Users Guide

Table Of Contents
Configure the remote syslog server in CONFIGURATION mode.
logging server {ipv4address | ipv6address} [tcp | udp | tls] [port-number]
[severity severity-level] [vrf {management | vrf-name]
Note: The switch might temporarily stop printing the system messages for a time period after the following sequence of events:
1. Change the system clock to a future date and wait for the system messages to print.
2. Revert the date to the present date and wait for the system messages to print.
3. Reload the switch.
The switch starts printing system messages after the previously configured future date is reached. This is the system behavior
of the syslog-ng service on Linux.
Disable system logging
You can use the no version of any logging command to disable system logging.
Disable console logging, and reset the minimum logging severity to the default in CONFIGURATION mode.
no logging console severity
Disable log-file logging, and reset the minimum logging severity to the default in CONFIGURATION mode.
no logging log-file severity
Disable monitor logging, and reset the minimum logging severity to the default in CONFIGURATION mode.
no logging monitor severity
Disable server logging, and reset the minimum logging severity to the default in CONFIGURATION mode.
no logging server severity
Reenable any logging command in CONFIGURATION mode.
no logging enable
Enable server logging for log notice
OS10(config)# logging server 10.11.86.139 severity log-notice
System logging over TLS
To provide enhanced security and privacy in the logged system messages sent to a syslog server, you can use the Transport
Layer Security (TLS) protocol. System logging over TLS encrypts communication between an OS10 switch and a configured
remote logging sever, including:
Performing mutual authentication of a client and server using public key infrastructure (PKI) certificates
Encrypting the entire authentication exchange so that neither user ID nor password is vulnerable to discovery, and that the
data is not modified during transport
Confguration notes
System logging over TLS requires that:
X.509v3 PKI certificates are configured on a certification authority (CA) and installed on the switch. Both the switch and
syslog server exchange a public key in a signed X.509v3 certificate to authenticate each other.
You configure a security profile for system logging.
Configure system logging over TLS
1. Copy an X.509v3 certificate created by a CA server using a secure method, such as SCP or HTTPS. Then install the trusted
CA certificate in EXEC mode.
crypto ca-cert install ca-cert-filepath [filename]
Troubleshoot Dell EMC SmartFabric OS10
1807