Users Guide

Table Of Contents
Enter the minimum severity level for logging to the console in CONFIGURATION mode.
logging console severity
Enter the minimum severity level for logging to the system log le in CONFIGURATION mode.
logging log-file severity
Enter the minimum severity level for logging to terminal lines in CONFIGURATION mode.
logging monitor severity
Enter which server to use for syslog messages with the hostname or IP address in CONFIGURATION mode.
logging server {hostname/ip-address severity}
Disable system logging
You can use the no version of any logging command to disable system logging.
Disable console logging and reset the minimum logging severity to the default in CONFIGURATION mode.
no logging console severity
Disable log-le logging and reset the minimum logging severity to the default in CONFIGURATION mode.
no logging log-file severity
Disable monitor logging and reset the minimum logging severity to the default in CONFIGURATION mode.
no logging monitor severity
Disable server logging and reset the minimum logging severity to the default in CONFIGURATION mode.
no logging server severity
Re-enable any logging command in CONFIGURATION mode.
no logging enable
Enable server logging for log notice
OS10(config)# logging server dell.com severity log-notice
System logging over TLS
To provide enhanced security and privacy in the logged system messages sent to a syslog server, you can use the Transport Layer Security
(TLS) protocol. System logging over TLS encrypts communication between an OS10 switch and a congured remote logging sever,
including:
Performing mutual authentication of a client and server using public key infrastructure (PKI) certicates
Encrypting the entire authentication exchange so that neither user ID nor password is vulnerable to discovery, and that the data is not
modied during transport
Confguration notes
System logging over TLS requires that:
X.509v3 PKI certicates are congured on a certication authority (CA) and installed on the switch. Both the switch and syslog server
exchange a public key in a signed X.509v3 certicate to authenticate each other. For more information, see X.509v3 certicates.
You congure a security prole for system logging as described in Security proles.
Congure system logging over TLS
1 Copy an X.509v3 certicate created by a CA server using a secure method, such as SCP or HTTPS, as described in Manage CA
certicates. Then install the trusted CA certicate in EXEC mode.
crypto ca-cert install ca-cert-filepath [filename]
ca-cert-filepath species the local path to the downloaded certicate; for example, home://CAcert.pem or
usb://CA-cert.pem.
Troubleshoot OS10
1355