31-12
Cisco Catalyst Blade Switch 3130 for Dell Software Configuration Guide
OL-13270-01
Chapter31 Configuring System Message Logging
Configuring System Message Logging
Beginning in privileged EXEC mode, follow these steps to enable configuration loggi ng :
This example shows how to enable the configuration-change logger and to set the number of entries in
the log to 500.
Switch(config)# archive
Switch(config-archive)# log config
Switch(config-archive-log-cfg)# logging enable
Switch(config-archive-log-cfg)# logging size 500
Switch(config-archive-log-cfg)# end
This is an example of output for the configuration log:
Switch# show archive log config all
idx sess user@line Logged command
38 11 unknown user@vty3 |no aaa authorization config-commands
39 12 unknown user@vty3 |no aaa authorization network default group radius
40 12 unknown user@vty3 |no aaa accounting dot1x default start-stop group
radius
41 13 unknown user@vty3 |no aaa accounting system default
42 14 temi@vty4 |interface GigabitEthernet4/0/1
43 14 temi@vty4 | switchport mode trunk
44 14 temi@vty4 | exit
45 16 temi@vty5 |interface GigabitEthernet5/0/1
46 16 temi@vty5 | switchport mode trunk
47 16 temi@vty5 | exit
Configuring UNIX Syslog Servers
The next sections describe how to configure the UNIX server syslog daemon and how to define the UNIX
system logging facility.

Logging Messages to a UNIX Syslog Daemon

Before you can send system log messages to a UNIX syslog server, you must configure the syslog
daemon on a UNIX server. This procedure is optional.
Command Purpose
Step1 configure terminal Enter global configuration mode.
Step2 archive Enter archive configuration mode.
Step3 log config Enter configuration-change logger configuration mode.
Step4 logging enable Enable configuration change logging.
Step5 logging size entries (Optional) Configure the number of entries retained in the configuration
log. The range is from 1 to 1000. The default is 100.
Note When the configuration log is full, the oldest log entry is removed
each time a new entry is entered.
Step6 end Return to privileged EXEC mode.
Step7 show archive log config Verify your entries by viewing the configuration log.