Chapter 13
| Basic Administration Protocols
Configuring Event Logging
– 317 –
◆
RAM Level
– Limits log messages saved to the switch’s temporary RAM
memory for all levels up to the specified level. For example, if level 7 is
specified, all messages from level 0 to level 7 will be logged to RAM.
(Range: 0-7, Default: 7)
Note:
The Flash Level must be equal to or less than the RAM Level.
Note:
All log messages are retained in RAM and Flash after a warm restart (i.e.,
power is reset through the command interface).
Note:
All log messages are retained in Flash and purged from RAM after a cold
restart (i.e., power is turned off and then on through the power source).
◆
Command Log Status
– Records the commands executed from the CLI,
including the execution time and information about the CLI user including the
user name, user interface (console port, telnet or SSH), and user IP address. The
severity level for this record type is 6 (a number that indicates the facility used
by the syslog server to dispatch log messages to an appropriate service).
Web Interface
To configure the logging of error messages to system memory:
1.
Click Administration, Log, System.
2.
Select Configure Global from the Step list.
3.
Enable or disable system logging, set the level of event messages to be logged
to flash memory and RAM.
4.
Click Apply.
Figure 200: Configuring Settings for System Memory Logs
To show the error messages logged to system or flash memory:
1.
Click Administration, Log, System.
2.
Select Show System Logs from the Step list.
Summary of Contents for GEL-1061
Page 14: ...Contents 14...
Page 28: ...Section I Getting Started 28...
Page 38: ...Chapter 1 Introduction System Defaults 38...
Page 40: ...Section II Web Configuration 40...
Page 60: ...Chapter 2 Using the Web Interface Navigating the Web Browser Interface 60...
Page 164: ...Chapter 6 Address Table Settings Issuing MAC Address Traps 164...
Page 192: ...Chapter 8 Congestion Control Storm Control 192...
Page 204: ...Chapter 9 Class of Service Layer 3 4 Priority Settings 204...
Page 216: ...Chapter 10 Quality of Service Attaching a Policy Map to a Port 216...
Page 430: ...Chapter 14 Multicast Filtering MLD Snooping Snooping and Query for IPv4 430...
Page 436: ...Chapter 15 IP Tools Address Resolution Protocol 436...
Page 474: ...Section III Appendices 474...
Page 492: ...Glossary 492...
Page 500: ...E052016 ST R02 150200001416A...