Cisco Systems 3560 Frozen Dessert Maker User Manual


  Open as PDF
of 1288
 
30-5
Catalyst 3560 Switch Software Configuration Guide
OL-8553-06
Chapter 30 Configuring System Message Logging
Configuring System Message Logging
Setting the Message Display Destination Device
If message logging is enabled, you can send messages to specific locations in addition to the console.
Beginning in privileged EXEC mode, use one or more of the following commands to specify the
locations that receive messages. This procedure is optional.
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
logging buffered [size] Log messages to an internal buffer on the switch. The range is 4096 to
2147483647 bytes. The default buffer size is 4096 bytes.
If the switch fails, the log file is lost unless you had previously saved it to
flash memory. See Step 4.
Note Do not make the buffer size too large because the switch could run
out of memory for other tasks. Use the show memory privileged
EXEC command to view the free processor memory on the switch.
However, this value is the maximum available, and the buffer size
should not be set to this amount.
Step 3
logging host Log messages to a UNIX syslog server host.
For host, specify the name or IP address of the host to be used as the
syslog server.
To build a list of syslog servers that receive logging messages, enter this
command more than once.
For complete syslog server configuration steps, see the “Configuring
UNIX Syslog Servers” section on page 30-12.
Step 4
logging file flash:filename
[max-file-size [min-file-size]]
[severity-level-number | type]
Store log messages in a file in flash memory.
For filename, enter the log message filename.
(Optional) For max-file-size, specify the maximum logging file size.
The range is 4096 to 2147483647. The default is 4096 bytes.
(Optional) For min-file-size, specify the minimum logging file size.
The range is 1024 to 2147483647. The default is 2048 bytes.
(Optional) For severity-level-number | type, specify either the logging
severity level or the logging type. The severity range is 0 to 7. For a
list of logging type keywords, see
Table 30-3 on page 30-9. By
default, the log file receives debugging messages and numerically
lower levels.
Step 5
end Return to privileged EXEC mode.
Step 6
terminal monitor Log messages to a nonconsole terminal during the current session.
Terminal parameter-setting commands are set locally and do not remain
in effect after the session has ended. You must perform this step for each
session to see the debugging messages.
Step 7
show running-config Verify your entries.
Step 8
copy running-config startup-config (Optional) Save your entries in the configuration file.