![HP ProCurve 530 NA Management And Configuration Manual Download Page 128](http://html.mh-extra.com/html/hp/procurve-530-na/procurve-530-na_management-and-configuration-manual_166483128.webp)
5-44
General System Configuration
Enabling System Logging
Enabling System Logging
The access point supports a logging process that can control error messages
saved to memory or sent to a server. The logged messages serve as a valuable
tool for isolating access point and network problems.
The following table lists the error message levels from the most severe
(Emergency) to least severe (Debug). The message levels that are logged
include the specified minimum level up to the Emergency level.
The access point error log can be viewed using the Web interface. The Web
interface displays the last 128 messages logged in chronological order, from
the newest to the oldest. Since the Web interface has a limited amount of
memory for containing and displaying the event log, you should use the CLI
log
command to view the complete list of logged events.
Log messages are only generated since the last reboot. Rebooting the access
point erases all previous log messages. Consider configuring the access point
to log messages to a server (see
“CLI: Setting Logging Parameters” on page 5-46
).
Error Level
Description
Emergency
System unusable
Alert
Immediate action needed
Critical
Critical conditions (e.g., memory allocation, or free memory error -
resource exhausted)
Error
Error conditions (e.g., invalid input, default used)
Warning
Warning conditions (e.g., return false, unexpected return)
Notice
Normal but significant condition, such as cold start
Informational
Informational messages only
Debug
Debugging messages
Summary of Contents for ProCurve 530 NA
Page 1: ...Management and Configuration Guide www procurve com ProCurve Wireless Access Point 530 ...
Page 2: ......
Page 3: ...ProCurve Wireless Access Point 530 Management and Configuration Guide ...
Page 21: ...1 1 1 Getting Started ...
Page 28: ...1 8 Getting Started Need Just a Quick Start This page is intentionally unused ...
Page 29: ...2 1 2 Selecting a Management Interface ...
Page 35: ...3 1 3 Using the Command Line Interface CLI ...
Page 51: ...4 1 4 Using the ProCurve Web Browser Interface ...
Page 85: ...5 1 5 General System Configuration ...
Page 195: ...7 1 7 Wireless Security Configuration ...
Page 271: ...8 1 8 Special Features ...
Page 308: ...8 38 Special Features Identity Driven Management This page is intentionally unused ...
Page 309: ...9 1 9 Command Line Reference ...
Page 474: ...9 166 Command Line Reference Spanning Tree Protocol STP This page is intentionally unused ...
Page 475: ...A 1 A File Uploads Downloads and Resets ...
Page 495: ...B 1 B Defaults ...
Page 507: ...C 1 C Adaptive Tx Power Control Use Cases ...
Page 517: ...D 1 D Open Source Licenses ...
Page 550: ...D 34 Open Source Licenses This page is intentionally unused ...
Page 555: ......