display log trace
613
display log trace
Displays system information stored in the nonvolatile log buffer or the
trace buffer.
Syntax
—
display log trace
[{
+
|
-
|
/
}
number-of-messages
]
[
facility
facility-name
] [
matching
string
]
[
severity
severity-level
]
trace
— Displays the log messages in the trace buffer.
+
|
-
|
/
number-of-messages
— Displays the number of messages
specified as follows:
A positive number (for example,
+100
), displays that number of log
entries starting from the oldest in the log.
A negative number (for example,
-100
) displays that number of log
entries starting from newest in the log.
A number preceded by a slash (for example,
/100
) displays that
number of the most recent log entries in the log, starting with the
least recent.
facility
facility-name
—
Area of MSS that is sending the log
message. Type a space and a question mark
(?)
after
display log
trace facility
for a list of valid facilities.
matching
string
—
Displays messages that match a string—for
example, a username or IP address.
severity
severity-level
—
Displays messages at a severity level
greater than or equal to the level specified. Specify one of the
following:
emergency
— The WX switch is unusable.
alert
— Action must be taken immediately.
critical
— You must resolve the critical conditions. If the
conditions are not resolved, the WX can reboot or shut down.
error
— The WX is missing data or is unable to form a connection.
warning
—
A possible problem exists.
notice
— Events that potentially can cause system problems have
occurred. These are logged for diagnostic purposes. No action is
required.
info
— Informational messages only. No problem exists.
debug
— Output from debugging.
Summary of Contents for OfficeConnect WX1200
Page 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Page 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Page 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Page 264: ...264 CHAPTER 8 AAA COMMANDS...
Page 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Page 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Page 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Page 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Page 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Page 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Page 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Page 596: ...596 CHAPTER 21 TRACE COMMANDS...
Page 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Page 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...