hit counter script

Sending System Log Messages To The Console Port - Cisco FirePOWER ASA 5500 series Configuration Manual

Security appliance command line
Hide thumbs Also See for FirePOWER ASA 5500 series:
Table of Contents

Advertisement

Configuring and Managing Logs
specify UDP, the security appliance continues to send logs regardless of whether the syslog server is
operational. The port argument specifies the port that the syslog server listens to for system log
messages. Valid port values are 1025 through 65535, for either protocol. The default UDP port is 514.
The default TCP port is 1470.
For example:
hostname(config)# logging host dmz1 192.168.1.5
If you want to designate more than one syslog server as an output destination, enter a new command for
each syslog server.
To specify which system log messages should be sent to the syslog server, enter the following command:
Step 2
hostname(config)# logging trap {severity_level | message_list}
Where the severity_level argument specifies the severity levels of messages to be sent to the syslog
server. You can specify the severity level number (0 through 7) or name. For severity level names, see
the
appliance sends system log messages for level 3, 2, 1, and 0.
The message_list argumentspecifies a customized message list that identifies the system log messages
to send to the syslog server. For information about creating custom message lists, see the
System Log Messages with Custom Message Lists" section on page
The following example specifies that the security appliance should send to the syslog server all system
log messages with a severity level of level 3 (errors) and higher. The security appliance will send
messages with the severity of 3, 2, and 1.
hostname(config)# logging trap errors
(Optional) If needed, set the logging facility to a value other than its default of 20 by entering the
Step 3
following command:
hostname(config)# logging facility number
Most UNIX systems expect the system log messages to arrive at facility 20.

Sending System Log Messages to the Console Port

This section describes how to configure the security appliance to send logs to the console port.
Note
To start logging to the console port as defined in this procedure, be sure to enable logging for all output
locations. See the
disable logging, see the
page
To specify which system log messages should be sent to the console port , enter the following command:
hostname(config)# logging console {severity_level | message_list}
Where the severity_level argument specifies the severity levels of messages to be sent to the console port.
You can specify the severity level number (0 through 7) or name. For severity level names, see the
"Severity Levels" section on page
appliance sends system log messages for level 3, 2, 1, and 0.
Cisco Security Appliance Command Line Configuration Guide
42-8
"Severity Levels" section on page
"Enabling Logging to All Configured Output Destinations" section on page
"Disabling Logging to All Configured Output Destinations" section on
42-6.
42-23. For example, if you set the level to 3, then the security
42-23. For example, if you set the level to 3, then the security
Chapter 42
Monitoring the Security Appliance
42-17.
"Filtering
42-6. To
OL-10088-01

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Pix 500 seriesCisco asa 5500 series

Table of Contents