Configuring Message Logging and Severity Level

Groups offer users authorization choices and read/write privileges.

Note: Because only one operator can set the XSR at any time, you must exit Global mode to perform SNMPv3 configuration. Otherwise, the SNMP set request will fail with the “resource unavailable” message. This rule applies to configuration values, not image downloads.

6.Optional. For SNMPv3, enter snmp-server view <name> {oid-tree treeEntryName}{included excluded} to specify a view.

Views offer users selective access to the family tree or Object IDs.

7.Optional. For SNMPv3, enter snmp-server user <username> <group name> v3

[encrypted][auth {md5 sha} auth-password[priv des56 priv-password]]} to add a user.

Users can have different levels of encryption and passwords. Remember to save your configuration after all edits. Refer to the User’s Guide and CLI Reference Guide for more information.

Note: To restart the XSR using NetSight or SNMP management programs, you must enter the snmp-serversystem-shutdowncommand.

Configuring Message Logging and Severity Level

1.Enter logging <console buffer monitor snmp A.B.C.D file> <high medium low debug> to direct where error messages are sent and what degree of severity they will reflect.

Messages stored to buffer are saved to the XSR’s RAM, those stored to monitor are displayed on active Telnet CLI sessions, those stored to A.B.C.D. are saved in the IP address of the associated SYSLOG server. Refer to the XSR CLI Reference and User Guide for more information about severity levels.

Typically, only HIGH severity alarms are logged to red flag critical events and those requiring operator intervention. Also, the DEBUG alarm level is meant for maintenance personnel only.

The XSR may discard LOW and DEBUG level alarms if the system is too occupied to deliver them. The number of discarded messages is displayed by the following line in show logging command output:

Discards: high=0 medium=0 low=4 debug=22

2.Enter show logging to verify the logging configuration.

When the XSR has been up and running for a while more data will be shown in this display. For a detailed list of most alarms and events generated by the router, refer to the XSR User Guide. Remember to save your configuration after all edits.

Viewing Your Configuration

1.Enter show running-configto verify your current configuration.

The XSR will display the commands you issued up to this point. Default values are not displayed.

Note: All show commands can be entered in privileged EXEC mode - XSR# - or Global configuration mode - XSR(config)#.

XSR Getting Started Guide 3-17

Page 61
Image 61
Enterasys Networks XSR-3020 manual Configuring Message Logging and Severity Level, Viewing Your Configuration

XSR-3020 specifications

Enterasys Networks XSR-3020 is a sophisticated Layer 2 and Layer 3 switch designed to meet the demands of modern networking environments. Known for its robust performance and versatility, the XSR-3020 is an ideal solution for enterprises that require high efficiency, comprehensive security, and network reliability.

This switch supports a variety of advanced technologies, making it suitable for both data center and edge deployments. One of its standout features is its scalability. The XSR-3020 can accommodate growing network demands by allowing for easy integration of additional modules. This capacity for expansion ensures that organizations can adapt their networks without the need for complete hardware replacements.

The XSR-3020 offers high-speed connectivity through its multiple gigabit Ethernet ports, providing up to 48 10/100/1000BASE-T ports in a single chassis. This high-density design optimizes the physical space and ensures that organizations can connect numerous devices simultaneously without sacrificing performance. Additionally, it supports Power over Ethernet (PoE), allowing users to power network devices, such as IP cameras and access points, directly through the switch. This feature streamlines installations and reduces the clutter of electrical wiring.

Security is a critical consideration in today’s network landscape, and the XSR-3020 addresses this need with robust security features. It incorporates advanced access control capabilities, enabling administrators to segment traffic and enforce policies effectively. The switch also supports 802.1X authentication, ensuring that only authorized devices can connect to the network.

In terms of management, the XSR-3020 is designed to simplify operations through its user-friendly interface and extensive support for management protocols. It offers native support for Simple Network Management Protocol (SNMP) and can be easily integrated with various network management systems, allowing for efficient monitoring and troubleshooting.

Another key characteristic of the XSR-3020 is its reliability. With features such as redundant power supplies and fans, the switch ensures high availability, minimizing downtime for critical applications. It is also built to withstand harsh conditions, making it suitable for diverse environments.

Overall, the Enterasys Networks XSR-3020 combines high performance, scalability, and security, making it an excellent choice for organizations looking to enhance their network infrastructure. Its comprehensive set of features positions it as a reliable backbone for any modern enterprise network, ensuring that businesses can operate efficiently and securely.