Logs, Igure – GarrettCom Magnum MNS-6K User Manual
Page 72

M A G N U M 6 K S W I T C H E S , M N S - 6 K U S E R G U I D E 
 
Magnum6K25#
F
IGURE
54 – Steps for setting up port security on a specific port
Once port security is setup, it is important to manage the log and review the log often. If the 
signals are sent to the trap receiver, the traps should also be reviewed for intrusion and other 
infractions. 
Logs
All events occurring on the Magnum 6K family of switches are logged. The events can be 
as shown below 
 
Code Description
0
Emergency: system is unusable – called “fatal” in show log 
command 
1
Alert: action must be taken immediately
2
Critical: critical conditions
3
Error: error conditions
4
Warning: warning conditions
5
Notice: normal but significant condition – called “note” in show log 
command 
6
Informational: informational messages
7
Debug: debug-level messages
A few point to note about logs
• By default, the logging is limited to the first six levels
• The event log is now automatically saved to flash, so rebooting will not loose
them. NOTE – since the event logs are written on the flash, once the flash 
memory is full, the logs stop writing. It is important to erase the log periodically 
or use syslog capability to download the logs to a syslog server 
• The event log now includes more information, because of the additional
flexibility built into the log engine. For example, it now logs the IP address and 
user name of a remote user login 
• The log size parameter is now redefined as the max size of the log that is saved to
flash. More events might appear in the log as they happen, but the whole list will 
be trimmed to the specified max size when a save command is issued, or the 
system rebooted. 
These logs are in compliance with the definitions of RFC 3164, though not all the nuances 
of the syslog are implemented as specified by the RFC. 
 
71
