beautypg.com

Logs, Igure – GarrettCom Magnum MNS-6K User Manual

Page 72

background image

M A G N U M 6 K S W I T C H E S , M N S - 6 K U S E R G U I D E

Magnum6K25#

F

IGURE

54Steps for setting up port security on a specific port

Once port security is setup, it is important to manage the log and review the log often. If the
signals are sent to the trap receiver, the traps should also be reviewed for intrusion and other
infractions.

Logs

All events occurring on the Magnum 6K family of switches are logged. The events can be
as shown below

Code Description

0

Emergency: system is unusable – called “fatal” in show log
command

1

Alert: action must be taken immediately

2

Critical: critical conditions

3

Error: error conditions

4

Warning: warning conditions

5

Notice: normal but significant condition – called “note” in show log
command

6

Informational: informational messages

7

Debug: debug-level messages

A few point to note about logs

• By default, the logging is limited to the first six levels

• The event log is now automatically saved to flash, so rebooting will not loose

them. NOTE – since the event logs are written on the flash, once the flash
memory is full, the logs stop writing. It is important to erase the log periodically
or use syslog capability to download the logs to a syslog server

• The event log now includes more information, because of the additional

flexibility built into the log engine. For example, it now logs the IP address and
user name of a remote user login

• The log size parameter is now redefined as the max size of the log that is saved to

flash. More events might appear in the log as they happen, but the whole list will
be trimmed to the specified max size when a save command is issued, or the
system rebooted.

These logs are in compliance with the definitions of RFC 3164, though not all the nuances
of the syslog are implemented as specified by the RFC.

71