Administrator Guide

line vty0
Oct 12 21:44:20: %STKUNIT1-M:CP %SEC-5-LOGOUT: Exec session is terminated for user admin
on line vty0
Oct 12 21:44:19: %STKUNIT1-M:CP %SYS-5-CONFIG_I: Configured from vty0 by admin
Oct 12 21:38:25: %STKUNIT1-M:CP %SEC-3-AUTHENTICATION_ENABLE_SUCCESS: Enable
authentication success on vty0 for user admin
Oct 12 21:38:18: %STKUNIT1-M:CP %SEC-5-LOGIN_SUCCESS: Login successful for user admin on
line vty0
Oct 12 21:28:55: %STKUNIT1-M:CP %SEC-5-LOGOUT: Exec session is terminated for user admin
on line vty0
Oct 12 20:29:19: %STKUNIT1-M:CP %SEC-3-AUTHENTICATION_ENABLE_SUCCESS: Enable
authentication success on vty0 for user admin
Oct 12 20:29:12: %STKUNIT1-M:CP %SEC-5-LOGIN_SUCCESS: Login successful for user admin on
line vty0
To view any changes made, use the show running-config logging command in EXEC privilege mode.
Setting Up a Secure Connection to a Syslog Server
You can use reverse tunneling with the port forwarding to securely connect to a syslog server.
Figure 2. Setting Up a Secure Connection to a Syslog Server
Pre-requisites
To configure a secure connection from the switch to the syslog server:
Management
63