xiii
Chapter 14: Configuring Syslog
System Logging Overview ............................................................................................................................ 14-1
Syslog Operation .......................................................................................................................................... 14-2
Syslog Operation on Extreme Devices .................................................................................................. 14-2
Filtering by Severity and Facility ............................................................................................................ 14-2
Syslog Components and Their Use .............................................................................................................. 14-3
Basic Syslog Scenario ........................................................................................................................... 14-5
Interpreting Messages .................................................................................................................................. 14-6
Example ................................................................................................................................................. 14-6
About Security Audit Logging ....................................................................................................................... 14-6
Security Events Logged ......................................................................................................................... 14-7
Trap Generation ..................................................................................................................................... 14-7
Format Examples ................................................................................................................................... 14-8
Configuring Syslog ....................................................................................................................................... 14-8
Syslog Command Precedence ............................................................................................................... 14-8
About Server and Application Severity Levels ....................................................................................... 14-9
Configuring Syslog Server(s) ................................................................................................................. 14-9
Example............................................................................................................................................14-9
Modifying Syslog Server Defaults ........................................................................................................ 14-10
Displaying System Logging Defaults ..............................................................................................14-10
Modifying Default Settings..............................................................................................................14-10
Reviewing and Configuring Logging for Applications ........................................................................... 14-10
Displaying Current Application Severity Levels ..............................................................................14-11
Enabling Console Logging and File Storage ........................................................................................ 14-11
Displaying to the Console and Saving to a File .............................................................................. 14-11
Configuration Examples ....................................................................................................................... 14-12
Enabling a Server and Console Logging ........................................................................................ 14-12
Adjusting Settings to Allow for Logging at the Debug Level ...........................................................14-12
Chapter 15: Configuring Spanning Tree
Spanning Tree Protocol Overview ................................................................................................................ 15-1
Why Use Spanning Trees? .................................................................................................................... 15-2
Spanning Tree on Extreme Platforms .................................................................................................... 15-2
STP Operation .............................................................................................................................................. 15-3
Rapid Spanning Tree Operation ............................................................................................................ 15-4
Multiple Spanning Tree Operation ......................................................................................................... 15-4
Functions and Features Supported on Extreme Devices ............................................................................. 15-6
Spanning Tree Versions ......................................................................................................................... 15-6
Maximum SID Capacities ....................................................................................................................... 15-6
Network Diameter .................................................................................................................................. 15-6
Port Forwarding ...................................................................................................................................... 15-6
Disabling Spanning Tree ........................................................................................................................ 15-7
STP Features ......................................................................................................................................... 15-7
SpanGuard .......................................................................................................................................15-7
Loop Protect ..................................................................................................................................... 15-7
Updated 802.1t ................................................................................................................................. 15-8
Multisource Detection .......................................................................................................................15-8
Spanning Tree Basics .................................................................................................................................. 15-9
Spanning Tree Bridge Protocol Data Units ............................................................................................ 15-9
Electing the Root Bridge ........................................................................................................................ 15-9
Assigning Path Costs ............................................................................................................................. 15-9
Paths to Root ....................................................................................................................................... 15-10
Identifying Designated, Alternate, and Backup Port Roles .................................................................. 15-12
Assigning Port States ........................................................................................................................... 15-13
RSTP Operation ................................................................................................................................... 15-14