The Command Log window maintains a record of all the user-initiated configuration changes on the selected device.
To view the Command Log window, proceed as follows:
Step 1 Right-click (on a relevant object icon in the Map Viewer window or from an object pick list) and choose Cisco Access Router Manager > Tools > Logging > View Command History. Refer to "EM Windows" for information on which objects allow you to launch the Command Log window.
The Command Log window appears, displaying the Command Log Details tab.
Figure 9-1 Command Log Window
Step 2 Select the relevant IOS host from the IOS Host list box at left of the window.
The Command Log Details pane displays the following:
IndexDisplays an arbitrary integer value to uniquely identify the listed events. When the number reaches the maximum value, the agent wraps the value back to 1 and can flush existing entries.
TimeDisplays the value of system up time when the event occurred.
Command SourceDisplays the source of the command that instigated the event. You will see either Command Line or SNMP.
Config SourceDisplays the configuration data source for the event.
Config DestinationDisplays the configuration data destination for the event.
Terminal TypeWhen the Command Source field is set to Command Line, the terminal type appears (unknown, console, terminal, virtual or auxiliary). Otherwise, not applicable appears.
Terminal NumberWhen the Command Source field is set to Command Line, the terminal number appears. When the terminal is not available or not applicable, -1 appears.
Terminal UserWhen the Command Source field is set to Command Line, the name of the logged in user appears. When the terminal type is not available or not applicable, the field appears empty.
Terminal LocationWhen the Command Source field is set to Command Line, the hard-wired location of the terminal or the remote host for an incoming connection appears. When the terminal type is not available or not applicable, the field appears empty.
Command Source AddressWhen the Terminal Type field is set to virtual, the internet address of the connected system appears. When the Command Source is set to SNMP, the internet address of the requester appears.
Virtual Host NameWhen the Terminal Type field is set to virtual, the host name of the connected system appears. When the Terminal Type is not available or not applicable, the field appears empty.
Server Address If Config Source (or) Config Destination field is 'networkTftp' or 'networkRcp', the Internet address of the storage file server displays. The value is 0.0.0.0 if Config Source (or) Config Destination field is N/A.
FileWhen the Config Source field or the Config Destination field is set to 'networkTftp' or 'networkRcp', the configuration filename at the storage file server appears.
RCP UserWhen the Config Source field or the Config Destination field is set to 'networkRcp', the remote user name appears.
The More (arrow) button is not applicable in this window.
The Event History Details area displays the following:
Uptime at Last SaveDisplays the amount of time the system had been up for, when the running configuration was last saved (written).
Uptime at Last ChangeDisplays the amount of time the system had been up from when the running configuration was last changed.
When the value of the Uptime at Last Change field is greater than the Uptime at Last Save field, the configuration has been changed, but not saved.
Maximum Table EntriesDisplays the maximum number of entries that may appear.
Entries Deleted from TableDisplays the number of times the oldest entry was deleted to make room for a new entry.
Step 3 Scroll through the list of event commands, using the arrow bars, until the relevant event command appears.
You can alter the width of the columns in the Command Log Details table. To change the width of a column. (1) Move the mouse pointer to the left of the column heading. The mouse pointer changes to a double headed arrow. (2) Click and hold the left mouse button. A line appears down the length of the column. (3) Drag the line to the desired width, then release the mouse button. Columns return to their default width when you close the window.
System Log
The SysLog Messages window provides a table of all syslog activity carried out by users logged into CLI or SNMP on a device. Data which displays may be the result of user action or SNMP syslog events. In order to receive SNMP data, the device must be configured with the EM server IP address so that data can be successfully transmitted from the device to the system log.
Note For details on configuring the EM to receive SNMP information from the device, see the
Cisco Access Router Manager Installation Guide.
You can manipulate the system log messages that the window displays by customizing the maximum number of table entries and the minimum severity level. You can opt to be notified of all user activities through alarm notification if required.
To view the SysLog Messages window, proceed as follows:
Step 1 Right-click (on a relevant object icon in the Map Viewer window or from an object pick list) and choose Cisco Access Router Manager > Tools > Logging > View System Log. Refer to "EM Windows" for information on which objects allow you to launch the SysLog Messages window.
The SysLog Messages window appears, displaying the SysLog Messages tab.
Figure 9-2 SysLog Messages Window
Step 2 Select the relevant IOS host from the IOS Host list box at left of the window.
The SysLog Messages pane displays syslog events according to the current SysLog Messages window settings. The SysLog Messages pane displays the following information:
IndexDisplays an arbitrary integer value to uniquely identify the listed messages. When it reaches the maximum value the agent flushes the area and wraps the value back to 1.
FacilityDisplays the name of the facility that generated the facility message.
SeverityDisplays the severity of the message.
Message NameDisplays textual identification for the message type. A facility name in conjunction with a message name uniquely identifies a message type.
Message TextDisplays the text of the message. When the text of the message exceeds 255 bytes, the message is truncated to 254 bytes and a '*' character is appended, indicating a truncated message.
Time StampDisplays the time the system has been running (when the message was generated).
The More (arrow) button is not applicable in this window.
The SysLog Message Details area displays the following:
Messages Not RecordedDisplays the number of syslog messages that were ignored.
Messages Not ProcessedDisplays the number of messages which could not be processed due to a lack of system resources.
Messages Deleted From TableDisplays the number of entries that have been removed to make room for new entries.
Notifications SentDisplays the number of notifications sent.
Step 3 You can customize the data which displays in the SysLog Messages pane through the following entries in the SysLog Message Details area:
Maximum Table EntriesEnter the maximum number of entries that the log displays.
Min. SysLog SeveritySelect the minimum severity level of syslog events that is to display. Any message with a severity less than that selected will be ignored by the agent. This field can be set to emergency, alert, critical, error, warning, notice, info, or debug.
Notifications EnabledChoose whether notifications are enabled or not enabled by selecting the corresponding option.
Step 4 Scroll through the list of system messages, using the arrow keys, until you find the information you want. You can view all the entries by using the horizontal scroll bar.
You can alter the width of the columns in the SysLog Messages table. To change the width of a column: (1) Move the mouse pointer to the left of the column heading. The mouse pointer changes to a double headed arrow. (2) Click and hold the left mouse button. A line appears down the length of the column. (3) Drag the line to the desired width, then release the mouse button. Columns return to their default width when you close the window.
When system log messages reach an established threshold, a syslog trap produces and displays an alarm in the Event Browser. You can further manage syslog alarms using the Event Browser. (Not all events listed, however, are directly related to a syslog trap.)
Note For details regarding the Event Browser, see the Cisco Element Management Framework User Guide.
In order to receive the alarm which the syslog trap triggers, the SNMP trap generation must be enabled within the EM. For additional information, see the "Enabling or Disabling Trap Generation" section.
Telnet
The Initiate Telnet Service application allows you to log onto the device, in order to configure or retrieve information from the device.
To launch a telnet window, proceed as follows:
Step 1 Right-click (on a relevant object icon in the Map Viewer window or from an object pick list) and choose Cisco Access Router Manager > Tools > Telnet. Refer to "EM Windows" for information on which objects allow you to launch the Telnet application.
The telnet window appears.
Figure 9-3 telnet Window
Step 2 Enter the required password (the device may also require a valid user name).
You may enter commands as necessary. To terminate the Telnet session, enter exit at the command prompt. To close the telnet window, enter exit a second time at the command prompt.