set log
615
Logging state (enabled or disabled)
To override the session defaults for an individual session, type the
set
log
command from within the session and use the
current
option.
trace
— Sets log parameters for trace files.
severity
severity-level
—
Logs events at a severity level greater
than or equal to the level specified. Specify one of the following:
emergency
— The WX switch is unusable.
alert
— Action must be taken immediately.
critical
— You must resolve the critical conditions. If the
conditions are not resolved, the WX can reboot or shut down.
error
— The WX is missing data or is unable to form a connection.
warning
— A possible problem exists.
notice
— Events that potentially can cause system problems have
occurred. These are logged for diagnostic purposes. No action is
required.
info
— Informational messages only. No problem exists.
debug
— Output from debugging.
local-facility
facility-level
—
For messages sent to a syslog
server, maps all messages of the severity you specify to one of the
standard local log facilities defined in RFC 3164. You can specify one
of the following values:
0
— maps all messages to
local0
.
1
— maps all messages to
local1
.
2
— maps all messages to
local2
.
3
— maps all messages to
local3
.
4
— maps all messages to
local4
.
5
— maps all messages to
local5
.
6
— maps all messages to
local6
.
7
— maps all messages to
local7
.
If you do not specify a local facility, MSS sends the messages with their
default MSS facilities. For example, AAA messages are sent with
facility 4 and boot messages are sent with facility 20 by default.
enable
— Enables messages to the specified target.
disable
— Disables messages to the specified target.
Summary of Contents for OfficeConnect WX1200
Page 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Page 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Page 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Page 264: ...264 CHAPTER 8 AAA COMMANDS...
Page 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Page 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Page 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Page 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Page 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Page 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Page 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Page 596: ...596 CHAPTER 21 TRACE COMMANDS...
Page 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Page 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...