Command Reference Guide

Error! Use the Home tab to apply 見出し 1 to the text that you want to appear here. 88
The following table describes the Syslog Configuration Menu options.
Table 80 Syslog Configuration Menu options
Command
Description
host <IP address> <-mgt|-data>
Sets the IP address of the first syslog host. For example,
100.10.1.1
host2 <IP address> <-mgt|-data>
Sets the IP address of the second syslog host. For
example,
100.10.1.2
sever <0-7>
Sets the severity level of the first syslog host displayed.
The default is 7, which means log all the severity levels.
sever2 <0-7>
Sets the severity level of the second syslog host
displayed. The default is 7, which means log all the
severity levels.
facil <0-7>
This option sets the facility level of the first syslog host
displayed. The range is 0-7. The default is 0.
facil2 <0-7>
This option sets the facility level of the second syslog
host displayed. The range is 0-7. The default is 0.
console disable|enable
Enables or disables delivering syslog messages to the
console. When necessary, disabling console ensures
the switch is not affected by syslog messages. It is
enabled by default.
log <feature|all> <enable|disable>
Displays a list of features for which syslog messages
can be generated. You can choose to
enable/disable specific features or enable/disable
syslog on all available features.
Features include:
console
system
mgmt
cli
stg
vlan
ssh
vrrp
ntp
ip
web
ospf
rmon
ufd
802.1x
cfg
cur
Displays the current syslog settings.
Secure Shell Server configuration
Command: /cfg/sys/sshd
[SSHD Menu]
interval Set Interval for generating the RSA server key
scpadm Set SCP-only admin password
hkeygen - Generate the RSA host key
skeygen - Generate the RSA server key
sshport - Set SSH server port number
ena - Enable the SCP apply and save
dis - Disable the SCP apply and save
on - Turn SSH server ON
off - Turn SSH server OFF
cur - Display current SSH server configuration
Telnet traffic on the network is not secure. This menu enables Secure Shell (SSH) access from any SSH
client. The SSH program securely logs into another computer over a network and executes commands in
a secure environment. All data using SSH is encrypted.