logging secure
Creates a log file for various events related to X.509v3 certificates.
Syntax
logging {hostname} {secure | tcp | udp} [vrf
vrf-name
] [sha1
fingerprint
] [port
port-number
]
Parameters
hostname
Enter the name of the host or device for which you wish to record logs corresponding to
the certificates.
NOTE:
The hostname can be an IPV4 address, an IPV6 address, or a DNS
hostname—with or without DNS suffix.
secure
Enter the keyword
secure
to enable the Syslog feature to communicate with a
compatible Syslog server using the secure TLS protocol over the default port (6514). The
range is from 1024 to 65535.
tcp
Enter the keyword
tcp
to enable TCP.
udp
Enter the keyword
udp
to enable UDP.
vrf
vrf-name
Enter the keyword
vrf
followed by the name of the VRF.
sha1
fingerprint
Enter the keyword
sha1
followed by the finger print. This option is only available when
the secure option is configured. This new option enables the Syslog feature to compare
the received certificate’s sha-1 fingerprint against this configured sha-1 fingerprint. If
present, only the fingerprint is used for certificate revocation validation.
port
port-number
Enter the keyword
port
followed by the port number. The default port number is 6514
for secure logging.
Defaults
None.
Command Modes
CONFIGURATION
Command History
This guide is platform-specific. For command information about other platforms, see the relevant
Dell Networking
OS Command Line Reference Guide
.
The following is a list of the Dell Networking OS version history for this command:
Version
Description
9.11.0.0
Introduced this command.
Usage Information
The following RBAC roles are allowed to issue this command:
•
sysadmin
•
secadmin
Following are the pre-requisites to configure logging:
•
The logging command must be configured to enable event logging.
•
A certificate must be installed on the switch. This certificate is only used for secure logging.
•
At least one CA certificate must be installed on the switch so that the logging server’s certificate can be
verified. If a SHA1 fingerprint is present, only the fingerprint is used for certificate revocation validation.
X.509v3
1739
Содержание S6100
Страница 1: ...Dell Command Line Reference Guide for the S6100 ON System 9 11 2 0P1 ...
Страница 474: ...protocol list ttl0 ttl1 Dell 474 Control Plane Policing CoPP ...
Страница 979: ... show lldp neighbors display the LLDP neighbors Link Layer Discovery Protocol LLDP 979 ...
Страница 1627: ... uplink state group creates an uplink state group and enables the tracking of upstream links Uplink Failure Detection UFD 1627 ...