Cisco Cisco Content Security Management Appliance M1070 Mode D'Emploi

Page de 437
 
14-50
AsyncOS 8.1 for Cisco Content Security Management User Guide
Chapter 14      Common Administrative Tasks
1. Paste via CLI
2. Load from file
[1]> 2
Enter the name of the file to import:
[]> changed.config.xml
Values have been loaded.
Be sure to run "commit" to make these settings active.
mail3.example.com> commit
In this example, a new configuration file is pasted directly at the command line. (Remember to press 
Ctrl-D on a blank line to end the paste command.) Then the System Setup Wizard is used to change the 
default hostname, IP address, and gateway information. (For more information, see 
.) Finally, the changes are committed. 
mail3.example.com> loadconfig
1. Paste via CLI
2. Load from file
[1]> 1
Paste the configuration file now. Press CTRL-D on a blank line when done.
[The configuration file is pasted until the end tag </config>. Control-D is entered on a 
separate line.] 
Values have been loaded.
Be sure to run "commit" to make these settings active.
mail3.example.com> commit
Please enter some comments describing your changes:
[]> pasted new configuration file and changed default settings
Managing Disk Usage 
To view the amount of disk space allocated to and currently used by each of the Security Management 
appliance’s monitoring services, select Management Appliance > System Administration > Disk 
Management
To view the percentage of the quotas for quarantines that are currently used, select Management 
Appliance > Centralized Services > System Status
 and look at the Centralized Services section. 
Disk Space Maximums and Allocations 
You can allocate available disk space among the features that your organization uses, up to the maximum 
available. 
Table 14-6
Maximum Disk Space Available, in GB