Logging Function
243
Note that there is a slash ('/') between module name and severity.
5
Severity
Switch information falls into three categories: log information, debugging
information and trap information. The info-center classifies every kind of
information into 8 severity or urgent levels. The log filtering rule is that the system
prohibits outputting the information whose severity level is greater than the set
threshold. The more urgent the logging packet is, the smaller its severity level.
The
level represented by “emergencies” is 1, and that represented by ”debugging” is
8. Therefore, when the threshold of the severity level is “debugging”, the system
will output all the information.
Definition of severity in logging information is as follows.
Table 271
I
nfo-Center-Defined Severity
Note that there is a slash between severity and digest.
6
Digest
The digest is abbreviation, it represent the abstract of contents.
RDS
Radius module
RM
Routing management
RMON
Remote monitor module
RSA
Revest, shamir and adleman encryption
system
RTPRO
Routing protocol
SHELL
User interface
SNMP
Simple network management protocol
SOCKET
Socket
SSH
Secure shell module
STP
Spanning tree protocol module
SYSMIB
System MIB module
TELNET
Telnet module
UDPH
UDP helper module
VFS
Virtual file system module
VTY
Virtual type terminal module
WCN
Web management module
XM
XModem module
Module name
Description
Severity
Description
emergencies
Extremely emergent errors
alerts
Errors that need to be corrected immediately
critical
Critical errors
errors
Errors that need to be addressed but are not critical
warnings
Warning, there may be some types of errors
notifications
Information that should be noted
informational
Common prompting information
debugging
Debugging information
Summary of Contents for 400 Family
Page 12: ......
Page 16: ...14 ABOUT THIS GUIDE ...
Page 58: ...56 CHAPTER 2 PORT OPERATION ...
Page 68: ...66 CHAPTER 3 VLAN OPERATION ...
Page 98: ...96 CHAPTER 5 NETWORK PROTOCOL OPERATION ...
Page 124: ...122 CHAPTER 6 IP ROUTING PROTOCOL OPERATION ...
Page 156: ...154 CHAPTER 8 ACL CONFIGURATION ...
Page 218: ...216 CHAPTER 11 802 1X CONFIGURATION ...
Page 298: ...296 CHAPTER 13 PASSWORD CONTROL CONFIGURATION OPERATIONS ...
Page 336: ...334 APPENDIX B RADIUS SERVER AND RADIUS CLIENT SETUP ...