
Chapter 16: Event Log and Syslog Server Commands
270 Section II: Advanced Operations
The log can display its entries in chronological order (oldest to newest), or
reverse chronological order. The default is chronological order. To reverse
the order, use the REVERSE parameter.
The SEVERITY parameter displays entries of a particular severity.
Table 10 defines the different severity levels. You can specify more than
one severity level at a time. The default is to display error, warning, and
informational messages.
PCFG Port configuration
PKI Public Key Infrastructure
PMIRR Port mirroring
PSEC Port security (MAC address-based)
PTRUNK Port trunking
QOS Quality of Service
RADIUS RADIUS authentication protocol
RPS Redundant power supply
RRP RRP snooping
RTC Real time clock
SNMP SNMP
SSH Secure Shell protocol
SSL Secure Sockets Layer protocol
STP Spanning Tree, Rapid Spanning, and Multiple
Spanning Tree protocols
SYSTEM Hardware status; Manager and Operator log in
and log off events.
TACACS TACACS+ authentication protocol
Telnet Te l n e t
TFTP TFTP
Time System time and SNTP
VLAN Port-based and tagged VLANs, and multiple
VLAN modes
WATCHDOG Watchdog timer
Table 9. AT-S63 Modules (Continued)
Module Name Description
Comentários a estes Manuais