Logging Function
259
Note that there is a slash ('/') between module name and severity.
5
Severity
Switch information falls into three categories: log information, debugging
information and trap information. The info-center classifies every kind of
information into 8 severity or urgent levels. The log filtering rule is that the system
prohibits outputting the information whose severity level is greater than the set
threshold. The more urgent the logging packet is, the smaller its severity level.
The
FTPS
FTP server module
HA
High availability module
HTTPD
HTTP server module
IFNET
Interface management module
IGSP
IGMP snooping module
IP
IP module
IPC
Inter-process communication module
IPMC
IP multicast module
L2INF
Interface management module
LACL
LAN switch ACL module
LQOS
LAN switch QoS module
LS
Local server module
MPM
Multicast port management module
NTP
Network time protocol module
PPRDT
Protocol packet redirection module
PTVL
Driver port, VLAN (Port & VLAN) module
QACL
QoS/ACL module
QOSF
QoS profile module
RDS
Radius module
RM
Routing management
RMON
Remote monitor module
RSA
Revest, shamir and adleman encryption
system
RTPRO
Routing protocol
SHELL
User interface
SNMP
Simple network management protocol
SOCKET
Socket
SSH
Secure shell module
STP
Spanning tree protocol module
SYSMIB
System MIB module
TELNET
Telnet module
UDPH
UDP helper module
VFS
Virtual file system module
VTY
Virtual type terminal module
WCN
Web management module
XM
XModem module
Module name
Description
Содержание Switch 4500 26-Port
Страница 16: ...14 ABOUT THIS GUIDE...
Страница 58: ...56 CHAPTER 2 PORT OPERATION...
Страница 104: ...102 CHAPTER 5 NETWORK PROTOCOL OPERATION...
Страница 130: ...128 CHAPTER 6 IP ROUTING PROTOCOL OPERATION...
Страница 154: ...152 CHAPTER 7 ACL CONFIGURATION...
Страница 228: ...226 CHAPTER 11 802 1X CONFIGURATION...
Страница 250: ...248 CHAPTER 14 DEVICE MANAGEMENT...
Страница 280: ...278 CHAPTER 15 SYSTEM MAINTENANCE AND DEBUGGING...
Страница 312: ...310 CHAPTER 18 NTP CONFIGURATION...
Страница 340: ...338 CHAPTER 19 SSH TERMINAL SERVICES...
Страница 350: ...348 CHAPTER 20 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Страница 388: ...386 APPENDIX B RADIUS SERVER AND RADIUS CLIENT SETUP...