- Table of Contents
-
- 07-System
- 01-High availability group
- 02-VRRP
- 03-Track
- 04-BFD
- 05-NQA
- 06-Basic log settings
- 07-Email server
- 08-Session log settings
- 09-Sandbox log settings
- 10-Heartbeat log settings
- 10-Threat log settings
- 11-Application audit log settings
- 12-URL filtering log settings
- 13-Attack defense log settings
- 14-Reputation log settings
- 15-Bandwidth alarm logs
- 16-Configuration log settings
- 17-Security policy log
- 18-Terminal identification logging
- 20-WAF log settings
- 21-IP access logs
- 22-MAC access log
- 23-Bandwidth management logs
- 24-Context rate limit logging
- 25-Report settings
- 26-Session settings
- 27-Signature upgrade
- 28-Software upgrade
- 29-License management
- 30-IRF
- 31-IRF advanced settings
- 32-Contexts
- 33-Administrators
- 34-Date and time
- 35-MAC address learning through a Layer 3 device
- 36-SNMP
- 37-Configuration management
- 38-Reboot
- 39-About
- 40-Ping
- 41-Tracert
- 42-Packet capture
- 43-Webpage Diagnosis
- 44-Diagnostic Info
- 45-Packet trace
- 46-Fast Internet Access
- Related Documents
-
Title | Size | Download |
---|---|---|
15-Bandwidth alarm logs | 13.21 KB |
Bandwidth alarm logs
Introduction
This feature monitors the total incoming traffic on the device. The device examines the total incoming traffic rate every 5 seconds and uses the average traffic rate during the 5 seconds to compare with the threshold. A log message is generated if the total incoming traffic rate on the device has reached or exceeded the threshold for the specified duration. After that, a log message is generated if the average traffic rate during a 5-second period reaches or exceeds the threshold. A log message is also generated when the average traffic rate falls below the threshold for the first time. Bandwidth alarm logs can only be output as system logs.