Troubleshooting Guide

Table Of Contents
Table 4: Log commands accessible for various users
Access level role Commands
Administrator The remove and delete commands.
No user at any access level. The following commands:
more
edit
rename
copy
Administrator All configuration commands can only be accessed by
the individual in the administrator role, other than the
preceding commands.
Administrator and auditor All show commands for log files.
All users (Administrator, auditor, security, privilege,
operator.)
All show commands for log configurations.
With enhanced secure mode enabled, authorized users can use SFTP to transfer files to a remote
server with the content encrypted.
SNMP traps
The SNMP trap is an industry-standard method used to manage events. You can set SNMP traps
for specific types of log message (for example, warning or fatal), from specific applications, and
send them to a trap server for further processing. For example, you can configure the switch to send
SNMP traps to a server after a port is unplugged or if a power supply fails.
This document only describes SNMP commands related to traps. For more information about how to
configure SNMP community strings and related topics, see Configuring Security on Avaya Virtual
Services Platform 7200 Series and 8000 Series, NN47227-601.
Secure syslog
Syslog is a standard used to send event log messages to devices within a network. The switch
sends event messages to a logging server called syslog server. The syslog server stores the log
messages and displays them for event reporting. Syslog messages are used for monitoring system
activities and troubleshooting.
The secure syslog feature adds security and authenticated access to the plain text event log
messages that are communicated between a remote syslog server and a syslog client. Secure
syslog feature helps prevent unauthorized access to confidential data transmitted on an unsecured
communication channel between a remote syslog server and client.
To implement the security, this feature employs port forwarding using the Secure Shell (SSH)
cryptography protocol and Transport Layer Security (TLS) to provide the secure connection between
syslog server and client.
Log and trap fundamentals
January 2017 Troubleshooting 38
Comments on this document? infodev@avaya.com