed.config.xml
Values have been loaded.
Be sure to run "commit" to make these settings active.
mail3.example.com> commit
In this example, a new configuration file is pasted directly at the command line. (Remember to press
Ctrl-D on a blank line to end the paste command.) Then the System Setup Wizard is used to change the
default hostname, IP address, and gateway information. (For more information, see
Ctrl-D on a blank line to end the paste command.) Then the System Setup Wizard is used to change the
default hostname, IP address, and gateway information. (For more information, see
.) Finally, the changes are committed.
mail3.example.com> loadconfig
1. Paste via CLI
2. Load from file
[1]> 1
Paste the configuration file now. Press CTRL-D on a blank line when done.
[The configuration file is pasted until the end tag </config>. Control-D is entered on a
separate line.]
Values have been loaded.
Be sure to run "commit" to make these settings active.
mail3.example.com> commit
Please enter some comments describing your changes:
[]> pasted new configuration file and changed default settings
Managing Disk Usage
View the amount of disk space allocated to each of the Security Management appliance’s monitoring
services at Management Appliance > System Administration > Disk Management.
services at Management Appliance > System Administration > Disk Management.
Disk Space Maximums and Allocations
You can allocate available disk space among the features that your organization uses, up to the maximum
available.
available.
Table 13-6
Maximum Disk Space Available, in GB