Logging Secure - Dell S6100 Configuration Manual

Hide thumbs Also See for S6100:
Table of Contents

Advertisement

logging secure

Creates a log file for various events related to X.509v3 certificates.
Syntax
logging {hostname} {secure | tcp | udp} [vrf vrf-name] [sha1 fingerprint] [port
port-number]
Parameters
hostname
secure
tcp
udp
vrf vrf-name
sha1 fingerprint
port port-number
Defaults
None.
Command Modes
CONFIGURATION
Command History
This guide is platform-specific. For command information about other platforms, see the relevant Dell Networking
OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command:
Version
9.11.0.0
Usage Information
The following RBAC roles are allowed to issue this command:
Following are the pre-requisites to configure logging:
Enter the name of the host or device for which you wish to record logs corresponding to
the certificates.
NOTE:
hostname—with or without DNS suffix.
Enter the keyword secure to enable the Syslog feature to communicate with a
compatible Syslog server using the secure TLS protocol over the default port (6514). The
range is from 1024 to 65535.
Enter the keyword tcp to enable TCP.
Enter the keyword udp to enable UDP.
Enter the keyword vrf followed by the name of the VRF.
Enter the keyword sha1 followed by the finger print. This option is only available when
the secure option is configured. This new option enables the Syslog feature to compare
the received certificate's sha-1 fingerprint against this configured sha-1 fingerprint. If
present, only the fingerprint is used for certificate revocation validation.
Enter the keyword port followed by the port number. The default port number is 6514
for secure logging.
Description
Introduced this command.
sysadmin
secadmin
The logging command must be configured to enable event logging.
A certificate must be installed on the switch. This certificate is only used for secure logging.
At least one CA certificate must be installed on the switch so that the logging server's certificate can be
verified. If a SHA1 fingerprint is present, only the fingerprint is used for certificate revocation validation.
The hostname can be an IPV4 address, an IPV6 address, or a DNS
X.509v3
1739

Advertisement

Table of Contents
loading

Table of Contents